Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ramesh, V.
- Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources
Abstract Views :172 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science, Klasalingam Institute of Technology, Krishnan koil, IN
1 Department of Computer Science, Klasalingam Institute of Technology, Krishnan koil, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 5 (2016), Pagination: 2876-2881Abstract
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.Keywords
RMO (Routing with Minimum Overhead, DMO (Decomposition with Minimum Overhead), MPC (Multiple Routing Configuration), OSPF (Open Shortest Path).- Multi Owner Data Sharing and Outsourced Revocation Using Identity Based Encryption on Cloud
Abstract Views :172 |
PDF Views:5
Authors
K. Kowsalya
1,
V. Ramesh
1
Affiliations
1 Department of Computer Science and Engineering, Kalasalingam Institute of Technology, Krishnan Koil, IN
1 Department of Computer Science and Engineering, Kalasalingam Institute of Technology, Krishnan Koil, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 5 (2016), Pagination: 2899-2903Abstract
Cloud computing is an economical and effective solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while protect data and identity privacy from an un trusted cloud is still a challenging issue, due to the recurrent change of the membership.The major aims of this method a secure multi-owner data sharing scheme.That is any user in the group can securely share data with others by un trusted cloud. Moreover, the real identities of data owners can be exposed by the group manager when disputes occur. User revocation can be achieved by a novel revocation list and no need to update the secret Keys of the remaining users.The drawback of IBE is computation over head. To overcome the drawback introduces outsourcing computation.Keywords
Cloud Computing, Revocation, Multi Owner Data Sharing, Identity Based Encryption.- Deriving Differential Unit Test Cases from System Test Cases
Abstract Views :124 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science and Engineering, Kalasalingam Institute of Technology, Tamilnadu, IN
1 Department of Computer Science and Engineering, Kalasalingam Institute of Technology, Tamilnadu, IN
Source
International Journal of Advanced Networking and Applications, Vol 4, No 4 (2013), Pagination: 1674-1679Abstract
Differential testing works by creating test suites for both the original system and the modified system and contrasting both versions of the system with these two suites. Differential testing is made possible by recent advances in automated unit test generation. The differential unit testing is one where developers would like to generate tests that exhibit the behavioral differences between the two versions, if any differences exist. Differential unit tests (DUT) are a combination of unit and system tests. DUTs retain some of the advantages of unit tests, can be automatically and inexpensively generated, and have the potential for revealing faults related to intricate system executions. Some examples of differential unit testing include regression testing, N-version testing, and mutation testing. Differential testing discovered 21%, 34%, and 21% more behavior changes using regression testing techniques than using regression testing alone.Keywords
Differential Unit Testing, System Testing, Test Cases, Unit Testing.- Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic Over ATM Network
Abstract Views :117 |
PDF Views:0
Authors
Affiliations
1 Sathyabama University, Chennai, IN
2 Veerabrahmendra Institute of Technology & Sciences, Badvel, Kadapa Dt, AP, IN
3 Dept of IT, BVRIT, Narsapur, AP, IN
1 Sathyabama University, Chennai, IN
2 Veerabrahmendra Institute of Technology & Sciences, Badvel, Kadapa Dt, AP, IN
3 Dept of IT, BVRIT, Narsapur, AP, IN