×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ijdpsjournal documents
Technology
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
Technology
MODELLING TRAFFIC IN IMS NETWORK NODES
Technology
A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET
Technology
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Engineering
Scalable frequent itemset mining using heterogeneous computing par apriori algorithm
Technology
A novel way of integrating voice recognition and one time passwords to prevent password phishing attacks
Engineering
Management of context aware software resources deployed in a cloud environment for improving quality of mobile cloud services
Technology
Lock free parallel access collections
Technology
Survey comparison estimation of various routing protocols in mobile ad hoc network
Technology
Spectrum requirement estimation for imt systems in developing countries
Technology
Crypto multi tenant an environment of secure computing using cloud sql
Technology
A cross layer optimized reliable multicast routing protocol in wireless mesh networks
Technology
An effective search on web log from most popular downloaded content
Technology
4213ijdps03
Technology
GPU Accelerated Automated Feature Extraction From Satellite Images
Technology
Survey comparison estimation of various routing protocols in mobile ad hoc network
Technology
Review on mobile threats and detection techniques
Technology
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
Technology
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATIONS VIDEO
Technology
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALLEL JOBS IN CLUSTERS
Technology
Robust encryption algorithm based sht in wireless sensor networks
Next >