Table of Contents
Articles
| Network Monitoring Using Genetic Algorithm |
PDF
|
| Amit Savyanavar, Mayank Manish, Raunak Agarwal, Devanshu Gupta, Saral Jain | 578-581 |
| Improvement of Handoff Latency by GPS Based Handoff Technique |
PDF
|
| Debabrata Sarddar, Shubhajeet Chatterjee, Ramesh Jana, Mandovi Mukherjee, Sreya Mallik, Utpal Biswas, M.K. Naskar | 582-588 |
| Theoretical Analysis and Performance Measurement of MEMS Based Pressure Sensor |
PDF
|
| T. Sripriya, J. Jayalakshmi | 589-592 |
| A Comprehensive Investigation of Sip Protocol |
PDF
|
| N. Rakesh, T.R. Mahesh, S.K. Srivatsa | 593-597 |
| DDOS( Distributed Denial of Services) Attack and its Removal |
PDF
|
| Gaurav Mittal, Sheenam Goyal | 598-600 |
| A Key Management Scheme for VANET Based on Vector Group |
PDF
|
| S. Christal, S. Sumitha | 601-605 |
| Differentiated Service to Improve QoS in Sensor Networks |
PDF
|
| M. Pradeep, K. Jason | 606-610 |
| Web Services Composition towards an Agent Based and Context Oriented Approach |
PDF
|
| D. Karthikeyan, P. Arunkumar, P. Vidyasri | 611-614 |
| Service Categorization and Admission Control in Enterprise Web Services Using Capacity Distribution Algorithm |
PDF
|
| I. Arul Sahaya Mary, K. Kalaivani, G. Arul Selvan, R. Manivannan | 615-619 |
| Dynamic Routing and Agent Technology Based Security Enhanced Data Delivery with Public Key Cryptography |
PDF
|
| K. Kalaivani, P.K. Uma Chandra, I. Arul Sahaya Mary, M. Ram Murali | 620-624 |
| A Scalable Overlay Multicast Architecture for Large-Scale Applications |
PDF
|
| N. Murali, K. Kumaran | 625-631 |
| Security Issues and Milestones in Cloud Infrastructure |
PDF
|
| S. Subbiah, T. Sowkarthika | 632-634 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616