Punita Arora, Shalini Goel, Sunil Kumar
Category: Volume 2-Issue 2-February-2012
THE ROLE AND USE OF DATA MINING TECHNIQUES FOR INTRUSION DETECTION SYSTEM
Download FileAmit Sharma
WEB MINING IN ELECTRONIC LEARNIN
Download FileLaxmi Choudhary
WEB DESIGN CHALLENGES: ISSUES WITH DIFFERENT BROWSER COMPATIBILIT
Download FileProf. Indravadan S. Patel, Prof. Sanjay Patel
IMPROVING FAST AND SMOOTH HANDOFF IN IEEE 802.11 WIRELESS NETWORK
Download FileDeepak Y. Bhadane, Akhilesh A. Waoo, P.S.Patheja
CLOUD COMPUTING IS HEADING INTO STRATOSPHERE (A BEGINNING OF NEW ERA…
Download FileRajinder Kaur, Payal Garg
SOFTWARE PERFORMANCE ENGINERRING
Download FileGouri Sharma, Meetu Arora
ROUTING ANALYSIS BASED ON PERFORMANCE COMPARISON OF AODV, DSR, DYMO, OLSR AND ZRP IN MOBILE AD-HOC NETWORK
Download FileDr. Ritika, Dr. Nipur
AN ONTOLOGY: A SHARED CONCEPTUALISATION OF KNOWLEDG
Download FileYogesh Yadav
SOFTWARE SECURITY PATTERNS IN SECURITY ENGINEERING
Download FileRshma Chawla, Dr. Naveeta Mehta