An Anonymous Secure Routing Using OLSR Protocol |
Osiers Gyamfuah Grace, John Rajan |
Vol 4, No 4 (2013), Pagination: 1645-1651
|
ABSTRACT |
PDF
|
|
Abstract Views: 183 |
PDF Views: 2
|
Security Threats in Wireless Sensor Networks in Each Layer |
Anitha S. Sastry, Shazia Sulthana, S. Vagdevi |
Vol 4, No 4 (2013), Pagination: 1657-1661
|
ABSTRACT |
PDF
|
|
Abstract Views: 191 |
PDF Views: 2
|
Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks |
R. Balakrishna, K. S. Rajesh |
Vol 4, No 4 (2013), Pagination: 1662-1666
|
ABSTRACT |
PDF
|
|
Abstract Views: 207 |
PDF Views: 2
|
Deriving Differential Unit Test Cases from System Test Cases |
V. Ramesh, R. Ananthakumar, S. Kannu Durai |
Vol 4, No 4 (2013), Pagination: 1674-1679
|
ABSTRACT |
PDF
|
|
Abstract Views: 187 |
PDF Views: 3
|
Improving the Student’s Performance Using Educational Data Mining |
K. Shanmuga Priya, A. V. Senthil Kumar |
Vol 4, No 4 (2013), Pagination: 1680-1685
|
ABSTRACT |
PDF
|
|
Abstract Views: 187 |
PDF Views: 3
|
Ant Colony Optimization Based Routing in Wireless Sensor Networks |
K. Syed Ali Fathima, K. Sindhanaiselvan |
Vol 4, No 4 (2013), Pagination: 1686-1689
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 3
|
Steganography: A Security Model for Open Communication |
K. Chandra Sekhar, M. Chandra Sekhar, K. Chokkanathan |
Vol 4, No 4 (2013), Pagination: 1690-1694
|
ABSTRACT |
PDF
|
|
Abstract Views: 209 |
PDF Views: 4
|
Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation |
K. Bhuvaneshwari, A. Francis Saviour Devaraj |
Vol 4, No 4 (2013), Pagination: 1695-1699
|
ABSTRACT |
PDF
|
|
Abstract Views: 198 |
PDF Views: 3
|