A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKSS.Seetha, P. Raviraj
|
FRAMING HYPOTHESIZED MODEL FOR CRM PRACTICES IN BANKS: APPLICATION OF CONFIRMATORY FACTOR ANALYSISS. Sheik Abdullah, R. Manohar, M. Manikandan
|
DESIGN AND READ STABILITYANALYSIS OF 8T SCHMITT TRIGGER BASED SRAMPriyanka Lee Achankunju, K S Sreekala, Marie K. James
|
PERFORMANCE OF OPTIMIZED HEXAGONAL SLOTTED PATCH ANTENNA DESIGN FOR ENHANCED SUB-6 5G WIRELESS SYSTEMSK. Kayalvizhi1, S. Ramesh2
|
CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTINGN Aravinthan, K Geetha
|
THE SECURED CLOUDS WATCH WEB SERVICE RESOURCES BASED ON PRE-SCHEDULED CHANGES TO RESOURCES IN BIG DATA MANAGEMENTM. Ramkumar, R. Karthick, N. Aravinth, A. Jayashree
|