An Anonymous Secure Routing Using OLSR Protocol |
Osiers Gyamfuah Grace, John Rajan |
Vol 4, No 4 (2013), Pagination: 1645-1651
|
ABSTRACT |
PDF
|
|
Abstract Views: 169 |
PDF Views: 2
|
Security Threats in Wireless Sensor Networks in Each Layer |
Anitha S. Sastry, Shazia Sulthana, S. Vagdevi |
Vol 4, No 4 (2013), Pagination: 1657-1661
|
ABSTRACT |
PDF
|
|
Abstract Views: 179 |
PDF Views: 2
|
Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks |
R. Balakrishna, K. S. Rajesh |
Vol 4, No 4 (2013), Pagination: 1662-1666
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 2
|
Deriving Differential Unit Test Cases from System Test Cases |
V. Ramesh, R. Ananthakumar, S. Kannu Durai |
Vol 4, No 4 (2013), Pagination: 1674-1679
|
ABSTRACT |
PDF
|
|
Abstract Views: 175 |
PDF Views: 3
|
Improving the Student’s Performance Using Educational Data Mining |
K. Shanmuga Priya, A. V. Senthil Kumar |
Vol 4, No 4 (2013), Pagination: 1680-1685
|
ABSTRACT |
PDF
|
|
Abstract Views: 173 |
PDF Views: 3
|
Ant Colony Optimization Based Routing in Wireless Sensor Networks |
K. Syed Ali Fathima, K. Sindhanaiselvan |
Vol 4, No 4 (2013), Pagination: 1686-1689
|
ABSTRACT |
PDF
|
|
Abstract Views: 186 |
PDF Views: 3
|
Steganography: A Security Model for Open Communication |
K. Chandra Sekhar, M. Chandra Sekhar, K. Chokkanathan |
Vol 4, No 4 (2013), Pagination: 1690-1694
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 4
|
Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation |
K. Bhuvaneshwari, A. Francis Saviour Devaraj |
Vol 4, No 4 (2013), Pagination: 1695-1699
|
ABSTRACT |
PDF
|
|
Abstract Views: 190 |
PDF Views: 3
|