Vol 3, No 14 (2011)

Table of Contents

Vol 3, No 14 (2011)

Open Access Open Access  Restricted Access Subscription Access

Articles

The Mobile Based Remote Networking and Monitoring the Remote System in Dynamic Position
G. Pary, S. Sridhar
 Vol 3, No 14 (2011), Pagination: 876-882
ABSTRACT |  PDF     Abstract Views: 150  |  PDF Views: 1
Load Balancing at Peak Hours Using FIFO and Weighted Average Techniques in Cloud Computing
G. Radhamani, P. Mary Sriryn
 Vol 3, No 14 (2011), Pagination: 883-889
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 2
Comparison of Percentage of Emission in Optical Communication for Different Receivers
K. V. Satya Kumar, T. Durga Prasad, K. Sridevi, T. Gowri, M. Ramesh
 Vol 3, No 14 (2011), Pagination: 890-893
ABSTRACT |  PDF     Abstract Views: 183  |  PDF Views: 1
A Novel Method for Controlling and Monitoring of Data Acquisition System
N. Jayamma, B. Hari Krishna
 Vol 3, No 14 (2011), Pagination: 894-897
ABSTRACT |  PDF     Abstract Views: 175  |  PDF Views: 1
Network Centric Warfare-Concepts and Challenges
D. Anand, Raja, E. G. Rajan
 Vol 3, No 14 (2011), Pagination: 898-902
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 13
An Efficient Algorithm for Token Management of Message Dependent Deadlocks Recovery Architecture
Rinkle Rani Aggarwal, Nidhi Garg
 Vol 3, No 14 (2011), Pagination: 903-908
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 1
Performance Analysis and Comparison of Scheduling Algorithm in MANET’s
Sanjeev Kumar, Yogesh Chaba, Amandeep
 Vol 3, No 14 (2011), Pagination: 909-914
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 5
A Survey on Resource Management in Cloud Computing Using Ontology Approach
R. Lakshmi Devi, L. S. Jayashree
 Vol 3, No 14 (2011), Pagination: 915-919
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 3
Job Scheduling in Grids with QoS Satisfaction Using Ant Colony Optimization (ACO)
P. Devaki, M. L. Valarmathi
 Vol 3, No 14 (2011), Pagination: 920-923
ABSTRACT |  PDF     Abstract Views: 139  |  PDF Views: 3
Security Analysis in Graphical Password Schemes
S. Yamini
 Vol 3, No 14 (2011), Pagination: 924-929
ABSTRACT |  PDF     Abstract Views: 153  |  PDF Views: 3
New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6)
D. Sathish
 Vol 3, No 14 (2011), Pagination: 930-937
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 3
Weighted Nebulous Matching over Frequent Episode Rules Using Internet Anomaly Detection
B. Muthulakshmi
 Vol 3, No 14 (2011), Pagination: 938-940
ABSTRACT |  PDF     Abstract Views: 141  |  PDF Views: 3
GT Approach for Detecting Application DoS Attacks
D. Jebakumar Immanuel, C. Sangeetha
 Vol 3, No 14 (2011), Pagination: 941-946
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 3
A Non-Intrusive BIST Capability for UART
D. Mahesh Kumar, A. M. Sreeram
 Vol 3, No 14 (2011), Pagination: 947-952
ABSTRACT |  PDF     Abstract Views: 159  |  PDF Views: 3