Vol 7, No 8 (2015)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System PDF
Dipti Balasaheb Bansode, Amar Buchade 317-320
Performance Evaluation of Wireless Networks PDF
R. C. Jaiswal, S. V. Mitkari, S. D. Lokhande 321-325
An Approach for Scaling Resources for Applications in Cloud PDF
Ankita A. Rathor, Amar Buchade 326-330
Privacy Preserving and Data Security Using Anonymous Cloud and RSA PDF
P. Kharat, A. Buchade 331-334
Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends PDF
S. EL- Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy 335-354
Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms PDF
Dr.G. Usha, Dr.K. Mahalakshmi 355-360
A New Load Balancing Algorithm for Cloud Computing PDF
Younes Ranjbar, Ali Ghaffari 361-366
Analysis and Impacts on Dynamic Load Balancing Techniques in Networks PDF
N Baskar, A D. Bharath 367-369


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616