Issue | Title | |
Vol 7, No 10 (2015) | Cloud Computing Architecture, Services and Deployment Models | Abstract |
Bhumika S. Zalavadia | ||
Vol 4, No 6 (2012) | Cloud Computing: A Next Generation Revolution in IT with e-Governance | Abstract |
Vivek Tiwari, Umesh Bindal, Shailesh Pandey | ||
Vol 3, No 5 (2011) | Cloud Computing: Practice of Efficient Approaches, Techniques and Challenges for Data Centers | Abstract |
S. Manimegalai, C. Sumithiradevi, Dr.M. Punithavalli | ||
Vol 12, No 9-10 (2020) | Cloud Network for Computer Aided Diabetic Control System | Abstract |
Dejene Boru, Albert Y. Zomaya | ||
Vol 5, No 2 (2013) | Cloud SafeSys: Secure Model for Cloud Computing System | Abstract |
Vaibhav Sawant, Lakhan Relwani, Vishal Wakchaure, Harshad Gojare, Hanumant Pawar | ||
Vol 4, No 7 (2012) | Cluster-based Adaptive Fault Tolerant QoS Routing Algorithm for Wireless Networks | Abstract |
S.A. Hafsa, R. Poornima | ||
Vol 1, No 2 (2009) | COAL: Combination of Arc Flag and Land Mark Speedup Techniques for Shortest Path queres | Abstract |
R. Kalpana, Dr. P. Thambidurai, H. Shahul Hamead | ||
Vol 6, No 6 (2014) | Collaborative Study on Recent Advances and Future Trends in Honeypot, Denial-of-Service Attack (DoS) and Distributed Denial-of-Service Attack (DDoS) | Abstract |
Shilpi Singh, Dr. Sweta Verma, Dr. A.K. Khare | ||
Vol 5, No 12 (2013) | Comparative Performance Analysis of DSDV and AODV Routing Protocols in MANET using NS2 | Abstract |
Subhrananda Goswami, Chandan Bikash Das, Subhankar Joardar | ||
Vol 5, No 12 (2013) | Comparative Performance Evaluation of Pattern Matching Algorithm for Intrusion Detection System Uses Memory Utilization | Abstract |
Sunil N. Chavda, Jaykaran Singh, Mukesh Tiwari | ||
Vol 9, No 3 (2017) | Comparative Study of Ant Colony Optimization and Bee Colony Optimization Algorithms in Swarm Intelligence Technique | Abstract |
Tenzin Rigdol, P. Beaulah Soundarabai | ||
Vol 12, No 2 (2020) | Comparative Study of Different Types of CAPTCHA | Abstract |
S. Likitha, B. Nethravathi | ||
Vol 2, No 1 (2010) | Comparative Study of Proactive and Reactive AdHoc Routing Protocols using Ns2 | Abstract |
S. Vanthana, V. Sinthu Janita Prakash | ||
Vol 6, No 6 (2014) | Comparative Study of the Right Protocol for Best Routing Path | Abstract |
Paramjeet Singh Sandhu, Manparveen Singh, Kamaljit Singh Bhatia | ||
Vol 2, No 11 (2010) | Comparison of ARQ and Adaptive FEC Error Control Techniques in Wireless Sensor Networks | Abstract |
M.R. Ebenezar Jebarani, T. Jayanthy | ||
Vol 3, No 8 (2011) | Comparison of FFT Approaches for Wireless OFDM Communication Systems | Abstract |
K. Umapathy, D. Rajaveerappa | ||
Vol 2, No 9 (2010) | Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography | Abstract |
V. B. Kirubanand, Dr. S. Palaniammal | ||
Vol 3, No 14 (2011) | Comparison of Percentage of Emission in Optical Communication for Different Receivers | Abstract |
K.V. Satya Kumar, T. Durga Prasad, K. Sridevi, T. Gowri, M. Ramesh | ||
Vol 7, No 3 (2015) | Comparison of Performance Metrics of Reactive Routing Protocol Using FTP | Abstract |
Abida Parveen, Paramjit Singh | ||
Vol 4, No 13 (2012) | Comparison of Various Energy Models for AODV Routing Protocol in MANET using Qual Net | Abstract |
Pratibha Bharti, Dharmendra Jhariya, Dr. Sandeep Vijay | ||
Vol 2, No 7 (2010) | Comparison of Wavelengths for Various Atmospheric Effects on FSO Link – A Comprehensive Study of Atmospheric Turbulence, Attenuation & Scattering, and Spatial & Temporal Detection Techniques | Abstract |
A. Jabeena, Sandeep Gottipati, K. Mishra | ||
Vol 1, No 7 (2009) | Comparitive Analysis of ACO and PSO in Grid Job Scheduling | Abstract |
B. Radha, Dr. V. Sumathy | ||
Vol 2, No 1 (2010) | Component based Effective Web Crawler and Indexer using Web Services | Abstract |
A. Vadivel, S.G. Shaila, R. Devi Mahalakshmi, J. Karthika | ||
Vol 4, No 2 (2012) | Computation of Inverse 1-Center Location Problem on the Weighted Trees | Abstract |
Biswanath Jana, Sukumar Mondal, Dr. Madhumangal Pal | ||
Vol 5, No 12 (2013) | Concrete Security Treatment of Public-Key Cryptosystem againstAdaptive Chosen Cipher-Text Attack Using PQK Public-Key Cryptosystem | Abstract |
Tamer M. Barakat | ||
301 - 325 of 963 Items | << < 8 9 10 11 12 13 14 15 16 17 > >> |
ISSN: 0974 – 9616