| Humanistic Approach in Mobile Adhoc Network : HAMANET |
| Md. Amir Khusru Akhtar1 and G. Sahoo2, 1 Cambridge Institute of Technology, India and 2 Birla Institute of Technology, India |
| Volume : 3 volume number : 6 pdf |
| Fake Face Database and Preprocessing |
| Aruni Singh, Sanjay Kumar Singh and Shrikant Tiwari, IIT(BHU), India |
| Volume : 3 volume number : 6 pdf |
| Node Failure Time Analysis for Maximum Stability vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks |
| Natarajan Meghanathan1 and Philip Mumford2, 1 Jackson State University, USA and 2 Air Force Research Lab/RYWC, USA |
| Volume : 3 volume number : 6 pdf |
| Knowledge Base Compound Approach Against Phishing Attacks Using Some Parsing Techniques |
| Gaurav Kumar Tak1, Gaurav Ojha2 and Udit Kumar2, 1 Lovely Professional University, India and 2 Indian Institute of Information Technology and Management, India |
| Volume : 3 volume number : 6 pdf |
| Affect of Parallel Computing on Multicore Processors |
| V R Rao Konkimalla and Niraj Upadhayaya, JB Institute of Engineering Technology, India |
| Volume : 3 volume number : 6 pdf |
| Framework for Tagging Software in Web Application |
| Karan Gupta and Anita Goel, University of Delhi, India |
| Volume : 3 volume number : 6 pdf |
| A RAMP Code for Fine-Grained Access Control |
| Kannan Karthik, Indian Institute of Technology - Guwahati, India |
| Volume : 3 volume number : 6 pdf |
| Fusion Based Multimodal Authentication in Biometrics Using Context-Sensitive Exponent Associative Memory Model : A Novel Approach |
| P. E. S. N. Krishna Prasad, Pavan Kumar K, M. V. Ramakrishna and B. D. C. N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India |
| Volume : 3 volume number : 6 pdf |
| Combined Mining Approach to Generate Patterns for Complex Data |
| Sumit Kumar1, Sweety2 and Manish Kumar2, 1IVY Comptech Pvt. Ltd, India and 2IIIT-Allahabad, India |
| Volume : 3 volume number : 6 pdf |
| Real Time Database Compression Optimization Using Iterative Length Compression Algorithm |
| Muthukumar Murugesan1 and T Ravichandran2, 1Karpagam University, India and 2Hindusthan Institute of Technology, India |
| Volume : 3 volume number : 6 pdf |
| Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures |
| Ranjit Panigrahi, Kalpana Sharma and M.K. Ghose, SMIT, India |
| Volume : 3 volume number : 6 pdf |
| Mapping of Traditional Software Development Methods to Agile Methodology |
| Rashmi Popli, Anita and Naresh Chauhan, YMCA University of Science & Technology, India |
| Volume : 3 volume number : 6 pdf |
| A Model for Aligning Software Projects Requirements with Project Team Members Requirements |
| Robert Hans, Tshwane University of Technology, South Africa |
| Volume : 3 volume number : 6 pdf |
| A Hybrid Approach for Ensuring Security in Data Communication |
| Shailender Gupta1, Bharat Bhushan1, Surbhi Singhania1 and Jeetesh Gulani2, 1YMCA University of Science and Technology, India and 2Indian Institute of Technology-Kharagpur, India |
| Volume : 3 volume number : 6 pdf |
| On Average Case Analysis Through Statistical Bounds : Linking Theory to Practice |
| Niraj Kumar Singh, Soubhik Chakraborty and Dheeresh Kumar Mallick, BIT Mesra, India |
| Volume : 3 volume number : 6 pdf |
| Semantic Web Services - Discovery, Selection and Composition Techniques |
| Sowmya Kamath S and Ananthanarayana V.S, National Institute of Technology, India |
| Volume : 3 volume number : 6 pdf |
| Classification of Tamil Poetry Using Context Free Grammar Using Tamil Grammar Rules |
| Subasree Venkatsubhramaniyen, Subha Rashmi and Rajeswari Sridhar, Anna University, India |
| Volume : 3 volume number : 6 pdf |
| Study of VANET Routing Protocols for End to End Delay |
| Sunilkumar M. Bhagat and Vijay Wadhai, MIT Academy of Engineering, India |
| Volume : 3 volume number : 6 pdf |