Table of Contents
Vol 2, No 12 (2010)


Articles
A Logical Topology Based Network Compositor for Packet Distribution System with Effective Edge Replacement | ||
P. R. Nirmal Binu, S. Karthikeyan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 312 | PDF Views: 4 |
Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network | ||
Madhumathi Rajesh, Rama Sugavanam, G. R. Gangadevi | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 287 | PDF Views: 4 |
Optimized Power Management Protocol for Mobile Ad Hoc Networks | ||
R. Nandha Kumar, I. Mohan | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 309 | PDF Views: 3 |
An Energy Efficient Prediction Based Object Tracking Sensor Networks | ||
R. S. Bhuvaneeswaran, M. Sujatha, S. Sivaranjani | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 316 | PDF Views: 3 |
A New Efficient Geographic Multicast Protocol in Multicasting over Mobile Ad Hoc Networks for Qos Improvements | ||
N. Renuka Devi, R. Niranchana | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 330 | PDF Views: 3 |
TAB-Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks | ||
P. Saranya Devi, S. Shanmuga Preetha, S. Athilakshmi | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 293 | PDF Views: 3 |
Email Phishing Processing with Symmetric Key Cryptography via Network Credential | ||
A. Prabhu Chakkaravarthy | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 304 | PDF Views: 3 |
Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing | ||
M. N. Divakar, C. K. Raju Tumkur | ||
Vol 2, No 12 (2010), Pagination: | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 302 | PDF Views: 3 |