Authors:
Vikas Pareek, Harshita Gupta, Jhilmil Gupta, Shreya Chatterjee and Astha Jain
Metamorphic Testing as a Testing Technique and an Automated Debugging Tool
Authors:
Jasmine Kaur and Harpreet Kaur
Buffer Overflow Exploit Prevention
Authors:
Kushal Ahuja and Vinod Kumar
A Survey of Topology Control of Multihop Wireless Networks for Energy Efficiency and Routing in AD HOC Networks
Authors:
L.S. Vijaya Kumar, Jagadeesha R and Ananda Babu J
Developing a Training Model using Orca (Assistive Technology) to Teach IT for Visually Impaired Students
Authors:
Meghana Jalgaonkar and Jayant Mahajan
Design and Identification of Tuberculosis using Fuzzy Based Decision Support System
Authors:
Navneet Walia, Sharad Kumar Tiwari and Rahul Malhotra
A Review on Deadlock Detection in Distributed Database
Authors:
Parul Tomar and Mohit Bhardwaj
Trusted Lightweight Authentication Protocol used in Wireless Sensor Network
Authors:
Pranjali Koli, D.G. Khairnar and Manish Sharma
An Advance algorithm for Solutions of Sudoku Puzzles
Authors:
Puja Majumdar
A Summarization of Various Intrusion Detection Techniques
Authors:
Randeep Brar and Neeraj Sharma
Checkpointing and Trust based Recovery in MANET: A Survey
Authors:
Ravneet Kaur and Neeraj Sharma
Web Based Claim Processing System
Authors:
Md. Waseem Akram and Abdur Rahman
A Fuzzy based Approach for Function Point Analysis
Authors:
Yusra, Farha Ashfaque and Mohd Sadiq
Data Encryption using Invisible Image Watermarking
Authors:
Alpana Kakkar and Apoorva Gupta
Alpana Kakkar1 and Apoorva Gupta2 1
Authors:
Parardha Kumar
E-Training Portals
Authors:
Kumari Seema Rani
Software Risk Assessment & Estimation Model using Fuzzy Functional Points
Authors:
Yusra and Saoud Sarwar