1. |
Effective Congestion Control for Wireless Ad-Hoc
Networks
Pages : 1832-1835
P.Sruthi, Manohar Goshel
Abstract | PDF |
2. |
Data Security through Confidentiality in Cloud
Computing Environment
Pages : 1836-1840
Subedari Mithila, P. Pradeep Kumar
Abstract | PDF |
3. |
Information -Aware Scheduling Strategies for
Desktop Grid Environment
Pages : 1841-1846
Er. Jayoti Arora, Ms. Geeta Arora , Dr. Paramjit , Dr. Shaveta
Abstract | PDF |
4. |
Issues in Dimensionality Reduction of
Multispectral and Hyperspectral data
Pages : 1847-1851
Bijith Marakarkandy,Dr. B.K. Mishra
Abstract | PDF |
5. |
Scalability & Security Architecture for Internet2
Applications
Pages : 1852-1855
T.Mahesh, Prof. P.Pradeep, R.SatyaTeja
Abstract | PDF |
6. |
A Sequential Approach for Surmising Missing Items
in the Shopping Cart
Pages : 1856-1861
Arshiya Subhani, Prof. P.Pradeep kumar
Abstract | PDF |
7. |
An approach to deal with time- evolving
Categorical data based on NIR using Clustering
Pages : 1862-1866
A. Shiva Prasad, Prof P.Pradeep Kumar , D.Prashanth Kumar
Abstract | PDF |
8. |
Web-based Analysis for Optical Network Data
Path Selection
Pages : 1867-1870
M.Murali Krishna, G Devi priya and K Balamurali Krishna
Abstract | PDF |
9. |
Item Set Extraction of Mining Association Rule
Pages : 1871-1875
Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar
Abstract | PDF |
10. |
Kannada and Telugu Native Languages to English
Cross Language Information Retrieval
Pages : 1876-1880
Mallamma V Reddy, Dr. M. Hanumanthappa
Abstract | PDF |
11. |
Efficient Broadcasting with Guaranteed Coverage
in Mobile Ad Hoc Networks
Pages : 1881-1886
P.Pranitha, G.Swamy , Manjula Aakunuri
Abstract | PDF |
12. |
Intrusion Detection in Wireless Networks
Using Selected Features
Pages : 1887-1893
M.Nadeem Baig, K. Kanthi Kumar, P.Pradeep kumar and Dr. A. Yesu Babu
Abstract | PDF |
13. |
Enhanced Features For Text Categorization
Pages : 1894-1897
N. Swarna Jyothi, M. Sailaja
Abstract | PDF |
14. |
Efficient Item Set Mining Supported by IMine
Index
Pages : 1898-1903
Manohar.M , Bharathi.G
Abstract | PDF |
15. |
Malicious Packet Losses Detection by using
Compromised Router Detection Protocol
Pages : 1904-1909
Chandra Sekhar.G, Srikanth.D
Abstract | PDF |
16. |
Data Accessibility for Resource Selection in
Large-Scale Distributed Systems
Pages : 1910-1922
B.Anusha, Pallamreddy VenkataSubbaReddy, T.V.Sai Krishna
Abstract | PDF |
17. |
A Distributed Dynamic Routing with Security
Considerations
Pages : 1923- 1926
B.Mallesham, T.Mahesh, Prof. P.Pradeep, D.Ramesh
Abstract | PDF |
18. |
Detection & Analysis of Skin Cancer using
Wavelet Techniques
Pages : 1927-1932
D.N.V.S.L.S. Indira , JYOTSNA SUPRIYA P
Abstract | PDF |
19. |
An Approach to Improve the Security of Online
System using Crypto System
Pages: 1933-1939
Saurav Mallik, Sutapa Majee,Arun Kanti Manna,Md. Headayetullah
Abstract | PDF |
20. |
Paper Removed
Pages: xxxx-xxxx
xxxx
Abstract | PDF |
21. |
Frequency and Compactness for Text Categorization
Pages : 1947-1950
Sumayya Hasan Osmani, T.Naresh Kumar
Abstract | PDF |
22. |
Evolving User Profiles in Dynamic Web Sites
Pages : 1951-1953
G BHANU, A .V. RAMANA
Abstract | PDF |
23. |
Analysis and Performance of ARCP for Multi
Region Mobile Emissary Environments
Pages : 1954-1957
Venkata Durga.Kiran Kasula, Venkata Sumanth Mareedu, S.S.Reddy. L
Abstract | PDF |
24. |
VLSI Design Approach for Emergency Locator
Transmitter (ELT) signal of 406MHz with Enhanced
Ground Proximity Warning System Receiver
Pages : 1958-1961
K. Babulu,R.S.Vinay
Abstract | PDF |
25. |
