ISSN: 0975–3397 |
Article # |
Article Title & Authors (Volume 3 Number 10 October 2011) |
Page |
1. |
Detection of threats in Honeynet using Honeywall
Navita Sharma, Sukhwinder Singh Sran
Abstract | PDF |
3332-3336 |
2. |
Software efforts estimation using Use Case Point approach by increasing Technical Complexity and Experience Factors
Chetan Nagar
Abstract | PDF |
3337-3345 |
3. |
RISK BASED TESTING A Fuzzy Approach
Ochin Sharma, Ameen Yasar Khan
Abstract | PDF |
3346-3354 |
4. |
Dimensionality Reduction for Optimal Clustering In Data Mining
Ch. Raja Ramesh, DVManjula, Dr. G. Jena, Dr C V Sastry
Abstract | PDF |
3355-3358 |
5. |
A study on detecting and classifying underwater mine like objects using image processing techniques
Dr.S.N.Geethalakshmi, Dr.P.Subashini, Mrs.P.Geetha
Abstract | PDF |
3359-3366 |
6. |
New Design Metrics for Complexity Estimation in Object Oriented Systems
Nisha Malik, Rajender Singh Chhillar
Abstract | PDF |
3367-3382 |
7. |
New Design Metrics for Complexity Estimation in Object Oriented SystemsWEB-BASED-SECURE ONLINE NON-CHOICE –BASED EXAMINATION SYSTEM (WONES) using Cryptography
Dr. R. Sheshadri, T.Chalama Reddy, N.Ashok kumar
Abstract | PDF |
3383-3392 |
8. |
Specifying a model of semantic web service composition
Souleymane OUMTANAGA, Issa TRAORE, Michel BABRI
Abstract | PDF |
3393-3402 |
9. |
Two Phase Data Reduction for Hough Transformation to Detect Skew
Sunil Kumar, S. Gopinath
Abstract | PDF |
3403-3411 |
10. |
AHP and Group Decision Making for Access Network Selection in Multi-Homed
Mobile Terminals
K. Radhika, Dr. A. Venugopal Reddy
Abstract | PDF |
3412-3421 |
11. |
Dual Moving Text Line Detection and Selective Masking
Panduranga H.T, Dr. Naveen Kumar S.K
Abstract | PDF |
3422-3425 |
12. |
Task-Scheduling in Cloud Computing using Credit Based Assignment Problem
Mousumi Paul, Goutam Sanyal
Abstract | PDF |
3426-3430 |
13. |
Performance Evaluation and Optimization of TCP Parameters over Frame Relay Network
Gursimran Singh, Jatinder Singh
Abstract | PDF |
3431-3440 |
14. |
A review on various methods of image thresholding
Er.Nirpjeet kaur, Er Rajpreet kaur
Abstract | PDF |
3441-3443 |
15. |
Wide Area Network's Reliability Redundancy Design Using Simulation
Janardhan Babu V, Nadhamuni Reddy C, Govardhan A
Abstract | PDF |
3444-3450 |
16. |
Generation of a pool of variable size symmetric keys through Image
Prerna Garg, Deepak Garg
Abstract | PDF |
3451-3456 |
17. |
Cluster Based Algorithm for Energy Conservation and Lifetime Maximization in Wireless Sensor Networks
H Sivasankari, Shaila K, Venugopal K R, L M Patnaik
Abstract | PDF |
3457-3471 |
18. |
Joint Link Scheduling for Optimal Management of Radio Resources in Satellite Systems
Zhao Yang
Abstract | PDF |
3472-3476 |
19. |
Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design
Yi-Chang Cheng, Sheng-Fuu Lin, Chi-Yao Hsu
Abstract | PDF |
3477-3489 |
20. |
Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks
Shaila K, S H Manjula, Thriveni J, Venugopal K R, L M Patnaik
Abstract | PDF |
3490-3501 |
Uploading is going on.... |
To view the PDF use Adobe Acrobat 6.0 or more |