Effective Searching Shortest Path In Graph Using Prim’s Algorithm Journal title: International Journal of Computer & organization Trends(IJCOT) Authors: D.Kalpanadevi Subject(s):
Test Optimization of 2D SOC using Enhanced ACO Algorithm Journal title: International Journal of Computational Engineering and Management IJCEM Authors: Naveen Dewan and Harpreet Vohra Subject(s):
A Survey on Privacy Preserving Data Mining Techniques Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Deepa Tiwari, Raj Gaurang Tiwari Subject(s):
A Minimum-Spanning-Tree-Inspired Algorithm for Channel Assignment in 802.11 Networks Journal title: International Journal of Electronics and Telecommunications Authors: Iwona Dolińska, Mariusz Jakubowski, Antoni Masiukiewicz, Grzegorz Rządkowski, Kamil Piórczyński Subject(s):
Construction of Variable Strength Covering Array for Combinatorial Testing Using a Greedy Approach to Genetic Algorithm Journal title: e-Informatica Software Engineering Journal Authors: Priti Bansal, Sangeeta Sabharwal, Nitish Mittal, Sarthak Arora Subject(s):
ALGORITHMS FOR INDIVIDUAL TRAINING SCHEDULE OPTIMIZATION Journal title: Международный научный журнал "Интернаука" Authors: Pavlo Sevidov Subject(s):
Passive IP Traceback: Tracing spoofer IP and Blocking IP spoofer from Data access using Greedy Algorithm Journal title: International journal of Emerging Trends in Science and Technology Authors: Mrs KarpagaPriya. P Subject(s):
Insights on Car Relocation Operations in One-Way Carsharing Systems Journal title: International Journal of Advanced Computer Science & Applications Authors: Rabih Zakaria, Mohammad Dib, Laurent Moalic, Alexandre Caminada Subject(s):
Data Prevention from Network Hacking Journal title: International Journal of Trend in Scientific Research and Development Authors: Subject(s): Biological Sciences, Computer and Information Science, Engineering, Mathematics, Agricultural Engineering, Management, Engineering, Multidisciplinary
Continuous Connectivity Aware Routing Using Hybrid Protocol and Cross Analysis for Message Verification