APPL-1291 | A Payload Driven Security Model for Flooding Attacks in Active Networks P. Jayashree, K. S. Easwarakumar, D. Radhakrishnan, N. Lakshmanan and P. Dinakaran |
APPL-1292 | Cell Phone Cloning And Retrieval Data from Another Mobile Nanda Kumar.P, Manikandan.P and M.Rajesh |
APPL-1293 | Pervasive Computing Environments Powered by Novel Miniature Sources S. Tanuja and K. R. Shailesh |
APPL-1296 | Development of Efficient Algorithms for Quasigroup Generation & Encryption Saibal K. Pal and Sumitra |
APPL-1299 | Wireless Mesh Network Security — A Study of Centralized and Distributed Authendification Mechanism Amit K. Maheshwary, Sanjeev Safat and Divya Bansal |
APPL-1301 | Spying Linux:Consequences, Techniques and Preventions Mosin Ibrahim Hasan |
APPL-1302 | Multi Code Assignment and Reduction in Code Rate Wastage for 3G and Beyond WCDMA Systems Davinder S. Saini, Vikas Hastir and Munish Sood |
APPL-1303 | Cross Layer Integrated Approach for Secured Broker Selection in Public/Subscribe for Ad Hoc Networks Anshu Chaturvedi and D. N. Goswami |
APPL-1306 | Green House Monitoring & Controlling In Irrigation Harshad M. Kubade and R. W. Jasutkar |
APPL-1308 | Shape Based Image Retrieval Using Cellular Automata and Fourier Descriptors C. Callins Christiyana, J. Sutha and M. Sheerin Banu |
APPL-1313 | Performance Analysis of Bulk CMOS, Strained Silicon and CNFET based Operational Amplifiers in VDSM Technology Fahad Ali Usmani, A. K. Kureshi, Mohd. Hasan and M. J. R. Khan |
APPL-1314 | Feedback Based Multicast Approach for Video Conferencing in Ad Hoc Networks Philip Samuel, Neelesh Kumar and Kumar Gaurav |