Abstract is missing.
- A Novel Approach for Task Processing through NEST Network in a GridTarun Gupta, Vipin Tyagi. 24-29 [doi]
- Security Issues in Cloud ComputingPardeep Sharma, Sandeep K. Sood, Sumeet Kaur. 36-45 [doi]
- Virtualization as an Engine to Drive Cloud Computing SecuritySnehi Jyoti, Snehi Manish, Gill Rupali. 62-66 [doi]
- Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control ProtocolVinit Kumar, Ajay Agarwal. 67-78 [doi]
- Efficient Task Scheduling Algorithms for Cloud Computing EnvironmentS. Sindhu, Saswati Mukherjee. 79-83 [doi]
- "Cloud Computing: Towards Risk Assessment"Bharat Chhabra, Bhawna Taneja. 84-91 [doi]
- Efficient Grid Scheduling with CloudsL. Yamini, G. LathaSelvi, Saswati Mukherjee. 92-102 [doi]
- Clustering Dynamic Class Coupling Data to Measure Class Reusability PatternAnshu Parashar, Jitender Kumar Chhabra. 126-130 [doi]
- Enhancing Grid Resource Scheduling Algorithms for Cloud EnvironmentsPankaj Deep Kaur, Inderveer Chana. 140-144 [doi]
- Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative StudySumit Goyal, A. K. Sharma, R. K. Sharma. 145-149 [doi]
- Design of CMOS Energy Efficient Single Bit Full AddersManoj Kumar, Sujata Pandey, Sandeep K. Arya. 159-168 [doi]
- Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive AnalyticsMamta Punjabi, Vineet Kushwaha, Rashmi Ranjan. 169-178 [doi]
- A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous EnvironmentRajkumar Sharma, Priyesh Kanungo, Manohar Chandwani. 186-191 [doi]
- Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service ApplicationsM. Vigilson Prem, S. Swamynathan. 192-200 [doi]
- Composition of Composite Semantic Web Services Using Abductive Event CalculusD. Paulraj, S. Swamynathan. 201-213 [doi]
- Ant Colony Optimization Based Congestion Control Algorithm for MPLS NetworkS. Rajagopalan, E. R. Naganathan, P. Herbert Raj. 214-223 [doi]
- Low Power Optimized Array Multiplier with Reduced AreaPadma Devi, Gurinder Pal Singh, Balwinder Singh. 224-232 [doi]
- Simulink Library Development and Implementation for VLSI Testing in MatlabGurinder Pal Singh, Balwinder Singh. 233-240 [doi]
- Processing of Image Data Using FPGA-Based MicroBlaze CoreSwagata Samanta, Soumi Paik, Shreedeep Gangopadhyay, Amlan Chakrabarti. 241-246 [doi]
- Parametric Analysis of Zone Routing ProtocolRani Astya, Parma Nand, Sunita Sharma 0002. 247-251 [doi]
- Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet TransformMusheer Ahmad, Omar Farooq. 257-264 [doi]
- Computational Analysis of Availability of Process Industry for High PerformanceShakuntla, A. K. Lal, S. S. Bhatia. 265-274 [doi]
- A Framework for Vulnerability Analysis during Software MaintenanceJitender Kumar Chhabra, Amarjeet Prajapati. 282-287 [doi]
- Ontology Based Information Retrieval for Learning Styles of Autistic PeopleSanchika Gupta, Deepak Garg 0002. 293-298 [doi]
- Self-Configurable Scheduling Algorithm for Heterogeneous Computing SystemsA. PrashanthRao, A. Govardhan. 306-315 [doi]
- SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web ServicesV. Shanmughaneethi, Ra. Yagna Pravin, C. Emilin Shyni, S. Swamynathan. 327-337 [doi]
- Computational Model for Prokaryotic and Eukaryotic Gene PredictionSandeep Kaur, Anu Sheetal, Preetkanwal Singh. 342-348 [doi]
- Optimum Controller for Automatic Generation ControlRahul Agnihotri, Gursewak Singh Brar, Raju Sharma. 357-363 [doi]
