International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 6, No. 7, Jun. 2014
Cover page and Table of Contents: PDF (size: 131KB)
Contents
REGULAR PAPERS
-
Router-based Content-aware Data Redirection for Future CDN Systems
Janaka L. Wijekoon, Erwin H. Harahap, Shinichi Ishida, Rajitha L. Tennekoon, Hiroaki Nishi
Abstract | References | Full Paper: PDF (Size:769KB), PP.1-10, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.01
-
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi
Abstract | References | Full Paper: PDF (Size:475KB), PP.11-18, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.02
-
Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview
Salehe I. Mrutu, Anael Sam, Nerey H. Mvungi
Abstract | References | Full Paper: PDF (Size:574KB), PP.19-27, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.03
-
Performance Comparison of Single and Multiple Watermarking Techniques
Mohananthini Natarajan, Yamuna Govindarajan
Abstract | References | Full Paper: PDF (Size:298KB), PP.28-34, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.04
-
A New Optimization Model for Distribution Siting and Sizing in Unbalanced Three-phase Networks for Loss and Cost Minimization
Farzaneh Yazdani, Seyyed Mehdy Hosseini, Taghi Barforuoshi
Abstract | References | Full Paper: PDF (Size:362KB), PP.35-41, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.05
-
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Soumyabrata Talapatra, Alak Roy
Abstract | References | Full Paper: PDF (Size:463KB), PP.42-49, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.06
-
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
R.Mohan, N.P.Gopalan
Abstract | References | Full Paper: PDF (Size:468KB), PP.50-55, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.07
-
Feature Selection for Modeling Intrusion Detection
Virendra Barot, Sameer Singh Chauhan, Bhavesh Patel
Abstract | References | Full Paper: PDF (Size:553KB), PP.56-62, Pub. Date: 2014-06-08
DOI: 10.5815/ijcnis.2014.07.08