A Comparative Study of Routing Protocols
Pages : 1962-1964
Rajender Kumar, Jitender Vats, Arvind Kumar
Abstract | PDF |
26. |
A Research Study on Accountability of Dynamic IP
Generation in a Campus Network (Wi-Fi)
Pages : 1965-1970
Pawan Prakash Singh, Savita Shiwani, Ruchi Dave, Naveen Hemrajani
Abstract | PDF |
27. |
A Review of Storage and Fault Tolerace
Approaches Used in Cloud Computing
Pages : 1971-1978
Amit Batra, Rajender Kumar, Arvind Kumar
Abstract | PDF |
28. |
Improving Web Accessibility of graphs for visually
Impaired
Pages : 1979-1981
Dr.Arvinder Kaur, Diksha Dani and Neeta Mishra
Abstract | PDF |
29. |
An Expert System of Determining Diabetes
Treatment Based on Cloud Computing Platforms
Pages : 1982-1987
Dr. Abdullah Al-Malaise Al-Ghamdi, Majda A.Wazzan, Fatimah M. Mujallid, Najwa K.Bakhsh
Abstract | PDF |
30. |
VHDL Modelling of WI- FI Mac Layer for Transmitter
Pages : 1988-1989
Bhanu Sireesha ,M.S.R.Sekhar
Abstract | PDF |
31. |
Competent Search in Blog Ranking Algorithm
Using Cluster Mining
Pages : 1990-1994
Robin Singh Bhadoria
Abstract | PDF |
32. |
An Efficient Parallel Sorting Algorithm for
Multicore Machines
Pages : 1995-1998
D.Abhyankar, M.Ingle
Abstract | PDF |
33. |
Performance Analysis and Comparison of MANET
Routing Protocols
Pages : 1999-2003
Kuljit Kaur,Swati Jindal,Lavneet Bansal
Abstract | PDF |
34. |
Generic Complex Programmable Logic Device
(CPLD) Board
Pages : 2004-2007
Nagaraj Hediyal
Abstract | PDF |
35. |
An Effective Indexing Method for High
Dimensional Databases
Pages : 2008-2018
Manjunath K.G. , Kallinatha H.D.
Abstract | PDF |
36. |
Advanced Indexing Techniques for Achieving
Concurrency in Multidimensional Data Sets
Pages : 2019-2024
N Krishna Kumari, Dr. M.H.M. Krishna Prasad
Abstract | PDF |
37. |
A New Optimal Checkpoint Restart Model
Pages : 2025-2032
Mallikarjuna Shastry P.M., K. Venkatesh
Abstract | PDF |
38. |
IVR Recognisation Using Speech Signals
Pages : 2033-2035
Arjun Kumar.P, Chinna Rao.M, Sridhar. G, Ravi Kumar. B
Abstract | PDF |
39. |
Robust Watermarking of Color Images under
Noise and Cropping Attacks in Spatial Domain
Pages : 2036-2041
Alankrita Aggarwal, Monika Singla
Abstract | PDF |
40. |
Data Mining: a Healthy Tool for Your Information
Retrieval and Text Mining
Pages : 2042-2045
Santosh Kumar Rath, Manobendu Kesari Jena, Tapaswini Nayak, Biswajit Bisoyee
Abstract | PDF |
41. |
Power Saving Strategies In Wireless Sensor
Networks Using Cross Layer Design
Pages : 2046-2051
Pranali D. Tembhurne (Nandeshwar), R.K. Krishna, Nilkamal G. Ramteke
Abstract | PDF |
42. |
Development of a Robot-Car in LEGO
Mindstorms NXT tool kit for Obstacle
Avoidance using JAVA
Pages : 2052-2054
Saswat Kumar Jena, Prof. (Dr.) Srikant Patnaik
Abstract | PDF |
43. |
Rephrasing Essentials of Object Oriented
Programming based on Testing Pre-requisites
Pages : 2055-2059
Amarnath Singh, Biswajit Bishoyee, Santosh Kumar Rath, Dharmananda Parida
Abstract | PDF |
44. |
Text -Steganography:
Review Study & Comparative Analysis
Pages : 2060-2062
Swati Gupta and Deepti Gupta
Abstract | PDF |
45. |
Object Classification in Still Images
Pages : 2063-2067
T.Harini, J.Uday Kiran, Prof. P.Pradeep, K. Jhansi Rani
Abstract | PDF |
46. |
An Accurate Termination Condition of the
Probabilistic Packet Marking Algorithm
Pages : 2068-2072
J.Shiva Kumar, P.Pradeep Kumar
Abstract | PDF |
47. |
Performance Analysis of Hybrid approach
of Clustering Algorithms
Pages : 2073-2077
Alankrita Aggarwal, Neetu Wadhwa
Abstract | PDF |
48. |
Efficient way of Data Managing for Range Queries
in Unstructured Peer to Peer Networks.
