- » Front Page
- » Front Inner Page
- » ROPE: A Robust Order Preserving Re-Encryption Scheme For Mobile Cloud Environment
Dr.C.Sundar1, S Aarthi2 - » An Effective Attack Elimination Method For Top-K Query Processing In MANETS
S.Venkatesh Babu1, S.Afrose2, Dr.C.Kezi Selva Vijila3 - » A Survey On Redundant Elimination [Re] Protocol For Avoid Collusion Attack Video Delivery
Dr.C.Sundar1, L.Balakrishnan2 - » Interfacing Of Large Scale Specimen Testing Machines In Big Hospitals To HMS Software Using RS 232
AU Binu1, P. Ashly Angel2 - » Adaptive Cooperation Of Multiple Devices In Model Driven Development Patterns In Cloud
S.Dhana Shree Liviya1, P.Ashly Angel2 - » A Survey On Optimized Cloud Instance Management Strategies Using Amazon EC2
J.Febin1, Suma Sira Jacob2, Dr.Kezi Selva Vijila3 - » Comparative Study On Resource Allocation Methods In Cloud Computing
D.Dennis Ebenezer1, T. Karthika2 - » Secure Privacy Preserving Techniques In Smart Phones : A Review
M.Malinipriya1, P.Tharics2, M.Senthil Kumar3 - » A Survey On Ergodic Rating Prediction Using Sequence Classification
Dr.C.Sundar 1, L.Manjula2 - » End To End Security And Efficient Video Delivery In Encrypted Network Caching
R.Monisha Shambhavi1, P.Tharcis2 - » Enhancing Load Sharing (Elshare) Method In Mobile Cloud Computing Environment
A.Mumtaj1, Dr.S.Srinivasan2 - » Survey And Analysis On Data Security Issues For Users Exercising Cloud
R.Nagaraja Prabu1, S.Christina Magneta2 - » A Survey On Time Based Cloud Scheduling
J.NathiPriya1, Suma Sira Jacob2 - » A Survey On Lung Segmentation Techniques
R.Shiny Angel1, P.Tharcis2 - » A Survey On Data Partitioning And Cluster Ensemble Techniques
D.Dennis Ebenezer1, M. Suganya2 - » A Survey on Energy-Aware Resource Allocation Method for Scientific Workflow Executions In Cloud Environment.html
J.Sowmiya1, S.Christina Magneta2 - » Survey on Efficient And Enhanced Resource Allocation For Scientific Workflow Executions in Cloud Environment
D.Dennis Ebenezer1, Siva Chandran2 - » Survey on Network Defence System [NDS] For Cryptography and Hybrid Network Security System
S.Venkateshbabu1, R.Kartheeswaran2 - » Back Inner Page - Call for Paper Next Issue
- » Back Cover