An Exploration of Grid Computing to be Utilized in Teaching and Research at TU |
Mohammed A. M. Ibrahim |
Vol 6, No 3 (2014), Pagination: 2291-2299
|
ABSTRACT |
PDF
|
|
Abstract Views: 221 |
PDF Views: 2
|
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:A Review |
Sushant Patial, Jawahar Thakur |
Vol 6, No 3 (2014), Pagination: 2308-2313
|
ABSTRACT |
PDF
|
|
Abstract Views: 231 |
PDF Views: 2
|
Information-Flow Analysis of Design Breaks Up |
Rajendra Kumar, Anil Kumar, Namrata Dhanda |
Vol 6, No 3 (2014), Pagination: 2319-2328
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 5
|
Diagnosis of Rectal Cancer through Images |
K. Sivakami Sundari, P. Vanaselvi, T. S. Vishakai |
Vol 6, No 3 (2014), Pagination: 2329-2333
|
ABSTRACT |
PDF
|
|
Abstract Views: 223 |
PDF Views: 2
|
String Identifier in Multiple Medical Databases |
Simona-Roxana Dumitrescu, Dan Popescu |
Vol 6, No 3 (2014), Pagination: 2334-2337
|
ABSTRACT |
PDF
|
|
Abstract Views: 219 |
PDF Views: 2
|
A Framework for Multicloud Environment Services |
C. S. Pillai |
Vol 6, No 3 (2014), Pagination: 2338-2341
|
ABSTRACT |
PDF
|
|
Abstract Views: 380 |
PDF Views: 2
|
Network Monitoring and Traffic Reduction Using Multi-Agent Technology |
M. Subramanian |
Vol 6, No 3 (2014), Pagination: 2342-2346
|
ABSTRACT |
PDF
|
|
Abstract Views: 218 |
PDF Views: 3
|
Open Flow Security Threat Detection and Defense Services |
Wanqing You, Kai Qian, Xi He, Ying Qian |
Vol 6, No 3 (2014), Pagination: 2347-2351
|
ABSTRACT |
PDF
|
|
Abstract Views: 229 |
PDF Views: 5
|