Table of Contents
Articles
| A Critique of Cloud Computing and its Security |
PDF
|
| Riyajuddin Y. Mujawar, Aiyeshabi S. Mulla | 257-260 |
| Multimedia Access Community for Unstructured P2P Networks |
PDF
|
| M. Manikandaprabu, R. Gnanakumaran, R. Gopinath | 261-264 |
| The Undo Sent E-Mail (USE) Protocol |
PDF
|
| K. Shanthi, A.P. Subapriya, R. Kalaivani | 265-269 |
| Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems |
PDF
|
| Prasad Rayi, D. Madhusudan, Ch. Madhusudhan | 270-275 |
| Truncated and Optimized Pilot-to-Data Power Ratio for MIMO-OFDM Systems |
PDF
|
| Prasad Rayi, T. Manikyala Rao, Ch. Madhu Sudhan | 276-282 |
| Dynamic Allocation of Cloud Resources for Parallel Data Processing |
PDF
|
| C. Sreejith, J.P. Angel Rajula | 283-288 |
| Security Issues Using Multi Clouds |
PDF
|
| R. Kavitha | 289-294 |
| Black Hole Password Security |
PDF
|
| S. Lakshmi Prabha, D. Bhuvanesh, S. Dinakar, S. Rajaranganathan | 295-299 |
| Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks |
PDF
|
| Dr.P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath | 300-307 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616