| Issue | Title | |
| Vol 6, No 9 (2014) | 3G Core Network Commissioning | Abstract |
| Junaid khan, V. Harini | ||
| Vol 2, No 10 (2010) | A Basic study of Multiple Tree Multicast Routing Protocol using MANET | Abstract |
| S. Vijayaragavan, K. Duraiswamy | ||
| Vol 5, No 9 (2013) | A Brief Study of Data Compression Algorithms | Abstract |
| Yogesh Rathore, Manish K. Ahirwar, Rajeev Pandey | ||
| Vol 3, No 11 (2011) | A Collective Processing Environment for Mobile Devices Using Grid | Abstract |
| G. Pary, S. Sridhar | ||
| Vol 6, No 4 (2014) | A Collusion-Resistant Acknowledgement-based Scheme for Mitigation of Packet Drop in MANETs | Abstract |
| G.D. Anjaly, J.C. Kavitha | ||
| Vol 7, No 5 (2015) | A Comparative Analysis of Energy Efficient SP-LEACH and Classical LEACH Protocols of WSNs | Abstract |
| P. Naveen Kumar, D.S. Anil Kumar, C.V. Sujana, A V. Sumanth | ||
| Vol 1, No 5 (2009) | A Comparative Analysis of Signature Schemes in a New Approach to Variant on ECDSA | Abstract |
| M. Prabu, Dr. R. Shanmugalakshmi | ||
| Vol 11, No 9 (2019) | A Comparative Study on Routing Protocols in VANET and MANET | Abstract |
| A. P. Thangamuthu | ||
| Vol 6, No 4 (2014) | A Comparison of Data Replication Schemes to Achieve an Optimum Query Delay and Efficient Data Access in MANETs | Abstract |
| Joslin Anie Abraham, Dr. C.D. Suriyakala | ||
| Vol 3, No 9 (2011) | A Comprehensive Investigation of Sip Protocol | Abstract |
| N. Rakesh, T.R. Mahesh, S.K. Srivatsa | ||
| Vol 6, No 9 (2014) | A Comprehensive Review on Intrusion Detection Systems | Abstract |
| M. Sreenath | ||
| Vol 7, No 5 (2015) | A Comprehensive Study of Wireless Sensor Networks | Abstract |
| Sharanjeet Kaur | ||
| Vol 11, No 12 (2019) | A Conversational User Interface (CUI) ChatBot Using Microsoft Bot Framework | Abstract |
| Dr. A. V. Ramani, A. Vignesh | ||
| Vol 4, No 5 (2012) | A Critique of Cloud Computing and its Security | Abstract |
| Riyajuddin Y. Mujawar, Aiyeshabi S. Mulla | ||
| Vol 3, No 4 (2011) | A Crucial Technology to Improve the Performance in Pervasive Computing | Abstract |
| G. Rajeswari, B. Nithya, D. Mahendravarman | ||
| Vol 2, No 6 (2010) | A Delay Aware Tree Based Technique in Wireless Sensor Network | Abstract |
| V. Cibi Castro, Dr.R. Rajesh | ||
| Vol 2, No 8 (2010) | A Descriptive Review of OSPF with Java RMI | Abstract |
| Virpal Kaur, Monika Gupta, Parminder Kang | ||
| Vol 2, No 6 (2010) | A Detailed Study on Cloud Computing based on Security and Future Opportunities | Abstract |
| A. Rajadurai, J. Ilanchezhian, V. Varadharassu, A. Ranjeeth | ||
| Vol 6, No 7 (2014) | A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks | Abstract |
| Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky | ||
| Vol 1, No 3 (2009) | A Distributed Cache Architecture with Snooping for QoS Routing in Large Networks | Abstract |
| Andhe Dharani, P. Anupama | ||
| Vol 3, No 6 (2011) | A Distributed Time Delay Model of Worms in Computer Network | Abstract |
| Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy | ||
| Vol 1, No 2 (2009) | A Dynamic Approach to Select a Proxy Using Link Properties for Scalable and Reliable Multicast Transport Layer Protocol | Abstract |
| R. Sasikala, Dr. K. Duraiswamy | ||
| Vol 4, No 3 (2012) | A Effective Edge Replacement Technique for Packet Distribution System using V-LAN | Abstract |
| P.R. Nirmal Binu, K. Sudharson | ||
| Vol 5, No 5 (2013) | A Energy Efficient Routing Method for Under Water Aural Sensor Network | Abstract |
| S. Prabhu, V. Kandasamy, R. Murgan | ||
| Vol 2, No 7 (2010) | A Frame work for Code Injection Attack Investigation in Windows Environment | Abstract |
| Deepak Singh Tomar, J.L. Rana, S.C. Shrivastava | ||
| 1 - 25 of 963 Items | 1 2 3 4 5 6 7 8 9 10 > >> | |
ISSN: 0974 – 9616