

Table of Contents
Research Articles
Cloud Storage Deduplication Based on Cryptography Techniques |
PDF
![]() |
Vijaya Kumar S, T.K.P. Rajagopal, Seema Pillai | 1-8 |
Query Processing and Energy Consumptions in Data Centers |
PDF
![]() |
Vijaya Kumar S, T.K.P. Rajagopal, Seema Pillai | 9-16 |
A Steganography Method Based Upon JPEG and Quantization Table Modification |
PDF
![]() |
B.M. Alaudeen, G. Tholkappia Arasu | 17-20 |
Privacy Aware Cross Cloud Service for Big Data Application Using Hiresome-II |
PDF
![]() |
Seema Pillai, Ravi D., T.K.P. Rajagopal, Vijaya Kumar S. | 21-32 |
Survey on Intrusion Detection Using Data Mining Methods |
PDF
![]() |
Manish Arya, Sanjiv Sharma | 33-43 |
This site has been shifted to https://stmcomputers.stmjournals.com/