Pages : 2078-2083
P. Lalitha Kumari, P. Rama Rao and Chinnam Yuva Raju
Abstract | PDF |
49. |
Handling Various Best Security Methods for
Bluetooth Technology in Cars to Maintain
Secrecy
Pages : 2084-2090
Y.V.K.D.Bhavani
Abstract | PDF |
50. |
Hybrid Broadcast Routing with Dynamic
Security Considerations
Pages : 2091-2094
S.Ramasubba Reddy, O. Srinivasa Rao, Dr MHM Krishna Prasad
Abstract | PDF |
51. |
Phishing WebPages Strategy Based On Optical
Semblance Assessment
Pages : 2095-2098
Vijaykumar kangala, A. Ranjith Kumar ,Shilpa shesham,Rampelly shilpa
Abstract | PDF |
52. |
Construction of Developing User Profiles for
Mining Structure
Pages : 2099-2101
Davuluri Suneetha, Kumar Vasantha
Abstract | PDF |
53. |
FPGA Realization of Radix-4 Booth Multiplication
Algorithm for High Speed Arithmetic Logics
Pages : 2102-2107
K. Babulu,G.Parasuram
Abstract | PDF |
54. |
A Novel Approach of Entropy based Adaptive
Thresholding Technique for Video Edge Detection
Pages : 2108-2110
Debabrata Samanta, Mousumi Paul
Abstract | PDF |
55. |
Weighted Association Rule Mining Without
Pre-assigned Weights
Pages : 2111-2115
PURNA PRASAD MUTYALA, KUMAR VASANTHA
Abstract | PDF |
56. |
Distributional Features for Text Categorization
Based on Weight
Pages : 2116-2120
CH.GOWTHAMI, P.RAJA SEKHAR
Abstract | PDF |
57. |
Intrusion Detection
Pages :2121-2123
B. Kiran Kumar, A. Kamala Priya, R. Vishnumurthy and Thillai Nayagi
Abstract | PDF |
58. |
Sensitive Itemset Hiding in Multi-level
Association Rule Mining
Pages : 2124-2126
P.RajyaLakshmi, C.Mohan Rao,Madhavi Dabbiru and Kopparthy Vinay Kumar
Abstract | PDF |
59. |
A NOVEL APPROACH FOR PASS WORD
AUTHENTICATION USING
BRAIN -STATE -IN -A BOX (BSB) MODEL
Pages : 2127-2131
A S N Chakravarthy, Penmetsa V Krishna Raja , Prof. P S Avadhani
Abstract | PDF |
60. |
VLSI Design Approach to Online
Analog/Digital DAQ System
Pages : 2132-2136
K Babulu and P Parasuram
Abstract | PDF |
61. |
Implementation of Viterbi Decoder for
Convolutional Code in HDL
Pages : 2137-2140
Nilesh G. Nirmal, Gajanan U.Patil, Prafulla.P.Chaudhari, Mandar.M.Kulkarni
Abstract | PDF |
62. |
A Performance Analysis of Multi-Hop Wireless
Ad-Hoc Network Routing Protocols in MANET
Pages : 2141-2146
S.Tamilarasan
Abstract | PDF |
63. |
Implementation of blind source separation of speech
signals using independent component analysis
Pages : 2147-2151
Vivek Anand. Dr. R. S. Anand.Dr. M. L. Dewal
Abstract | PDF |
64. |
The Next Generation of Cloud Computing on
Information Technology
Pages : 2152-2155
G.C.Priya, R.Parameswari, G.Gayathri
Abstract | PDF |
65. |
Dynamic Routing Key Distribution in
Security Considerations
Pages : 2156-2158
D. Raghu, MD. Baliguddin, Ch. Raja Jacub
Abstract | PDF |
66. |
Design and Implementation of Efficient Load
Balancing Algorithm in Grid Environment
Pages : 2159-2164
Sandip S.Patil, Preeti Singh
Abstract | PDF |
67. |
Different Network Micro-Mobility Protocols and
their Performance Analysis
Pages :2165-2175
K Karmakar, J S Banerjee
Abstract | PDF |
68. |
