IJCOT - Volume 1 Issue 2 - 2011
S.No
|
Title/Author Name
|
Ref. No
|
1
|
IJCOT-V1I2P301
|
|
2 |
Laptop Theft Analysis for Digital Investigations -J.Keziya Rani, S.Prem Kumar, U.Ram Mohan,C.Uma Shankar |
IJCOT-V1I2P302 |
3 |
Data Mining Approach in Software Analysis -S.Suyambu Kesavan, Dr.K.Alagarsamy |
IJCOT-V1I2P303 |
4 |
A Non-blocking Checkpointing Algorithm for Non-Deterministic Mobile Ad hoc Networks -Kusum Saluja, Praveen Kumar |
IJCOT-V1I2P304 |