Table of Contents
Articles
| An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing |
PDF
|
| S.R. Nayana, G. VenifaMini, J.Jeya A Celin | 147-152 |
| VM Inclusive MeBaSA for Virtualized Multi-tier Cloud |
PDF
|
| Ramesh D. Kodi, M. Balavaishnavi | 153-162 |
| Efficient Resource Provisioning using RTUOP Algorithm in Cloud Computing |
PDF
|
| M. Revatheeswari, P. Saranya | 163-167 |
| Paper Framework for Power Aware Scheduling in Cloud Environment |
PDF
|
| Abdul Nasar Kaipancherry, Dr.K. Najeeb | 168-174 |
| An Enhanced Framework Model for Secure Key Management in Stream Control Transmission Protocol |
PDF
|
| P. Venkadesh, Dr.Julia Punitha Malar Dhas, S.V. Divya | 175-181 |
| Source Layer Group Aggregation for Balanced Traversing |
PDF
|
| S.T. Padmapriya, J. Deepika | 182-189 |
| A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing |
PDF
|
| K. Bhuvaneshwari, O.G. Harini Vardhan | 190-194 |
| Implementing ABSM Protocol for VANET |
PDF
|
| M.S. Bagavathiammal, P. Sivaraman | 195-199 |
| Penalty Model for SLA Architecture in Cloud |
PDF
|
| S. Absa, Shajulin Benedict | 200-206 |
| A Novel Approach for Load Balancer in SIP Clusters |
PDF
|
| K. Anandhan, V.K. Dinesh Prabu, Dr.C. Kumar | 207-213 |
| Network Reconfiguration of Distribution System Using Harmony Search Algorithm |
PDF
|
| T.D. Sudhakar | 214-221 |
| Securing Information using Cryptography and Steganography Technique |
PDF
|
| V. Hemanth, Mahammad Shareef | 222-226 |
| Improving Security and Verifiability of Stored Data in Cloud |
PDF
|
| N.H. Rajesh, Dr.S. Nagarajan | 227-231 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616