Skip to main content

and
  1. Article

    Retraction Note: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud

    S. Usha, A. Tamilarasi in Cluster Computing (2023)

  2. No Access

    Article

    RETRACTED ARTICLE: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloud

    The cloud computing is established as the technology that provides all the need oriented and the use dependent IT resources that has been used very frequently for the business information systems. In relation ...

    S. Usha, A. Tamilarasi in Cluster Computing (2019)

  3. No Access

    Chapter and Conference Paper

    Cross-Layer Scheme to Solve Hidden Device Problem in WPANs with Increased Transmission Range

    Wireless Personal Area Networks(WPANs) is one of the promising candidates for interconnections between Wireless Sensor Network. The standard IEEE 802.15.4 is designed specifically to achieve low power transmis...

    M. L. Mathivathani, S. Usha in Global Trends in Computing and Communication Systems (2012)

  4. No Access

    Chapter and Conference Paper

    Vertical Handover Based on Voice Activity in Heterogeneous Network

    A heterogeneous network consists of multiple access networks interworking together. Vertical handover is the technique that allows for seamless connectivity among these networks. This vertical handover when us...

    G. Kalaivani, S. Usha in Global Trends in Computing and Communication Systems (2012)

  5. No Access

    Article

    Eigenvalues of centrosymmetric matrices

    A method is given to extract the eigenvalues of standard and generalised eigenvalue problems involving centrosymmetric matrices.

    Dr. N. Muthiyalu, S. Usha in Computing (1992)