Classification of Software Quality Attributes for Service Oriented Architecture (Englisch)
- Neue Suche nach: Kumar, Satish
- Neue Suche nach: Singh, Neeta
- Neue Suche nach: Kumar, Anuj
- Neue Suche nach: Kumar, Satish
- Neue Suche nach: Singh, Neeta
- Neue Suche nach: Kumar, Anuj
In:
High Performance Architecture and Grid Computing
1
;
46-51
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Classification of Software Quality Attributes for Service Oriented Architecture
-
Beteiligte:
-
Erschienen in:High Performance Architecture and Grid Computing , 1 ; 46-51Communications in Computer and Information Science ; 169, 1 ; 46-51
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Era of Cloud ComputingJoshi, Pramod Kumar / Rana, Sadhana et al. | 2011
- 9
-
An Overview on Soft Computing TechniquesRao, K. Koteswara / SVP Raju, G. et al. | 2011
- 24
-
A Novel Approach for Task Processing through NEST Network in a GridGupta, Tarun / Tyagi, Vipin et al. | 2011
- 30
-
TCP/IP Security Protocol Suite for Grid Computing ArchitectureKamra, Vikas / Chugh, Amit et al. | 2011
- 36
-
Security Issues in Cloud ComputingSharma, Pardeep / Sood, Sandeep K. / Kaur, Sumeet et al. | 2011
- 46
-
Classification of Software Quality Attributes for Service Oriented ArchitectureKumar, Satish / Singh, Neeta / Kumar, Anuj et al. | 2011
- 52
-
Energy Efficiency for Software and Services on the CloudBhati, Priyanka / Sharma, Prerna / Sharma, Avinash / Sutaria, Jatin / Hanumanthapa, M. et al. | 2011
- 56
-
Evaluation of Grid Middleware Frameworks for Execution of MPI ApplicationsJain, Abhishek / Vadhiyar, Sathish S. et al. | 2011
- 62
-
Virtualization as an Engine to Drive Cloud Computing SecurityJyoti, Snehi / Manish, Snehi / Rupali, Gill et al. | 2011
- 67
-
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control ProtocolKumar, Vinit / Agarwal, Ajay et al. | 2011
- 79
-
Efficient Task Scheduling Algorithms for Cloud Computing EnvironmentSindhu, S. / Mukherjee, Saswati et al. | 2011
- 84
-
“Cloud Computing: Towards Risk Assessment”Chhabra, Bharat / Taneja, Bhawna et al. | 2011
- 92
-
Efficient Grid Scheduling with CloudsYamini, L. / LathaSelvi, G. / Mukherjee, Saswati et al. | 2011
- 103
-
Security Concerns in Cloud ComputingKaur, Puneet Jai / Kaushal, Sakshi et al. | 2011
- 113
-
Cloud Computing – The FutureChawla, Vinay / Sogani, Prenul et al. | 2011
- 119
-
Cloud Computing: A Need for a Regulatory BodySingh, Bikramjit / Khanna, Rizul / Gujral, Dheeraj et al. | 2011
- 126
-
Clustering Dynamic Class Coupling Data to Measure Class Reusability PatternParashar, Anshu / Chhabra, Jitender Kumar et al. | 2011
- 131
-
Cloud Computing in Education: Make India Better with the Emerging TrendsManro, Sunita / Singh, Jagmohan / Manro, Rajan et al. | 2011
- 140
-
Enhancing Grid Resource Scheduling Algorithms for Cloud EnvironmentsKaur, Pankaj Deep / Chana, Inderveer et al. | 2011
- 145
-
Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa – A Comparative StudyGoyal, Sumit / Sharma, A. K. / Sharma, R. K. et al. | 2011
- 150
-
QoS for Grid SystemsVandana / Sehgal, Tamanna et al. | 2011
- 154
-
Creating Information Advantage in Cloudy WorldRavita, Chahar / Vikram, Mangla et al. | 2011
- 159
-
Design of CMOS Energy Efficient Single Bit Full AddersKumar, Manoj / Pandey, Sujata / Arya, Sandeep K. et al. | 2011
- 169
-
Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive AnalyticsPunjabi, Mamta / Kushwaha, Vineet / Ranjan, Rashmi et al. | 2011
- 179
-
Bio-enable Security for Operating System by Customizing GinaUbale, Swapnaja A. / Apte, S. S. et al. | 2011
- 186
-
A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous EnvironmentRajkumar, Sharma / Priyesh, Kanungo / Manohar, Chandwani et al. | 2011
- 192
-
Reliable Mobile Agent in Multi – Region Environment with Fault Tolerance for E-Service ApplicationsPrem, M. Vigilson / Swamynathan, S. et al. | 2011
