Search
Now showing items 1-10 of 14
SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter
(Publishing India, 2014)
The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
Comparison of classification techniques for intrusion detection dataset using WEKA
(Institute of Electrical and Electronics Engineers Inc., 2014)
As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
Behavior analysis of LEACH protocol
(Institute of Electrical and Electronics Engineers Inc., 2014)
A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
A review of De-facto MAC standard: IEEE 802.11 DCF
(Institute of Electrical and Electronics Engineers Inc., 2014)
Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by ...
Mobility model based performance analysis of DSDV mobile ad hoc routing protocol
(Institute of Electrical and Electronics Engineers Inc., 2014)
Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the ...
A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
(IJRET, 2014)
Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified ...
AODV Based Congestion Control Protocols: Review
(IJCSIT, 2014)
Ad- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They ...
Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
(IJCSIT, 2014)
Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users ...
Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing
(IASIR, 2014)
Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means ...
Impact of Denial of Service Attack on the Virtualization in Cloud Computing
(2014)
Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing ...