Issue | Title | |
Vol 5, No 2 (2013) | An Analysis on Mobile Visualization Connectionist IDS | Abstract |
K. Poongodi, B. Rosiline Jeetha | ||
Vol 2, No 3 (2010) | An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment | Abstract |
Palvinder Singh Mann, Dinesh Kumar | ||
Vol 2, No 5 (2010) | An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration | Abstract |
Saba Naaz, B. V. R. Reddy | ||
Vol 7, No 8 (2015) | An Approach for Scaling Resources for Applications in Cloud | Abstract |
Ankita A. Rathor, Amar Buchade | ||
Vol 2, No 2 (2010) | An Approach for Twofold Defend Secure Mobile Voting | Abstract |
P. Shanthi Bala | ||
Vol 7, No 5 (2015) | An Approach to Block Ciphering Using Root of Perfect Square Number | Abstract |
Shibaranjan Bhattacharyya, Pranam Paul | ||
Vol 7, No 9 (2015) | An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment | Abstract |
A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan | ||
Vol 3, No 10 (2011) | An Architecture for FSM Based Web Service Composition | Abstract |
M. Ezhilarasan, G. Kumaraguru, D. Balraj | ||
Vol 2, No 4 (2010) | An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver | Abstract |
S. Kayalvizhi, R. Chitra | ||
Vol 12, No 1 (2020) | An Automatic Service Composition using Clustering Techniques | Abstract |
K. Meenakshi Sundaram, T. Parimalam | ||
Vol 3, No 6 (2011) | An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms | Abstract |
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo | ||
Vol 6, No 6 (2014) | An Effective and Secure Key Management Scheme in Multiphase Cryptosystem | Abstract |
Manoj Kumar Pandey, Prateeksha Pandey | ||
Vol 2, No 9 (2010) | An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection | Abstract |
M. Thangavel, P. Thangaraj | ||
Vol 2, No 8 (2010) | An Effective Cost Optimized Provisioning Algorithm-(ECOPA) for Optical Networks | Abstract |
R. Deepalakshmi, S. Rajaram | ||
Vol 2, No 5 (2010) | An Effective Process Schedule by Clustered Servers | Abstract |
R. Mala, R. Balasubramaniyan, A. Anandan | ||
Vol 8, No 8 (2016) | An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | Abstract |
K.H. Aparna, M.B. Shyjith | ||
Vol 7, No 10 (2015) | An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing | Abstract |
L. V. Sowmya Therese | ||
Vol 5, No 4 (2013) | An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing | Abstract |
S. R. Nayana, G. Venifa Mini, J. Jeya A. Celin | ||
Vol 3, No 14 (2011) | An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture | Abstract |
Rinkle Rani Aggarwal, Nidhi Garg | ||
Vol 9, No 4 (2017) | An Efficient Approach for Detecting Dengue Using the Processing Power of Mobile Phones and Social Networks | Abstract |
B. Ramana Babu | ||
Vol 2, No 10 (2010) | An Efficient Checkpointing Algorithm for Mobile Distributed Systems | Abstract |
Surender Kumar, R. K. Chauhan, Parveen Kumar | ||
Vol 4, No 3 (2012) | An Efficient Digital Signature Scheme | Abstract |
G. Jai Arul Jose, C. Sajeev, C. Suyambulingom | ||
Vol 6, No 3 (2014) | An Efficient Distributed Dynamic Load Balancing Algorithm for Private Cloud Environment | Abstract |
G. Suryadevi, D. Vijayakumar, R. Sabari Muthu Kumar | ||
Vol 6, No 3 (2014) | An Efficient Dynamic Indexing and Metadata Model for Storage in Cloud Environment | Abstract |
S. Anjanadevi, D. Vijayakumar | ||
Vol 8, No 10 (2016) | An Efficient Greedy Algorithm to Improve the Lifetime of the Wireless Sensor Network | Abstract |
J. R. Arunkumar, M. Sundar Rajan | ||
176 - 200 of 922 Items | First Previous 3 4 5 6 7 8 9 10 11 12 Next Last |
Browse Title Index
Scroll