


default search action
12th ICDCIT 2016: Bhubaneswar, India
- Nikolaj S. Bjørner, Sanjiva Prasad, Laxmi Parida:

Distributed Computing and Internet Technology - 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings. Lecture Notes in Computer Science 9581, Springer 2016, ISBN 978-3-319-28033-2
Invited Talks
- Benny Chor, Assaf Zaritsky

:
Teaching Computer Science in the Community. 3-9 - Danielle Movsowitz, Orna Agmon Ben-Yehuda, Assaf Schuster:

Attacks in the Resource-as-a-Service (RaaS) Cloud Context. 10-18 - John Rushby:

Trustworthy Self-Integrating Systems. 19-29
Contributed Papers
- S. Chandrakanth, P. Santhi Thilagam

:
HiRE - A Heuristic Approach for User Generated Record Extraction. 33-37 - Pikkala Vijaya Laxmi, Kanithi Jyothsna:

Optimization of Service Rate in a Discrete-Time Impatient Customer Queue Using Particle Swarm Optimization. 38-42 - Seep Goel, Pooja Aggarwal, Smruti R. Sarangi:

A Wait-Free Stack. 43-55 - Jatharakonda Mallesham, S. Durga Bhavani

:
Influential Degree Heuristic for RankedReplace Algorithm in Social Networks. 56-60 - Sanjaya K. Panda

, Prasanta K. Jana:
An Efficient Task Consolidation Algorithm for Cloud Computing Systems. 61-74 - Kumar Dheenadayalan, V. N. Muralidhara, Gopalakrishnan Srinivasaraghavan

:
Storage Load Control Through Meta-Scheduler Using Predictive Analytics. 75-86 - Sushree Bibhuprada B. Priyadarshini

, Suvasini Panigrahi:
A Distributed Approach Based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation. 87-91 - Anu Saini:

An Extension to UDDI for the Discovery of User Driven Web Services. 92-96 - M. M. Hafizur Rahman

, Rizal Bin Mohd. Nor
, Md. Rabiul Awal
, Tengku Mohd Bin Tengku Sembok
, Yasuyuki Miura:
Long Wire Length of Midimew-Connected Mesh Network. 97-102 - Rajendra Kumar Roul, Sanjay Kumar Sahay:

K-means and Wordnet Based Feature Selection Combined with Extreme Learning Machines for Text Classification. 103-112 - Bhumika Gupta, Gaurav Bhatt, Ankush Mittal:

Language Identification and Disambiguation in Indian Mixed-Script. 113-121 - Syed Jalal Ahmad, V. S. K. Reddy, A. Damodaram, P. Radha Krishna:

A Dynamic Priority Based Scheduling Scheme for Multimedia Streaming Over MANETs to Improve QoS. 122-126 - Alpa Gore, Siddharth Dutt Choubey, Kopal Gangrade:

Improved Bug Localization Technique Using Hybrid Information Retrieval Model. 127-131 - R. Kingsy Grace, R. Manimegalai

:
HGASA: An Efficient Hybrid Technique for Optimizing Data Access in Dynamic Data Grid. 132-136 - Bandita Sahu

, Pabitra Mohan Khilar:
Energy Efficient SNR Based Clustering in Underwater Sensor Network with Data Encryption. 137-141 - Nemi Chandra Rathore

, Prashant Shaw, Somanath Tripathy
:
Collaborative Access Control Mechanism for Online Social Networks. 142-147 - Kanagaraj Narayanasamy

, Padmapriya Arumugam:
i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution Using Randomly Generated Bitmap Image. 148-156 - Anh-Hoang Truong, Dang Van Hung, Duc-Hanh Dang

, Xuan-Tung Vu:
A Type System for Counting Logs of Multi-threaded Nested Transactional Programs. 157-168 - Geethapriya Ramakrishnan, Prashant Anantharaman, Saswati Mukherjee:

Proactive Resource Provisioning Model for Cloud Federation. 169-174 - Santosh Kumar Sahu

, Sanjay Kumar Jena:
A Multiclass SVM Classification Approach for Intrusion Detection. 175-181 - D. S. Jayalakshmi

, T. P. Rashmi Ranjana, Srinivasan Ramaswamy:
Dynamic Data Replication Across Geo-Distributed Cloud Data Centres. 182-187 - Pooja Chaturvedi

, Ajai K. Daniel:
Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic. 188-192 - K. G. Srinivasa

, Kartik S. Gayatri, Maaz Syed Adeeb, Nikhil N. Jannu:
An Internet of Things Based Software Framework to Handle Medical Emergencies. 193-198 - D. Sirisha

, G. VijayaKumari:
Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous Computing Systems. 199-212 - P. Neelaveni

, Muthuswamy Vijayalakshmi
:
FC-LID: File Classifier Based Linear Indexing for Deduplication in Cloud Backup Services. 213-222

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














