Table of Contents
Articles
| Fault Tree Analysis for Safety Critical Network Infrastructure |
PDF
|
| P. Vaishnavi, Rajesh Prasanna | 450-454 |
| Modeling RTT Using Box-Jenkins Model |
PDF
|
| A. Jeyasekar, S.V. Kasmir Raja | 455-460 |
| Advance Defense Modeling for SCADA Systems |
PDF
|
| Suma Christal Mary, Renjini Jose | 461-465 |
| Congestion Avoidance in WSN with Multiple Mobile Sink Using Energy Based Routing |
PDF
|
| Litty Koshy | 466-470 |
| Workflow Scheduling Using Heuristics Based Ant Colony Optimization |
PDF
|
| N. Pughazendi, J. Elayaraja | 471-475 |
| VPN: The Stride of Technology for Future Ready Business |
PDF
|
| Swarnangini Sinha, Vibha Thakur | 476-480 |
| Implementation of VoIP Using Session Initiation Protocol |
PDF
|
| G. Appala Naidu, P. Chandrasekhar, K. Srinivas, Anwar Basha Pattan | 481-485 |
| Ant Based Route Optimization for FTP Protocol |
PDF
|
| Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | 486-490 |
| Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN |
PDF
|
| P. Kaushik, J. Singhai | 491-496 |
| Single Polysilicon Nano-Wire Piezoresistors for MEMS Pressure Sensor |
PDF
|
| S. Maflin Shaby, A. Vimala Juliet | 497-501 |
| Performance Analysis of Pseudo-Orthogonal Codes at 10 Gbps for 16 Users in Free Space |
PDF
|
| Dr. Neena Gupta, Divya Dhawan, Preety Singla | 502-506 |
| MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network |
PDF
|
| Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria | 507-509 |
| Intrusion Detection System for Protection against Packet Dropping Attack on Distributed Information System in any Organization |
PDF
|
| K.P Singh, Yogesh Chaba, Gaurav Lodha, Yudhvir Singh | 510-513 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616