Open Access
Subscription or Fee Access
Table of Contents
Articles
The Mobile Based Remote Networking and Monitoring the Remote System in Dynamic Position | |
G. Pary, S. Sridhar | 876-882 |
Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing | |
Dr.G. Radhamani, P. Mary Sriryn | 883-889 |
Comparison of Percentage of Emission in Optical Communication for Different Receivers | |
K.V. Satya Kumar, T. Durga Prasad, K. Sridevi, T. Gowri, M. Ramesh | 890-893 |
A Novel Method for Controlling and Monitoring of Data Acquisition System | |
N. Jayamma, B. Hari Krishna | 894-897 |
Network Centric Warfare- Concepts and Challenges | |
D. Anand, Ch. Raja, Dr.E.G. Rajan | 898-902 |
An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture | |
Rinkle Rani Aggarwal, Nidhi Garg | 903-908 |
Performance Analysis and Comparison of Scheduling Algorithm in MANET’s | |
Sanjeev Kumar, Yogesh Chaba, Amandeep Amandeep | 909-914 |
A Survey on Resource Management in Cloud Computing using Ontology Approach | |
R. Lakshmi Devi, Dr.L.S. Jayashree | 915-919 |
Job Scheduling in Grids with QoS Satisfaction using Ant Colony Optimization (ACO) | |
P. Devaki, Dr.M.L. Valarmathi | 920-923 |
Security Analysis in Graphical Password Schemes | |
S. Yamini | 924-929 |
New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) | |
D. Sathish | 930-937 |
Weighted Nebulous Matching over Frequent Episode Rules using Internet Anomaly Detection | |
B. Muthulakshmi | 938-940 |
GT Approach for Detecting Application DoS Attacks | |
D. Jebakumar Immanuel, C. Sangeetha | 941-946 |
A Non-Intrusive BIST Capability for UART | |
D. Mahesh Kumar, A.M. Sreeram | 947-952 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616