Table of Contents
Articles
| Development of an Improved Anonymity in GPS Traces for Analyzing Traffic and Routes |
PDF
|
| V. Karthik, V. Venkatesa Kumar | 694-700 |
| A Study on Web Ontologies-Based Reengineering Software for Cloud Computing Using Probabilistic Topic Models |
PDF
|
| R. Rathika, M. Ambika | 701-705 |
| An Optimal Wake–up Scheduling Algorithm for Minimizing Energy Consumption While Limiting Maximum Delay in Mesh Sensor Network |
PDF
|
| P. Karthikeyan | 706-710 |
| Analysis of Flow Correlation Attacks in Anonymity Networks against Passive Logging Attacks |
PDF
|
| S.G. Shahidha Taj | 711-716 |
| A Collective Processing Environment for Mobile Devices Using Grid |
PDF
|
| G. Pary, S. Sridhar | 717-725 |
| A Hybrid Approach for Feature Selection in Improving the Efficiency of Wireless Intrusion Detection Systems |
PDF
|
| Dr. K. Selva Kumar, R. Saminathan, S. Suganthi | 726-730 |
| User-Controlled Privacy Preserving Identity Management for Cloud Computing |
PDF
|
| Viswanathan Pachaiyappan, R. Chandrasekar | 731-736 |
| Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography |
PDF
|
| R. Bala | 737-740 |
| Review of Routing and Switching |
PDF
|
| Shalaka Vijay. Sawant, Shubha M Puthran | 741-746 |
| Performance Optimization for Mobile Environments |
PDF
|
| D. Vaishnavi, S.G. Santhi, K. Venkatachalapathy | 747-751 |
| Secure Multicast Routing Protocol against Insider Attacks in MANET |
PDF
|
| V. Jayalakshmi, Dr. R. Rameshkumar | 752-759 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616