The Term Wave Console: Reimagining Console Communication
V. Maniraj1 , E. Manohari2
Section:Review Paper, Product Type: Journal Paper
Volume-3 ,
Issue-8 , Page no. 125-135, Aug-2015
Online published on Aug 31, 2015
Copyright © V. Maniraj , E. Manohari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: V. Maniraj , E. Manohari, “The Term Wave Console: Reimagining Console Communication,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.125-135, 2015.
MLA Style Citation: V. Maniraj , E. Manohari "The Term Wave Console: Reimagining Console Communication." International Journal of Computer Sciences and Engineering 3.8 (2015): 125-135.
APA Style Citation: V. Maniraj , E. Manohari, (2015). The Term Wave Console: Reimagining Console Communication. International Journal of Computer Sciences and Engineering, 3(8), 125-135.
BibTex Style Citation:
@article{Maniraj_2015,
author = {V. Maniraj , E. Manohari},
title = {The Term Wave Console: Reimagining Console Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {125-135},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=622},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=622
TI - The Term Wave Console: Reimagining Console Communication
T2 - International Journal of Computer Sciences and Engineering
AU - V. Maniraj , E. Manohari
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 125-135
IS - 8
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2317 | 2283 downloads | 2345 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
Throughout human civilization, content has been an indispenscapable channel of communication. Modern computers equipped with desktop consoles have dramatically increased the ease and volume of text-based communication in the structure of email, content chat, and Web posting. As computing advances expanded beyond the confines of the desktop, the need on the other hand compelling content section on versatile gadgets has been increasingly felt over the last two decades. Such a need has inspired both scholarly researchers and the information innovation industry in pursuit of compelling content section techniques elective to the ubiquitous desktop keyboards.
Key-Words / Index Term
Cloud Computing, Cloud association provider(CSP), Proxy,SaaS, IaaS, PaaS
References
[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
[8] Thulasiraman, K. ; Xi Fang ; Dejun Yang more authors,” Computing a Most Probable Constrained Path: NP-Hardness and ApproximatioScheme”. Published in:Computers, IEEE Transactions on (Volume:61 , Issue: 5 Page(s)738 – 744.
[9] Hongbo Wang ; Adamou, B. ; Shiduan Cheng Finding the Most Balanced Delay Constrained PathPublished in: Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on (Volume:3 )Date of Conference:6-8 Jan. 2009Page(s):201 – 205.