|
Issue |
Title |
|
Vol 1, No 4 (2012) |
Evolution of Cloud Computing and Enabling Technologies |
Abstract
PDF
|
Rabi Prasad Padhy, Manas Ranjan Patra |
|
Vol 3, No 3 (2014) |
Exploring Different Architectures to Support Crop Farmers with a Mobile Application on Pesticide Control |
Abstract
PDF
|
Richard K Lomotey, Ralph Deters |
|
Vol 3, No 6 (2014) |
Factors Affecting the Adoption of Cloud Computing in the Government Sector: A Case Study of Saudi Arabia |
Abstract
PDF
|
Majed Alsanea, Jennifer Barth |
|
Vol 2, No 2 (2013) |
Factors Influencing Organization Adoption Decision On Cloud Computing |
Abstract
PDF
|
Ailar Rahimli |
|
Vol 2, No 4 (2013) |
Feasibility Analysis of Critical Factors Affecting Cloud Computing in Nigeria |
Abstract
PDF
|
Eustace M. Dogo, Abdulazeez Salami, Salim I. Salman |
|
Vol 3, No 5 (2014) |
Hadoop Distributed File System-Experiment and Analysis for Optimum Performance |
Abstract
PDF
|
Rajeev Kumar Gupta, R. K. Pateriya |
|
Vol 3, No 5 (2014) |
Impact of DOS Attacks on a Private Cloud and the FAPA Solution |
Abstract
PDF
|
Kazi Zunnurhain, Susan Vrbsky, Ragib Hasan |
|
Vol 2, No 6 (2013) |
INTEGRITY VERIFICATION IN MULTI-CLOUD BY USING PROVABLE DATA POSSESSION AND ALERT NOTIFICATION |
Abstract
PDF
|
Ms. V. Mangaiyarkkarasi, Mr. K. A.Dhamodaran |
|
Vol 1, No 4 (2012) |
Is cloud computing finally beginning to mature? |
Abstract
PDF
|
Dimitrios Zissis, Dimitrios Lekkas |
|
Vol 3, No 6 (2014) |
Library Cloud: Concept and Design with Security Features |
Abstract
PDF
|
Lokesh Kumar PM, N. Ch. S. N. Iyengar |
|
Vol 2, No 4 (2013) |
Medical Applications and Healthcare Based on Cloud Computing |
Abstract
PDF
|
Lidong Wang, Cheryl Ann Alexander |
|
Vol 1, No 2 (2012) |
Minimization of Delay for Query Processing in Peer to Peer Networks |
Abstract
PDF
|
U. V.Arivazhagu, Dr. S.Srinivasan |
|
Vol 1, No 4 (2012) |
More Practical Fully Homomorphic Encryption |
Abstract
PDF
|
Gu Chun-sheng, Wu Fang-sheng, Jing Zheng-jun, Yu Zhi-min |
|
Vol 1, No 1 (2012) |
Multi-Source Information Service (MSIS) Process Management In Cloud Computing Environment |
Abstract
PDF
|
Wenjuan Fan, Shanlin Yang |
|
Vol 1, No 1 (2012) |
New Federated Collaborative Networked Organization Model (FCNOM) |
Abstract
PDF
|
Morcous M. Yassa, Hesham A. Hassan, Fatma A. Omara |
|
Vol 2, No 1 (2013) |
Object-Relational Mapping Framework to Enable Multi- Tenancy Attributes in SaaS Applications |
Abstract
PDF
|
Arsalan Shahid, Muhammad Naeem Ahmed Khan |
|
Vol 2, No 1 (2013) |
On Fully Homomorphic Encryption, Approximate Lattice Problem and LWE |
Abstract
PDF
|
Gu Chun-sheng, Wu Fang-sheng |
|
Vol 2, No 4 (2013) |
OPENICRA: Towards A Generic Model for Automatic Deployment and Hosting of Applications in the Cloud |
Abstract
PDF
|
Gadhgadhi Ridha, Cheriet Mohamed, Kanso Ali, Saida Khazri |
|
Vol 2, No 3 (2013) |
Optimization of QoS parameters through flexible Resource Scheduling in Finite Population Cloud Environment |
Abstract
PDF
|
Veena Goswami, Sudhansu Shekhar Patra, G. B. Mund |
|
Vol 2, No 6 (2013) |
Performance Evaluation of the CloudStack Private Cloud |
Abstract
PDF
|
Mumtaz M. Ali AL-Mukhtar, Asraa Abdulrazak Ali Mardan |
|
Vol 3, No 2 (2014) |
Performance Overhead Evaluation of Multi-cloud Computing with Secret Sharing approach Based Model |
Abstract
PDF
|
Mohammed A. AlZain, Ben Soh, Eric Pardede |
|
Vol 2, No 5 (2013) |
Prediction of Trustworthiness in the Cloud Computing Environment using Predator-Prey Model |
Abstract
PDF
|
S. B. Dash, H. Saini, T. C. Panda, A. Mishra |
|
Vol 1, No 3 (2012) |
Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis |
Abstract
PDF
|
G. Geethakumari, Abha Belorkar |
|
Vol 2, No 5 (2013) |
Resource Sharing in Libraries on Cloud Landscape: Potentials and Paradoxes |
Abstract
PDF
|
Mayank Yuvaraj |
|
Vol 2, No 4 (2013) |
Scalability Analysis of KVM-Based Private Cloud For IaaS |
Abstract
PDF
|
Fayruz Rahma, Teguh Bharata Adji, Widyawan Widyawan |
|
51 - 75 of 94 Items |
<< < 1 2 3 4 > >> |