Issue | Title | |
Vol 10, No 6 (2018) | A Traceback Attack OnFreenet | Abstract |
K. Vanitha, P. Anbumani | ||
Vol 3, No 2 (2011) | A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain | Abstract |
N. Arumugam, Dr.C. Venkatesh | ||
Vol 1, No 4 (2009) | A Unified Access to Multiple Mail Servers (UAMMS) | Abstract |
D. Sudha, A. Devapriya VimalaMary | ||
Vol 4, No 8 (2012) | A Unique Token based Approach for Secure Cloud Computing | Abstract |
M.V. Raghavendra Reddy, H. Srinivasa Murthy | ||
Vol 7, No 3 (2015) | A Very Robust Dedicated and Verified Technique by Applying the Hybridity of Cloud for Deduplication of Data | Abstract |
Aishwarya Shekhar, Devesh Kumar Srivastava | ||
Vol 5, No 6 (2013) | A Water-Filling Based Scheduling Algorithm for the Smart Grid | Abstract |
A. Karthikeyan, R. Sathish Kumar | ||
Vol 5, No 5 (2013) | Accessibility Assessment of Cloud SaaS Based E-Government for People with Disabilities in India | Abstract |
B. Gohin, Dr. Viji Vinod | ||
Vol 5, No 5 (2013) | Achieving Maximum Throughput and Low Delay in Wireless Multi-hop Networks using Q-CSMA/CA Algorithm | Abstract |
S. Kousalya, Dr.K. Ruba Soundar, K. Selva Murugan | ||
Vol 6, No 7 (2014) | Acknowledged Routing using Cluster Based Approach in Wireless Sensor Network | Abstract |
Sudhakar S. Jadhav, Sonal A. Bankar | ||
Vol 1, No 4 (2009) | Active Network Approach for Security Management | Abstract |
K. Ravi kumar, Dr. A. Kannammal | ||
Vol 2, No 10 (2010) | Adaption of Optimal Evaluation Methods in Resource Utilization by Service Providers with Grid Approaches | Abstract |
Jhansi Lakshmi Vaddelle, Y. Surekha | ||
Vol 5, No 5 (2013) | Adaptive Amplitude Clipping PAPR Reduction Technique using Extended Peak Reduction Tone Set | Abstract |
Shripad P. Mohani, Shipra Sarkar, Mukul S. Sutaone | ||
Vol 4, No 4 (2012) | Adaptive Content based Secured Access of Data in Cloud Environment | Abstract |
D. Daniel, M. Karthic, M. Prakash, R. Suresh Kumar | ||
Vol 3, No 4 (2011) | Adaptive Local Route Optimization Technique with Multiple MAP Environments in Hierarchical Mobile IPv6 Networks | Abstract |
Yudhvir Singh, Yogesh Chaba, Rajesh Kumar, Prabha Rani | ||
Vol 3, No 2 (2011) | Adaptive Network Topology Acquisition (A-NTA) Algorithm in IEEE 802.16j Non-Transparent Mode Relay Networks | Abstract |
D. Satish Kumar, Dr.N. Nagarajan | ||
Vol 3, No 6 (2011) | Adaptive Routing for QoS in Manet by Using Cross Layer Architecture | Abstract |
P. Chitra, G. Ilanchezhia Pandian, Dr.P. Sheik Abdul Khader | ||
Vol 4, No 13 (2012) | Adequate Labour Welfare Measures Leads to Healthy Industrial Relations – An Empirical Analysis | Abstract |
Bhavani Bhavani, Thamil Selvan | ||
Vol 3, No 7 (2011) | Advance Defense Modeling for SCADA Systems | Abstract |
Suma Christal Mary, Renjini Jose | ||
Vol 2, No 7 (2010) | Advanced Intrusion Detection and Prevention System with Rule Based Mining Techniques and using Prevention Policies over an Internet | Abstract |
P.S. Revankar, A.B. Pawar | ||
Vol 1, No 6 (2009) | Algorithm for Cryptanalysis with Application to Data Encryption Standard | Abstract |
K. Ravikumar, Dr. A. Kannammal, S. A. Jameel | ||
Vol 1, No 8 (2009) | Alternative Best Effort (ABE) Router (Providing a Low-Delay Service within Best Effort) | Abstract |
A. S. Naveenkumar, Dr. M. Punithavalli | ||
Vol 7, No 7 (2015) | An Abstract Survey on Software – Defined Networking | Abstract |
C. Tamilselvi | ||
Vol 4, No 4 (2012) | An Adaptive CSMA/TDMA Hybrid-Mac for Wireless Sensor Networks | Abstract |
S. Koteswara Rao, Dr.M. Sailaja, Dr. T. Madhu, P. Ramesh | ||
Vol 1, No 8 (2009) | An Adaptive Intrusion Detection and Prevention System Approach to Network Security | Abstract |
T. Sarathamani, N. Sudha Bhuvaneswari | ||
Vol 3, No 5 (2011) | An Adaptive Reliable Multipath Centralized RWA Algorithm for All-Optical WDM Networks | Abstract |
T.K. Ramesh, Sandeep Kumar Konda, M. Swaraj Teja, Harshadeep Harshadeep, P.R. Vaya | ||
151 - 175 of 963 Items | << < 2 3 4 5 6 7 8 9 10 11 > >> |
ISSN: 0974 – 9616