Search

Your search keyword '"Gaurav Raj"' showing total 28 results

Search Constraints

Start Over You searched for: Author "Gaurav Raj" Remove constraint Author: "Gaurav Raj" Topic computer.software_genre Remove constraint Topic: computer.software_genre
28 results on '"Gaurav Raj"'

Search Results

1. Trust Decision Model and Trust Evaluation Model for Quality Web Service Identification in Web Service Lifecycle Using QSW Data Analysis

2. Cloud based End to End Service Security

4. Performance Evaluation of AWS and IBM Cloud Platforms for Security Mechanism

5. Security Testing for Monitoring Web Service using Cloud

6. K-mean Clustering in Web Service Quality Datasets Using AWS and RapidMiner

7. Remote Health Monitoring System Using IoT

8. Effective Prediction in Amazon Web Service Based Clustered Data Using Artificial Neural Networks

9. Elastic Search in Cache Based Service Management for Healthcare Automation

10. Survey on Data Processing and Scheduling in Hadoop

11. Test Case Optimization and Prioritization of Web Service Using Bacteriologic Algorithm

12. Analysis of Quantum Cryptosystems Using Key Distribution and Attacking Strategies Over Security Protocols

13. FRAME: Framework for Real Time Analysis of Malware

14. Quality Analysis for Web Services Recommendation Using Functional and Non-Functional Requirement

15. An efficient survey to detect Alzheimer disease using data mining techniques

16. QoWS Analysis for Web Service Selection Using WS Monitoring Tool

17. Surveillance drone for disaster management and military security

18. Security Testing of Web Applications: Issues and Challenges

19. QoS implementation in Web Services selection and ranking using data analysis

20. Effective Cost Mechanism for Cloudlet Retransmission and Prioritized VM Scheduling Mechanism Over Broker Virtual Machine Communication Framework

21. Security Implementation through PCRE Signature over Cloud Network

22. Analysis of HDFS RPC and Hadoop with RDMA by evaluating write performance

23. Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud

24. Survey on trust establishment in cloud computing

25. Analysis for security implementation in SDLC

26. Load Balancing for Resource Provisioning Using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling

27. Comparative analysis of Black Hole attack over Cloud Network using AODV and DSDV

28. Efficient Resource Allocation in Resource provisioning policies over Resource Cloud Communication Paradigm

Catalog

Books, media, physical & digital resources