Issue | Title | |
Vol 3, No 6 (2011) | LIGHTMQ Provider for Java Message Service | Abstract |
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav | ||
Vol 1, No 6 (2009) | Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks | Abstract |
S. Suganya, Dr. S. Palaniammal | ||
Vol 8, No 6 (2016) | Linux Architecture and Advantages | Abstract |
Bhumika S. Zalavadia | ||
Vol 4, No 14 (2012) | Literature Review on EAP Methods | Abstract |
Anupama Patil, Sameer Nagtilak, Shweta Mane | ||
Vol 4, No 14 (2012) | Literature Survey for Diminution of Envelope Fluctuation in SC-FDMA System for Uplink Transmission | Abstract |
T. Abisha, B. Bhuvaneswari | ||
Vol 7, No 1 (2015) | Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks | Abstract |
Yogesh V. Jilhawar, Dr. Emmanuel M. | ||
Vol 7, No 5 (2015) | Literature Survey on Network Traffic Management in Software Defined Networking | Abstract |
Sachin A. Vanjari | ||
Vol 13, No 2 (2021) | Load Balancing Algorithms and Simulation Tools in Cloud Environment | Abstract |
P. R. Sudha, Dr. P. M. Rekha | ||
Vol 3, No 14 (2011) | Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing | Abstract |
Dr.G. Radhamani, P. Mary Sriryn | ||
Vol 3, No 5 (2011) | Load Balancing in Mesh Based Wireless Network Using Cluster Re-Configuration Algorithm | Abstract |
P. Vinoth Kumar, B. Chandra Mohan | ||
Vol 3, No 4 (2011) | Location Based Scheduler for Independent Jobs in Computational Grids | Abstract |
P. Karthikeyan, B. Dhiyanesh | ||
Vol 11, No 8 (2019) | Location based Web Recommendation using Data Mining Techniques | Abstract |
Katayoun Farrahi, Angela Curl | ||
Vol 1, No 2 (2009) | Low Latency Seamless Transport Interface | Abstract |
Mauli Gulati, Dr. Deepak Garg | ||
Vol 2, No 1 (2010) | Low-Low Average Algorithm for Scheduling Request-Demanding Cloud Workflows with Overhead | Abstract |
V. Anbalagan | ||
Vol 2, No 9 (2010) | LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems | Abstract |
G. Satyavathy, M. Punithavalli | ||
Vol 3, No 7 (2011) | MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network | Abstract |
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria | ||
Vol 8, No 3 (2016) | Maintaining Privacy for Multi-keyword Search on Encrypted Data: A Survey | Abstract |
Sushant Y. Kamble, Amit B. Chougule | ||
Vol 3, No 1 (2011) | Malicious Impostor Email Prevention Using Randomly Encrypted Address Book | Abstract |
R. Rajesh Perumal, J. Vinu | ||
Vol 3, No 4 (2011) | Malicious User Limit: A Decentralized Approach against Sybil Attacks | Abstract |
M. Kowsigan, K. Rajakumari | ||
Vol 4, No 6 (2012) | Managing Trust and Detecting the Guilty Party in P2P Networks | Abstract |
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar | ||
Vol 2, No 9 (2010) | Measurement of Denial of Service Attacks Using New Metrics | Abstract |
P. Kavithapandian, S. Muthukumar, Dr. Kannan Balasubramanian | ||
Vol 2, No 9 (2010) | Measuring Sustainable Development: Theory and Application | Abstract |
Dr. Joshua O. Miluwi | ||
Vol 8, No 6 (2016) | Mechanized Discovery of Malicious Attack and Providing Security using Frame Breaking in WoT | Abstract |
S. John Samuel, A. Mathan Gopi | ||
Vol 5, No 8 (2013) | Methods of Reducing False Alerts by Intrusion Detection System | Abstract |
PrajaktaSandeep Jadhav | ||
Vol 5, No 2 (2013) | Metric Based Scheduling Algorithm (MeBaSA) for Scaled Multi-tier Clouds | Abstract |
Ramesh D. Kodi, M. Balavaishnavi | ||
601 - 625 of 963 Items | << < 20 21 22 23 24 25 26 27 28 29 > >> |
ISSN: 0974 – 9616