Vol 5, No 4 (2013)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing PDF
S.R. Nayana, G. VenifaMini, J.Jeya A Celin 147-152
VM Inclusive MeBaSA for Virtualized Multi-tier Cloud PDF
Ramesh D. Kodi, M. Balavaishnavi 153-162
Efficient Resource Provisioning using RTUOP Algorithm in Cloud Computing PDF
M. Revatheeswari, P. Saranya 163-167
Paper Framework for Power Aware Scheduling in Cloud Environment PDF
Abdul Nasar Kaipancherry, Dr.K. Najeeb 168-174
An Enhanced Framework Model for Secure Key Management in Stream Control Transmission Protocol PDF
P. Venkadesh, Dr.Julia Punitha Malar Dhas, S.V. Divya 175-181
Source Layer Group Aggregation for Balanced Traversing PDF
S.T. Padmapriya, J. Deepika 182-189
A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing PDF
K. Bhuvaneshwari, O.G. Harini Vardhan 190-194
Implementing ABSM Protocol for VANET PDF
M.S. Bagavathiammal, P. Sivaraman 195-199
Penalty Model for SLA Architecture in Cloud PDF
S. Absa, Shajulin Benedict 200-206
A Novel Approach for Load Balancer in SIP Clusters PDF
K. Anandhan, V.K. Dinesh Prabu, Dr.C. Kumar 207-213
Network Reconfiguration of Distribution System Using Harmony Search Algorithm PDF
T.D. Sudhakar 214-221
Securing Information using Cryptography and Steganography Technique PDF
V. Hemanth, Mahammad Shareef 222-226
Improving Security and Verifiability of Stored Data in Cloud PDF
N.H. Rajesh, Dr.S. Nagarajan 227-231


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616