Vol 3, No 6 (2011)

Table of Contents

Vol 3, No 6 (2011)

Open Access Open Access  Restricted Access Subscription Access

Articles

Virtual Password Obscuring in Avoidance of Keyloggers
J. Jeysree
 Vol 3, No 6 (2011), Pagination: 371-374
ABSTRACT |  PDF     Abstract Views: 164  |  PDF Views: 3
Improving the Performance of Interactive TCP Applications using End-Point Techniques
Varun G. Menon, Alfred Raja Melvin
 Vol 3, No 6 (2011), Pagination: 375-379
ABSTRACT |  PDF     Abstract Views: 172  |  PDF Views: 2
A New Protocol Stack for 6LoWPAN–An Overview
R. B. Jagadeesha
 Vol 3, No 6 (2011), Pagination: 380-389
ABSTRACT |  PDF     Abstract Views: 157  |  PDF Views: 1
LIGHTMQ Provider for Java Message Service
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav
 Vol 3, No 6 (2011), Pagination: 390-395
ABSTRACT |  PDF     Abstract Views: 152  |  PDF Views: 1
Workflow Based Resource Allocation and Monitoring Using Mobile Agents
L. Venkatakrishnan, T. V. U. Kiran Kumar, M. A. Dorairengaswamy
 Vol 3, No 6 (2011), Pagination: 396-400
ABSTRACT |  PDF     Abstract Views: 144  |  PDF Views: 3
Gaze-based Password Entry Systems
S. Yamini
 Vol 3, No 6 (2011), Pagination: 401-403
ABSTRACT |  PDF     Abstract Views: 161  |  PDF Views: 3
A Survey of Peer To Peer Network
R. Maruthaveni, S. kalaivani
 Vol 3, No 6 (2011), Pagination: 404-407
ABSTRACT |  PDF     Abstract Views: 149  |  PDF Views: 3
Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL
A. Thiruneelakandan, N. Hemavathy
 Vol 3, No 6 (2011), Pagination: 408-414
ABSTRACT |  PDF     Abstract Views: 173  |  PDF Views: 3
An Efficient Reliable Protocol in AD-Hoc Network Using A Cross Layer Approach via TCP
R. Thamizhamuthu, G. Ilanchezhia Pandian, P. Sheik Abdul Khader
 Vol 3, No 6 (2011), Pagination: 415-417
ABSTRACT |  PDF     Abstract Views: 176  |  PDF Views: 3
Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam
 Vol 3, No 6 (2011), Pagination: 418-423
ABSTRACT |  PDF     Abstract Views: 168  |  PDF Views: 3
Adaptive Routing for QoS in Manet by Using Cross Layer Architecture
P. Chitra, G. Ilanchezhia Pandian, P. Sheik Abdul Khader
 Vol 3, No 6 (2011), Pagination: 424-426
ABSTRACT |  PDF     Abstract Views: 164  |  PDF Views: 1
Privacy Protected Query Processing using Advanced Location Based Service
U. Nithyapriya, M. Kalimuthu
 Vol 3, No 6 (2011), Pagination: 427-432
ABSTRACT |  PDF     Abstract Views: 150  |  PDF Views: 1
An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo
 Vol 3, No 6 (2011), Pagination: 433-435
ABSTRACT |  PDF     Abstract Views: 148  |  PDF Views: 3
A Quarantine Model for Malicious Objects in Computer Network
Aditya Kumar Singh, Bimal Kumar Mishra
 Vol 3, No 6 (2011), Pagination: 436-440
ABSTRACT |  PDF     Abstract Views: 159  |  PDF Views: 1
A Distributed Time Delay Model of Worms in Computer Network
Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy
 Vol 3, No 6 (2011), Pagination: 441-447
ABSTRACT |  PDF     Abstract Views: 313  |  PDF Views: 1