P. Varalakshmi

According to our database1, P. Varalakshmi
  • authored at least 24 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A novel dual authentication protocol (DAP) for multi-owners in cloud computing.
Cluster Computing, 2017

Multifaceted trust management framework based on a trust level agreement in a collaborative cloud.
Computers & Electrical Engineering, 2017

2016
Computer aided system for breast cancer in digitized mammogram using shearlet band features with LS-SVM classifier.
IJWMIP, 2016

Enhanced Schmidt-Samoa cryptosystem for data confidentiality in cloud computing.
IJISCM, 2016

EFG-AOMDV: Evolving Fuzzy based Graph-AOMDV Protocol for Reliable and Stable Routing in Mobile Ad Hoc Networks.
Ad Hoc & Sensor Wireless Networks, 2016

2015
An Enhanced and Secured RSA Key Generation Scheme (ESRKGS).
J. Inf. Sec. Appl., 2015

Secure file storage and retrieval in cloud.
IJICS, 2015

2014
An Optimal Constraint Based Web Service Composition Using Intelligent Backtracking.
J. Web Eng., 2014

2013
Thwarting DDoS attacks in grid using information divergence.
Future Generation Comp. Syst., 2013

2012
Dynamic Web Service Composition based on Network Modeling with Statistical Analysis and Backtracking
CoRR, 2012

QoS Monitoring and Dynamic Trust Establishment in the Cloud.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

A Novel Approach for Dynamic Web Service Composition through Network Analysis with Backtracking.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Improving TCP Performance in Hybrid Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
An Optimal Workflow Based Scheduling and Resource Allocation in Cloud.
Proceedings of the Advances in Computing and Communications, 2011

SLA with Dual Party Beneficiality in Distributed Cloud.
Proceedings of the Advances in Computing and Communications, 2011

2010
Secured and trusted three-tier grid architecture.
IJAHUC, 2010

An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid.
Proceedings of the Information Processing and Management, 2010

Reactive Network Monitor for DDoS Attacks.
Proceedings of the Information Processing and Management, 2010

2009
Reputation and policy-based three-tier grid architecture with genuine feedbacks.
IJAACS, 2009

2008
Securing Trustworthy Three-Tier Grid Architecture with Spam Filtering.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Securing Trustworthy Three-Tier Grid Architecture with Spam Filtering.
Proceedings of the International Conference on High Performance Computing, 2008

Quiz-based trust model with optimized resource management in grid.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008

2007
A Robust Trust Model For Resource Selection in Grid.
Proceedings of the 2007 International Conference on Grid Computing & Applications, 2007

A Multi-Broker Trust Management Framework for Resource Selection in Grid.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007


  Loading...