Vol 4, No 4 (2013)

Table of Contents

Articles

Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability PDF
Mohammad Naderuzzman, Md. Nasim Akhtar 1-9
Getting Relational Database from Legacy Data-MDRE Approach PDF
Omar EL BEGGAR, Brahim BOUSETTA, Taoufiq GADI 10-32
Network Traffic Analysis: A Case Study of ABU Network PDF
SB .A. Mohammed, S.M Sani, D.D. DAJAB 33-39
An Evaluation of Mobile Phone Usage Restriction in Selected Public Places in Akure, Nigeria PDF
Wasiu Lawal, E.O. Ogunti 40-46
Investigating the Performance of VOIP over WLAN in Campus Network PDF
U. R. ALO, NWEKE HENRY FRIDAY 47-58


Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org