|
|||||
SI | Paper Number |
Author |
Title |
||
1 | 198 | Santosh Ramachandran, Anand S.V.R., Malati Hegde, Anurag Kumar and Rajesh Sundaresan | Neighbor Oblivious Link Reversal over Duty-Cycled WSNs | ||
2 | 121 | Vinay Joseph, Vinod Sharma and Utpal Mukherji | Opportunistic Splitting for Scheduling via Stochastic Approximation | ||
3 | 124 | Vanniarajan Chellappan and Kamala Krithivasan | Network (Tree)Topology Inference Based on Prüfer Sequence | ||
4 | 145 | Nikhil Ranjan, Hema A Murthy and Timothy A Gonsalves | Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Modeling Technique | ||
5 | 148 | Mukundan Madhavan, Andrew Thangaraj, Kapali Viswanathan and Yogesh Sankarasubramaniam | NLHB : A Light-weight, Provably-secure Variant of the HB Protocol Using Simple Non-linear Functions | ||
6 | 150 | Ashok Sairam and Gautam Barua | Distributed Route Control Schemes to Load Balance Incoming Traffic in Multihomed Stub Networks | ||
7 | 178 | Sandeep Sood | Improvement of Wang et al.’s Authentication Scheme Using Smart Cards | ||
8 | 219 | Pallavi Manohar and Manjunath D | Survivability Analysis under Non-Uniform Stochastically Dependent Node Damages | ||
9 | 253 | Mayur M Vegad, Swades De and Brejesh Lall | Mitigation of Exposed Terminals Problem with Differential Capture Capable Receivers | ||
10 | 218 | Abul Bashar, Gerard Parr, Santosh Chaudhari, Mani Subramanian,Timothy Gonsalves, Sally McClean and Bryan Scotney | Employing Bayesian Belief Networks for Energy Efficient Network Management | ||
11 | 244 | Priyatosh Mandal, Swades De and Shyam Chakraborty | Characterization of Aloha in Underwater Wireless Networks | ||
12 | 182 | Varsha Jain and Gerard Parr | Deriving a Generic Energy Consumption Model for Network Enabled Devices | ||
13 | 192 | Vikrant Tomar, Himanshu Asnani, Abhay Karandikar, Vinay Chander,Swati Agrawal and Prateek Kapadia | Social Network Analysis of the Short Message Service | ||
14 | 104 | Purvang Dalal and K. S. Dasgupta | TCP Cross Layer Adaptive Policy -Throughput Optimization over Wireless Links | ||
15 | 212 | Kartik Bommepally, Glisa TK, Jeena J Prakash, ranbir sanasam and Hema Murthy | Internet Activity Analysis Through Proxy Log | ||
16 | 222 | Weizhi Luo and Eliane Bodanese | Network Resource Availability Evaluation for IEEE802.11a/b based WLAN Carrying Different Service Types | ||
17 | 176 | Arijit Ukil and Jaydip Sen | Proactive Resource Reservation in Next-Generation Wireless Networks | ||
18 | 203 | Deepti Kumar, Timothy Gonsalves, Ashok Jhunjhunwala and Gaurav Raina | Mobile Payment Architectures for India | ||
19 | 225 | Santhana Krishnan B | On the Bounds of Separability in Sensor Networks | ||
20 | 187 | Vikrant Tomar, Himanshu Asnani, Abhay Karandikar and Prateek Kapadia | Traffic Analysis of a Short Message Service Network | ||
21 | 217 | Ganesh Narayana Murthy and Sridhar Iyer | Study Element based adaption of lecture videos to mobile devices | ||
22 | 95 | Brijesh Patel and Sanjay Srivastava | Performance Analysis of Zone Routing Protocols in Ad Hoc Networks | ||
23 | 172 | Selvam T and Srikanth S | A Frame Aggregation Scheduler for IEEE 802.11n |
Back |