Browse Title Index


 
Issue Title
 
Vol 5, No 2 (2013) An Analysis on Mobile Visualization Connectionist IDS Abstract
K. Poongodi, B. Rosiline Jeetha
 
Vol 2, No 3 (2010) An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment Abstract
Palvinder Singh Mann, Dinesh Kumar
 
Vol 2, No 5 (2010) An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration Abstract
Saba Naaz, B. V. R. Reddy
 
Vol 7, No 8 (2015) An Approach for Scaling Resources for Applications in Cloud Abstract
Ankita A. Rathor, Amar Buchade
 
Vol 2, No 2 (2010) An Approach for Twofold Defend Secure Mobile Voting Abstract
P. Shanthi Bala
 
Vol 7, No 5 (2015) An Approach to Block Ciphering Using Root of Perfect Square Number Abstract
Shibaranjan Bhattacharyya, Pranam Paul
 
Vol 7, No 9 (2015) An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment Abstract
A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan
 
Vol 3, No 10 (2011) An Architecture for FSM Based Web Service Composition Abstract
M. Ezhilarasan, G. Kumaraguru, D. Balraj
 
Vol 2, No 4 (2010) An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver Abstract
S. Kayalvizhi, R. Chitra
 
Vol 12, No 1 (2020) An Automatic Service Composition using Clustering Techniques Abstract
K. Meenakshi Sundaram, T. Parimalam
 
Vol 3, No 6 (2011) An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms Abstract
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo
 
Vol 6, No 6 (2014) An Effective and Secure Key Management Scheme in Multiphase Cryptosystem Abstract
Manoj Kumar Pandey, Prateeksha Pandey
 
Vol 2, No 9 (2010) An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection Abstract
M. Thangavel, P. Thangaraj
 
Vol 2, No 8 (2010) An Effective Cost Optimized Provisioning Algorithm-(ECOPA) for Optical Networks Abstract
R. Deepalakshmi, S. Rajaram
 
Vol 2, No 5 (2010) An Effective Process Schedule by Clustered Servers Abstract
R. Mala, R. Balasubramaniyan, A. Anandan
 
Vol 8, No 8 (2016) An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics Abstract
K.H. Aparna, M.B. Shyjith
 
Vol 7, No 10 (2015) An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing Abstract
L. V. Sowmya Therese
 
Vol 5, No 4 (2013) An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing Abstract
S. R. Nayana, G. Venifa Mini, J. Jeya A. Celin
 
Vol 3, No 14 (2011) An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture Abstract
Rinkle Rani Aggarwal, Nidhi Garg
 
Vol 9, No 4 (2017) An Efficient Approach for Detecting Dengue Using the Processing Power of Mobile Phones and Social Networks Abstract
B. Ramana Babu
 
Vol 2, No 10 (2010) An Efficient Checkpointing Algorithm for Mobile Distributed Systems Abstract
Surender Kumar, R. K. Chauhan, Parveen Kumar
 
Vol 4, No 3 (2012) An Efficient Digital Signature Scheme Abstract
G. Jai Arul Jose, C. Sajeev, C. Suyambulingom
 
Vol 6, No 3 (2014) An Efficient Distributed Dynamic Load Balancing Algorithm for Private Cloud Environment Abstract
G. Suryadevi, D. Vijayakumar, R. Sabari Muthu Kumar
 
Vol 6, No 3 (2014) An Efficient Dynamic Indexing and Metadata Model for Storage in Cloud Environment Abstract
S. Anjanadevi, D. Vijayakumar
 
Vol 8, No 10 (2016) An Efficient Greedy Algorithm to Improve the Lifetime of the Wireless Sensor Network Abstract
J. R. Arunkumar, M. Sundar Rajan
 
176 - 200 of 922 Items First Previous 3 4 5 6 7 8 9 10 11 12 Next Last