![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
A Critique of Cloud Computing and its Security |
PDF
![]() |
Riyajuddin Y. Mujawar, Aiyeshabi S. Mulla | 257-260 |
Multimedia Access Community for Unstructured P2P Networks |
PDF
![]() |
M. Manikandaprabu, R. Gnanakumaran, R. Gopinath | 261-264 |
The Undo Sent E-Mail (USE) Protocol |
PDF
![]() |
K. Shanthi, A.P. Subapriya, R. Kalaivani | 265-269 |
Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems |
PDF
![]() |
Prasad Rayi, D. Madhusudan, Ch. Madhusudhan | 270-275 |
Truncated and Optimized Pilot-to-Data Power Ratio for MIMO-OFDM Systems |
PDF
![]() |
Prasad Rayi, T. Manikyala Rao, Ch. Madhu Sudhan | 276-282 |
Dynamic Allocation of Cloud Resources for Parallel Data Processing |
PDF
![]() |
C. Sreejith, J.P. Angel Rajula | 283-288 |
Security Issues Using Multi Clouds |
PDF
![]() |
R. Kavitha | 289-294 |
Black Hole Password Security |
PDF
![]() |
S. Lakshmi Prabha, D. Bhuvanesh, S. Dinakar, S. Rajaranganathan | 295-299 |
Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks |
PDF
![]() |
Dr.P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath | 300-307 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616