Table of Contents
Vol 5, No 4 (2013)
Open Access
Subscription Access
Articles
An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing | ||
S. R. Nayana, G. Venifa Mini, J. Jeya A. Celin | ||
Vol 5, No 4 (2013), Pagination: 147-152 | ||
ABSTRACT | PDF | Abstract Views: 219 | PDF Views: 3 |
VM Inclusive MeBaSA for Virtualized Multi-Tier Cloud | ||
Ramesh D. Kodi, M. Balavaishnavi | ||
Vol 5, No 4 (2013), Pagination: 153-162 | ||
ABSTRACT | PDF | Abstract Views: 268 | PDF Views: 4 |
Efficient Resource Provisioning Using RTUOP Algorithm in Cloud Computing | ||
M. Revatheeswari, P. Saranya | ||
Vol 5, No 4 (2013), Pagination: 163-167 | ||
ABSTRACT | PDF | Abstract Views: 241 | PDF Views: 2 |
Paper Framework for Power Aware Scheduling in Cloud Environment | ||
Abdul Nasar Kaipancherry, K. Najeeb | ||
Vol 5, No 4 (2013), Pagination: 168-174 | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 2 |
An Enhanced Framework Model for Secure Key Management in Stream Control Transmission Protocol | ||
P. Venkadesh, Julia Punitha Malar Dhas, S. V. Divya | ||
Vol 5, No 4 (2013), Pagination: 175-181 | ||
ABSTRACT | PDF | Abstract Views: 241 | PDF Views: 2 |
Source Layer Group Aggregation for Balanced Traversing | ||
S. T. Padmapriya, J. Deepika | ||
Vol 5, No 4 (2013), Pagination: 182-189 | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 2 |
A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing | ||
K. Bhuvaneshwari, O. G. Harini Vardhan | ||
Vol 5, No 4 (2013), Pagination: 190-194 | ||
ABSTRACT | PDF | Abstract Views: 238 | PDF Views: 2 |
Implementing ABSM Protocol for VANET | ||
M. S. Bagavathiammal, P. Sivaraman | ||
Vol 5, No 4 (2013), Pagination: 195-199 | ||
ABSTRACT | PDF | Abstract Views: 302 | PDF Views: 2 |
Penalty Model for SLA Architecture in Cloud | ||
S. Absa, Shajulin Benedict | ||
Vol 5, No 4 (2013), Pagination: 200-206 | ||
ABSTRACT | PDF | Abstract Views: 241 | PDF Views: 2 |
A Novel Approach for Load Balancer in SIP Clusters | ||
K. Anandhan, V. K. Dinesh Prabu, C. Kumar | ||
Vol 5, No 4 (2013), Pagination: 207-213 | ||
ABSTRACT | PDF | Abstract Views: 260 | PDF Views: 2 |
Network Reconfiguration of Distribution System Using Harmony Search Algorithm | ||
T. D. Sudhakar | ||
Vol 5, No 4 (2013), Pagination: 214-221 | ||
ABSTRACT | PDF | Abstract Views: 230 | PDF Views: 2 |
Securing Information Using Cryptography and Steganography Technique | ||
V. Hemanth, Mahammad Shareef | ||
Vol 5, No 4 (2013), Pagination: 222-226 | ||
ABSTRACT | PDF | Abstract Views: 276 | PDF Views: 2 |
Improving Security and Verifiability of Stored Data in Cloud | ||
N. H. Rajesh, S. Nagarajan | ||
Vol 5, No 4 (2013), Pagination: 227-231 | ||
ABSTRACT | PDF | Abstract Views: 231 | PDF Views: 2 |