Digitale Bibliotheek
Sluiten
Bladeren door artikelen uit een tijdschrift
Zoeken naar
Tijdschrift
Artikel
ISSN
NBN artikel
NBN tijdschrift
DARE/NARCIS document
met titel:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Tijdschrift beschrijving
Alle jaargangen van het bijbehorende tijdschrift
Alle afleveringen van het bijbehorende jaargang
Alle artikelen van de bijbehorende aflevering
47 gevonden resultaten
nr
titel
auteur
tijdschrift
jaar
jaarg.
afl.
pagina('s)
type
1
A Comparitive Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN
Arockiam .L
2011
02
03
p. 619-625
artikel
2
A Data Mining Approach to Generation of Persistent Data Using Relative Data Analysis
B.V.V.S.Prasad
2011
02
03
p. 451-455
artikel
3
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)
Manjunath Gadiparthi
2011
02
03
p. 555-565
artikel
4
Agent Based Image Segmentation Method : A Review
Pooja Mishra
2011
02
03
p. 704-708
artikel
5
Analysis and Design of Enhanced HTTP Proxy Cashing Server
Shiva Shankar Reddy P
2011
02
03
p. 537-541
artikel
6
A New Paradigm for the Next Generation Wireless Optimization Cross Layer Design
K. Ravi
2011
02
03
p. 475-484
artikel
7
A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis
Manjunath Gadiparthi
2011
02
03
p. 688-694
artikel
8
Ant Colony versus Genetic Algorithm based on Travelling Salesman Problem
Mohammed Alhanjouri
2011
02
03
p. 570-578
artikel
9
Applying Object Oriented Metrics to C#(C Sharp) Programs
Arti Chhikara
2011
02
03
p. 666-674
artikel
10
A Robust Zone Disjoint Multipath Routing Protocol
M. Arvind
2011
02
03
p. 559-564
artikel
11
A Simulation Study between the Random Based Synthetic Entity Mobility Models in Ad Hoc Networks
D.Srinivasa Rao
2011
02
03
p. 675-682
artikel
12
Aspects of Data Quality in Data Warehouse Systems: An Analysis
Subramanyam Vangara
2011
02
03
p. 418-425
artikel
13
A Study of Performance Comparisons of Simulated Ad hoc Network Routing Protocols
Amandeep Verma
2011
02
03
p. 565-569
artikel
14
A Survey on Multicast rekeying for secure group communication
S.Sasikala Devi
2011
02
03
p. 385-391
artikel
15
Background Subtraction and Target Classification for Gait Recognition
Kantipudi MVV Prasad
2011
02
03
p. 515-520
artikel
16
Behavioural Response of Elasto-Plastic Deformations for Concrete Cylindrical Shells Using 4 Noded Flat Plate Elements by Finite Element Method of Analysis with an Incremental Loading Technique
S. S. Angalekar
2011
02
03
p. 410-413
artikel
17
Best Practices to Achieve CMMI Level 2 Configuration Management Process Area through VSS tool
Prerna Gupta
2011
02
03
p. 542-558
artikel
18
Comparative Performance of Arm and Farm on a Normalised Datasets
Prachi Singh Thakur
2011
02
03
p. 502-509
artikel
19
Cryptography and Steganography-A Survey
A. Joseph Raphael
2011
02
03
p. 626-630
artikel
20
Data Embedding In Multimedia and Improved Digital Watermarking Techniques
Kishore Nerella
2011
02
03
p. 433-438
artikel
21
Design and Interfacing of High speed model of FPGA using I2C protocol
Arvind Sahu
2011
02
03
p. 531-536
artikel
22
Design Approach for Fault Tolerance Algorithm in FPGA Architecture with BIST in Hardware Controller
Shweta S. Meshram
2011
02
03
p. 498-501
artikel
23
Effective method of Initial Seed Selection Used for Color Image Segmentation
A. V. Anjikar
2011
02
03
p. 431-432
artikel
24
Efficient Speech Recognition by Using Modular Neural Network
Dr.R.L.K.Venkateswarlu
2011
02
03
p. 463-470
artikel
25
Enhanced Block Truncation Coding for Gray Scale Image
Enhanced Block Truncation Coding for Gray Scale Image
2011
02
03
p. 525-530
artikel
26
Exploiting Six Sigma by using DTS
Anuradha
2011
02
03
p. 683-687
artikel
27
Golden Baby Boomers’ Perceptions of Online Social Networking Sites
Edina Susan Farai Nyemba
2011
02
03
p. 695-703
artikel
28
Identity Based Color Image Cryptography
Gopi Krishnan S
2011
02
03
p. 521-524
artikel
29
Image Cipher Technique for Covert and Low Bandwidth Channels
Sangeeta Solanki
2011
02
03
p. 646-654
artikel
30
Implementation of Four Walsh Transform Sectors for Image Retrieval from Image Databases
P. Kalpana
2011
02
03
p. 414-417
artikel
31
Issues in Developing Open Source Licensing Tool for Controllers in the Context of BA (Building Automation)
Shah Ujval
2011
02
03
p. 485-489
artikel
32
Modified ATPG method by feeling don’t care bit for optimization of switching activities
Chetan Sharma
2011
02
03
p. 426-430
artikel
33
Multicast Security Attacks and Its Counter Measures for Puma Protocol
A. Amuthan
2011
02
03
p. 594-600
artikel
34
Network Intrusion Forensic Analysis Using Intrusion Detection System
Manish Kumar
2011
02
03
p. 612-618
artikel
35
Parallel Algorithm to Enumerate Sorting Reversals for Signed Permutation
Amit Kumar Das
2011
02
03
p. 579-589
artikel
36
Performance Analysis of Intrusion Detection in MANET
Rohit Sharma
2011
02
03
p. 456-462
artikel
37
Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes
M.L Sharma
2011
02
03
p. 392-400
artikel
38
Predictive Branching Methods and Architectures - A survey
Chhayadevi M bhamare
2011
02
03
p. 471-474
artikel
39
Requirements Engineering In Current Web Engineering Methodologies
R. Jeyakarthik
2011
02
03
p. 490-497
artikel
40
Secure Measures for the Vulnerabilities in MAODV
P. Bharathi
2011
02
03
p. 601-607
artikel
41
Short Term Crime Forecasting for Prevention of Crimes : A Study of SATARA District
Prof. Hanmant N. Renushe
2011
02
03
p. 608-611
artikel
42
Studying the Importance and Feasibility of Software Testing
Anil Kumar Velupula
2011
02
03
p. 401-409
artikel
43
The Importance of QoS & QoE Management In Wireless Communication System
Chuka Venkateswar Rao
2011
02
03
p. 639-645
artikel
44
The Technology Journey from Floppy disk to Cloud storage
Goutham Kumar Reddy P
2011
02
03
p. 446-450
artikel
45
Threats in Optical Burst Switched Network
P. Siva Subramanian
2011
02
03
p. 510-514
artikel
46
Transmission and System Control in Quantum Cryptography
Anand Sharma
2011
02
03
p. 590-593
artikel
47
Writing Software Requirements Specification Quality Requirements:An Approach to Manage Requirements Volatility
G. SWATHI
2011
02
03
p. 631-638
artikel
47 gevonden resultaten
Koninklijke Bibliotheek -
Nationale Bibliotheek van Nederland