To search, Click below search items.
All Published Papers Search Service
Title
Proliferation of Worm Infection in P2p Networks and Its Prohibition
Author
B.Manasa Devi
Vol. 14 No. 9 pp. 45-49
Keywords
Malware, peer-to-peer networks, compartmental model, Bit Torrent and Time to Live (TTL)
Algorithms for Data-Compression in Wireless Computing Systems
Upasana Mahajan, Prashanth C.S.R
Vol. 14 No. 9 pp. 50-55
Lossless data compression, irreducible substitution tables, wireless sensor networks, compression algorithms, compression ratio
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
V.Jyothi, U. Vidya Sagar, S. Ramesh Kumar
Vol. 14 No. 9 pp. 56-59
Jamming Attacks, Packet Hiding Methods
An On-Chip Delay Measurement Technique for Small-Delay Defect Detection Using Signature Registers
RAJESHWARI SOMA, ZULEKHA TABASSUM, S.PRATHAP
Vol. 14 No. 9 pp. 60-66
Delay estimation, design for testability (DFT), integrated circuit measurements, semiconductor device reliability, signature register