Future Challenges and Opportunities of Systems and
Software Engineering Processes
Pages : 2176-2179
Rohit Sharma ,Samridhi Sharma ,Sachleen Singh
Abstract | PDF |
69. |
Comparative Study of Knowledge in Crop Diseases
Using Machine Learning Techniques
Pages : 2180-2182
P. Revathi , R. Revathi and Dr.M.Hemalatha
Abstract | PDF |
70. |
An Improved Page Rank Algorithm based on
Optimized Normalization Technique
Pages : 2183-2188
Hema Dubey ,Prof. B. N. Roy
Abstract | PDF |
71. |
Object Oriented Software Testing
Pages : 2189-2192
P.D.Ratna Raju, Suresh.Cheekaty, HarishBabu.Kalidasu
Abstract | PDF |
72. |
Inverse ObjectRank: Dynamic Authority Based
Search in Databases
Pages : 2193-2194
C.Vijaya Ram ,Ch.Srinivasalu, T.Jacob Sanjay Kumar
Abstract | PDF |
73. |
A Neural Network Approach for Fragmentation in
Distributed Databases
Pages : 2195-2197
M.Ram Bhupal , A. Raga Deepthi
Abstract | PDF |
74. |
The Wonderful Toy of 20th Century can be a
Disaster in 21st Century:
Scenario and Policies Regarding Mobile Waste in India
Pages :2198-2203
Neeta Sharma1 and Manoj Kumar
Abstract | PDF |
75. |
Approaches on Detecting Domain Errors – A
Survey
Pages : 2204-2212
Dr. Anna Saro Vijendran, N.R.Suganya
Abstract | PDF |
76. |
Implementation of High Security in MANET
Using Combined IDS and Finger Print
Authentication with Data Fusion
Pages :2213-2215
J. Deny and N. Sivasankari
Abstract | PDF |
77. |
A Novel Approach of THUI (Temporal High
Utility Item sets) Algorithm on On-Shelf Web
Log Data
Pages : 2216-2219
D.N.V.S.L.S. Indira , JYOTSNA SUPRIYA P2, S.Narayana
Abstract | PDF |
78. |
A Closer look at RSA and ECC
Pages : 2220-2224
Aditya Kumar Kommera, Keerthana Kommera, Praneeth Kumar Gunda
Abstract | PDF |
79. |
A Framework on Database Content Security using
Negative Databases
Pages : 2225-2228
Vemula Vamshi Krishna ,Rama Krishna V
Abstract | PDF |
80. |
An Efficient Image Based Approach for
Extraction of Deep Web Data (AEiEDWD)
Pages :229-2232
MSN. Murthy, S.Sreenivasa Rao
Abstract | PDF |
81. |
An Enhanced Digital Watermarking for Color
Image using Support Vector Machine
Pages : 2233-2236
Yogendra Kumar Jain ,Saurabh Tiwari
Abstract | PDF |
82. |
Secure Dynamic Routing Using DDRA
Pages : 2237-2241
Nagamalleswara Rao.A, Adilakshmi.Y
Abstract | PDF |
83. |
Defect Prediction and Analysis Using
ODC Approach in a Web Application
Pages : 2242-2245
Pranayanath Reddy Anantula, Raghuram Chamarthi (Tejoraghuram)
Abstract | PDF |
84. |
Employing Grid Computing Strategies in Cloud
Computing
Pages : 2246-2253
Amit Batra, Rajender Kumar, Arvind Kumar
Abstract | PDF |
85. |
Feature Level Medical Image Fusion Using MUlti Wavelet Transforms
Pages : 2254-2257
P.Daniel Ratna Raju, Guntupalli Neelima, K.Prasada Rao
Abstract | PDF |
86. |
Semantic Web Mining - A Critical Review
Pages : 2258-2261
S.S. Dhenakaran, S.Yasodha
Abstract | PDF |
87. |
Mobile Communications for E-Applications
Pages : 2262-2266
K.V.Ashok, K.Raja Sekhar, V.Dhana Raj
Abstract | PDF |
88. |
Hotel Management System -an E-Commerce Application using REsource Description Framework (RDF)