- 201
-
Composition of Composite Semantic Web Services Using Abductive Event CalculusPaulraj, D. / Swamynathan, S. et al. | 2011
- 214
-
Ant Colony Optimization Based Congestion Control Algorithm for MPLS NetworkRajagopalan, S. / Naganathan, E. R. / Raj, P. Herbert et al. | 2011
- 224
-
Low Power Optimized Array Multiplier with Reduced AreaDevi, Padma / Singh, Gurinder pal / singh, Balwinder et al. | 2011
- 233
-
Simulink Library Development and Implementation for VLSI Testing in MatlabSingh, Gurinder Pal / Singh, Balwinder et al. | 2011
- 241
-
Processing of Image Data Using FPGA-Based MicroBlaze CoreSamanta, Swagata / Paik, Soumi / Gangopadhyay, Shreedeep / Chakrabarti, Amlan et al. | 2011
- 247
-
Parametric Analysis of Zone Routing ProtocolAstya, Rani / Nand, Parma / Sharma, S. C. et al. | 2011
- 252
-
Vision of 5G CommunicationSiddiqui, Mohd. Maroof et al. | 2011
- 257
-
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet TransformAhmad, Musheer / Farooq, Omar et al. | 2011
- 265
-
Computational Analysis of Availability of Process Industry for High PerformanceShakuntla / Lal, A. K. / Bhatia, S. S. et al. | 2011
- 275
-
A Preprocessing Technique for Recognition of Online Handwritten Gurmukhi NumeralsBawa, Rajesh Kumar / Rani, Rekha et al. | 2011
- 282
-
A Framework for Vulnerability Analysis during Software MaintenanceChhabra, Jitender Kumar / Prajapati, Amarjeet et al. | 2011
- 288
-
Performance Optimization for Logs of ServersVedaprakash, M. / Alavala, Ramakrishna / Desai, Veena R. et al. | 2011
- 293
-
Ontology Based Information Retrieval for Learning Styles of Autistic PeopleGupta, Sanchika / Garg, Deepak et al. | 2011
- 299
-
Analyze the Performance of New Edge Web Application’s over N-Tiers Layer ArchitectureSingh, Pushpendra Kumar / Gupta, Prabhakar / Bedi, S. S. / Singh, Krishna et al. | 2011
- 306
-
Self-Configurable Scheduling Algorithm for Heterogeneous Computing SystemsPrashanthRao, A. / Govardhan, A. et al. | 2011
- 316
-
Performance Analysis of Proposed MAES Cryptographic TechniquesKalra, Richa / Singhal, Ankur / Kaler, Rajneesh / Singhal, Promila et al. | 2011
- 322
-
Analysis of Core-Level Scale-Out Efficiency for OpenMP Programs on Multi-core ProcessorsDoroodian, Sareh / Ghaemian, Nima / Sharifi, Mohsen et al. | 2011
- 327
-
SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web ServicesShanmughaneethi, V. / Pravin, Ra. Yagna / Shyni, C. Emilin / Swamynathan, S. et al. | 2011
- 338
-
Analysis and Study of Incremental K-Means Clustering AlgorithmChakraborty, Sanjay / Nagwani, N. K. et al. | 2011
- 342
-
Computational Model for Prokaryotic and Eukaryotic Gene PredictionKaur, Sandeep / Sheetal, Anu / Singh, Preetkanwal et al. | 2011
- 349
-
Detection of Malicious Node in Ad Hoc Networks Using Statistical Technique Based on CPU UtilizationSharma, Deepak / Prashar, Deepak / Salaria, Dalwinder Singh / Geetha, G. et al. | 2011
- 357
-
Optimum Controller for Automatic Generation ControlAgnihotri, Rahul / Brar, Gursewak Singh / Sharma, Raju et al. | 2011
- 364
-
Abstraction of Design Information from Procedural ProgramKulkarni, R. N. / Aruna, T. / Amrutha, N. et al. | 2011
- 373
-
Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent InterfaceSingh, Aarti / Juneja, Dimple / Sharma, A. K. et al. | 2011
- 385
-
Autonomous Robot Motion Control Using Fuzzy PID ControllerSood, Vaishali et al. | 2011
- 391
-
A Multiresolution Technique to Despeckle Ultrasound ImagesKaur, Parvinder / Singh, Baljit et al. | 2011
- 397
-
Design and Analysis of the Gateway Discovery Approaches in MANETMajumder, Koushik / Ray, Sudhabindu / Sarkar, Subir Kumar et al. | 2011
- 406
-
Wireless Sensor Network Security Research and Challenges: A BackdropJuneja, Dimple / Sharma, Atul / Sharma, A. K et al. | 2011
- 417
-
Automated Test Case Generation for Object Oriented Systems Using UML Object DiagramsPrasanna, M. / Chandran, K. R. et al. | 2011
