Manipulating Multistage Interconnection Networks Using Fundamental Arrangements |
E. Gur, Z. Zalevsky |
Vol 2, No 6 (2010), Pagination: 1-11
|
ABSTRACT |
PDF
|
|
Abstract Views: 366 |
PDF Views: 155
|
Inheritance Metrics for Object-Oriented Design |
Kumar Rajnish, Arbind Kumar Choudhary, Anand Mohan Agrawal |
Vol 2, No 6 (2010), Pagination: 13-26
|
ABSTRACT |
PDF
|
|
Abstract Views: 311 |
PDF Views: 168
|
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-Core Architectures |
Nitin Chaturvedi, Jithin Thomas, S. Gurunarayanan |
Vol 2, No 6 (2010), Pagination: 38-45
|
ABSTRACT |
PDF
|
|
Abstract Views: 318 |
PDF Views: 120
|
Use of Smart Antennas in AD HOC Networks |
Mohammed Ali Hussain, P. Suresh Varma, K. Satya Rajesh, Hussain Basha Pathan, Leela Madhav Sarraju |
Vol 2, No 6 (2010), Pagination: 47-54
|
ABSTRACT |
PDF
|
|
Abstract Views: 342 |
PDF Views: 150
|
A Novel Embedded Statistical Scheduler for Realising High System-QoS |
Suman Paul, A. K. Jana, M. K. Pandit |
Vol 2, No 6 (2010), Pagination: 56-62
|
ABSTRACT |
PDF
|
|
Abstract Views: 327 |
PDF Views: 143
|
Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16 |
A. K. M. Nazmus Sakib |
Vol 2, No 6 (2010), Pagination: 64-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 286 |
PDF Views: 140
|
Security in Wireless Sensor Networks Using Key Management Schemes |
P. Soundarya, L. M. Varalakshmi |
Vol 2, No 6 (2010), Pagination: 76-90
|
ABSTRACT |
PDF
|
|
Abstract Views: 337 |
PDF Views: 149
|
Pattern Recognition Using Neural Networks |
Santaji Ghorpade, Jayshree Ghorpade, Shamla Mantri |
Vol 2, No 6 (2010), Pagination: 92-98
|
ABSTRACT |
PDF
|
|
Abstract Views: 359 |
PDF Views: 165
|
Dynamic Scheduling of Skippable Periodic Tasks with Energy Efficiency in Weakly Hard Real-Time System |
Santhi Baskaran, P. Thambidurai |
Vol 2, No 6 (2010), Pagination: 100-111
|
ABSTRACT |
PDF
|
|
Abstract Views: 369 |
PDF Views: 161
|
Data Mining Algorithms and Medical Sciences |
Irshad Ullah |
Vol 2, No 6 (2010), Pagination: 127-136
|
ABSTRACT |
PDF
|
|
Abstract Views: 334 |
PDF Views: 146
|
Network Intrusion Detection System Based on Machine Learning Algorithms |
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, M. V. V. N. S. Srikanth, T. Gireesh Kumar |
Vol 2, No 6 (2010), Pagination: 138-151
|
ABSTRACT |
PDF
|
|
Abstract Views: 474 |
PDF Views: 308
|
Segmentation and Object Recognition Using Edge Detection Techniques |
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani |
Vol 2, No 6 (2010), Pagination: 153-161
|
ABSTRACT |
PDF
|
|
Abstract Views: 527 |
PDF Views: 381
|
Automatic Induction of Rule Based Text Categorization |
D. Maghesh Kumar |
Vol 2, No 6 (2010), Pagination: 163-172
|
ABSTRACT |
PDF
|
|
Abstract Views: 376 |
PDF Views: 161
|