ANAS Volume 8, Number 17: EEICC Special 5 2014 for Computer Science and Engineering
----------------------------------------------------------------------------------------------------------------------------------
Dynamic Key Management Schemes: A Survey
Vinoth Chakkaravarthy G. and Ambiga P
1-7
----------------------------------------------------------------------------------------------------------------------------------
Query Refinement Based Question Answering System using Pattern Analysis
Muthukrishnan Ramprasath and Shanmugasundaram Hariharan
8-15
----------------------------------------------------------------------------------------------------------------------------------
A Novel Complex Event Processing Monitoring Framework using RFID
Govindasamy Vaiyapuri, Akila Govindasmay, Gilbert Gunaseelan, Kamalaganesh Thirumeni,
Hariharan. S
16-22
----------------------------------------------------------------------------------------------------------------------------------
A Survey on Cross-Layer Architecture with QoS Assurances for Wireless Multimedia
Sensor Networks
A. Sivagami, S. Malarkkan, M. Asvini Devi
23-35
----------------------------------------------------------------------------------------------------------------------------------
Cloud Computing with Optimized Resources Allocation in Virtual Machine
S. Jayanthi and Dr. P. Srinivasa Babu
36-40
----------------------------------------------------------------------------------------------------------------------------------
Hybrid Genetic Algorithm Approach for Mobile Robot Path Planning
S. Abinaya, V. Hemanth Kumar, P. Srinivasa Karthic, D. Tamilselvi, S. Mercy Shalinie
41-47
----------------------------------------------------------------------------------------------------------------------------------
Study of Honeypots: Analysis of WiFi_Honeypots and Honeypots tools
Poonkuntran.S and Arun Anoop M
48-59
----------------------------------------------------------------------------------------------------------------------------------
Detection and Mitigation System for Routing Attacks in BGP
C. Siva and Dr. S. Arumugam
60-67
----------------------------------------------------------------------------------------------------------------------------------
LH-MAC: Load Balanced Hybrid MAC protocol for Wireless Sensor Network
B. Priya and S. Solai Manohar
68-75
----------------------------------------------------------------------------------------------------------------------------------
A Recap on Data Stream Classification
S. Jayanthi and B. Karthikeyan
76-82
----------------------------------------------------------------------------------------------------------------------------------
A new Approach of data Gathering using Mobile Sink and Support-in Cluster Head in
WSN
Kumaresan, Kand Krishnan A
83-91
----------------------------------------------------------------------------------------------------------------------------------
An Empirical Study on Dos Attacks and DDoS Defense Mechanism
Dr. S. Angel Latha Mary, E. Sabaridha, A.N. Sivagami, M. Usha Rani
92-100
----------------------------------------------------------------------------------------------------------------------------------
Auditability-Aware Data Scheduling for Privacy Preserved Third-party Auditing
Suganya S., Uma.A. and Kumaresan. M.
101-107
----------------------------------------------------------------------------------------------------------------------------------
|