Table of Contents
Articles
| Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability | |
| Mohammad Naderuzzman, Md. Nasim Akhtar | 1-9 |
| Getting Relational Database from Legacy Data-MDRE Approach | |
| Omar EL BEGGAR, Brahim BOUSETTA, Taoufiq GADI | 10-32 |
| Network Traffic Analysis: A Case Study of ABU Network | |
| SB .A. Mohammed, S.M Sani, D.D. DAJAB | 33-39 |
| An Evaluation of Mobile Phone Usage Restriction in Selected Public Places in Akure, Nigeria | |
| Wasiu Lawal, E.O. Ogunti | 40-46 |
| Investigating the Performance of VOIP over WLAN in Campus Network | |
| U. R. ALO, NWEKE HENRY FRIDAY | 47-58 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Computer Engineering and Intelligent Systems


