Abstract is missing.
- Empirical study of performance benefits of hardware assisted virtualizationRajeshwari Ganesan, Yogesh Murarka, Santonu Sarkar, Kristoffer Frey. 1 [doi]
- AtDRM: a DRM architecture with rights transfer and revocation capabilityRicha Garg, Ravi Sankar Veerubhotla, Ashutosh Saxena. 2 [doi]
- A comparative study of Monte Carlo methods to compute rare event probabilities of failure in reliability modelsGopichand Agnihotram, Hari Manassery Koduvely. 3 [doi]
- Uncoupling of mobile cloud computing architecture using tuple space: modeling and reasoningSabyasachi Abadhan, Sohini De, Suddhasil De. 4 [doi]
- An integrated framework for enhancing privacy in online social networksAshutosh Saxena, Ina Jain, M. Choudary Gorantla. 5 [doi]
- How many researchers does it take to make impact?: mining software engineering publication data for collaboration insightsSubhajit Datta, Santonu Sarkar, A. S. M. Sajeev, Nishant Kumar. 6 [doi]
- Upgradation of business applications with autonomic computingDevasia Kurian, Pethuru Raj Chelliah. 7 [doi]
- LibRe: a consistency protocol for modern storage systemsSathiya Prabhu Kumar, Raja Chiky, Sylvain Lefebvre, Eric Gressier-Soudan. 8 [doi]
- Improving security and efficiency of time-bound access to outsourced dataNaveen Kumar 0011, Anish Mathuria, Manik Lal Das, Kanta Matsuura. 9 [doi]
- Nearest neighbour based social recommendation using heat diffusionJithin Justin, A. S. Ajeena Beegom. 10 [doi]
- Durable data storage in distributed non persistent caching environmentDeep Parekh, Sanjay Chaudhary. 11 [doi]
- Graph based techniques for user personalization of news streamsSaurabh Kumar, Mayank Kulkarni. 12 [doi]
- Generating topic maps from XML/XSD documentsSuman Roy, Kiran Prakash Sawant, Olivier Maurice Charvin. 13 [doi]
- A data-centric heuristic for Hadoop provisioning in the cloudAllahbaksh M. Asadullah, Nikita Jain 0001, Kanika Kapoor, Hajar Falih. 14 [doi]
- Modeling and analysis of internet key exchange protocolv2 and a proposal for its variantHasmukh Patel, Devesh C. Jinwala. 15 [doi]
- Feature selection for detection of peer-to-peer botnet trafficPratik Narang, Jagan Mohan Reddy, Chittaranjan Hota. 16 [doi]
- A ranking algorithm for online social network searchDivya Sharma, Akz Alam, Parthasarathi Dasgupta, Debashis Saha. 17 [doi]
- SLA achievement by negotiation in a cloudS. Jaya Nirmala, Shah Maulik, S. Mary Saira Bhanu. 18 [doi]
- An alternate line drawing algorithm on hexagonal gridPrabukumar Manoharan, Bimal Kumar Ray. 19 [doi]
- Fine grain thread scheduling on multicore processors: cores with multiple functional unitsMunish Bhatia, D. C. Kiran, J. P. Misra, S. Gurunarayanan. 20 [doi]
- Trends and research directions for privacy preserving approaches on the cloudTanmay Sinha, Vrns Srikanth, Mangal Sain, Hoon Jae Lee. 21 [doi]
- Study of the effect of a rule based classifier modeled anti-corruption body in a neural network based environmentPraveen Ranjan Srivastava, Rahul Kapoor, Rajat Gupta. 22 [doi]
- Rough intuitionistic fuzzy C-means algorithm and a comparative analysisRohan Bhargava, Balakrushna Tripathy, Anurag Tripathy, Rajkamal Dhull, Ekta Verma, P. Swarnalatha. 23 [doi]
- Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulationMary A. Geetha, Debi Prasanna Acharjya, N. Ch. Sriman Narayana Iyengar. 24 [doi]