Table of Contents
Vol 2, No 3 (2010)
Articles
Efficient Resource Matching in Heterogeneous Grid Using Resource Vector | ||
Srirangam V. Addepallil1High Performance Computing Centre, Texas Tech University, Lubbock, Texas, Per Andersen, George L. Barnes | ||
Vol 2, No 3 (2010), Pagination: 1-10 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 404 | PDF Views: 199 |
Low Power Shift and Add Multiplier Design | ||
C. N. Marimuthu, P. Thangaraj, Aswathy Ramesan | ||
Vol 2, No 3 (2010), Pagination: 12-22 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 396 | PDF Views: 215 |
Implementing and Evaluating A Wireless Body Sensor System For Automated Physiological Data Acquisition At Home | ||
Chao Chen, Carlos Pomalaza-Raez | ||
Vol 2, No 3 (2010), Pagination: 24-38 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 416 | PDF Views: 196 |
A Parsing Scheme for Finding the Design Pattern and Reducing the Development Cost of Reusable Object Oriented Software | ||
K. M. Azharul Hasan, Mohammad Sabbir Hasan | ||
Vol 2, No 3 (2010), Pagination: 40-54 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 426 | PDF Views: 200 |
Hybrid Scenario based Performance Analysis of DSDV and DSR | ||
Koushik Majumder, Subir Kumar Sarkar | ||
Vol 2, No 3 (2010), Pagination: 56-70 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 453 | PDF Views: 205 |
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues | ||
Md. Headayetullah, G. K. Pradhan | ||
Vol 2, No 3 (2010), Pagination: 72-91 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 476 | PDF Views: 202 |
An Algorithm To Self - Extract Secondary Keywords and Their Combinations Based On Abstracts Collcted Using Primary Keywords From Online Digital Libraries | ||
Natarajan Meghanathan, Nataliya Kostyuk, Raphael Isokpehi, Hari Cohly | ||
Vol 2, No 3 (2010), Pagination: 93-101 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 479 | PDF Views: 207 |
A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding | ||
A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar | ||
Vol 2, No 3 (2010), Pagination: 103-112 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 490 | PDF Views: 215 |
Biometric Authentication Using Nonparametric Methods | ||
S. V. Sheela, K. R. Radhika | ||
Vol 2, No 3 (2010), Pagination: 114-133 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 521 | PDF Views: 190 |
Game Information System | ||
Spits Warnars | ||
Vol 2, No 3 (2010), Pagination: 135-148 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 410 | PDF Views: 193 |
Survey on the Event Orderings Semantics Used for Distributed System | ||
Yaser Miaji, Osman Gazali, Suhaidi Hassan | ||
Vol 2, No 3 (2010), Pagination: 150-158 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 392 | PDF Views: 181 |
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups | ||
Ruchira Naskar, Indranil Sengupta | ||
Vol 2, No 3 (2010), Pagination: 160-179 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 418 | PDF Views: 205 |
Genbit Compress Tool(GBC): A Java-Based Tool to Compress DNA Sequences and Compute Compression Ratio(Bits/Base) of Genomes | ||
P. Raja Rajeswari, Allam Appa Rao | ||
Vol 2, No 3 (2010), Pagination: 181-191 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 413 | PDF Views: 208 |