Collection's Items (Sorted by Submit Date in Descending order): 21 to 32 of 32
| Issue Date | Title | Author(s) |
| 2010 | Ephemeral key recovery using index calculus method | Padmavathy, R.; Bhagvati, Chakravarthy |
| 2009 | An Improved Lazy Release Consistency Model | Sudhakar, Chapram; Ramesh, T. |
| 2001-02 | Performance comparison of two on-demand routing protocols for ad hoc networks | Perkins, C.E.; Royer, E.M.; Das, S.R.; Marina, M.K. |
| 2005 | A fault tolerant Connectionist Model for Predicate Logic Reasoning, Variable Binding: Using Coarse-coded Distributed Representations | Sanjeevi, S.G.; Bhattacharya, P. |
| 2010 | IMPROVED THREE PARTY EKE PROTOCOL | Padmavathy, R. |
| 2009 | Analysis of Key Management Schemes for Secure Group Communication and Their Classification | Aparna, R; Amberker, B.B |
| 1986 | 32-Bit Microprocessors | R. Govinda Rajulu |
| 1994 | Genetic algorithm for embedding a complete graph in a hypercube with a VLSI application | R. Chandrasekharam, V.V. Vinod; S. Subramanian |
| 1998 | Algorithms for delay-constrained low-cost multicast tree construction | R. Sriram, G. Manimaran and; C. Siva Ram Murthy |
| 1998 | A new study for fault-tolerant real-time dynamic scheduling algorithms | G. Manimaran and, C. Siva Ram Murthy |
| 1996-08 | IsoEthernet: An Integrated services LAN | F.E. Ross, D.R. Vaman |
| 1998-05-22 | Preferred link based delay-constrained least-cost routing in wide area networks | R. Sriram, G. Manimaran and; C. Siva Ram Murthy |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 32 of 32