Vol 6, No 7 (2014)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Intrusion Detection System Using BCO and Genetic Algorithm and a Comparison with ACO PDF
Harsimran Kaur, Usvir Kaur, Dr. Dheerendra Singh 265-269
Database Migration along with Architecture using Bee Colony Optimization PDF
Amarjit Kaur, Usvir Kaur, Dr. Dheerendra Singh 270-273
Secure Auditing Method for Cloud Computing PDF
S. Srinivasan, K. Raja 274-278
A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks PDF
Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky 279-285
Implementation of TCP/IP using pSOS PDF
M. Meena 286-290
Edifice of Remedy Network Plinth on Side Effects with Allege for Remedy Deputy PDF
C. Bala Saravanan 291-294
Space Wave Optical Fixed Link and Data Communication Services in Rural Environments PDF
A. P. Kaur, G. Aujla 295-300
A New Approach to Improve the Performance of Dynamic Distributed Networks PDF
Shahram Jamali, Khadije Hourali 301-306
Acknowledged Routing using Cluster Based Approach in Wireless Sensor Network PDF
Sudhakar S. Jadhav, Sonal A. Bankar 307-311
Ontology of Cloud Computing Service, Technology, and Security PDF
G. Sathishkumar, B.R. Laxmi Sree 312-315
A Novel Client Side Intrusion Detection and Response Framework PDF
B. Padhmavathi, M. Jyotheeswar Arvind, G. Ritikesh 316-321

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616