Volume 2 Issue 6, June 2013: Page 60
Downloads: 122 | Views: 414
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 287 - 290Public Key Encryption : A Survey
Banazir B
Downloads: 120 | Views: 393
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 291 - 294Survey on Common Spatial Pattern Detection using Affine Transformation
Shashikala N, Dr. S.B Shivakumar, Ramesh
Downloads: 110 | Views: 402
Computer Science, India, Volume 2 Issue 6, June 2013
Pages: 295 - 298Interserver Service Allocation Model using Soa
V. Padmavathi, N. Shenbagavadivu
Downloads: 125 | Views: 458
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 299 - 302Comprative Study Of Green Computing On University Campus
Pankaj, Pawan Prakash Singh
Downloads: 139 | Views: 454
Mechanical Engineering, India, Volume 2 Issue 6, June 2013
Pages: 303 - 305Improving the Performance of Household Refrigerator by Recovering Heat from the Condenser
Y.A.Patil, H.M.Dange
Downloads: 125 | Views: 575
Anthropology Science, Kenya, Volume 2 Issue 6, June 2013
Pages: 306 - 312The Role Of Constituency Development Fund In Rural Development: Experiences From North Mugirango Constituency, Kenya
Samwel Auya, Peter Oino
Downloads: 127 | Views: 494
Anthropology Science, Kenya, Volume 2 Issue 6, June 2013
Pages: 313 - 319The role of Networks of Relations among Street Children in Kenya: Evidence from Eldoret Municipality
Samwel Auya, Peter Oino
Downloads: 115 | Views: 427
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 320 - 323A Trivial And Consistent Routing With In-Network Aggregation In Wireless Sensor Networks
C.Pravallika, T.Venkata Naga Jayudu
Downloads: 125 | Views: 443
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 324 - 328Avoiding selective jam attack by packet hiding method in wireless sensor network
Dilip kumar D.P, H. Venugopal
Downloads: 131 | Views: 481
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 329 - 334Secure and Optimized Algorithm for Implementation of Digital Signature
Isha Jauhari, Jitendra Kumar