| Issue | Title | |
| Vol 6, No 7 (2014) | Edifice of Remedy Network Plinth on Side Effects with Allege for Remedy Deputy | Abstract |
| C. Bala Saravanan | ||
| Vol 6, No 4 (2014) | Effect of Propagation Models on Analysis of MANET Routing Protocols | Abstract |
| K. B. Wane, A. D. Bhoi, Dr. R. D. Kharadkar, Dr. A. Y. Deshmukh | ||
| Vol 2, No 10 (2010) | Effective Cache Placement in Multi-Hop Wireless Networks | Abstract |
| A. Valarmozhi, M. Priya, Sasikumar Gurumurthy | ||
| Vol 8, No 5 (2016) | Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network | Abstract |
| T.K. Ujina, Dr. Sai Shanmuga Raja | ||
| Vol 6, No 5 (2014) | Effective Privacy Preserving In Leakage Upper Bound Constraints Using Cloud | Abstract |
| S. Hemalatha, S. AlaudeenBasha, N. Premkumar | ||
| Vol 4, No 12 (2012) | Effective Routing & Channel Assignment for Wireless Sensor Networks using Genetic Algorithm Approach | Abstract |
| N. Thangadurai, Dr. R. Dhanasekaran | ||
| Vol 4, No 12 (2012) | Effective Secured Spectrum Sensing for Cognitive Radio Channels | Abstract |
| Dr. R. Gunasundari, Choragudi K.Y. Karthik | ||
| Vol 6, No 2 (2014) | Effective Shielding of Stressed Network from Flood Attacks | Abstract |
| S. Angelin Joy, S. Sariga | ||
| Vol 7, No 4 (2015) | Effectiveness of Kd- Tree in Ray Tracing of Dynamic Point Clouds | Abstract |
| Aishwarya Shekhar, Trapti Sharma, Devesh Kumar Srivastava | ||
| Vol 6, No 4 (2014) | Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography | Abstract |
| D. Pavithra, S. Anitha | ||
| Vol 8, No 7 (2016) | Efficient Bidirectional Data Backup Mechanism for Cloud Computing | Abstract |
| Yashodha Sambrani, Dr. Rajashekarappa | ||
| Vol 8, No 6 (2016) | Efficient Broadcasting in Wireless Adhoc Network | Abstract |
| S. Vijaya, V. Sharmila, K. Sindhiya | ||
| Vol 6, No 6 (2014) | Efficient Compressed Video Communication | Abstract |
| E. M. El-Bakary, O. Zahran, S. EL-Rabaie, F. E. Abd El-Samie | ||
| Vol 4, No 10 (2012): Special Issue | Efficient Congestion Adaptive Routing Protocol for Mobile Ad-hoc Networks | Abstract |
| P. Visu, J. Janet | ||
| Vol 7, No 3 (2015) | Efficient Data Sharing In Cloud Medium with Key Aggregate Cryptosystem | Abstract |
| A. Shakila Banu | ||
| Vol 5, No 6 (2013) | Efficient Energy Consumption Mechanism for Wireless Networks | Abstract |
| R. Kesavan, Dr.V. Thulasibai | ||
| Vol 3, No 10 (2011) | Efficient Error Correction Mechanism in Mobile Computing System | Abstract |
| R. Bala, V. Janani, G. Kousalya | ||
| Vol 3, No 4 (2011) | Efficient Message Routing in Unstructured P2P Using CIS and Ant Search Algorithms | Abstract |
| U. Kaleelurrahaman, L.M. Nithya, V. Jeyakrishnan | ||
| Vol 5, No 4 (2013) | Efficient Resource Provisioning using RTUOP Algorithm in Cloud Computing | Abstract |
| M. Revatheeswari, P. Saranya | ||
| Vol 2, No 4 (2010) | Efficient Run-Time Task Allocation for Reconfigurable Multiprocessor System-on-Chip with Network-on-Chip | Abstract |
| K. Suganya, M. Malathi | ||
| Vol 8, No 2 (2016) | Efficient Search over Encrypted Mobile Cloud Using TEES | Abstract |
| T. Nagamani, T. Priyadharshini, P.T. Kiruthika | ||
| Vol 1, No 4 (2009) | e-governance Initiatives – A Case Study on e-Seva | Abstract |
| Manisha Kumbhar, Vidya Gavekar, A. D. Kumbhar, Dr. Vilas D. Nandavadekar | ||
| Vol 2, No 12 (2010) | Email Phishing Processing with Symmetric Key Cryptography via Network Credential | Abstract |
| A. Prabhu Chakkaravarthy | ||
| Vol 3, No 3 (2011) | Empirical Study of Peer to Peer Network Simulators | Abstract |
| Kaushik H. Raviya, Prashant M. Jadav, C.K. Bhensdadia | ||
| Vol 2, No 5 (2010) | Enabling Congestion Avoidance Mechanism in Input Queued Switch Architecture by Eliminating HOL Blocking | Abstract |
| A. Vishnu Priya, Dr. Kannan Balasubramanian | ||
| 426 - 450 of 963 Items | << < 13 14 15 16 17 18 19 20 21 22 > >> | |
ISSN: 0974 – 9616