Table of Contents
Vol 7, No 3 (2015)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Threat Modeling-A Survey | ||
Pooja Lahoti, Pragya Shukla | ||
Vol 7, No 3 (2015), Pagination: 63-65 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 192 | PDF Views: 3 |
A Unique Solution for Clickjacking Attack Using Regex Based Code Crawler | ||
B. V. Ramaraju, S. Suganya | ||
Vol 7, No 3 (2015), Pagination: 66-69 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 167 | PDF Views: 3 |
Privacy Preserving Firewall Optimization over Cross Domains | ||
J. Dhyaneshwaran, S. Saravanakumar, N. Selvaraj, S. Arulbalamurugan | ||
Vol 7, No 3 (2015), Pagination: 70-73 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 156 | PDF Views: 2 |
Reduction of Test Data Volume Based On Viterbi Compression Algorithm | ||
K. S. Neelukumari, A. Pavithra, N. Saranya, S. Vanitha | ||
Vol 7, No 3 (2015), Pagination: 74-79 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 162 | PDF Views: 3 |
High Speed Floating Point Multiplier | ||
P. Karthika Rani, S. Ramya, V. Saranya, N. Priya | ||
Vol 7, No 3 (2015), Pagination: 80-83 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 176 | PDF Views: 3 |
Efficient Layout of Fredkin Gate with Minimized Area Methodologies | ||
P. Anusuya, M. Arunmozhi Devi | ||
Vol 7, No 3 (2015), Pagination: 84-88 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 172 | PDF Views: 3 |
BITSTREAMS Compression of RLE with Bitstuffing | ||
J. Satheesh Kumar, G. Saravana Kumar, R. S. Madhunica, K. Prakash, E. Deepa, K. Rajesh | ||
Vol 7, No 3 (2015), Pagination: 89-91 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 205 | PDF Views: 3 |