Abstract

Authors and Affiliations

Keywords

DMA

Related Articles

Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network

The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving...

Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...

Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)

The aim of this paper is to study the management of Information Technology (IT) security in Kenyan Small and Medium Enterprises (SMEs). Particularly, this study looks at whether SMEs have a designated employee in charge...

ROUTING PROBLEM FOR PARALLEL ROUTE BASED MAXMIN ANT SYSTEM

The proposed work presented a modified MAX-MIN Ant System (MMAS) algorithm to solve the routing problem, in which known demand are supplied from a store house with parallel routes for new local search. Routing Problem is...

Method to Minimize the Clock Skew and Uniform Clock Distribution using Parallel Port in Pipe Line Based Multi Channel DMA Request Terminal for Frequency Measurement

This paper presents a new wide-range digital speed measurement method with jitter removal technique and using the direct memory access (DMA) terminal count register (TCR). Our work also supports a multi node interfacing...

Download PDF file
  • EP ID EP97155
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

(2010).  . International Journal of Computer Science and Information Technologies, 1(2), 126-129. https://europub.co.uk/articles/-A-97155