Table of Contents
Vol 3, No 2 (2011)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Heuristics Based Survey on Workflow Scheduling in Computational Grids | ||
E. Saravana Kumar, A. Sumathi | ||
Vol 3, No 2 (2011), Pagination: 82-86 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 191 | PDF Views: 1 |
Virtual Environment Security-Considerations & Practices | ||
S. Ranjitha Kumari, V. Kathiresan | ||
Vol 3, No 2 (2011), Pagination: 87-92 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 200 | PDF Views: 2 |
Optimal Path Energy Efficient Routing Algorithm for Wireless Sensor Networks | ||
K. S. Shivaprakasha, Muralidhar Kulkarni, Pravin Kumar, Santosh Kumar Singh | ||
Vol 3, No 2 (2011), Pagination: 93-98 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 189 | PDF Views: 3 |
Adaptive Network Topology Acquisition (A-NTA) Algorithm in IEEE 802.16j Non-Transparent Mode Relay Networks | ||
D. Satish Kumar, N. Nagarajan | ||
Vol 3, No 2 (2011), Pagination: 99-104 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 195 | PDF Views: 1 |
An Efficient Topology Construction for Wireless Mesh Networks with Reduced Cost, Energy and Interference | ||
V. Anuratha, P. Sivaprakasam | ||
Vol 3, No 2 (2011), Pagination: 105-110 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 201 | PDF Views: 1 |
Investigation on Heterogeneous Power line Communication for Home Area Networking | ||
A. Rajesh, R. Nakkeeran | ||
Vol 3, No 2 (2011), Pagination: 111-120 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 176 | PDF Views: 1 |
A Survey on Mobile Agents Based Load Balancing Based in Distributed Web Servers | ||
M. Aramudhan | ||
Vol 3, No 2 (2011), Pagination: 121-127 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 193 | PDF Views: 1 |
A Novel Trust Based Job Replication for A Global Scale Grid Environment | ||
Asir, Shamila Ebenezer, Daniel | ||
Vol 3, No 2 (2011), Pagination: 128-131 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 187 | PDF Views: 3 |
A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain | ||
N. Arumugam, C. Venkatesh | ||
Vol 3, No 2 (2011), Pagination: 132-135 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 198 | PDF Views: 3 |
SAMON-C:Sensor Access and Monitoring in Cloud Environment | ||
R. S. Ponmagal, J. Raja | ||
Vol 3, No 2 (2011), Pagination: 136-144 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 161 | PDF Views: 2 |
Fault-Tolerant Scheduling Techniques for Computational Grid | ||
S. Uma Maheswari, A. Shamila Ebenezer | ||
Vol 3, No 2 (2011), Pagination: 145-151 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 182 | PDF Views: 3 |