article de recherche
IMPORTANCE OF LOCATION AWARE ARCHITECTURE FOR CRIMINAL WATCH: A CASE STUDY OF POLICE STATIONS IN SATARA DISTRICT
MULTIHOMING ARCHITECTURE USED IN ATTACKING MAIL AND WEB SERVERS
DATA WAREHOUSE AND ITS METHODS
PASSWORD IN PRACTICE: AN USABILITY SURVEY
Article de révision
RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM
SECURITY THREATS IN WIRELESS SENSOR NETWORKS
APPLICATIONS OF SOFTWARE TESTING METRICS IN CONSTRUCTING MODELS OF THE SOFTWARE DEVELOPMENT PROCESS
MODEL BASED TESTING CONSIDERING STEPS, LEVELS, TOOLS & STANDARDS OF SOFTWARE QUALITY
XML MINING USING GENETIC ALGORITHM
LINEAR AND NON-LINEAR CAMERA CALIBRATION TECHNIQUES
USING HASH BASED APRIORI ALGORITHM TO REDUCE THE CANDIDATE 2- ITEMSETS FOR MINING ASSOCIATION RULE
THE IHS TRANSFORMATIONS BASED IMAGE FUSION
LOGIC BASED RULES FOR PROJECT ASSIGN PREDICTION
A MODERN ADVANCED HILL CIPHER INVOLVING A PAIR OF KEYS, MODULAR ARITHMETIC ADDITION AND SUBSTITUTION
A MODERN ADVANCED HILL CIPHER INVOLVING A PAIR OF KEYS, XOR OPERATION AND SUBSTITUTION
EDGE DETECTION OF HUMAN EYE BASED ON HOMOGENEITY ANALYSIS
LIP CONTOUR DETECTION TECHNIQUES BASED ON FRONT VIEW OF FACE
DETECTING ANOMALIES DURING MULTIPLE INHERITANCE
Text Steganography using CALP with High Embedding Capacity
ANTI-RANDOM TEST GENERATION IN SOFTWARE TESTING
Data Forwarding in Adhoc Wireless Sensor Network Using Shortest Path Algorithm
VULNERABILITIES AND SOLUTIONS: MOBILE AD HOC NETWORKS (MANETs) FOR OPTIMAL ROUTING AND SECURITY
Weighted Mean Priority Based Scheduling for Interactive Systems
Voir plus