Lock-Free Parallel Access Collections |
Bruce P. Lester, Maharishi University of Management, USA |
Volume : 5 volume number : 1 pdf |
Spectrum Requirement Estimation for IMT Systems in Developing Countries |
Md Sohel Rana and Een-Kee Hong, Kyung Hee University, Republic of Korea |
Volume : 5 volume number : 1 pdf |
Derivative Threshold Actuation for Single Phase Wormhole Detection With Reduced False Alarm Rate |
K.Aathi Dharshini1, C.Susil Kumar2 E.Babu Thirumangai Alwar3, 1,2Velammal College of Engineering & Technology, India and 3Hindusthan Institute of Technology, India |
Volume : 5 volume number : 1 pdf |
Implementing Database Lookup Method in Mobile Wimax for Location Management Area Based Mbs Zone |
S.Sivaranjani1, T.S.Supriya2 and B.Sridevi3, 1Theni Kammavar Sangam College of Technology, India, 2SCAD Institute of Technology, India and 3Velammal College of Engineering & Technology, India |
Volume : 5 volume number : 1 pdf |
An Effective Search on Web Log from Most Popular Downloaded Content |
Brindha.S and Sabarinathan.P, Pavendar Bharathidasan College of Engineering and Technology, India |
Volume : 5 volume number : 1 pdf |
Robust Encryption Algorithm Based Sht in Wireless Sensor Networks |
Uma.G and Sriram.G, Parisutham Institute of Technology, India |
Volume : 5 volume number : 1 pdf |
Multilevel Priority Packet Scheduling Scheme for Wireless Networks |
R.Arasa Kumar and K.Madhu Varshini, Velammal College of Engineering and Technology, India |
Volume : 5 volume number : 1 pdf |
Crypto Multi Tenant: An Environment of Secure Computing Using Cloud Sql |
Parul Kashyap and Rahul Singh, Shri Ramswaroop Memorial College of Engineering and Management, India |
Volume : 5 volume number : 1 pdf |
Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network |
Priyanshu and Ashish Kumar Maurya, Shri Ramswaroop Memorial University, India |
Volume : 5 volume number : 1 pdf |