Quantum parity algorithms as oracle calls, and application in Grover Database search |
M. Z. Rashad |
Volume : 3 volume number : 2 pdf |
Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol |
M. W. Youssef 1and Hazem El-Gendy2 |
Volume : 3 volume number : 2 pdf |
How To Improve Software Quality Assurance In Developing Countries |
Ali Javed , Muazzam Maqsood KhurramAshfaqQazi and Khurram Ali Shah |
Volume : 3 volume number : 2 pdf |
Controlled Multimedia Cloud Architecture And Advantages |
Selvaraj Kesavan1, Jerome Anand2 and J.Jayakumar1 |
Volume : 3 volume number : 2 pdf |
Construction of Community Web Directories based on Web usage Data |
Ramancha Sandhyarani, Bodakuntla Rajkumar and Jayadev Gyani |
Volume : 3 volume number : 2 pdf |
Edge Preserving Image Coding For High Resolution Image Representation |
M. Nagaraju Naik 1, K. Kumar Naik 1 and P. Rajesh Kumar 1 |
Volume : 3 volume number : 2 pdf |
Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks |
S. Parthiban1, A. Amuthan2, N.Shanmugam3, K.Suresh Joseph1 |
Volume : 3 volume number : 2 pdf |
Role Of Context In Usability Evaluations: A Review |
vMunesh Chandra Trivedi1 and Mohammadi Akheela Khanum2 |
Volume : 3 volume number : 2 pdf |
Data Load Manifestation In Process Chains In SAP Business Ware House |
M. Victoria Hebseeba1 , T. Bhasakara Reddy2 , B. Lakshma Reddy3 and T. Venkateswarulu4 |
Volume : 3 volume number : 2 pdf |
A Novel Framework using Elliptic Curve Cryptography for Extremely Secure Transmission in Distributed Privacy Preserving Data Mining |
Kiran P, S Sathish Kumar and Kavya N P |
Volume : 3 volume number : 2 pdf |
Analysis of Various Symbol Detection Techniques in Multiple-Input Multiple-Output System (MIMO) |
Shuchi Jani1, Shrikrishan Yadav2 and B. L. Pal3 |
Volume : 3 volume number : 2 pdf |
Aspect-Oriented Software Quality Model: The AOSQ Model |
Pankaj Kumar |
Volume : 3 volume number : 2 pdf |
A Survey for Load Balancing in Mobile WiMAX Networks |
Camellia Askarian and Hamid Beigy |
Volume : 3 volume number : 2 pdf |
Physical Unclonable Function (PUF) Based Random Number Generator |
Ali Sadr and Mostafa Zolfaghari-Nejad |
Volume : 3 volume number : 2 pdf |
Feature Extraction Methods For Color Image Similarity |
R.Venkata Ramana Chary1,D.Rajya Lakshmi2 and K.V.N Sunitha3 |
Volume : 3 volume number : 2 pdf |
Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications |
Mohammed A. T. AlSudiari and TGK Vasista |
Volume : 3 volume number : 2 pdf |
Anonymity And Accountability In Web Based Transactions |
H.Jayasree and A.Damodaram |
Volume : 3 volume number : 2 pdf |