Vol 5, No 4 (2013)

Table of Contents

Vol 5, No 4 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

Analysis of Different Parameters of ZigBee (802.15.4) for Wireless Sensor Networks
Gagninder Kaur, Raveenpal Kaur
 Vol 5, No 4 (2013), Pagination: 143-147
ABSTRACT |  PDF     Abstract Views: 147  |  PDF Views: 3
Effective Replica Allocation to Minimize Performance Degradation in MANET
P. Nagasundari, M. Malathi
 Vol 5, No 4 (2013), Pagination: 148-153
ABSTRACT |  PDF     Abstract Views: 134  |  PDF Views: 3
An Efficient Identification of Malicious Packet Dropping in Wireless Sensor Networks
A. S. Hemavarthinee, T. R. Vedhavathy, M. Bakyalakshmi
 Vol 5, No 4 (2013), Pagination: 154-157
ABSTRACT |  PDF     Abstract Views: 150  |  PDF Views: 4
QoS Provisioning in Vertical Handover of WiMAX/WLAN Overlay Network for Fixed and Mobile Users
G. Ben Seraphin, S. Ramesh
 Vol 5, No 4 (2013), Pagination: 158-162
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 2
Versioning File System in Cloud Computing with Intrusion Detection using Mobile Agent
V. Arun, K. L. Shunmuganathan
 Vol 5, No 4 (2013), Pagination: 163-169
ABSTRACT |  PDF     Abstract Views: 166  |  PDF Views: 3
TARF-Prevention from Adverseries of Multihop Routing in WSN
Aathira Jayan, K. Divya, R. Divya, R. Geetha
 Vol 5, No 4 (2013), Pagination: 170-176
ABSTRACT |  PDF     Abstract Views: 143  |  PDF Views: 2
Cost Optimized Resource Provisioning in Cloud Computing Environments
P. Arun Pandian, S. Anto
 Vol 5, No 4 (2013), Pagination: 177-182
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 3
Trusted Third Party Auditing to Improve the Cloud Storage Security
V. Venkatesh, P. Parthasarathi
 Vol 5, No 4 (2013), Pagination: 183-187
ABSTRACT |  PDF     Abstract Views: 129  |  PDF Views: 3
Enabling Data Storage Security by Multiple Auditing Mechanism in Cloud Computing
B. Santhosh, M. Suguna
 Vol 5, No 4 (2013), Pagination: 188-194
ABSTRACT |  PDF     Abstract Views: 129  |  PDF Views: 3