S.No |
Contents |
1 |
An Novel Automated Optimal Resource Allocation procurement Scheme and Elliptic Curve Cryptography En
Authors : N. NAGALAKSHMI, Dr.S.RAJALAKSHMI
|
2 |
Deadline Based Task Scheduling in Cloud with Effective Provisioning Cost using LBMMC Algorithm
Authors : Ms.K.Sathya, Dr.S.Rajalakshmi
|
3 |
Data Integration of Distributed Data Using Secure Two Party Algorithm
Authors : Mr.K.Thambi Prbhakaran, Ms.P.Mallika, ME
|
4 |
Improved Secure Access Control in Cloud Using Sign Based Ciphertext-Policy Attribute-Based Encryptio
Authors : Ms.P.Vijaya, Mrs.P.MallikaME
|
5 |
SYSTEM CONFIGURATION AND SCHEDULING IN WIRELESS NETWORKS USING OPTIMIZATION DECOMPOSITION
Authors : Ms.KAVITHA.V.KAKADE, Ms.C.APARNA
|
6 |
TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA
Authors : Mrs.B.Jeeva, Dr.S.Rajalakshmi
|
7 |
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Authors : Mrs.K.Saranya, Dr.S.Rajalakshmi
|
8 |
RELIABLE DEADLINE-DRIVEN RESOURCE ALLOCATION FOR CLOUD SYSTEM REDUCING USER PAYMENT
Authors : Ms.V.SATHYA DEVI, M.E., (CSE), Ms.A.GOKILAVANI,M.E.,(Ph.D).,
|
9 |
Pricing Cloud Bandwidth Reservation Under Demand Uncertainty
Authors : Mr.K Karthikeyan, Dr.T.Senthil Prakash, Mr.S.Prakadeswaran, M.E.,
|
10 |
Data Redundancy and Compression Methods for a Disk-Based Network Backup System
Authors : Mr.G.S.Karmukilan, Dr.T.Senthil prakesh, Mr.J.Senthil
|
11 |
An Efficient Map Reduce Task Scheduling and Micro-Partitioning Mechanism for Optimizing Large Data A
Authors : Ms.N.Saranya, Mr.T.Yoganandh M.E.,
|
12 |
Utility based User Preference Resource Selection based Collaborative Cloud Computing (CCC)
Authors : Mrs.K.M.Thilagavathi, Mr.T.Seenivasan
|
13 |
PROVIDING SECURITY FOR NETWORK DATA STREAMS FROM ANOMALY DETECTION
Authors : Bhavani. P, M.Latha
|
14 |
Enhanced Synergetic Attraction Revelation for Mobile Ad Hoc Networks
Authors : Rakesh Kumar ER
|
15 |
Automated Technique for detecting and preventing SQL Injection in stored procedure
Authors : Mr.K.Kodeswaran, Dr.T.Senthil Prakash, Mrs.P.V.Jothikantham
|
16 |
Evaluation of Performance and Cost of an Adaptive Encryption Architecture in Cloud
Authors : P.Gowthaman, S.Thiruvenkatasamy
|
17 |
Moderate Denial-of-Service attack detection based on Distance flow and Trace back Routing
Authors : Vinish Alikkal, Dr.T.Senthil Prakash, D.Yuvraj
|
18 |
A STUDY ON QUALITY OF WORK LIFE LEADS ORGANIZATION RESILIENCE IN AUTOMOBILE INDUSTRY WITH SPECIAL RE
Authors : Dr.K Jawahar Rani, Mr.T.Chandrasekar, Ms.T.Shanmugapriya
|
19 |
Design and Analysis of a Highly Reliable and Secure Method for Authentication
Authors : Ms.S.RAGADHARSINI, M.E., (CSE), Mr.T.YOGANANDH M.E
|
20 |
A Novel Approach for Travel Package Recommendation Using Cock Tail Algorithm
Authors : Ms.R.PRIYANKA, M.E.,(CSE), Mr.T.YOGANANDH M.E.,
|
21 |
TOP K RESULT RETRIEVAL IN SEARCHING THE FILE OVER THE ENCRYPTED DATA IN CLOUD
Authors : Ms.T.Anusuyadevi, Mrs.A.Gokilavani B.Tech, ME.
|
22 |
COMPARISON THE DEVELOPMENT OF POLYCRYSTALLINE THIN-FILM CU(IN,GA)SE2 SOLAR CELLS AND CDTE SOLAR CELL
Authors : Stephen Raja John Britto
|
23 |
CLASSIFICATION OF RICE PLANT LEAF DISEASES USING FEATURE MATCHING
Authors : Dr.C.Kumar Charliepaul
|
24 |
A NEW INTELLIGENT REMOTE CONTROL SYSTEM FOR HOME AUTOMATION AND REDUCE ENERGY CONSUMPTION
Authors : Dr.C.Kumar Charliepaul, K.Megala Devi
|