Open Access
Subscription or Fee Access
Table of Contents
Research Articles
Cloud Storage Deduplication Based on Cryptography Techniques | |
Vijaya Kumar S, T.K.P. Rajagopal, Seema Pillai | 1-8 |
Query Processing and Energy Consumptions in Data Centers | |
Vijaya Kumar S, T.K.P. Rajagopal, Seema Pillai | 9-16 |
A Steganography Method Based Upon JPEG and Quantization Table Modification | |
B.M. Alaudeen, G. Tholkappia Arasu | 17-20 |
Privacy Aware Cross Cloud Service for Big Data Application Using Hiresome-II | |
Seema Pillai, Ravi D., T.K.P. Rajagopal, Vijaya Kumar S. | 21-32 |
Survey on Intrusion Detection Using Data Mining Methods | |
Manish Arya, Sanjiv Sharma | 33-43 |
This site has been shifted to https://stmcomputers.stmjournals.com/