Issue 3 of Volume 5

Analysis of Combining Software Estimation Techniques

Authors: S. G. Bhirud, M. V. Deshpande

A Peer-to-Peer Architecture to collaboratively Propagate and Traceback DDoS Attack information using DST

Authors: P.Syam Kumar, Dr.R.Subramanian, D.Thamizh Selvam, P.S.Vinayagam

Mixing Codebooks of LBG, KPE and KFCG Algorithms to Increase Capacity of Information Hiding

Authors: Kalpana Sagvekar, Dr. Tanuja K. Sarode, Archana Athawale, Dr. H. B. Kekre

Optimization of Chip Interconnect Area by using Interconnect Length and Width

Authors: Dr.Y.Venkatarami Reddy, D.Venkata Vara Prasad

Fuzzy Set Theoretic Approach To Collocation Extraction

Authors: H. S. Dhami, Raj Kishor Bisht