SCSSM

Displaying 1-9 of 9 results

  • White Papers // May 2013

    Secure Resource Management and Efficient Mining in Cloud Computing

    Cloud computing provide a large scale computing resources to various customers and developers. The resource transformation between customers and cloud maintenance can be easily threatened by the various cyber attacks, because cloud computing provide the service to many customers who are not proven to be trustworthy. Therefore cloud computing system...

    Provided By SCSSM

  • White Papers // Apr 2013

    An Efficient Implementation of Validating the Client Level Security Factors for the Cloud Applications

    Client level security issues in the cloud computing became a major challenge in service access process in cloud environment. Day by day number of threats over the network increasing because of the huge demand for the cloud products and service. The existing authentication systems are unable to provide the sufficient...

    Provided By SCSSM

  • White Papers // Mar 2013

    Effectiveness of Data Mining - Based E-Learning System (DMBELS)

    E-learning is emerging as the new paradigm of modern education. Most of the e-learning systems have limitations such as scarcity of content, lack of intelligent search and context sensitive personalization problems, which are the challenging tasks for researchers. This motivated the author to take up this problem and the method...

    Provided By SCSSM

  • White Papers // Mar 2013

    Adaptation of SAAs in Business Intelligence for SME

    This paper aims to widen the current state-of-the-art techniques of new management models. In recent years, the appearance of new web tools, the exponential increase in open-source, remote collaboration software solutions, and the new social and labor paradigms, make necessary a deep review of the traditional management models. It becomes...

    Provided By SCSSM

  • White Papers // Feb 2013

    A Survey on Radio Over Fiber (RoF) for Wireless Broadband Access Technologies

    In this paper presents a survey on RoF for Wireless Broadband Access technology like WiMAX (Fixed and Mobile). RoF is considered to achieve an effective delivery of wireless and baseband signal, and it also reduces the power consumption. In the other hand WiMAX (Worldwide Interoperability for Microwave Access) is recent...

    Provided By SCSSM

  • White Papers // Sep 2012

    A Study on Attrition among New Entrants in Software Testing Professionals

    Software Development Life Cycle is a systems approach to problem solving and is made up of several phases, each comprised of well define input and output milestones. Testing phase has much importance in Software Development Life Cycle due to a major contribution in finding and correcting the errors and it...

    Provided By SCSSM

  • White Papers // Sep 2012

    Survey of Format Preserving Encryption

    Cryptography is a technique used to transmit data in a secured way through the internet. Encryption is the process of converting information from its original form (called plaintext) into an encoded, unreadable form (called cipher text). Format Preserving Encryption (FPE) refers to a set of techniques for encrypting data such...

    Provided By SCSSM

  • White Papers // Aug 2012

    A Challenge in Improving the Consistency of Transactions in Cloud Databases - Scalability

    Cloud computing is an automated on-demand self-service paradigm, allowing a pay-per-use model on shared resources. Scalability is one of the challenges faced by cloud computing to be achieved at full strength. The "cloud scalability" is slowly gaining weight in cloud industry since the load of traffic is usually unpredictable. Load...

    Provided By SCSSM

  • White Papers // Jul 2012

    Software Architecture Evaluation Methods - A Survey

    Software architectural evaluation becomes a familiar practice in software engineering community for developing quality software. Architectural evaluation reduces software development effort and costs, and enhances the quality of the software by verifying the addressability of quality requirements and identifying potential risks and it provides assurance to developers that their chosen...

    Provided By SCSSM

  • White Papers // Mar 2013

    Effectiveness of Data Mining - Based E-Learning System (DMBELS)

    E-learning is emerging as the new paradigm of modern education. Most of the e-learning systems have limitations such as scarcity of content, lack of intelligent search and context sensitive personalization problems, which are the challenging tasks for researchers. This motivated the author to take up this problem and the method...

    Provided By SCSSM

  • White Papers // Feb 2013

    A Survey on Radio Over Fiber (RoF) for Wireless Broadband Access Technologies

    In this paper presents a survey on RoF for Wireless Broadband Access technology like WiMAX (Fixed and Mobile). RoF is considered to achieve an effective delivery of wireless and baseband signal, and it also reduces the power consumption. In the other hand WiMAX (Worldwide Interoperability for Microwave Access) is recent...

    Provided By SCSSM

  • White Papers // Apr 2013

    An Efficient Implementation of Validating the Client Level Security Factors for the Cloud Applications

    Client level security issues in the cloud computing became a major challenge in service access process in cloud environment. Day by day number of threats over the network increasing because of the huge demand for the cloud products and service. The existing authentication systems are unable to provide the sufficient...

    Provided By SCSSM

  • White Papers // May 2013

    Secure Resource Management and Efficient Mining in Cloud Computing

    Cloud computing provide a large scale computing resources to various customers and developers. The resource transformation between customers and cloud maintenance can be easily threatened by the various cyber attacks, because cloud computing provide the service to many customers who are not proven to be trustworthy. Therefore cloud computing system...

    Provided By SCSSM

  • White Papers // Sep 2012

    A Study on Attrition among New Entrants in Software Testing Professionals

    Software Development Life Cycle is a systems approach to problem solving and is made up of several phases, each comprised of well define input and output milestones. Testing phase has much importance in Software Development Life Cycle due to a major contribution in finding and correcting the errors and it...

    Provided By SCSSM

  • White Papers // Aug 2012

    A Challenge in Improving the Consistency of Transactions in Cloud Databases - Scalability

    Cloud computing is an automated on-demand self-service paradigm, allowing a pay-per-use model on shared resources. Scalability is one of the challenges faced by cloud computing to be achieved at full strength. The "cloud scalability" is slowly gaining weight in cloud industry since the load of traffic is usually unpredictable. Load...

    Provided By SCSSM

  • White Papers // Sep 2012

    Survey of Format Preserving Encryption

    Cryptography is a technique used to transmit data in a secured way through the internet. Encryption is the process of converting information from its original form (called plaintext) into an encoded, unreadable form (called cipher text). Format Preserving Encryption (FPE) refers to a set of techniques for encrypting data such...

    Provided By SCSSM

  • White Papers // Jul 2012

    Software Architecture Evaluation Methods - A Survey

    Software architectural evaluation becomes a familiar practice in software engineering community for developing quality software. Architectural evaluation reduces software development effort and costs, and enhances the quality of the software by verifying the addressability of quality requirements and identifying potential risks and it provides assurance to developers that their chosen...

    Provided By SCSSM

  • White Papers // Mar 2013

    Adaptation of SAAs in Business Intelligence for SME

    This paper aims to widen the current state-of-the-art techniques of new management models. In recent years, the appearance of new web tools, the exponential increase in open-source, remote collaboration software solutions, and the new social and labor paradigms, make necessary a deep review of the traditional management models. It becomes...

    Provided By SCSSM