Issue | Title | |
Vol 1, No 2 (2013) | A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment | Abstract |
Mayanka Katyal, Atul Mishra | ||
Vol 4, No 1 (2016) | A Dynamic Predictive Approach to Identify an Optimal Cloud Availability Zone with Maximum Satisfaction Level | Abstract |
R. Santhosh, A. Ramya | ||
Vol 1, No 1 (2013) | A Priority Constrained Pre-emptive Scheduling of Online Real Time Services with Fixed Checkpoint Intervals for Cloud Computing | Abstract |
R. Santhosh, T. Ravichandran | ||
Vol 6, No 2 (2018) | A Review on Attribute Based Encryption Techniques of Access Control in Cloud Computing | Abstract |
Shobha Chawla | ||
Vol 2, No 2 (2014) | A Security Aware User Access Privileges in Cloud through Fuzzy Reasoning Approach | Abstract |
R. Poorvadevi, S. Rajalakshmi | ||
Vol 2, No 2 (2014) | A Survey on Cloud Computing and Cloud Security | Abstract |
Rohit Handa | ||
Vol 6, No 1 (2018) | A Survey on Search Engine Optimization and Google’s Search Engine Algorithms | Abstract |
R. Santhosh, I. S. Suhail | ||
Vol 3, No 2 (2015) | A System Architecture for Data Storage in the Cloud | Abstract |
Maryam Hammami, Hatem Bellaaj | ||
Vol 3, No 2 (2015) | About Cloud Forensics:Challenges and Solutions | Abstract |
Vaithianathan Geetha | ||
Vol 5, No 1 (2017) | Adoption of Cloud Computing in Nepal | Abstract |
Gajendra Sharma | ||
Vol 9, No 1 (2021) | Amazon EC2 Locations for Spot Pricing - A Hierarchical Clustering Approach | Abstract |
Veena Khandelwal, Shantanu Khandelwal | ||
Vol 1, No 2 (2013) | An Additional Security Layer in the Implementation of SaaS (Software as a Service) - A Survey | Abstract |
Laxmi Arun, V. L. Divyalakshmi, P. Sharmila, S. Rakshitha, Amith Jacob | ||
Vol 6, No 2 (2018) | An Approach Towards the Fog Computing:Stretching Cloud Computing and Internet of Things | Abstract |
Bhoomi Shah, Hetal Bhavsar | ||
Vol 3, No 1 (2015) | An Enhanced Cloud Security Using Quantum Teleportation | Abstract PDF |
D. Sowmya, S. Sivasankaran | ||
Vol 1, No 1 (2013) | Analysis and Development of Load Balancing Framework for EyeOS | Abstract |
A.M. Gosai, Rushi R. Raval | ||
Vol 2, No 2 (2014) | Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Abstract |
Hazem A. Elbaz, Mohammed H. Abd-Elaziz, Taymoor M. Nazmy | ||
Vol 7, No 1 (2019) | Archiving-As-A-Service:A Comprehensive Reference Architecture Using Cloud Computing to Monitor and Supervise the Archive Documents from Long Term Point of View | Abstract |
A. H. Shanthakumara, N. R. Sunitha | ||
Vol 3, No 1 (2015) | Automation of Discovery and Aggregation of Cloud Services | Abstract PDF |
Sreedevi R. Nagarmunoli, Nandini S. Sidnal | ||
Vol 3, No 2 (2015) | Big Data Privacy Preservation Using Two Phase Top-Down Specialization Algorithm with Multidimensional Map Reduce Framework on Hadoop | Abstract |
S. Shalin Eliabeth, S. Sarju | ||
Vol 5, No 1 (2017) | BigData Analytical Challenges with IOT | Abstract |
Lalitha Balla, Chavva Ravi Kishore Reddy, A. V. L. N. Sujith | ||
Vol 2, No 2 (2014) | Cloud Based Information Management System Model for Rural Health Care in India | Abstract |
Kalpana Chaudhari, P. T. Karule | ||
Vol 4, No 2 (2016) | Cloud Computing Implementation:An Analysis using Systems Approach | Abstract |
Abhinav Pandey | ||
Vol 7, No 1 (2019) | Cloud Optimized Eclat Growth (COEG) Using Fuzzy Logic | Abstract |
Priya Vaithiyanathan, S. Murugan | ||
Vol 7, No 1 (2019) | Cloud Security Framework:VM Features Based Intrusion Detection System | Abstract |
Yakuta Tayyebi, D. S. Bhilare | ||
Vol 3, No 1 (2015) | Cloud Services:Application and its Use in Information Science | Abstract PDF |
Shahkar Riyaz Tramboo | ||
1 - 25 of 77 Items | 1 2 3 4 Next Last |
Browse Title Index
Scroll