Table of Contents
Vol 2, No 3 (2010)
Articles
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector | ||
Srirangam V. Addepallil1High Performance Computing Centre, Texas Tech University, Lubbock, Texas, Per Andersen, George L. Barnes | ||
Vol 2, No 3 (2010), Pagination: 1-10 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 222 | PDF Views: 129 |
Low Power Shift and Add Multiplier Design | ||
C. N. Marimuthu, P. Thangaraj, Aswathy Ramesan | ||
Vol 2, No 3 (2010), Pagination: 12-22 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 229 | PDF Views: 141 |
Implementing and Evaluating A Wireless Body Sensor System For Automated Physiological Data Acquisition At Home | ||
Chao Chen, Carlos Pomalaza-Raez | ||
Vol 2, No 3 (2010), Pagination: 24-38 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 230 | PDF Views: 136 |
A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software | ||
K. M. Azharul Hasan, Mohammad Sabbir Hasan | ||
Vol 2, No 3 (2010), Pagination: 40-54 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 238 | PDF Views: 134 |
Hybrid Scenario based Performance Analysis of DSDV and DSR | ||
Koushik Majumder, Subir Kumar Sarkar | ||
Vol 2, No 3 (2010), Pagination: 56-70 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 237 | PDF Views: 127 |
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues | ||
Md. Headayetullah, G. K. Pradhan | ||
Vol 2, No 3 (2010), Pagination: 72-91 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 237 | PDF Views: 117 |
An Algorithm To Self - Extract Secondary Keywords and Their Combinations Based On Abstracts Collcted Using Primary Keywords From Online Digital Libraries | ||
Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi, Hari Cohly | ||
Vol 2, No 3 (2010), Pagination: 93-101 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 227 | PDF Views: 129 |
A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding | ||
A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar | ||
Vol 2, No 3 (2010), Pagination: 103-112 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 249 | PDF Views: 136 |
Biometric Authentication Using Nonparametric Methods | ||
S. V. Sheela, K. R. Radhika | ||
Vol 2, No 3 (2010), Pagination: 114-133 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 231 | PDF Views: 127 |
Game Information System | ||
Spits Warnars | ||
Vol 2, No 3 (2010), Pagination: 135-148 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 228 | PDF Views: 128 |
Survey on the Event Orderings Semantics Used for Distributed System | ||
Yaser Miaji, Osman Gazali, Suhaidi Hassan | ||
Vol 2, No 3 (2010), Pagination: 150-158 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 215 | PDF Views: 120 |
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups | ||
Ruchira Naskar, Indranil Sengupta | ||
Vol 2, No 3 (2010), Pagination: 160-179 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 214 | PDF Views: 132 |
Genbit Compress Tool(GBC): A Java-Based Tool to Compress DNA Sequences and Compute Compression Ratio(Bits/Base) of Genomes | ||
P. Raja Rajeswari, Allam Appa Rao | ||
Vol 2, No 3 (2010), Pagination: 181-191 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 220 | PDF Views: 138 |