1.TAP-WAVE-RUB ANDROID APPLICATION (TWRDROID): A LIGHTWEIGHT PERMISSION ENFORCEMENT APPROACH TO EMERGING SMARTPHONE MALWARE.
Authors :K.Vijayalakshmi,J.Jayavel
Paper Id :IJCRCST-MAY16-01
Page No : 744 – 747
2.PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS USING ADMISSION CONTROL SCHEME FOR CLUSTERED AD HOC NETWORKS
Authors : T.Parameswaran,Dr. C. Palanisamy,P.Bhagya devi
Paper Id :IJCRCST-MAY16-02
Page No : 748 – 753
3.COMPARISON OF DIFFERENT COGNITIVE ARCHITECTURES WITH THE NEWLY PROPOSED CSIA ARCHITECTURE
Authors : N.Vishwitha,Govindaraju,K.Ashwini,Dr. M V Vijayakumar
Paper Id :IJCRCST-MAY16-03
Page No : 754 – 760
4.DISTRIBUTED DE-DUPLICATION SYSTEM: MORE SECURE AND RELIABLE APPROACH
Authors : Sagar G. Khengat,Swapnil S. belorkar,Alok Y. Shukla,Prof. Shital D. Bachpalle
Paper Id :IJCRCST-MAY16-04
Page No : 761- 765
5.MULTIPATH ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR NETWORKS USING COLD SPOT TECHNIQUE
Authors : Selva Jothi.S,Balachander.K
Paper Id :IJCRCST-MAY16-05
Page No : 766- 770
6.A SURVEY ON QUALITY OF SERVICES AWARE ROUTING PROTOCOL IN MANET
Authors : P.Sivakami,S.Mythili
Paper Id :IJCRCST-MAY16-06
Page No : 771- 774