Table of Contents
Vol 2, No 6 (2010)
Open Access
Subscription Access
Articles
A Delay Aware Tree Based Technique in Wireless Sensor Network | ||
V. Cibi Castro, R. Rajesh | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 292 | PDF Views: 2 |
Restoring Internodes Connectivity in Networks of Moveable Sensors | ||
R. AnbuRajan | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 146 | PDF Views: 4 |
A Detailed Study on Cloud Computing Based on Security and Future Opportunities | ||
A. Rajadurai, J. Ilanchezhian, V. Varadharassu, A. Ranjeeth | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 269 | PDF Views: 2 |
Secure Data Transmission in Wireless Sensor Network Using Randomized Multipath Routes | ||
K. Soundar Rajan | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 182 | PDF Views: 3 |
Design of Reconfigurable 2-D W/T OCDMA Decoder for Access Networks | ||
M. Bala Subramanian, Prita Nair | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 155 | PDF Views: 3 |
Design of a Wireless Sensor Network Node Based on nRF2401 | ||
B. Thulasiram, P. Pandiaraj | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 164 | PDF Views: 3 |
Transaction Processing System for Efficient Maintenance of Databases in Cloud | ||
S. Bala Manohari, R. Sasikala | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 165 | PDF Views: 3 |
Providing Security to Wireless Sensor Networks by Identifying and Preventing Malicious Node | ||
A. Asha Joshia, I. Shahanaz Begumb | ||
Vol 2, No 6 (2010), Pagination: | ||
ABSTRACT | PDF | Abstract Views: 162 | PDF Views: 3 |