Table of Contents
Vol 5, No 1 (2014)
Open Access
Subscription Access
Articles
Analysis of Android Vulnerabilities and Modern Exploitation Techniques | ||
Himanshu Shewale, Sameer Patil, Vaibhav Deshmukh, Pragya Singh | ||
Vol 5, No 1 (2014), Pagination: 863-867 | ||
ABSTRACT | PDF | Abstract Views: 261 | PDF Views: 0 |
Failure Correction of Linear Array Antenna with Multiple Null Placement Using Cuckoo Search Algorithm | ||
R. Muralidaran, A. Vallavaraj, Hemant Patidar, G. K. Mahanti | ||
Vol 5, No 1 (2014), Pagination: 877-881 | ||
ABSTRACT | PDF | Abstract Views: 252 | PDF Views: 0 |
DCRS: A Dynamic Contention Resolution Scheme for Wimax Networks | ||
M. Deva Priya, M. L. Valarmathi, D. Prithviraj | ||
Vol 5, No 1 (2014), Pagination: 882-889 | ||
ABSTRACT | PDF | Abstract Views: 253 | PDF Views: 0 |
Prioritized Queue with Round Robin Scheduler for Buffered Crossbar Switches | ||
N. Narayanan Prasanth, Kannan Balasubramanian, R. Chithra Devi | ||
Vol 5, No 1 (2014), Pagination: 890-893 | ||
ABSTRACT | PDF | Abstract Views: 255 | PDF Views: 0 |
An Energy Efficient Fitness Based Routing Protocol in Wireless Sensor Networks | ||
A. Balamurugan | ||
Vol 5, No 1 (2014), Pagination: 894-899 | ||
ABSTRACT | PDF | Abstract Views: 267 | PDF Views: 0 |
Noise Secures Secret Data! by Act as a Reference for Embedding | ||
J. Jayaseelan, B. Kruthika | ||
Vol 5, No 1 (2014), Pagination: 900-903 | ||
ABSTRACT | PDF | Abstract Views: 246 | PDF Views: 0 |
Performance Analysis of Distinct Secured Authentication Protocols Used in the Resource Constrained Platform | ||
S. Prasanna, M. Gobi | ||
Vol 5, No 1 (2014), Pagination: 904-906 | ||
ABSTRACT | PDF | Abstract Views: 251 | PDF Views: 0 |