Browse Title Index


 
Issue Title
 
Vol 11, No 4 (2019) A Proposal on Novel Cloud Scheduling using Soft Computing Techniques Abstract
B. Kanagalakshmi
 
Vol 8, No 3 (2016) A QOS Oriented Analysis in WIMAX Abstract
Lovepreet Kaur, Amandeep Kaur
 
Vol 3, No 6 (2011) A Quarantine Model for Malicious Objects in Computer Network Abstract
Aditya Kumar Singh, Bimal Kumar Mishra
 
Vol 4, No 11 (2012) A Reliability Model for the Task Scheduling in Distributed Systems based on Fuzzy Theory Abstract
Sagar Gulati, P. K. Yadav, K. Bhatia
 
Vol 7, No 1 (2015) A Review of Para-Virtualized Environment for Data Storage Management Abstract
Ketan M. Parmar, Aspriha R. Das
 
Vol 11, No 10 (2019) A Review on Application Perspective of IoT and Wireless Sensor Network (WSN) Abstract
K. Ashton, S. Sadik
 
Vol 12, No 3-5 (2020) A Review on Routing Protocols in Wireless Sensor Networks Abstract
J De Graaff, W Zijp
 
Vol 4, No 1 (2012) A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks Abstract
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran
 
Vol 12, No 11-12 (2020) A Review on Wireless Networks and it's Architectures Abstract
Ruqiang Yan, Hanghang Sun
 
Vol 3, No 9 (2011) A Scalable Overlay Multicast Architecture for Large-Scale Applications Abstract
N. Murali, K. Kumaran
 
Vol 1, No 8 (2009) A Scheduling Algorithm for Coarse Grain Applications with Spry Technique Abstract
S. V. Sudha, K. Thanushkodi
 
Vol 8, No 5 (2016) A Secure - Acknowledgment Based Detection Approach for MANET’S Abstract
V. Sathya
 
Vol 7, No 2 (2015) A Secure Authentication Method using Acknowledgment-based IDS for MANET Abstract
G. Komarasamy, G. Gowthaman
 
Vol 4, No 8 (2012) A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks Abstract
N. Theja, T. Jayakumari
 
Vol 1, No 1 (2009) A Secured Hybrid Architecture Model for Internet Banking (E-Banking) Abstract
R. Ganesan, K. Vivekanandan
 
Vol 3, No 15 (2011) A Short Survey on Routing Protocols in Mobile Ad-Hoc Networks Abstract
M. Sunitha, B. Babitha, J. Samatha
 
Vol 4, No 12 (2012) A Study about Concepts, Virtualization, Benefits and Challenges of Cloud Computing Abstract
G. Sekar, N. M. Elango
 
Vol 4, No 12 (2012) A Study and Design of Encryption Less Protocol using Quantum Bits for Secure Communication in Wireless Network Abstract
K. Maharajan, M. JayaLakshmi, B. Paramasivan, V. SivaKumar
 
Vol 10, No 5 (2018) A Study Based on Different Protocols to Enhance Security for Data Dissemination in Wireless Sensor Networks Abstract
Divya, Khateeja Rukshana, Shifana Begum, Akhilraj V. Gadagkar
 
Vol 5, No 6 (2013) A Study of DASH7 Technology:An Overview Abstract
R. B. Jagadeesha, Jose Oliveira
 
Vol 11, No 10 (2019) A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms Abstract
T. W. Hong, S. G. Miller
 
Vol 8, No 5 (2016) A Study on Authentication Challenges & Approaches Abstract
C. Subramanian, S. Stephen Raj
 
Vol 9, No 3 (2017) A Study on Cyber Physical System and Network Security Abstract
G. Satyavathy, C. Mercy Praba
 
Vol 9, No 1 (2017) A Study on Data Analysis for Intrusion Detection Abstract
D. Anitha, P. Devipriya
 
Vol 8, No 5 (2016) A Study on Innovative Testing Techniques Abstract
S. Somasundaram
 
76 - 100 of 922 Items First Previous 1 2 3 4 5 6 7 8 9 10 Next Last