Pages : 2267-2272
A. Gauthami Latha, R. Naga Raju, Ch. Satyanarayana, Y. Srinivas
Abstract | PDF |
89. |
Power Quality Improvement of
Three-phase four-wire DSTATCOM with
Fuzzy logic Controller
Pages : 2273-2276
M.Bhanu Siva, M.R.P Reddy, Ch.Rambabu
Abstract | PDF |
90. |
A Survey on Detecting Domain Errors in Programs
Pages : 2277-2279
N.R.Suganya, R.Venkateswaran, K.Kathirvel, M.Mohankumar, G.Manivasagam
Abstract | PDF |
91. |
Sub Pattern Technique for Face Recognition
Pages : 2280-2283
M.Pradeep, CH.Sri Devi, V.Dhana Raj
Abstract | PDF |
92. |
Performance Analysis of Counting Sort Algorithm
using various Parallel Programming Models
Pages : 2294-2287
M Rajasekhara Babu, M Khalid, Sachin Soni, Sunil Chowdari Babu, Mahesh
Abstract | PDF |
93. |
Design of Triangular Microstrip Patch Antenna at
Super High Frequency
Pages : 2288-2289
Sunil kr singh ,Shirish kumar Jain
Abstract | PDF |
94. |
Cloud Computing – A New Paradigm for Modern Computing
Pages : 2290-2292
S.U.Sharma, Y.B.Gandole
Abstract | PDF |
95. |
Real Time Facial Expression Detection Techniques
using Pixels Values
Pages : 2293-2296
Jabir Ali ,Ankur Shree Aggrawal ,Anuradha Tyagi ,Amit Kr. Balyan
Abstract | PDF |
96. |
New Shuffle Algorithm for Lossless Compression
Method of JPEG File
Pages : 2297-2299
Surgali Chanti, Ch Ramesh
Abstract | PDF |
97. |
Avoidance of Collision and Overhearing in
Wireless Sensor Networks
Pages : 2300-2303
P. Srivalli, N. Nagakumari, G. Anupama, V. Srujana
Abstract | PDF |
98. |
Modifying Simple Spatial Operator for High
Dynamic Range Images to Improve Image Quality
and Automating the User Parameter
Pages : 2304-2308
Sumandeep Kaur, Sumeet Kaurj
Abstract | PDF |
99. |
Rainfall forecasting using Nonlinear SVM based on PSO
Pages : 2309-2313
P. Vikram, P. Raghu Veer
Abstract | PDF |
100. |
INCOG Query Processing in Networks
Pages : 2314-2318
Yetcherla Kumar Sekhar, U. Nanaji
Abstract | PDF |
101. |
Cloud Computing Based Visual Backchannel
for Web Based Events
Pages : 2319-2325
Santhosh.kola, Sanjib.k
Abstract | PDF |
102. |
Performance Analysis of HR Portal Domain
Components Extraction
Pages : 2326-2331
N Md Jubair Basha, Salman Abdul Moiz , A. A. Moiz Qyser
Abstract | PDF |
103. |
Color Image Segmentation using Watershed
Algorithm
Pages : 2332-2334
Thodeti Srikanth, P.Pradeep Kumar, Ashwin Kumar
Abstract | PDF |
104. |
Analysis of Human Immune System Inspired
Intrusion Detection System
Pages : 2335-2339
R.Sridevi , . Rajan Chattamvelli, E . K a n nan
Abstract | PDF |
105. |
Texture and Shape Based Classification of Brain
Tumors Using Back-Propagation Algorithm
Pages : 2340-2342
Neelam Marshkole, Bikesh Kumar Singh and A.S.Thoke
Abstract | PDF |
106. |
An Efficient Key Management Scheme for
Heterogeneous Sensor Networks
Pages : 2343-2347
S.Gandhi ,D.Indira
Abstract | PDF |
107. |
Automatic Eye Blink Tracking and Detection in an
Image Sequence
Pages : 2348-2349
Tarun Dhar Diwan ,Rajesh Tiwari
Abstract | PDF |
108. |
The Design of Adaptive E-Learning System based
