Cloud Computing: Towards Risk Assessment (English)
- New search for: Chhabra, B.
- New search for: Taneja, B.
- New search for: Chhabra, B.
- New search for: Taneja, B.
- New search for: Mantri, A.
In:
High Performance Architecture and Grid Computing; HPAGC 2011
169
;
84-91
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Cloud Computing: Towards Risk Assessment
-
Contributors:
-
Conference:Conference, High Performance Architecture and Grid Computing; HPAGC 2011 ; 2011 ; Chandigarh, India
-
Published in:COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE , 169 ; 84-91
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2011-01-01
-
Size:8 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Era of Cloud ComputingJoshi, P.K. / Rana, S. et al. | 2011
- 9
-
An Overview on Soft Computing TechniquesRao, K.K. / Raju, G.S.V.P. et al. | 2011
- 24
-
A Novel Approach for Task Processing through NEST Network in a GridGupta, T. / Tyagi, V. et al. | 2011
- 30
-
TCP/IP Security Protocol Suite for Grid Computing ArchitectureKamra, V. / Chugh, A. et al. | 2011
- 36
-
Security Issues in Cloud ComputingSharma, P. / Sood, S.K. / Kaur, S. et al. | 2011
- 46
-
Classification of Software Quality Attributes for Service Oriented ArchitectureKumar, S. / Singh, N. / Kumar, A. et al. | 2011
- 52
-
Energy Efficiency for Software and Services on the CloudBhati, P. / Sharma, P. / Sharma, A. / Sutaria, J. / Hanumanthapa, M. et al. | 2011
- 56
-
Evaluation of Grid Middleware Frameworks for Execution of MPI ApplicationsJain, A. / Vadhiyar, S.S. et al. | 2011
- 62
-
Virtualization as an Engine to Drive Cloud Computing SecuritySnehi, J. / Snehi, M. / Gill, R. et al. | 2011
- 67
-
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control ProtocolKumar, V. / Agarwal, A. et al. | 2011
- 79
-
Efficient Task Scheduling Algorithms for Cloud Computing EnvironmentSindhu, S. / Mukherjee, S. et al. | 2011
- 84
-
Cloud Computing: Towards Risk AssessmentChhabra, B. / Taneja, B. et al. | 2011
- 92
-
Efficient Grid Scheduling with CloudsYamini, L. / LathaSelvi, G. / Mukherjee, S. et al. | 2011
- 103
-
Security Concerns in Cloud ComputingKaur, P.J. / Kaushal, S. et al. | 2011
- 113
-
Cloud Computing - The FutureChawla, V. / Sogani, P. et al. | 2011
- 119
-
Cloud Computing: A Need for a Regulatory BodySingh, B. / Khanna, R. / Gujral, D. et al. | 2011
- 126
-
Clustering Dynamic Class Coupling Data to Measure Class Reusability PatternParashar, A. / Chhabra, J.K. et al. | 2011
- 131
-
Cloud Computing in Education: Make India Better with the Emerging TrendsManro, S. / Singh, J. / Manro, R. et al. | 2011
- 140
-
Enhancing Grid Resource Scheduling Algorithms for Cloud EnvironmentsKaur, P.D. / Chana, I. et al. | 2011
- 145
-
Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative StudyGoyal, S. / Sharma, A.K. / Sharma, R.K. et al. | 2011
- 150
-
QoS for Grid SystemsVandana / Sehgal, T. et al. | 2011
- 154
-
Creating Information Advantage in Cloudy WorldChahar, R. / Mangla, V. et al. | 2011
- 159
-
Design of CMOS Energy Efficient Single Bit Full AddersKumar, M. / Pandey, S. / Arya, S.K. et al. | 2011
- 169
-
Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive AnalyticsPunjabi, M. / Kushwaha, V. / Ranjan, R. et al. | 2011
- 179
-
Bio-enable Security for Operating System by Customizing GinaUbale, S.A. / Apte, S.S. et al. | 2011
- 186
-
A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous EnvironmentRajkumar, S. / Priyesh, K. / Manohar, C. et al. | 2011
- 192
-
Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service ApplicationsPrem, M.V. / Swamynathan, S. et al. | 2011
- 201
-
Composition of Composite Semantic Web Services Using Abductive Event CalculusPaulraj, D. / Swamynathan, S. et al. | 2011
- 214
-
Ant Colony Optimization Based Congestion Control Algorithm for MPLS NetworkRajagopalan, S. / Naganathan, E.R. / Raj, P.H. et al. | 2011
- 224
-
Low Power Optimized Array Multiplier with Reduced AreaDevi, P. / Singh, G.P. / Singh, B. et al. | 2011
- 233
-
Simulink Library Development and Implementation for VLSI Testing in MatlabSingh, G.P. / Singh, B. et al. | 2011
- 241
-
Processing of Image Data Using FPGA-Based MicroBlaze CoreSamanta, S. / Paik, S. / Gangopadhyay, S. / Chakrabarti, A. et al. | 2011
- 247
-
Parametric Analysis of Zone Routing ProtocolAstya, R. / Nand, P. / Sharma, S.C. et al. | 2011
- 252
-
Vision of 5G CommunicationSiddiqui, M.M. et al. | 2011
- 257
-
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet TransformAhmad, M. / Farooq, O. et al. | 2011
- 265
-
Computational Analysis of Availability of Process Industry for High PerformanceShakuntla / Lal, A.K. / Bhatia, S.S. et al. | 2011
- 275
-
A Preprocessing Technique for Recognition of Online Handwritten Gurmukhi NumeralsBawa, R.K. / Rani, R. et al. | 2011
- 282
-
A Framework for Vulnerability Analysis during Software MaintenanceChhabra, J.K. / Prajapati, A. et al. | 2011
- 288
-
Performance Optimization for Logs of ServersVedaprakash, M. / Alavala, R. / Desai, V.R. et al. | 2011
- 293
-
Ontology Based Information retrieval for Learning Styles of Autistic PeopleGupta, S. / Garg, D. et al. | 2011
- 299
-
Analyze the Performance of New Edge Web Application's over N-Tiers Layer ArchitectureSingh, P.K. / Gupta, P. / Bedi, S.S. / Singh, K. et al. | 2011
- 306
-
Self-Configurable Scheduling Algorithm for Heterogeneous Computing SystemsPrashanthRao, A. / Govardhan, A. et al. | 2011
- 316
-
Performance Analysis of Proposed Maes Cryptographic TechniquesKalra, R. / Singhal, A. / Kaler, R. / Singhal, P. et al. | 2011
- 322
-
Analysis of Core-Level Scale-Out Efficiency for OpenMP Programs on Multi-core ProcessorsDoroodian, S. / Ghaemian, N. / Sharifi, M. et al. | 2011
- 327
-
SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web ServicesShanmughaneethi, V. / Pravin, R.Y. / Shyni, C.E. / Swamynathan, S. et al. | 2011
- 338
-
Analysis and Study of Incremental K-Means Clustering AlgorithmChakraborty, S. / Nagwani, N.K. et al. | 2011
- 342
-
Computational Model for Prokaryotic and Eukaryotic Gene PredictionKaur, S. / Sheetal, A. / Singh, P. et al. | 2011
- 349
-
Detection of Malicious Node in Ad Hoc Networks Using Statistical Technique Based on CPU UtilizationSharma, D. / Prashar, D. / Salaria, D.S. / Geetha, G. et al. | 2011
- 357
-
Optimum Controller for Automatic Generation ControlAgnihotri, R. / Brar, G.S. / Sharma, R. et al. | 2011
- 364
-
Abstraction of Design Information From Procedural ProgramKulkarni, R.N. / Aruna, T. / Amrutha, N. et al. | 2011
- 373
-
Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent InterfaceSingh, A. / Juneja, D. / Sharma, A.K. et al. | 2011
- 385
-
Autonomous Robot Motion Control Using Fuzzy PID ControllerSood, V. et al. | 2011
- 391
-
A Multiresolution Technique to Despeckle Ultrasound ImagesKaur, P. / Singh, B. et al. | 2011
- 397
-
Design and Analysis of the Gateway Discovery Approaches in MANETMajumder, K. / Ray, S. / Sarkar, S.K. et al. | 2011
- 406
-
Wireless Sensor Network Security Research and Challenges: A BackdropJuneja, D. / Sharma, A. / Sharma, A.K. et al. | 2011
- 417
-
Automated Test Case Generation for Object Oriented Systems Using UML Object DiagramsPrasanna, M. / Chandran, K.R. et al. | 2011
- 424
-
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO)Singh, T.P. / Kaur, M. / Sharma, V. et al. | 2011
- 430
-
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing EnvironmentsSharma, B. / Bhatia, R.S. / Singh, A.K. et al. | 2011
- 435
-
Analysis of Digital Forensic Tools and Investigation ProcessYadav, S. / Ahmad, K. / Shekhar, J. et al. | 2011
- 442
-
Evaluation of Normalized Routing Load for MANETTaneja, S. / Kush, A. et al. | 2011
- 449
-
Reliability and Performance Based Resource Selection in Grid EnvironmentBawa, R.K. / Sharma, G. et al. | 2011
- 455
-
Elliptic Curve Cryptography: Current Status and Research ChallengesKalra, S. / Sood, S.K. et al. | 2011
- 461
-
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor NetworksBanerjee, I. / Chanak, P. / Rahaman, H. et al. | 2011
- 470
-
Study and Analysis of Incremental Apriori AlgorithmSharma, N.K. / Nagwani, N.K. et al. | 2011
- 473
-
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony SystemMohan, B.C. / Baskaran, R. et al. | 2011
- 485
-
Implementing Key Management for Security in Ad Hoc NetworkSharma, A. / Agarwal, N. / Roy, S. / Sharma, P. et al. | 2011
- 490
-
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLANSharma, V. / Malhotra, J. / Singh, H. et al. | 2011
- 497
-
Key Authentication for MANET SecurityKumar, V. / Sharma, R. / Kush, A. et al. | 2011
- 505
-
Biometric Encryption: Combining Fingerprints and CryptographyAhuja, M.S. / Chabbra, S. et al. | 2011
- 515
-
Node Architectures and Its Deployment in Wireless Sensor Networks: A SurveyKushwaha, S. / Kumar, V. / Jain, S. et al. | 2011
- 527
-
New Innovations in Cryptography and Its ApplicationsSharma, S. / Mishra, N.K. et al. | 2011
- 539
-
Competitive Equilibrium Theory and Its Applications in Computer ScienceRekha, J.U. / Chatrapati, K.S. / Babu, A.V. et al. | 2011
- 548
-
A Novel Approach for Information Dissemination in Vehicular NetworksKumar, R. / Dave, M. et al. | 2011
- 557
-
Understanding the Generation of Cellular TechnologiesSandhu, M. / Kaur, T. / Chander, M. / Bala, A. et al. | 2011
- 568
-
Evaluation of Routing Schemes for MANETSingh, S. / Kush, A. et al. | 2011
- 574
-
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc NetworksGupta, S. / Bharti, P.K. / Choudhary, V. et al. | 2011
- 580
-
Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor NetworksKalyani, P. / Chellappan, C. et al. | 2011
- 588
-
Simulative Analysis of Bidirectional WDM/TDM-PON Using NRZ and RZ Downstream Signals and Narrowband AWGRajniti / Suman, A. / Sheetal, A. / Kumar, P. et al. | 2011
- 594
-
Data Mining Techniques for Prefetching in Mobile Ad Hoc NetworksChauhan, N. / Awasthi, L.K. / Chand, N. et al. | 2011
- 603
-
An Image Steganography Approach Based upon MatchingKaur, S. et al. | 2011
- 609
-
From Calculus to Number Theory Paves Way to Break OSS SchemeGeetha, G. / Saruchi et al. | 2011
- 612
-
Digital Image Watermarking Technique Based on Dense DescriptorWalia, E. / Suneja, A. et al. | 2011
- 617
-
Novel Face Detection Using Gabor Filter Bank with Variable ThresholdSuri, P.K. / Walia, E. / Verma, A. et al. | 2011
- 626
-
When to Stop TestingJangra, A. / Singh, G. / Kant, C. / Priyanka et al. | 2011
- 631
-
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)Jangra, A. / Goel, N. / Kant, C. / Priyanka et al. | 2011
- 640
-
Agile Software: Ensuring Quality Assurance and ProcessesSingh, N.P. / Soni, R. et al. | 2011
- 649
-
Measure Complexity in Heterogeneous SystemSharma, K. et al. | 2011