1 |
Volume 1 |
Issue 3 |
Active Queue Management in a QOS Enabled Network |
P.Chenna Reddy, Dr.P.Chandra Shekhar Reddy |
|
2 |
Volume 1 |
Issue 3 |
Security in Group Conference Protocol (SGCP) |
K.Bhuuvanreswari and T.ArunKumar |
|
3 |
Volume 1 |
Issue 3 |
Security Model for IEEE 802.11 Wireless LAN Using WPA |
Mr.Madhu S Nair |
|
4 |
Volume 1 |
Issue 3 |
Improved Algorithm for Elliptic Curve Scalar MultiPlication using wMOF and Shamir Method |
E.Karthikeyan,P.Balasubramaniam |
|
5 |
Volume 1 |
Issue 3 |
APT-A Novel Symmetric Key Cryptographic Algorithm for Securing VPNs |
G.Sudha Sadhasivam |
|
6 |
Volume 1 |
Issue 3 |
An Efficient and Robust Face Recognition System Based on Two-Dimensional Fisher Linear Discriminant Analysis:A New Approach |
Noushath S,Hemantha Kumar G and ShivaKumara P |
|
7 |
Volume 1 |
Issue 3 |
Suitability of Multiagents for Intelligent Distributed Searching |
D.Indumathi,A.Chitra,S.N.Sivanandam,R.L avanya |
|
8 |
Volume 1 |
Issue 3 |
Targeted Associaton Querying for Dynamic and Distributed Databases |
T.Hamsapriya,Dr.S.Sumathi |
|
9 |
Volume 1 |
Issue 3 |
History-Aware Anticipated Route Maintenance in Mobile Ad Hoc Networks |
M.V.Sivanarayana,M.P.Sebastian |
|
10 |
Volume 1 |
Issue 3 |
Pre-Syntactic Analysis of NL Sentences For Auto Generation Of Programming Interface |
Gopinath Ganapathy |
|
11 |
Volume 1 |
Issue 3 |
A Novel Delta-Rule Approach For the Design Of PID Controllers to Stabilize Linear Time Invariant Continuous Systems |
R.Venkatesam,Dr.s.n.sivanandam |
|