IJCTT-Volume 2 Iss 1 No 1 Issue 2011
|
Title/Author Name
|
Paper Id
|
♦ |
IJCTT-V2I1P101
|
|
♦ |
A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network - Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad. |
IJCTT-V2I1P103 |
♦ |
- Ismail O. Muraina,Imran A.Adeleke, Mukaila A.Rahman |
IJCTT-V2I1P104 |
♦ |
Credit Card Fraud Detection Analysis - J. Keziya Rani,S.Prem Kumar,U.Ram Mohan, C.Uma Shankar. |
IJCTT-V2I1P106 |
♦ |
A Study on Conduct of Teams in an It and a BPO Company - S.Nirmala, S.Deborah Sharon. |
IJCTT-V2I1P112 |
♦ |
An IP Trace back System to Find the Real Source of Attacks - A.Parvathi and G.L.N.JayaPradha. |
IJCTT-V2I1P113 |
♦ |
Dependency grammar feature based noun phrase extraction for text summarization. - Mrs. Dipti Sakhare,Dr. Rajkumar. |
IJCTT-V2I1P114 |
♦ |
Low Power testing by don’t care bit filling technique - Chetan Sharma. |
IJCTT-V2I1P115 |
♦ |
Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs) - Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg. |
IJCTT-V2I1P118 |
♦ |
A QOS-Aware Software Selection Method Based On Service Credibility Evaluation - U.Sadhana Reddy, M.Y.Babu. |
IJCTT-V2I1P121 |
♦ |
- Dodda Shekar, Rangu Srikanth. |
IJCTT-V2I1P122 |