- Abstraction of Design Information from Procedural ProgramR. N. Kulkarni, T. Aruna, N. Amrutha. 364-372 [doi]
- Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent InterfaceAarti Singh, Dimple Juneja, A. K. Sharma. 373-384 [doi]
- Autonomous Robot Motion Control Using Fuzzy PID ControllerVaishali Sood. 385-390 [doi]
- A Multiresolution Technique to Despeckle Ultrasound ImagesParvinder Kaur, Baljit Singh. 391-396 [doi]
- Wireless Sensor Network Security Research and Challenges: A BackdropDimple Juneja, Atul Sharma, A. K. Sharma. 406-416 [doi]
- Automated Test Case Generation for Object Oriented Systems Using UML Object DiagramsM. Prasanna, K. R. Chandran. 417-423 [doi]
- Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO)Tanu Preet Singh, Manmeet Kaur, Vishal Sharma. 424-429 [doi]
- On the Potential of Ricart-Agrawala Algorithm in Mobile Computing EnvironmentsBharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh. 430-434 [doi]
- Analysis of Digital Forensic Tools and Investigation ProcessSeema Yadav, Khaleel Ahmad, Jayant Shekhar. 435-441 [doi]
- Evaluation of Normalized Routing Load for MANETSunil Taneja, Ashwani Kush. 442-448 [doi]
- Elliptic Curve Cryptography: Current Status and Research ChallengesSheetal Kalra, Sandeep K. Sood. 455-460 [doi]
- SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor NetworksIndrajit Banerjee, Prasenjit Chanak, Hafizur Rahaman. 461-469 [doi]
- Study and Analysis of Incremental Apriori AlgorithmNeeraj Kumar Sharma, N. K. Nagwani. 470-472 [doi]
- Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony SystemB. Chandra Mohan, R. Baskaran. 473-484 [doi]
- Implementing Key Management for Security in Ad Hoc NetworkAvinash Sharma, Narendra Agarwal, Satyabrata Roy, Ajay Sharma, Pankaj Sharma. 485-489 [doi]
- Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLANVishal Sharma, Jagjit Malhotra, Harsukhpreet Singh. 490-496 [doi]
- Key Authentication for MANET SecurityVijay Kumar, Rakesh Sharma, Ashwani Kush. 497-504 [doi]
- Biometric Encryption: Combining Fingerprints and CryptographyMini Singh Ahuja, Sumit Chabbra. 505-514 [doi]
- Node Architectures and Its Deployment in Wireless Sensor Networks: A SurveySumit Kushwaha, Vinay Kumar, Sanjeev Jain. 515-526 [doi]
- Competitive Equilibrium Theory and Its Applications in Computer ScienceJ. Ujwala Rekha, K. Shahu Chatrapati, A. Vinaya Babu. 539-547 [doi]
- Understanding the Generation of Cellular TechnologiesManjit Sandhu, Tajinder Kaur, Mahesh Chander, Anju Bala. 557-567 [doi]
- Evaluation of Routing Schemes for MANETSima Singh, Ashwani Kush. 568-573 [doi]
- Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc NetworksSonia Gupta, P. K. Bharti, Vishal Choudhary. 574-579 [doi]
- Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor NetworksP. Kalyani, C. Chellappan. 580-587 [doi]
- Data Mining Techniques for Prefetching in Mobile Ad Hoc NetworksNaveen Chauhan, Lalit Kumar Awasthi, Narottam Chand. 594-602 [doi]
- An Image Steganography Approach Based upon MatchingSukhpreet Kaur, Sumeet Kaur. 603-608 [doi]
- From Calculus to Number Theory, Paves Way to Break OSS SchemeG. Geetha, Saruchi. 609-611 [doi]
- Digital Image Watermarking Technique Based on Dense DescriptorEkta Walia, Anu Suneja. 612-616 [doi]
- Novel Face Detection Using Gabor Filter Bank with Variable ThresholdP. K. Suri, Ekta Walia, Amit Verma. 617-625 [doi]
- An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)Ajay Jangra, Nitin Goel, Chander Kant, Priyanka. 631-639 [doi]