Cryptographic Strength Estimation Using Spurious Keys with Consideration to Information Content in the Message |
Mekala Rama Rao1, L Pratap Reddy1, BHVS Narayana Murthy2 and Maruti Sairam Annaluru2, 1Jawaharlal Nehru Technological University, India and 2Research Centre Imarat, India |
Volume : 7 volume number : 11 pdf |
Adapted Bin Packing Algorithm for Virtuals Machines Placement into Datacenters |
Frejus A. R. Gbaguidi1,3 Selma Boumerdassi1,2 and Eugene C. Ezin3, 1CEDRIC, France, 2INRIA Hipercom, France and 3IMSP, Benin |
Volume : 7 volume number : 11 pdf |
Extraction and Refinement of Fingerprint Orientation Field |
Pierluigi Maponi, Riccardo Piergallini and Filippo Santarelli, University of Camerino, Italy |
Volume : 7 volume number : 11 pdf |
Analysis of Wormhole Attack Confirmation System During Email Dumping Attack |
Divya Sai Keerthi T and Pallapa Venkataram, Indian Institute of Science - Bangalore, India |
Volume : 7 volume number : 11 pdf |
Attack Analysis in Vehicular Ad Hoc Networks |
Omer Mintemur and Sevil Sen, Hacettepe University, Turkey |
Volume : 7 volume number : 11 pdf |
Representation with Word Clouds at the PHD UNS Digital Library |
Georgia Kapitsaki1 and Dragan Ivanovic2, 1University of Cyprus, Cyprus and 2University of Novi Sad, Serbia |
Volume : 7 volume number : 11 pdf |
CINNAMONS : A Computation Model Underlying Control Network Programming |
Kostadin Kratchanov, Yasar University, Turkey |
Volume : 7 volume number : 11 pdf |
Usability Testing of Fitness Mobile Application : Methodology and Quantitative Results |
Ryan Alturki and Valerie Gay, University of Technology Sydney, Australia |
Volume : 7 volume number : 11 pdf |
Recognition the Droplets in Gray Scale Images of Dropwise Condensation on Pillared Surfaces |
Helene Martin1, Solmaz Boroomandi Barati2, Jean-Charles Pinoli1, StephaneValette2 and Yann Gavet1, 1Ecole Nationale Superieure des Mines de Saint-Etienne, France and 2Univ Lyon, France |
Volume : 7 volume number : 11 pdf |
Predicting Software Launch Readiness in a Complex Product |
Abhinav Sharma, HCL Technologies, UK |
Volume : 7 volume number : 11 pdf |
Lightweight Key Management Scheme for Hierarchical Wireless Sensor Networks |
Mohammed A. Al-taha and Ra'ad A. Muhajjar, Basrah University, Iraq |
Volume : 7 volume number : 11 pdf |
Block Chain Based Data Logging and Integrity Management System for Cloud Forensics |
Jun Hak Park, Jun Young Park and Eui Nam Huh, Kyung Hee University, South Korea |
Volume : 7 volume number : 11 pdf |
An Innovative Social Mobile Platform to Support Real Time Communication in Peer Tutoring |
Meghan Wang1 and Yu Sun2, 1Valencia High School, USA and 2California State Polytechnic University, USA |
Volume : 7 volume number : 11 pdf |
An Intelligent Self Adaptive System to Automate the Sprinkler Control |
Jiahao Li1, Yu Sun2 and Fangyan Zhang3, 1Northwood High School, USA, 2California State Polytechnic University, USA and 3Mississippi State University, USA |
Volume : 7 volume number : 11 pdf |