on Student's Learning Styles
Pages : 2350-2353
Herman Dwi Surjono
Abstract | PDF |
109. |
Dynamic Resource Discovery protocol in
Unstructured Peer-to-Peer Networks
Pages : 2354-2355
B. Steffi, D. Srinivas, V. Naga Raju, K. Upendra Das
Abstract | PDF |
110. |
Services in Android can Share Your Personal
Information in Background
Pages : 2356-2359
Manoj Kumar and Sheshendra Rathi
Abstract | PDF |
111. |
Article Removed
Pages : xxxx-xxxx
xxxxxxx
Abstract | PDF |
112. |
LROR Oriented Tree Quorum Protocol
Pages : 2367-2368
Meenu and .Udai Shanker
Abstract | PDF |
113. |
Simultaneous Data Compression and Encryption
Pages : 2369-2374
T.SubhamastanRao , M.Soujanya, T.Hemalatha, T.Revathi
Abstract | PDF |
114. |
A Comparative Study of Iterative Thinning
Algorithms for BMP Images
Pages : 2375-2379
Harish Kumar and Paramjeet Kaur
Abstract | PDF |
115. |
Network Control Systems RTAI framework –
A Review
Pages : 2380-2383
Deepika Bhatia, Urmila Shrawankar
Abstract | PDF |
116. |
Article removed
Pages : 2384-2389
xxxx,xxxx
Abstract | PDF |
117. |
Web Usage Mining: A Research Concept of Web Mining
Pages : 2390-2393
D.Suresh Babu, SK.Abdul Nabi,Mohd.Anwar Ali ,Y.Raju
Abstract | PDF |
118. |
Comparison and Implementation of Compound Memood Model and Memood Model
Pages : 2394-2398
Chhavi Gautam , Sandeep Singh Kang
Abstract | PDF |
119. |
Inferring web user sessions by
Clustering techniques
Pages : 2399-2404
N. kalpana,G.V.S.N.R.V.Prasad
Abstract | PDF |
120. |
Proficient Resource Allocation for Wireless
Multicast
Pages : 2405-2411
Mounika.D,Suresh babu.CH
Abstract | PDF |
121. |
Application of Genetic Algorithms in Machine
learning
Pages : 2412-2415
Harsh Bhasin, Surbhi Bhatia
Abstract | PDF |
122. |
Spam Weeding, Detection and Filtering on
P2P System
Pages : 2416-2420
Sarvani Rallabandi , M V Krishna
Abstract | PDF |
123. |
A Survey of Link Failure Mechanism and
Overhead of Routing Protocols in MANET
Pages : 2421-2425
Ashish Kumar, M. Q. Rafiq, Kamal Bansal
Abstract | PDF |
124. |
ANN Based Directional Fault Detector/Classifier
for Protection of Transmission Lines
Pages : 2426-2433
Anamika Yadav, A.S. Thoke
Abstract | PDF |
125. |
Image Edge Detection by Using Rule Based Fuzzy
Classifier
Pages : 2434-2439
Mandeep Singh Sandhu ,Vikram Mutneja ,Nishi
Abstract | PDF |
126. |
Context-aware Personalized Mobile Web Search
Techniques-A Review
Pages : 2440-2443
Deepika Bhatia, Smita Nirkhi, Preeti Bajaj
Abstract | PDF |
127. |
Vector Quantization for Image Compression using
Repulsion based FPCM
Pages : 2444-2451
S. Sathappan,S. Pannirselvam
Abstract | PDF |
128. |
Access Control Policy: A Framework to Enforce
Recommendations
Pages : 2452-2463
Nada Essaouini , Anas Abou El Kalam , Abdellah Ait Ouahman
Abstract | PDF |
129. |
Relevant Data Clustering In Web Search Engine
Pages : 2464-2466
N.NAGAKUMARI, P.SRIVALLI, K.SATYA TEJ
Abstract | PDF |
130. |
A Comprehensive Analysis and Comparison of TCP
Tahoe, TCP Reno and TCP Lite
Pages : 2467-2472
Poonam Tomar, Prashant Panse
Abstract | PDF |