PUBLIC AUDITING USING IDENTITY BASED CRYPTOSYSTEMS ON MULTI-COPY DATA INTEGRITY IN CLOUDR. Hariharan1,G. Komarasamy2,S. Daniel Madan Raja3
|
PRIORITIZED QUEUE WITH ROUND ROBIN SCHEDULER FOR BUFFERED CROSSBAR SWITCHESN. Narayanan Prasanth1, Kannan Balasubramanian2, R. Chithra Devi3
|
ADVANCED DYNAMIC FRAMED SLOTTED ALOHAT. Raja1 , V. Perumal2
|
ICT AND HIGHER EDUCATION: TEACHERS TECHNOLOGICAL DRIVEN ECOSYSTEM AND A PARADIGM SHIFT IN LEARNING ENVIRONMENTN Boobalakrishnan, C Pichandy
|
IP PROTECTION USING WATERMARKING WITH OBFUSCATIONNisha Elma Koshy, Binu K Mathew
|
ADVANCING INFORMATION TECHNOLOGY WITH IMMUNOLOGICAL COMPUTING – SOFT COMPUTING TECHNIQUES FOR ADAPTIVE AND ROBUST SYSTEMSS. Kaliswaran1, R. Sivasankari2, Attru Hanumantharao3, V. Saravanan4, G. Gokul Kumari5
|