Browse Title Index


 
Issue Title
 
Vol 3, No 6 (2011) LIGHTMQ Provider for Java Message Service Abstract
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav
 
Vol 1, No 6 (2009) Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks Abstract
S. Suganya, Dr. S. Palaniammal
 
Vol 8, No 6 (2016) Linux Architecture and Advantages Abstract
Bhumika S. Zalavadia
 
Vol 4, No 14 (2012) Literature Review on EAP Methods Abstract
Anupama Patil, Sameer Nagtilak, Shweta Mane
 
Vol 4, No 14 (2012) Literature Survey for Diminution of Envelope Fluctuation in SC-FDMA System for Uplink Transmission Abstract
T. Abisha, B. Bhuvaneswari
 
Vol 7, No 1 (2015) Literature Survey on Different Cloud Computing Infrastructure-as-a-Service Frameworks Abstract
Yogesh V. Jilhawar, Dr.  Emmanuel M.
 
Vol 7, No 5 (2015) Literature Survey on Network Traffic Management in Software Defined Networking Abstract
Sachin A. Vanjari
 
Vol 13, No 2 (2021) Load Balancing Algorithms and Simulation Tools in Cloud Environment Abstract
P. R. Sudha, Dr. P. M. Rekha
 
Vol 3, No 14 (2011) Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing Abstract
Dr.G. Radhamani, P. Mary Sriryn
 
Vol 3, No 5 (2011) Load Balancing in Mesh Based Wireless Network Using Cluster Re-Configuration Algorithm Abstract
P. Vinoth Kumar, B. Chandra Mohan
 
Vol 3, No 4 (2011) Location Based Scheduler for Independent Jobs in Computational Grids Abstract
P. Karthikeyan, B. Dhiyanesh
 
Vol 11, No 8 (2019) Location based Web Recommendation using Data Mining Techniques Abstract
Katayoun Farrahi, Angela Curl
 
Vol 1, No 2 (2009) Low Latency Seamless Transport Interface Abstract
Mauli Gulati, Dr. Deepak Garg
 
Vol 2, No 1 (2010) Low-Low Average Algorithm for Scheduling Request-Demanding Cloud Workflows with Overhead Abstract
V. Anbalagan
 
Vol 2, No 9 (2010) LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems Abstract
G. Satyavathy, M. Punithavalli
 
Vol 3, No 7 (2011) MAC Layer Based Insubordination Mechanism for Differentiating and Penalizing/Rewarding Opportunist Nodes in 802.11 WLAN Network Abstract
Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadauria
 
Vol 8, No 3 (2016) Maintaining Privacy for Multi-keyword Search on Encrypted Data: A Survey Abstract
Sushant Y. Kamble, Amit B. Chougule
 
Vol 3, No 1 (2011) Malicious Impostor Email Prevention Using Randomly Encrypted Address Book Abstract
R. Rajesh Perumal, J. Vinu
 
Vol 3, No 4 (2011) Malicious User Limit: A Decentralized Approach against Sybil Attacks Abstract
M. Kowsigan, K. Rajakumari
 
Vol 4, No 6 (2012) Managing Trust and Detecting the Guilty Party in P2P Networks Abstract
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar
 
Vol 2, No 9 (2010) Measurement of Denial of Service Attacks Using New Metrics Abstract
P. Kavithapandian, S. Muthukumar, Dr. Kannan Balasubramanian
 
Vol 2, No 9 (2010) Measuring Sustainable Development: Theory and Application Abstract
Dr. Joshua O. Miluwi
 
Vol 8, No 6 (2016) Mechanized Discovery of Malicious Attack and Providing Security using Frame Breaking in WoT Abstract
S. John Samuel, A. Mathan Gopi
 
Vol 5, No 8 (2013) Methods of Reducing False Alerts by Intrusion Detection System Abstract
PrajaktaSandeep Jadhav
 
Vol 5, No 2 (2013) Metric Based Scheduling Algorithm (MeBaSA) for Scaled Multi-tier Clouds Abstract
Ramesh D. Kodi, M. Balavaishnavi
 
601 - 625 of 963 Items << < 20 21 22 23 24 25 26 27 28 29 > >> 


ISSN: 0974 – 9616