Vol 5, No 4 (2013)

Table of Contents

Vol 5, No 4 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing
S. R. Nayana, G. Venifa Mini, J. Jeya A. Celin
 Vol 5, No 4 (2013), Pagination: 147-152
ABSTRACT |  PDF     Abstract Views: 219  |  PDF Views: 3
VM Inclusive MeBaSA for Virtualized Multi-Tier Cloud
Ramesh D. Kodi, M. Balavaishnavi
 Vol 5, No 4 (2013), Pagination: 153-162
ABSTRACT |  PDF     Abstract Views: 268  |  PDF Views: 4
Efficient Resource Provisioning Using RTUOP Algorithm in Cloud Computing
M. Revatheeswari, P. Saranya
 Vol 5, No 4 (2013), Pagination: 163-167
ABSTRACT |  PDF     Abstract Views: 241  |  PDF Views: 2
Paper Framework for Power Aware Scheduling in Cloud Environment
Abdul Nasar Kaipancherry, K. Najeeb
 Vol 5, No 4 (2013), Pagination: 168-174
ABSTRACT |  PDF     Abstract Views: 239  |  PDF Views: 2
An Enhanced Framework Model for Secure Key Management in Stream Control Transmission Protocol
P. Venkadesh, Julia Punitha Malar Dhas, S. V. Divya
 Vol 5, No 4 (2013), Pagination: 175-181
ABSTRACT |  PDF     Abstract Views: 241  |  PDF Views: 2
Source Layer Group Aggregation for Balanced Traversing
S. T. Padmapriya, J. Deepika
 Vol 5, No 4 (2013), Pagination: 182-189
ABSTRACT |  PDF     Abstract Views: 239  |  PDF Views: 2
A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing
K. Bhuvaneshwari, O. G. Harini Vardhan
 Vol 5, No 4 (2013), Pagination: 190-194
ABSTRACT |  PDF     Abstract Views: 238  |  PDF Views: 2
Implementing ABSM Protocol for VANET
M. S. Bagavathiammal, P. Sivaraman
 Vol 5, No 4 (2013), Pagination: 195-199
ABSTRACT |  PDF     Abstract Views: 302  |  PDF Views: 2
Penalty Model for SLA Architecture in Cloud
S. Absa, Shajulin Benedict
 Vol 5, No 4 (2013), Pagination: 200-206
ABSTRACT |  PDF     Abstract Views: 241  |  PDF Views: 2
A Novel Approach for Load Balancer in SIP Clusters
K. Anandhan, V. K. Dinesh Prabu, C. Kumar
 Vol 5, No 4 (2013), Pagination: 207-213
ABSTRACT |  PDF     Abstract Views: 260  |  PDF Views: 2
Network Reconfiguration of Distribution System Using Harmony Search Algorithm
T. D. Sudhakar
 Vol 5, No 4 (2013), Pagination: 214-221
ABSTRACT |  PDF     Abstract Views: 230  |  PDF Views: 2
Securing Information Using Cryptography and Steganography Technique
V. Hemanth, Mahammad Shareef
 Vol 5, No 4 (2013), Pagination: 222-226
ABSTRACT |  PDF     Abstract Views: 276  |  PDF Views: 2
Improving Security and Verifiability of Stored Data in Cloud
N. H. Rajesh, S. Nagarajan
 Vol 5, No 4 (2013), Pagination: 227-231
ABSTRACT |  PDF     Abstract Views: 231  |  PDF Views: 2