Volume 1 Issue 9

1
An Integrated Cross-layer Design For Efficient Live Multimedia
Authors : P. THANGAVEL , S. MOHANASUNDARAM
Pages : 61 - 68

2
Unique Identity Based Provable Data Control In Multi Cloud Environment
Authors : J.Emily Helda , D.Jebasudha
Pages : 56-60

3
Traffic Pattern Based Content Leakage Detection For Trusted Content Delivery Networks
Authors : K.B.Sakthipriya , K.Venkatesh
Pages : 51-55

4
Knowledge Gaining In Unclear Systems Using Grid Computing
Authors : M. Ramar, B. L. Bindhu
Pages : 47-50

5
A Systematic Cross Modal Multimedia Retrival Using Maui Indexing Algorithm
Authors : R.Kannan, R.Umesh
Pages : 43-46

6
Preventing The Low-rate Dos Attacks In Web Server Using Router Based Firewall
Authors : J. Prasanth , T. Prem Kumar , M.S. Vidya Sagar , R.Elakiya
Pages : 40-42

7
An Enhanced Stsl Based Mobile Uwsns Using Da-time Sync Scheme
Authors : M. Rajadurai , C.Jeyalakshmi
Pages : 36-39

8
Obligation Analysis For Lineages Of Connective Queries With Inequalities
Authors : M.Saranya , S.Rupa Sri , R.Rajalakshmi , R.Vijay
Pages : 33-35

9
Automatic Support System For Classifying Brain Signal
Authors : Pavithra B , Preethi M , Suthanthira Devi P
Pages : 29-32

10
Configuration And Execution Of A Progressive Sip-based Distributed System
Authors : R.Anushiya
Pages : 25-28

11
An Efficient Routing Taxonomy For Energy Saving And Enhancing The Lifetime Of Wsn
Authors : Janakiraman V , G.Vadivel Murugan
Pages : 21-24

12
Secure And Precise Location Verification For Wireless Sensor Networks Using Enhanced Iterative Filtering Algorithms
Authors : T.Kaviyarasi , L.Venkatakrishnan
Pages : 18-20

13
A Survey On Cluster Based Sufficient And Necessary Set Scheme For Misbehavior Detection In Adversary Environment
Authors : Kanagarohini.V, Ramya.K
Pages : 15-17

14
An Efficient Design Of Optimized Low Power Dual Mode Logic Circuits Using Vlsi Technology
Authors : SM.Ayyappan , M.Palaniappan , R.Sornalatha
Pages : 10-14

15
Burn Depth Analysis Using Multidimensional Scaling And K-nn Classifier
Authors : M.S.Jeoadlin Justus , K.M.Alaaudeen
Pages : 6-9

16
Solution To Prohibit Rushing Attack In Mobile Ad-hoc Network
Authors : Wilson Prakash. S , Sankaranarayanan S
Pages : 1-5