Security in a Virtualised Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3
Abstract
Do the security challenges posed by virtualisation make it a non-starter for your sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype – but if it delivers the benefits it claims, it has the potential to transform enterprise computing. So what are the challenges – and what are the opportunities posed by this development?
Authors and Affiliations
E. Geetha Ran
Implementing multicast communication system making use of anexisting data network to offer free TV channels
Abstract: This paper discusses how a company can implement multicast communication system making use ofits existing data network to offer free TV channels. The advantages and challenges involved in multicastcommuni...
Evaluating Air Pollution Parameters Using Zigbee (IEEE 802.15.4)
Air pollution receives one of the prime concerns in India, primarily due to rapid economic growth, industrialization and urbanization with associated increase in energy demands. Lacks of implementation of e...
Analysis and Implementation of Efficient Association Rules using K-mean and Neuralgas Algorithm
Efficient Privacy Preserving association rule mining has emerged as a latest research issue. In this thesis work, existing algorithms, Increase Support of Left Hand Side and Decrease Support of Right Hand Side...
CPRM: Cooperative Position based Routing scheme for MANETs
Abstract: A mobile ad hoc network is a wireless communication network, where nodes that are not within direct transmission range of each other will require other nodes to forward data. Routing is difficult in...
Occlusion detection in video sequences
Abstract: An occlusion is the region between two overlapping objects with disparate motion. Detecting these occluded objects is crucial for many of the video processing. The Occlusion detection is decomposed into two ind...