


Остановите войну!
for scientists:


default search action
ADCONS 2011: Surathkal, India
- P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan:
Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7135, Springer 2012, ISBN 978-3-642-29279-8
A New Small World Lattice
- Abhishek Parakh, Subhash C. Kak:
A New Small World Lattice. 1-8 - G. M. Siddesh, K. G. Srinivasa
:
SLA - Driven Dynamic Resource Allocation on Clouds. 9-18 - Jagadeesh Balasubramaniyan, Sumalatha Ramachandran:
An Intelligent Cloud System Adopting File Pre-fetching. 19-27 - Marcin Bazydlo, Szymon Francuzik, Cezary Sobaniec, Dariusz Wawrzyniak:
Replication Infrastructure for RESTful Web Services. 28-37 - Joon-Mo Yang, Jun-Yong Park, Ryum-Duck Oh:
Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network. 38-47 - D. Paulraj, S. Swamynathan:
Content Based Service Discovery in Semantic Web Services Using WordNet. 48-56 - Demian Antony D'Mello
, Manasa Shetty, Akshatha Prabhu, Akshaya, Adithi Shenoy:
Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions. 57-66 - Deivamani Mallayya
, Baskaran Ramachandran:
Reconfigurable Web Service Composition Using Belief Revision. 67-76 - Pon Harshavardhanan, J. Akilandeswari, K. A. Anjali Krishna:
Semantic Web Service Discovery with Structural Level Matching of Operations. 77-84
Image Processing
- Aditya Narang, Sagar Prakash Joglekar
, Karthikeyan Balaji Dhanapal, Arun Agrahara Somasundara:
A Novel Way of Tracking People in an Indoor Area. 85-94 - Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan, Jampana Nagaraju:
Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study. 95-105 - J. Rekha, Jhilik Bhattacharya
, Somajyoti Majumder:
Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition. 106-116 - Arpitha M. D., Megha P. Arakeri
, G. Ram Mohan Reddy:
An Approach for Color Edge Detection with Automatic Threshold Detection. 117-124 - Anand T. V., Madhu S. Nair
, Rao Tatavarti
:
Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method. 125-134 - Praveen Cyriac, Philomina Simon
:
Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers. 135-145 - A. Benjamin Joseph, Baskaran Ramachandran:
Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation. 146-153
Pattern Recognition
- T. Ashwini Reddy, K. Renuka Devi, Suryakanth V. Gangashetty
:
Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering. 154-162 - Pawan Bhaladhare, Devesh Jinwala
:
A Sensitive Attribute Based Clustering Method for k-Anonymization. 163-170 - Siddhaling Urolagin, K. V. Prema
, N. V. Subba Reddy
:
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method. 171-178 - Sudha Subramani, Sathiyabhama Balasubramaniam:
Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery. 179-187 - Damodar Reddy Edla, Prasanta K. Jana:
Clustering Biological Data Using Voronoi Diagram. 188-197 - T. Deepa, Sathiyabhama Balasubramaniam, Akilandeswari Jeyapal, N. P. Gopalan
:
Knowledge Management Techniques for Analysis of Clinical Databases. 198-206 - P. S. Hiremath, Parashuram Bannigidad:
Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System. 207-215 - Marcin Bazydlo:
Combining Load Balancing with Shared Storage and Primary Backup Replicaton. 216 - Prafulla Kalapatapu, Aruna Malapati:
Smart Playlist Generation Using Data Mining Techniques. 217
Applied Algorithms
- Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar, Ankush Mittal:
Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors. 218-227 - K. R. Guruprasad
:
EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment. 228-236 - Vijay Laxmi
, Manoj Singh Gaur, Parvez Faruki, Smita Naval
:
PEAL - Packed Executable AnaLysis. 237-243 - U. Raghavendra
, Krishnamoorthi Makkithaya
, A. Kotegar Karunakar
:
Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms. 244-252 - J. Jasper
, T. Aruldoss Albert Victoire
:
Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch. 253-262 - D. Tamilselvi
, S. Mercy Shalinie
, A. Fathima Thasneem, S. Gomathi Sundari:
Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment. 263-269 - Chinta Someswararao
, K. Butchi Raju, S. V. Appaji, S. Viswanadha Raju, K. K. V. V. V. S. Reddy:
Recent Advancements in Parallel Algorithms for String Matching on Computing Models - A Survey and Experimental Results. 270-278 - Rakesh Kumar Jha
, Upena D. Dalal:
Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology. 279-288
Networking Track Papers
- A. Kotegar Karunakar, Younsong Qio, Brian Lee:
Scalable Video Delivery over Peer-to-Peer Network. 289
Wireless Networking
- Lukasz Piatkowski:
K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments. 290-296 - Anshuman Biswas, Banani Saha, Saswati Guha:
Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks. 297-305 - Houda Jaouani, Rim Bouhouch, Wafa Najjar, Salem Hasnaoui:
Data Distribution Service on Top of FlexRay Vehicle Networks. 306-317 - Raviteja B. L., Annappa B.
, Mohit P. Tahiliani:
CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs. 318-327 - V. P. Harigovindan
, A. V. Babu
, Lillykutty Jacob:
Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks. 328-337 - Rajeev Kumar, Prashant Kumar, Naveen Chauhan
:
CBRM - Cluster Based Replica Management in Mobile Adhoc Networks. 338-347 - S. Nandakumar
, Sibaram Khara:
A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell. 348-356 - Rakesh Kumar Jha
, A. Vishal Wankhade
, Upena D. Dalal:
An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network. 357-365
Sensor Networks
- B. S. Panda, D. Pushparaj Shetty
:
Strong Minimum Interference Topology for Wireless Sensor Networks. 366-374 - Lakshmi Priya M., Lalit Kumar Awasthi
:
Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering. 375-380 - Bhargavi K.
, B. Sathish Babu
:
CAs-based QoS Scheme for Remote Health Monitoring over WMSN. 381-388 - N. Chandrakant, A. P. Bijil, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs. 389-398 - Pratyay Kuila, Prasanta K. Jana:
Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks. 399-404 - Muni Venkateswarlu K., K. Chandrasekaran, A. Kandasamy:
Node - Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks - A Survey and Conceptual Modeling. 405-414 - Sumathi S., Chandrasekaran M.:
Self Healing Wireless Sensor Network. 415-425
Network Infrastructure
- Surinder Singh, Meenakshi Garg:
Contention Detection and Minimization in All Optical Routers. 426-434 - Mohit P. Tahiliani, K. C. Shet, T. G. Basavaraju:
FARED: Fast Adapting RED Gateways for TCP/IP Networks. 435-443 - Shreesha Kashyap, Shravan I. V., Anuraj Suman, T. K. Ramesh
, Vaya P. R.:
An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks. 444-450 - Prasun Ghosal, Hafizur Rahaman
, Satrajit Das, Arindam Das, Parthasarathi Dasgupta:
Obstacle Aware Routing in 3D Integrated Circuits. 451-460 - J. Hanumanthappa, D. H. Manjaiah:
A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism. 461-471
Security Track Papers
- Bartosz Brodecki, Jerzy Brzezinski
, Piotr Sasak, Michal Szychowiak
:
Consistency Maintenance of Modern Security Policies. 472-477 - Pandi Vijayakumar
, Sundan Bose, Arputharaj Kannan
:
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation. 478-485 - Priyanka Dadhich
, Kamlesh Dutta, Mahesh Chandra Govil:
Reputation-Based Trust for Mobile Agents. 486-494 - Bhumika K. Patel, Devesh Jinwala
:
Anonymity in Attribute-Based Group Signatures. 495-504 - Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography. 505-514 - Nishant Doshi
, Devesh Jinwala
:
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext. 515-523 - Roshni Chandrashekhar, Manoj Mardithaya, P. Santhi Thilagam
, Dipankar Saha:
SQL Injection Attack Mechanisms and Prevention Techniques. 524-533 - Abhinav Bhandari
, Amrit Lal Sangal
, Krishan Kumar Saluja:
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks. 534-540 - Ketki Arora, Krishan Kumar
, Monika Sachdeva
:
Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed. 541-550 - V. Shanmughaneethi, Regan Abraham, S. Swamynathan:
A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation. 551-557 - Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal, Bhushan Trivedi:
Correlation in Distributed Intrusion Detection System Using Mobile Agent. 558-567 - S. Benson Edwin Raj, V. S. Jayanthi, V. Muthulakshmi:
A Novel Architecture for the Generation of Picture Based CAPTCHA. 568-574 - Sachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy:
Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images. 575-582 - H. S. Gururaja
, M. Seetha, Anjan K. Koundinya
:
Covertness Analysis of Subliminal Channels in Legitimate Communication. 583-592 - P. Devaraj:
Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map. 593-601 - Jyoti Grover
, Vijay Laxmi
, Manoj Singh Gaur:
Misbehavior Detection Based on Ensemble Learning in VANET. 602-611 - Poonam Saini, Awadhesh Kumar Singh:
An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration. 612-620 - V. K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie
, Tulika Pandey:
Application of IP Traceback Mechanism to OnlineVoting System. 621-630 - Ganesh Reddy Karri
, P. Santhi Thilagam
:
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network. 631-637

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.