Table of Contents
Articles
| The Mobile Based Remote Networking and Monitoring the Remote System in Dynamic Position |
PDF
|
| G. Pary, S. Sridhar | 876-882 |
| Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing |
PDF
|
| Dr.G. Radhamani, P. Mary Sriryn | 883-889 |
| Comparison of Percentage of Emission in Optical Communication for Different Receivers |
PDF
|
| K.V. Satya Kumar, T. Durga Prasad, K. Sridevi, T. Gowri, M. Ramesh | 890-893 |
| A Novel Method for Controlling and Monitoring of Data Acquisition System |
PDF
|
| N. Jayamma, B. Hari Krishna | 894-897 |
| Network Centric Warfare- Concepts and Challenges |
PDF
|
| D. Anand, Ch. Raja, Dr.E.G. Rajan | 898-902 |
| An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture |
PDF
|
| Rinkle Rani Aggarwal, Nidhi Garg | 903-908 |
| Performance Analysis and Comparison of Scheduling Algorithm in MANET’s |
PDF
|
| Sanjeev Kumar, Yogesh Chaba, Amandeep Amandeep | 909-914 |
| A Survey on Resource Management in Cloud Computing using Ontology Approach |
PDF
|
| R. Lakshmi Devi, Dr.L.S. Jayashree | 915-919 |
| Job Scheduling in Grids with QoS Satisfaction using Ant Colony Optimization (ACO) |
PDF
|
| P. Devaki, Dr.M.L. Valarmathi | 920-923 |
| Security Analysis in Graphical Password Schemes |
PDF
|
| S. Yamini | 924-929 |
| New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) |
PDF
|
| D. Sathish | 930-937 |
| Weighted Nebulous Matching over Frequent Episode Rules using Internet Anomaly Detection |
PDF
|
| B. Muthulakshmi | 938-940 |
| GT Approach for Detecting Application DoS Attacks |
PDF
|
| D. Jebakumar Immanuel, C. Sangeetha | 941-946 |
| A Non-Intrusive BIST Capability for UART |
PDF
|
| D. Mahesh Kumar, A.M. Sreeram | 947-952 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616