Table of Contents
Articles
| Algorithm for Cryptanalysis with Application to Data Encryption Standard |
PDF
|
| K. Ravikumar, Dr. A. Kannammal, S. A. Jameel | 240-244 |
| Virtualization: A Foundation for Cloud Computing |
PDF
|
| Dr. Manoj Devare, Mehdi Sheikhalishahi, Dr. Lucio Grandinetti | 245-254 |
| Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions |
PDF
|
| A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala | 255-259 |
| IPv6 over Wireless Sensor Networks |
PDF
|
| Vivek S. Deshpande, Vasundhara V. Ghate | 260-267 |
| Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks |
PDF
|
| S. Suganya, Dr. S. Palaniammal | 268-272 |
| Providing QOS for Mobile Ad-Hoc Network |
PDF
|
| A. Boomarani Malany, Dr. R. M. Chandrasekaran | 273-282 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616