Issue | Title | |
Vol 10, No 1 (2018) | A Survey on Load Balancing Methods in Software Defined Network | Abstract |
Shahram Jamali, Amin Badirzadeh | ||
Vol 10, No 2 (2018) | A Survey on Load Balancing Methods in Software Defined Network | Abstract |
Amin Badirzadeh, Shahram Jamali | ||
Vol 3, No 2 (2011) | A Survey on Mobile Agents Based Load Balancing Based in Distributed Web Servers | Abstract |
M. Aramudhan | ||
Vol 9, No 9 (2017) | A Survey on Network Security Based on Cryptographic Techniques | Abstract |
M. Nachammai, R. Krithika, A. Madhusri | ||
Vol 7, No 2 (2015) | A Survey on Optimal Opportunistic Routing in Mobile Social Network | Abstract |
Pradeep Mhaske, D. D. Londhe | ||
Vol 3, No 14 (2011) | A Survey on Resource Management in Cloud Computing Using Ontology Approach | Abstract |
R. Lakshmi Devi, L. S. Jayashree | ||
Vol 4, No 2 (2012) | A Survey on Routing and Wavelength Assignment in WDM Optical Networks | Abstract |
G. Karpagarajesh, S. Beril, J. Jasper Sweetlin | ||
Vol 10, No 10 (2018) | A Survey on Scheduling Tasks in Fog Nodes | Abstract |
M. Akshaya, A. Dharani, S. Sarathambekai | ||
Vol 9, No 9 (2017) | A Survey on Secured Frequent Pattern Discovery Schemes under the Cloud Environment | Abstract |
K. Banupriya, S. Kiruthika | ||
Vol 8, No 4 (2016) | A Survey on the Applications of IoT in Health Care | Abstract |
G. Sasi, G. Gokul | ||
Vol 9, No 2 (2017) | A Survey on Transmission Power Control Schemes for Wireless Body Area Network | Abstract |
M. Raj Kumar Naik, P. Samundiswary | ||
Vol 7, No 1 (2015) | A Survey on VANET Security Challenges | Abstract |
Jay Rupareliya, Sunil Vithalani, Chirag Gohel | ||
Vol 2, No 7 (2010) | A Survey on Various Aspects of Quantum Cryptography | Abstract |
R. K. Pateriya, J. L. Rana, Anupriya Gupta | ||
Vol 2, No 3 (2010) | A Survey on Various DDoS Attacks on Websites | Abstract |
R. Tamil Selvi, R. Rathika | ||
Vol 9, No 2 (2017) | A Survey on Vertical Handover Decision Algorithms in Heterogeneous Wireless Networks | Abstract |
M. Sivasindhu, P. Samundiswary | ||
Vol 1, No 2 (2009) | A Survey on Web Service Discovery and Selection | Abstract |
N. Sasikaladevi, L. Arockiam | ||
Vol 5, No 9 (2013) | A Survey on Wireless Routing Schemes in Single and Multi-Hop Energy Constrained Networks | Abstract |
C. R. Sakthivel, S. Karthikeyan | ||
Vol 6, No 1 (2014) | A System for Distributed Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis | Abstract |
S. Gopika, I. Diana Jeba Jingle | ||
Vol 1, No 8 (2009) | A System of Umpires for Security of MANET | Abstract |
Ayyaswamy Kathirvel, Rengaramanujam Srinivasan | ||
Vol 4, No 13 (2012) | A Technique for Scalable and Energy Efficient Context Monitoring Framework | Abstract |
Avinash Palave, Shiv K. Sahu, Amit Sinhal | ||
Vol 10, No 6 (2018) | A Traceback Attack OnFreenet | Abstract |
K. Vanitha, P. Anbumani | ||
Vol 3, No 2 (2011) | A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain | Abstract |
N. Arumugam, C. Venkatesh | ||
Vol 1, No 4 (2009) | A Unified Access to Multiple Mail Servers (UAMMS) | Abstract |
D. Sudha, A. Devapriya VimalaMary | ||
Vol 4, No 8 (2012) | A Unique Token based Approach for Secure Cloud Computing | Abstract |
M. V. Raghavendra Reddy, H. Srinivasa Murthy | ||
Vol 7, No 3 (2015) | A Very Robust Dedicated and Verified Technique by Applying the Hybridity of Cloud for Deduplication of Data | Abstract |
Aishwarya Shekhar, Devesh Kumar Srivastava | ||
126 - 150 of 922 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll