Manipulating Multistage Interconnection Networks Using Fundamental Arrangements |
E. Gur, Z. Zalevsky |
Vol 2, No 6 (2010), Pagination: 1-11
|
ABSTRACT |
PDF
|
|
Abstract Views: 191 |
PDF Views: 115
|
Inheritance Metrics for Object-Oriented Design |
Kumar Rajnish, Arbind Kumar Choudhary, Anand Mohan Agrawal |
Vol 2, No 6 (2010), Pagination: 13-26
|
ABSTRACT |
PDF
|
|
Abstract Views: 187 |
PDF Views: 113
|
Adaptive Block Pinning Based: Dynamic Cache Partitioning for Multi-Core Architectures |
Nitin Chaturvedi, Jithin Thomas, S. Gurunarayanan |
Vol 2, No 6 (2010), Pagination: 38-45
|
ABSTRACT |
PDF
|
|
Abstract Views: 185 |
PDF Views: 85
|
Use of Smart Antennas in AD HOC Networks |
Mohammed Ali Hussain, P. Suresh Varma, K. Satya Rajesh, Hussain Basha Pathan, Leela Madhav Sarraju |
Vol 2, No 6 (2010), Pagination: 47-54
|
ABSTRACT |
PDF
|
|
Abstract Views: 198 |
PDF Views: 102
|
A Novel Embedded Statistical Scheduler for Realising High System-QoS |
Suman Paul, A. K. Jana, M. K. Pandit |
Vol 2, No 6 (2010), Pagination: 56-62
|
ABSTRACT |
PDF
|
|
Abstract Views: 187 |
PDF Views: 103
|
Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16 |
A. K. M. Nazmus Sakib |
Vol 2, No 6 (2010), Pagination: 64-74
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 98
|
Security in Wireless Sensor Networks Using Key Management Schemes |
P. Soundarya, L. M. Varalakshmi |
Vol 2, No 6 (2010), Pagination: 76-90
|
ABSTRACT |
PDF
|
|
Abstract Views: 174 |
PDF Views: 104
|
Pattern Recognition Using Neural Networks |
Santaji Ghorpade, Jayshree Ghorpade, Shamla Mantri |
Vol 2, No 6 (2010), Pagination: 92-98
|
ABSTRACT |
PDF
|
|
Abstract Views: 218 |
PDF Views: 110
|
Dynamic Scheduling of Skippable Periodic Tasks with Energy Efficiency in Weakly Hard Real-Time System |
Santhi Baskaran, P. Thambidurai |
Vol 2, No 6 (2010), Pagination: 100-111
|
ABSTRACT |
PDF
|
|
Abstract Views: 195 |
PDF Views: 108
|
Data Mining Algorithms and Medical Sciences |
Irshad Ullah |
Vol 2, No 6 (2010), Pagination: 127-136
|
ABSTRACT |
PDF
|
|
Abstract Views: 177 |
PDF Views: 104
|
Network Intrusion Detection System Based on Machine Learning Algorithms |
Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, M. V. V. N. S. Srikanth, T. Gireesh Kumar |
Vol 2, No 6 (2010), Pagination: 138-151
|
ABSTRACT |
PDF
|
|
Abstract Views: 358 |
PDF Views: 271
|
Segmentation and Object Recognition Using Edge Detection Techniques |
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani |
Vol 2, No 6 (2010), Pagination: 153-161
|
ABSTRACT |
PDF
|
|
Abstract Views: 414 |
PDF Views: 317
|
Automatic Induction of Rule Based Text Categorization |
D. Maghesh Kumar |
Vol 2, No 6 (2010), Pagination: 163-172
|
ABSTRACT |
PDF
|
|
Abstract Views: 201 |
PDF Views: 114
|