Table of Contents
Vol 2, No 6 (2010)
Articles
Manipulating Multistage Interconnection Networks Using Fundamental Arrangements | ||
E. Gur, Z. Zalevsky | ||
Vol 2, No 6 (2010), Pagination: 1-11 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 479 | PDF Views: 202 |
Inheritance Metrics for Object-Oriented Design | ||
Kumar Rajnish, Arbind Kumar Choudhary, Anand Mohan Agrawal | ||
Vol 2, No 6 (2010), Pagination: 13-26 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 422 | PDF Views: 220 |
Comparison of Class Inheritance and Interface Usage in Object Oriented Programming through Complexity Measures | ||
V. Krishnapriya, K. Ramar | ||
Vol 2, No 6 (2010), Pagination: 28-36 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 396 | PDF Views: 211 |
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-Core Architectures | ||
Nitin Chaturvedi, Jithin Thomas, S. Gurunarayanan | ||
Vol 2, No 6 (2010), Pagination: 38-45 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 425 | PDF Views: 167 |
Use of Smart Antennas in AD HOC Networks | ||
Mohammed Ali Hussain, P. Suresh Varma, K. Satya Rajesh, Hussain Basha Pathan, Leela Madhav Sarraju | ||
Vol 2, No 6 (2010), Pagination: 47-54 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 447 | PDF Views: 195 |
A Novel Embedded Statistical Scheduler for Realising High System-QoS | ||
Suman Paul, A. K. Jana, M. K. Pandit | ||
Vol 2, No 6 (2010), Pagination: 56-62 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 433 | PDF Views: 205 |
Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16 | ||
A. K. M. Nazmus Sakib | ||
Vol 2, No 6 (2010), Pagination: 64-74 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 389 | PDF Views: 184 |
Security in Wireless Sensor Networks Using Key Management Schemes | ||
P. Soundarya, L. M. Varalakshmi | ||
Vol 2, No 6 (2010), Pagination: 76-90 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 445 | PDF Views: 199 |
Pattern Recognition Using Neural Networks | ||
Santaji Ghorpade, Jayshree Ghorpade, Shamla Mantri | ||
Vol 2, No 6 (2010), Pagination: 92-98 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 472 | PDF Views: 210 |
Dynamic Scheduling of Skippable Periodic Tasks with Energy Efficiency in Weakly Hard Real-Time System | ||
Santhi Baskaran, P. Thambidurai | ||
Vol 2, No 6 (2010), Pagination: 100-111 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 468 | PDF Views: 213 |
Some Observations on Open Source Software Development on Software Engineering Perspectives | ||
Vinay Tiwari | ||
Vol 2, No 6 (2010), Pagination: 113-125 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 380 | PDF Views: 194 |
Data Mining Algorithms and Medical Sciences | ||
Irshad Ullah | ||
Vol 2, No 6 (2010), Pagination: 127-136 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 443 | PDF Views: 197 |
Network Intrusion Detection System Based on Machine Learning Algorithms | ||
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, M. V. V. N. S. Srikanth, T. Gireesh Kumar | ||
Vol 2, No 6 (2010), Pagination: 138-151 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 587 | PDF Views: 362 |
Segmentation and Object Recognition Using Edge Detection Techniques | ||
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani | ||
Vol 2, No 6 (2010), Pagination: 153-161 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 632 | PDF Views: 440 |
Automatic Induction of Rule Based Text Categorization | ||
D. Maghesh Kumar | ||
Vol 2, No 6 (2010), Pagination: 163-172 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 481 | PDF Views: 206 |