Vol 1, No 6 (2009)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Algorithm for Cryptanalysis with Application to Data Encryption Standard PDF
K. Ravikumar, Dr. A. Kannammal, S. A. Jameel 240-244
Virtualization: A Foundation for Cloud Computing PDF
Dr. Manoj Devare, Mehdi Sheikhalishahi, Dr. Lucio Grandinetti 245-254
Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions PDF
A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala 255-259
IPv6 over Wireless Sensor Networks PDF
Vivek S. Deshpande, Vasundhara V. Ghate 260-267
Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks PDF
S. Suganya, Dr. S. Palaniammal 268-272
Providing QOS for Mobile Ad-Hoc Network PDF
A. Boomarani Malany, Dr. R. M. Chandrasekaran 273-282

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616