Issue | Title | |
Vol 3, No 7 (2011) | VPN: The Stride of Technology for Future Ready Business | Abstract |
Swarnangini Sinha, Vibha Thakur | ||
Vol 8, No 8 (2016) | Ways to Use Mobile Phones Safely | Abstract |
Bhumika S. Zalavadia | ||
Vol 13, No 1 (2021) | Wearable Technologies for the Present Comfort and Secure Future: Implementation on a Different Domain, Pro and Cons | Abstract |
N. Deepa, A. S. Prethepa, K. K. Sowmiya | ||
Vol 3, No 9 (2011) | Web Services Composition towards an Agent Based and Context Oriented Approach | Abstract |
D. Karthikeyan, P. Arunkumar, P. Vidyasri | ||
Vol 3, No 14 (2011) | Weighted Nebulous Matching over Frequent Episode Rules using Internet Anomaly Detection | Abstract |
B. Muthulakshmi | ||
Vol 3, No 3 (2011) | Wipe Out Brute Force and Exterminate Malware - Based Attacks Using High Secure One-Time Password by Grid-Clear-CAPTCHA (GCC) – Analytical Study | Abstract |
M. Viju Prakash, S. Jeya Shobana, P. Alwin Infant | ||
Vol 10, No 4 (2018) | Wireless and its Operating Features in Real Time World | Abstract |
P. JaikumarAravaanan, P. Josephine Arul Priya | ||
Vol 9, No 6 (2017) | Wireless BMI System with QT Application | Abstract |
Shreyans Shah | ||
Vol 5, No 1 (2013) | Wireless Navigation using RFID Network | Abstract |
Kashif I.K. Sherwani, Arindam Chatterjee | ||
Vol 4, No 11 (2012) | Wireless Sensor Networks and Issues –A Survey | Abstract |
Shubha .V. Rao, R. Sreelatha, Dr.M. Dakshayini, Dr.P. Jayarekha | ||
Vol 3, No 6 (2011) | Workflow Based Resource Allocation and Monitoring Using Mobile Agents | Abstract |
L. Venkatakrishnan, T.V.U. Kiran Kumar, M.A. Dorairengaswamy | ||
Vol 10, No 9 (2018) | Workflow Scheduling in Cloud Computing Environment using Chaotic Whale Optimization | Abstract |
S. Kanagalakshmi, Dr. K. Ramar | ||
Vol 3, No 7 (2011) | Workflow Scheduling Using Heuristics Based Ant Colony Optimization | Abstract |
N. Pughazendi, J. Elayaraja | ||
951 - 963 of 963 Items | << < 34 35 36 37 38 39 |
ISSN: 0974 – 9616