Pankaj K. Kawadkar

Learn More
Now a day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer's world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites it to a adjacent memory. The(More)
By the development of the software industry and the advances of the software engineering sciences, the use of Object Oriented Software Engineering (OOSE) has increased in the software complex world. The origin of the OOSE in evaluation and design of the software has expanded much and is now considered as one of the software integration processes. The OOSE(More)
— A Mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. In each communication operation we use multicasting technique. In multicasting technique signified for group communication that supports the dissemination of information from a(More)
Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously and pay-as-you-go pricing schemes are some of the reasons for the success of Cloud computing .In this paper we discuss few aspects of cloud computing and also there area. Cloud computing has been acknowledged as one of the prevailing models for providing IT(More)
Object-oriented approaches to software design and implementation have gained enormous popularity over the past two decades. However, whilst models of software systems routinely allow software engineers to express relationships between objects, object-oriented programming languages lack this ability. Instead, relationships must be encoded using complex(More)
Cloud computing promises innate scalability and high availability at low cost. So far cloud storage deployments were subject to big companies but an increasing amount of available open-source systems allow also smaller private cloud installations. In this paper we discuss cloud aggregation and cloud bursting with their empirical review. Based on the review(More)
  • 1