- 424
-
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO)Singh, Tanu Preet / Kaur, Manmeet / Sharma, Vishal et al. | 2011
- 430
-
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing EnvironmentsSharma, Bharti / Bhatia, Rabinder Singh / Singh, Awadhesh Kumar et al. | 2011
- 435
-
Analysis of Digital Forensic Tools and Investigation ProcessYadav, Seema / Ahmad, Khaleel / Shekhar, Jayant et al. | 2011
- 442
-
Evaluation of Normalized Routing Load for MANETTaneja, Sunil / Kush, Ashwani et al. | 2011
- 449
-
Reliabilty and Performance Based Resource Selection in Grid EnvironmentBawa, Rajesh Kumar / Sharma, Gaurav et al. | 2011
- 455
-
Elliptic Curve Cryptography: Current Status and Research ChallengesKalra, Sheetal / Sood, Sandeep K. et al. | 2011
- 461
-
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor NetworksBanerjee, Indrajit / Chanak, Prasenjit / Rahaman, Hafizur et al. | 2011
- 470
-
Study and Analysis of Incremental Apriori AlgorithmSharma, Neeraj Kumar / Nagwani, N. K. et al. | 2011
- 473
-
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony SystemMohan, B. Chandra / Baskaran, R. et al. | 2011
- 485
-
Implementing Key Management for Security in Ad Hoc NetworkSharma, Avinash / Agarwal, Narendra / Roy, Satyabrata / Sharma, Ajay / sharma, Pankaj et al. | 2011
- 490
-
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLANSharma, Vishal / Malhotra, Jagjit / Singh, Harsukhpreet et al. | 2011
- 497
-
Key Authentication for MANET SecurityKumar, Vijay / Sharma, Rakesh / Kush, Ashwani et al. | 2011
- 505
-
Biometric Encryption: Combining Fingerprints and CryptographyAhuja, Mini Singh / Chabbra, Sumit et al. | 2011
- 515
-
Node Architectures and Its Deployment in Wireless Sensor Networks: A SurveyKushwaha, Sumit / Kumar, Vinay / Jain, Sanjeev et al. | 2011
- 527
-
New Innovations in Cryptography and Its ApplicationsSharma, Saurabh / Mishra, Neeraj Kumar et al. | 2011
- 539
-
Competitive Equilibrium Theory and Its Applications in Computer ScienceRekha, J. Ujwala / Chatrapati, K. Shahu / Babu, A. Vinaya et al. | 2011
- 548
-
A Novel Approach for Information Dissemination in Vehicular NetworksKumar, Rakesh / Dave, Mayank et al. | 2011
- 557
-
Understanding the Generation of Cellular TechnologiesSandhu, Manjit / Kaur, Tajinder / Chander, Mahesh / Bala, Anju et al. | 2011
- 568
-
Evaluation of Routing Schemes for MANETSingh, Sima / Kush, Ashwani et al. | 2011
- 574
-
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc NetworksGupta, Sonia / Bharti, P. K. / Choudhary, Vishal et al. | 2011
- 580
-
Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor NetworksKalyani, P. / Chellappan, C. et al. | 2011
- 588
-
Simulative Analysis of Bidirectional WDM/TDM-PON Using NRZ and RZ Downstream Signals and Narrowband AWGRajniti / Anita, Suman / Anu, Sheetal / Parveen, Kumar et al. | 2011
- 594
-
Data Mining Techniques for Prefetching in Mobile Ad Hoc NetworksChauhan, Naveen / Awasthi, L. K. / Chand, Narottam et al. | 2011
- 603
-
An Image Steganography Approach Based upon MatchingKaur, Sukhpreet / Kaur, Sumeet et al. | 2011
- 609
-
From Calculus to Number Theory, Paves Way to Break OSS SchemeGeetha, G. / Saruchi et al. | 2011
- 612
-
Digital Image Watermarking Technique Based on Dense DescriptorWalia, Ekta / Suneja, Anu et al. | 2011
- 617
-
Novel Face Detection Using Gabor Filter Bank with Variable ThresholdSuri, P. K. / Ekta, Walia / Amit, Verma et al. | 2011
- 626
-
When to Stop TestingJangra, Ajay / Singh, Gurbaj / Kant, Chander / Priyanka et al. | 2011
- 631
-
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)Jangra, Ajay / Goel, Nitin / Kant, Chander / Priyanka et al. | 2011
- 640
-
Agile Software: Ensuring Quality Assurance and ProcessesSingh, Narinder Pal / Soni, Rachna et al. | 2011
- 649
-
Measure Complexity in Heterogeneous SystemSharma, Kuldeep et al. | 2011