Issue | Title | |
Vol 1, No 4 (2009) | Troubleshooting Networks Using Internet Control Message Protocol | Abstract |
M. Anand Kumar, K. Appathurai, P. Nagarajan | ||
Vol 4, No 5 (2012) | Truncated and Optimized Pilot-to-Data Power Ratio for MIMO-OFDM Systems | Abstract |
Prasad Rayi, T. Manikyala Rao, Ch. Madhu Sudhan | ||
Vol 7, No 10 (2015) | Tube Rack Security Checking Using Wireless Sensor Systems | Abstract |
H. Ambika, N. Kavitha, A. Daison Raj, S. Suguna | ||
Vol 8, No 4 (2016) | Tuning the Cell Planning Problem in Mobile Upbringing to Optimize the Cost and Path Using Self-Motivated Algorithm | Abstract |
T. Prince, Dr. S. Thabasu Kannan | ||
Vol 2, No 11 (2010) | UDP based Analysis of Ad hoc On-Demand Distance Vector Protocol in MANET | Abstract |
Annapurna Singh, Mishra Shailendra | ||
Vol 4, No 9 (2012) | Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection | Abstract |
N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu | ||
Vol 7, No 8 (2015) | Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends | Abstract |
S. EL- Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy | ||
Vol 4, No 11 (2012) | User Authentication Mechanism for Sharing E-Resource in Educational Clouds | Abstract |
I. Arulmani, L. Arockiam, N. Veeraragavan | ||
Vol 4, No 3 (2012) | User Preferred Optimal Execution Path Selection from Quality Enabled Multi-Path Web Service Composition Graph | Abstract |
S. Justin Samuel, Dr. T. Sasipraba | ||
Vol 3, No 11 (2011) | User-Controlled Privacy Preserving Identity Management for Cloud Computing | Abstract |
Viswanathan Pachaiyappan, R. Chandrasekar | ||
Vol 10, No 4 (2018) | Uses of Grid Computing in Educational Infrastructure | Abstract |
N. M. Abroja, A. Afila Parveen, R. Sathish Kumar | ||
Vol 4, No 8 (2012) | Validating the Rule set with BDD & Usage with GEM for Improving Efficiency of Firewalls | Abstract |
M. Kasi Viswanadh, Dr.P. Harini | ||
Vol 8, No 4 (2016) | Various Scheduling Algorithm Based on Admission Control for Wireless Sensor Networks | Abstract |
K. Kowsalya, S. Sabitha | ||
Vol 10, No 2 (2018) | Vehicle Location Estimation by Dead Reckoning Using Inertial Measurement Unit Sensor in MEMS | Abstract |
S. Abinaya Shivani, V. Nivetha, J. Mubeena, K. Roshni Rajan, R. Prabakaran, Dr.N.J.R. Muniraj | ||
Vol 13, No 5 (2021) | Vehicular Emergency System Using Tracking System and XBee Technologies with SDN | Abstract |
T. Padma, S. Rajeshwari, S. Shalini | ||
Vol 6, No 2 (2014) | Verifiable Secret Sharing protocol for Mobile Ad-hoc Networks | Abstract |
P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu | ||
Vol 4, No 11 (2012) | Vertical Scalability Issues and Challenges in Cloud Computing: An Overview | Abstract |
M. Bala Vaishnavi, A. Stanislas, L. Arockiam | ||
Vol 3, No 2 (2011) | Virtual Environment Security - Considerations & Practices | Abstract |
S. Ranjitha Kumari, V. Kathiresan | ||
Vol 3, No 6 (2011) | Virtual Password Obscuring in Avoidance of Keyloggers | Abstract |
J. Jeysree | ||
Vol 1, No 6 (2009) | Virtualization: A Foundation for Cloud Computing | Abstract |
Dr. Manoj Devare, Mehdi Sheikhalishahi, Dr. Lucio Grandinetti | ||
Vol 7, No 6 (2015) | Visual Cryptography | Abstract |
Priya Sethi, Shipra Kataria, Deepika Bansal | ||
Vol 8, No 2 (2016) | Visual Exploration Based Comparative Analysis of Tag Cloud Layout | Abstract |
Darshita S. Pathak, Vidhi Jani | ||
Vol 9, No 3 (2017) | VLSI Implementation of Brain Tumor Segmentation Using Fuzzy C-Mean Clustering | Abstract |
S. Preethi | ||
Vol 4, No 1 (2012) | VLSI Implementation of Data Security Architecture | Abstract |
Dilip Thomas, K. S. M. Panicker | ||
Vol 5, No 4 (2013) | VM Inclusive MeBaSA for Virtualized Multi-tier Cloud | Abstract |
Ramesh D. Kodi, M. Balavaishnavi | ||
926 - 950 of 963 Items | << < 33 34 35 36 37 38 39 > >> |
ISSN: 0974 – 9616