Browse Title Index


 
Issue Title
 
Vol 4, No 3 (2012) Role of Fuzzy Logic in Information Routing - A Review Abstract
Paramjit Singh, Ajay k. Sharma, T.S. Kamal
 
Vol 3, No 12 (2011) Role of Smart Phones in Cloud Computing Abstract
N. Prasanna Balaji, U. Sreenivasulu, A.B. Ramesh
 
Vol 2, No 2 (2010) Role-Based Access Control Architecture in Grid Environments Abstract
M. Nithya, R.S.D. Wahida Banu
 
Vol 2, No 3 (2010) Routing and Wavelength Assignment Schemes in WDM Optical Networks Abstract
K. Aparna, Dr. S. Venkatachalam, Dr. G.R. Babu
 
Vol 3, No 1 (2011) Routing in Automatically Switched Optical Networks Using Hop Routing Algorithm Abstract
S. Indira Gandhi, V. Vaidehi, Xavier Fernando
 
Vol 2, No 3 (2010) RWA in the Presence of Wavelength Conversion in WDM Networks Abstract
S. Suryanarayana, Dr.K. Ravindra, Dr.K. Chenna Kesava Reddy
 
Vol 3, No 2 (2011) SAMON - C: Sensor Access and Monitoring in Cloud Environment Abstract
R.S. Ponmagal, Dr.J. Raja
 
Vol 5, No 2 (2013) Scalability Issues and Research Challenges in Cloud Computing Abstract
L. Arockiam, A. Stanislas
 
Vol 1, No 3 (2009) Scalable Contributory Key Agreement with Efficient Authentication Abstract
Dr. M. Rajaram, D. Thilagavathy
 
Vol 2, No 7 (2010) Scalable Energy Efficient Ad-Hoc on Demand Distance Vector Routing Protocol Abstract
Mandhir Kaur, Jasbir Singh Saini, Prabhneet Kaur
 
Vol 3, No 4 (2011) Scheduling in Computational Grid Using Improved Ant Colony Optimization Algorithm Abstract
L.M. Nithya, Dr.A. Shanmugam, J. Rajeshkumar
 
Vol 8, No 10 (2016) Scheduling in Networked Control System for Monitoring and Protection Applications in Sensor Nodes Abstract
Dr. M.  Sundar Rajan
 
Vol 5, No 3 (2013) Secure and Efficient RFID Authentication for Social Network in Cloud Abstract
Sherin Jobe, G. Venifa Mini, J.Jeya A.Celin
 
Vol 6, No 7 (2014) Secure Auditing Method for Cloud Computing Abstract
S. Srinivasan, K. Raja
 
Vol 8, No 3 (2016) Secure Authorized Deduplication in Hybrid Cloud with Public Auditing Abstract
J. Dhivya, R. Santhosh
 
Vol 7, No 4 (2015) Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique Abstract
A. Balakumar, R. Senthilkumar
 
Vol 7, No 8 (2015) Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System Abstract
Dipti Balasaheb Bansode, Amar Buchade
 
Vol 10, No 4 (2018) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract
G. Swathika, R. Vijayalakshmi
 
Vol 10, No 8 (2018) Secure Data Sharing in Cloud Computing using RS-IBE Abstract
T. Amith Kumar
 
Vol 2, No 6 (2010) Secure Data Transmission in Wireless Sensor Network using Randomized Multipath Routes Abstract
K. Soundar Rajan
 
Vol 4, No 7 (2012) Secure Low Cost FPGA-based AMI System using LTE Technology Abstract
M.M. Abutaleb, A.M. Allam
 
Vol 2, No 5 (2010) Secure Multi Server Strong-Password Authentication Using Two Factor Approach (Image Password and Mobile) Abstract
R. KanakasundaraRao
 
Vol 3, No 11 (2011) Secure Multicast Routing Protocol against Insider Attacks in MANET Abstract
V. Jayalakshmi, Dr. R. Rameshkumar
 
Vol 8, No 5 (2016) Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage Abstract
S. Nalini Poornima, Dr. R. S. Ponmagal
 
Vol 6, No 2 (2014) Secure Probabilistic Location Verification for Wireless Sensor Networks Abstract
R. VidhyaLakshmi, G. Surya
 
801 - 825 of 963 Items << < 28 29 30 31 32 33 34 35 36 37 > >> 


ISSN: 0974 – 9616