Table of Contents
Articles
| Heuristics Based Survey on Workflow Scheduling in Computational Grids |
PDF
|
| E. Saravana Kumar, A. Sumathi | 82-86 |
| Virtual Environment Security - Considerations & Practices |
PDF
|
| S. Ranjitha Kumari, V. Kathiresan | 87-92 |
| Optimal Path Energy Efficient Routing Algorithm for Wireless Sensor Networks |
PDF
|
| K.S. Shivaprakasha, Muralidhar Kulkarni, Pravin Kumar, Santosh Kumar Singh | 93-98 |
| Adaptive Network Topology Acquisition (A-NTA) Algorithm in IEEE 802.16j Non-Transparent Mode Relay Networks |
PDF
|
| D. Satish Kumar, Dr.N. Nagarajan | 99-104 |
| An Efficient Topology Construction for Wireless Mesh Networks with Reduced Cost, Energy and Interference |
PDF
|
| V. Anuratha, Dr.P. Sivaprakasam | 105-110 |
| Investigation on Heterogeneous Power line Communication for Home Area Networking |
PDF
|
| A. Rajesh, R. Nakkeeran | 111-120 |
| A Survey on Mobile Agents Based Load Balancing Based in Distributed Web Servers |
PDF
|
| M. Aramudhan | 121-127 |
| A Novel Trust Based Job Replication for A Global Scale Grid Environment |
PDF
|
| Asir Asir, Shamila Ebenezer, Daniel Daniel | 128-131 |
| A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain |
PDF
|
| N. Arumugam, Dr.C. Venkatesh | 132-135 |
| SAMON - C: Sensor Access and Monitoring in Cloud Environment |
PDF
|
| R.S. Ponmagal, Dr.J. Raja | 136-144 |
| Fault-Tolerant Scheduling Techniques for Computational Grid |
PDF
|
| S. Uma Maheswari, A. Shamila Ebenezer | 145-151 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616