Issue | Title | |
Vol 5, No 6 (2013) | A Water-Filling Based Scheduling Algorithm for the Smart Grid | Abstract |
A. Karthikeyan, R. Sathish Kumar | ||
Vol 5, No 5 (2013) | Accessibility Assessment of Cloud SaaS Based E-Government for People with Disabilities in India | Abstract |
B. Gohin, Viji Vinod | ||
Vol 5, No 5 (2013) | Achieving Maximum Throughput and Low Delay in Wireless Multi-Hop Networks Using Q-CSMA/CA Algorithm | Abstract |
S. Kousalya, K. Ruba Soundar, K. Selva Murugan | ||
Vol 6, No 7 (2014) | Acknowledged Routing Using Cluster Based Approach in Wireless Sensor Network | Abstract |
Sudhakar S. Jadhav, Sonal A. Bankar | ||
Vol 1, No 4 (2009) | Active Network Approach for Security Management | Abstract |
K. Ravi kumar, A. Kannammal | ||
Vol 2, No 10 (2010) | Adaption of Optimal Evaluation Methods in Resource Utilization by Service Providers with Grid Approaches | Abstract |
Jhansi Lakshmi Vaddelle, Y. Surekha | ||
Vol 5, No 5 (2013) | Adaptive Amplitude Clipping PAPR Reduction Technique Using Extended Peak Reduction Tone Set | Abstract |
Shripad P. Mohani, Shipra Sarkar, Mukul S. Sutaone | ||
Vol 4, No 4 (2012) | Adaptive Content based Secured Access of Data in Cloud Environment | Abstract |
D. Daniel, M. Karthic, M. Prakash, R. Suresh Kumar | ||
Vol 3, No 4 (2011) | Adaptive Local Route Optimization Technique with Multiple MAP Environments in Hierarchical Mobile IPv6 Networks | Abstract |
Yudhvir Singh, Yogesh Chaba, Rajesh Kumar, Prabha Rani | ||
Vol 3, No 2 (2011) | Adaptive Network Topology Acquisition (A-NTA) Algorithm in IEEE 802.16j Non-Transparent Mode Relay Networks | Abstract |
D. Satish Kumar, N. Nagarajan | ||
Vol 3, No 6 (2011) | Adaptive Routing for QoS in Manet by Using Cross Layer Architecture | Abstract |
P. Chitra, G. Ilanchezhia Pandian, P. Sheik Abdul Khader | ||
Vol 4, No 13 (2012) | Adequate Labour Welfare Measures Leads to Healthy Industrial Relations–An Empirical Analysis | Abstract |
Bhavani, Thamil Selvan | ||
Vol 3, No 7 (2011) | Advance Defense Modeling for SCADA Systems | Abstract |
Suma Christal Mary, Renjini Jose | ||
Vol 2, No 7 (2010) | Advanced Intrusion Detection and Prevention System with Rule Based Mining Techniques and Using Prevention Policies over an Internet | Abstract |
P. S. Revankar, A. B. Pawar | ||
Vol 1, No 6 (2009) | Algorithm for Cryptanalysis with Application to Data Encryption Standard | Abstract |
K. Ravikumar, A. Kannammal, S. A. Jameel | ||
Vol 1, No 8 (2009) | Alternative Best Effort (ABE) Router (Providing a Low-Delay Service within Best Effort) | Abstract |
A. S. Naveenkumar, M. Punithavalli | ||
Vol 7, No 7 (2015) | An Abstract Survey on Software–Defined Networking | Abstract |
C. Tamilselvi | ||
Vol 4, No 4 (2012) | An Adaptive CSMA/TDMA Hybrid-Mac for Wireless Sensor Networks | Abstract |
S. Koteswara Rao, M. Sailaja, T. Madhu, P. Ramesh | ||
Vol 1, No 8 (2009) | An Adaptive Intrusion Detection and Prevention System Approach to Network Security | Abstract |
T. Sarathamani, N. Sudha Bhuvaneswari | ||
Vol 3, No 5 (2011) | An Adaptive Reliable Multipath Centralized RWA Algorithm for All-Optical WDM Networks | Abstract |
T. K. Ramesh, Sandeep Kumar Konda, M. Swaraj Teja, Harshadeep, P. R. Vaya | ||
Vol 8, No 4 (2016) | An Algorithm for Dexterous Scanning Neighbour Devices in Opportunistic Mobile Social Networks | Abstract |
K. Suganthi, K. Saranya | ||
Vol 12, No 9-10 (2020) | An Analysis of Cloud Networking and Cloud-based Data Center Networks | Abstract |
Nabil Bitar, Steven Gringeri | ||
Vol 12, No 6-8 (2020) | An Analysis of Cyber Security and Privacy issues in Big Data Analysis | Abstract |
M. Arias-Estévez, J Simal-Gándara | ||
Vol 4, No 13 (2012) | An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network | Abstract |
R. Venkatesan, A. Arul Lawrence Selvakumar | ||
Vol 11, No 10 (2019) | An Analysis of Wireless Sensor Network Attack Classification | Abstract |
D. Spirjakin | ||
151 - 175 of 922 Items | First Previous 2 3 4 5 6 7 8 9 10 11 Next Last |
Browse Title Index
Scroll