Robust Transmission of Images Based on JPEG2000 using Edge Information

Author(s): Qurban A Memon | Amjad Boumatar
Volume: 3
Issue: 1
Year: 2012





Reliability Analysis in Parallel and Distributed Systems with Network Contention

Author(s): Hussein EL Ghor | Rafic Hage Chehade | Tamim Fliti
Volume: 3
Issue: 1
Year: 2012





Devnagari Script Recognition Using Kohonen Neural Network

Author(s): Mayuri Tathod | Ronak Shah | S R Nalamwar | Rajnish Yadav | Minal Shah
Volume: 3
Issue: 1
Year: 2012





Tackling the Threats of Internet Worms

Author(s): Al-Sakib Khan Pathan
Volume: 3
Issue: 1
Year: 2012





DIGGER: Identifying Operating System Dynamic Kernel Objects for Run-time Security Analysis

Author(s): Amani S. Ibrahim | James Hamlyn-Harris | John Grundy | Mohamed Almorsy
Volume: 3
Issue: 1
Year: 2012





Suspicious Human Activity Detection from Surveillance Videos

Author(s): Gowsikhaa D. | Manjunath | Abirami S.
Volume: 2
Issue: 2
Year: 2012





A Survey of Adaptation Systems

Author(s): Keling DA | Marc DALMAU | Philippe ROOSE
Volume: 2
Issue: 2
Year: 2012





CSCM: A Contention Sensitive Routing Metric for Efficient Cooperative Communication in Multi-Hop Wireless Networks

Author(s): A. F. M. Shahen Shah | Md. Shariful Islam
Volume: 2
Issue: 2
Year: 2012





Performance Comparison of 6to4, 6RD, and ISATAP Tunnelling Methods on Real Testbeds

Author(s): Se-Joon Yoon | Se-Joon Yoon | Dae-In Choi | Hyun K. Kahng
Volume: 2
Issue: 2
Year: 2012





TCP Performance Enhancement in Wireless Mobile Ad Hoc Networks

Author(s): Md. Mohsin Ali | A.K.M. Sazzadul Alam | Md. Shohan Sarker
Volume: 1
Issue: 1
Year: 2011





Internet and Distributed Computing Knowledge in Today’s World

Author(s): Al-Sakib Khan Pathan
Volume: 1
Issue: 1
Year: 2011





A Detailed Review of Fault-Tolerance Techniques in Distributed System

Author(s): Sanjay Bansal | Sanjeev Sharma | Ishita Trivedi
Volume: 1
Issue: 1
Year: 2011





Evaluating Weblog Behavior in Quality of Information Criteria

Author(s): Mohammad Javad Kargar
Volume: 1
Issue: 1
Year: 2011





Data Parallelism for Large-scale Distributed Computing

Author(s): Jinoh Kim
Volume: 1
Issue: 1
Year: 2011





Near-Duplicates Detection and Elimination Based on Web Provenance for Effective Web Search

Author(s): Y. Syed Mudhasir | J. Deepika | S. Sendhilkumar | G.S. Mahalakshmi
Volume: 1
Issue: 1
Year: 2011




