IJCSEE Vol 1 Issue 5 (2013) ISSN 2320-401X (Printed Version) ISSN 2320-4028 (Online Version)

    Sr. no.Title & author(s) namePage no.
    1Information Security Issues Facing Internet Cafe Users

    Alfred Thaga Kgopa

    580
    2Weaknesses of Wu-Hwang-Liu's Password Authentication Protocol

    Hassan M. Elkamchouchi, and Mohamed Hamdy Eldefrawy

    588
    3Photoconductivity of CdTe Semiconductor Radiation Detectors

    Ondrej Sik, and Lubomir Grmela

    591
    4Ubiquitous Computing- A Technological Impact for an Intelligent System

    Saju Mathew

    595
    5Link Failure Recovery in WDM Networks

    Mallika, and Neeraj Mohan

    599
    6Double P-cycle based Dual failure Survivability

    Neeraj Mohan, Seema, Dr. Amit Wason, and Dr. Parvinder S. Sandhu

    603
    7FFT based image registration using corner response

    R. Kokila, and P. Thangavel

    607
    8Ternary Function Minimization by Map Method

    Vikram R. Ghiye, Dr. A.P. Dhande, and Sharan H. Bonde

    614
    9A Systematic Way to Analyse the Performance of DBDCTO Algorithm With Respect To DTC, Greedy Cost, Max-Min and Min-Min Workflow Scheduling Algorithms U

    Gaganpreet Kaur, and Yogesh Kumar

    621
    10Searching and analyzing Arabic text using regular expressions e−Quran case study

    Ahmed ARARA, Adel SMEDA, and Ismail ELLABIB

    627
    11Analysis of e-Commerce Application in Macedonia and Albania

    Rezarta Zhaku, Majlinda Fetaji, and Bekim Fetaji

    632
    12Analysis of the Implementation of Wimax Technology Using Motorola Canopy: Case Study in Macedonia

    Afrim Mehmedi, Rezarta Zhaku, Bekim Fetaji, and Majlinda Fetaji

    638