Issue | Title | |
Vol 11, No 4 (2019) | A Proposal on Novel Cloud Scheduling using Soft Computing Techniques | Abstract |
B. Kanagalakshmi | ||
Vol 8, No 3 (2016) | A QOS Oriented Analysis in WIMAX | Abstract |
Lovepreet Kaur, Amandeep Kaur | ||
Vol 3, No 6 (2011) | A Quarantine Model for Malicious Objects in Computer Network | Abstract |
Aditya Kumar Singh, Bimal Kumar Mishra | ||
Vol 4, No 11 (2012) | A Reliability Model for the Task Scheduling in Distributed Systems based on Fuzzy Theory | Abstract |
Sagar Gulati, P. K. Yadav, K. Bhatia | ||
Vol 7, No 1 (2015) | A Review of Para-Virtualized Environment for Data Storage Management | Abstract |
Ketan M. Parmar, Aspriha R. Das | ||
Vol 11, No 10 (2019) | A Review on Application Perspective of IoT and Wireless Sensor Network (WSN) | Abstract |
K. Ashton, S. Sadik | ||
Vol 12, No 3-5 (2020) | A Review on Routing Protocols in Wireless Sensor Networks | Abstract |
J De Graaff, W Zijp | ||
Vol 4, No 1 (2012) | A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks | Abstract |
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran | ||
Vol 12, No 11-12 (2020) | A Review on Wireless Networks and it's Architectures | Abstract |
Ruqiang Yan, Hanghang Sun | ||
Vol 3, No 9 (2011) | A Scalable Overlay Multicast Architecture for Large-Scale Applications | Abstract |
N. Murali, K. Kumaran | ||
Vol 1, No 8 (2009) | A Scheduling Algorithm for Coarse Grain Applications with Spry Technique | Abstract |
S. V. Sudha, K. Thanushkodi | ||
Vol 8, No 5 (2016) | A Secure - Acknowledgment Based Detection Approach for MANET’S | Abstract |
V. Sathya | ||
Vol 7, No 2 (2015) | A Secure Authentication Method using Acknowledgment-based IDS for MANET | Abstract |
G. Komarasamy, G. Gowthaman | ||
Vol 4, No 8 (2012) | A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks | Abstract |
N. Theja, T. Jayakumari | ||
Vol 1, No 1 (2009) | A Secured Hybrid Architecture Model for Internet Banking (E-Banking) | Abstract |
R. Ganesan, K. Vivekanandan | ||
Vol 3, No 15 (2011) | A Short Survey on Routing Protocols in Mobile Ad-Hoc Networks | Abstract |
M. Sunitha, B. Babitha, J. Samatha | ||
Vol 4, No 12 (2012) | A Study about Concepts, Virtualization, Benefits and Challenges of Cloud Computing | Abstract |
G. Sekar, N. M. Elango | ||
Vol 4, No 12 (2012) | A Study and Design of Encryption Less Protocol using Quantum Bits for Secure Communication in Wireless Network | Abstract |
K. Maharajan, M. JayaLakshmi, B. Paramasivan, V. SivaKumar | ||
Vol 10, No 5 (2018) | A Study Based on Different Protocols to Enhance Security for Data Dissemination in Wireless Sensor Networks | Abstract |
Divya, Khateeja Rukshana, Shifana Begum, Akhilraj V. Gadagkar | ||
Vol 5, No 6 (2013) | A Study of DASH7 Technology:An Overview | Abstract |
R. B. Jagadeesha, Jose Oliveira | ||
Vol 11, No 10 (2019) | A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms | Abstract |
T. W. Hong, S. G. Miller | ||
Vol 8, No 5 (2016) | A Study on Authentication Challenges & Approaches | Abstract |
C. Subramanian, S. Stephen Raj | ||
Vol 9, No 3 (2017) | A Study on Cyber Physical System and Network Security | Abstract |
G. Satyavathy, C. Mercy Praba | ||
Vol 9, No 1 (2017) | A Study on Data Analysis for Intrusion Detection | Abstract |
D. Anitha, P. Devipriya | ||
Vol 8, No 5 (2016) | A Study on Innovative Testing Techniques | Abstract |
S. Somasundaram | ||
76 - 100 of 922 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll