Challenges in the Cloud Application Development
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Anyone who develops and tests software is well-known with the Software Development Life Cycle (SDLC). By its very nature, cloud-based development offers an organization a high degree of agility; correspondingly, the developmental processes themselves should be agile in nature. This paper provides an overview of the challenges faced in developing cloud applications, and discusses an agile framework that offers a repeatable process for building cloud-based applications.
Authors and Affiliations
B. J. D Kalyani
Data mining approach to evaluate the data lossless Data Compression algorithms
: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression r...
A Design of an Efficient, Robust, Autonomous and a well Coordinated Distributed Network Monitory System for Large Computer Networks
Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today’s world. Data security and access control to information are...
Preserving Privacy Using Data Perturbation in Data Stream
Data stream can be conceived as a continuous and changing sequence of data that continuously arrive at a system to store or process. Examples of data streams include computer network traffic, phone conversations, web sea...
Energy Renewal Approach in Wireless Sensor Network
Wireless sensor networks (WSN) monitor the environmental conditions that can be used for various applications. They are often encumbered with limited battery energy. Thus, the network lifetime is widely regarded...
Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( u...