


default search action
13th ICDCIT 2017: Bhubaneswar, India
- Padmanabhan Krishnan, P. Radha Krishna, Laxmi Parida:

Distributed Computing and Internet Technology - 13th International Conference, ICDCIT 2017, Bhubaneswar, India, January 13-16, 2017, Proceedings. Lecture Notes in Computer Science 10109, Springer 2017, ISBN 978-3-319-50471-1
Mobile Computing
- Sushree Bibhuprada B. Priyadarshini

, Suvasini Panigrahi:
A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks. 3-14 - Durjoy Dutta, Tandrima Dey, Sruti Gan Chaudhuri:

Gathering Multiple Robots in a Ring and an Infinite Grid. 15-26 - Enrico Eugenio, Agostino Cortesi

:
WiFi-Related Energy Consumption Analysis of Mobile Devices in a Walkable Area by Abstract Interpretation. 27-39
Analytics
- Swati Agarwal, Ashish Sureka:

A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on Tumblr. 43-57 - P. S. V. S. Sai Prasad

, H. Bala Subrahmanyam, Praveen Kumar Singh:
Scalable IQRA_IG Algorithm: An Iterative MapReduce Approach for Reduct Computation. 58-69 - D. S. Jayalakshmi

, R. Srinivasan:
Simulation of MapReduce Across Geographically Distributed Datacentres Using CloudSim. 70-81
Distributed Computing
- Sharma Saravanan, Sameera Shaik:

Revamping the Frequency and Computational Time of RTOS Task - Power Dissipation. 85-93 - Rishi Sharma, Ranu Vikram, Bala Prakasa Rao Killi, Seela Veerabhadreswara Rao:

CO2 Penalty and Disaster Aware Data Center and Service Placement for Cost Minimization. 94-104
Virtual Machines
- Srimoyee Bhattacherjee, Uttiya Sarkar, Sunirmal Khatua

, Sarbani Roy
:
PMM: A Novel Prediction Based VM Migration Scheme in Cloud Computing. 107-117 - Sharmistha Mandal

, Sunirmal Khatua
, Rajib Kumar Das:
Bid Selection for Deadline Constrained Jobs over Spot VMs in Computational Cloud. 118-128 - Sanjaya Kumar Panda

, Prasanta K. Jana:
An Efficient Request-Based Virtual Machine Placement Algorithm for Cloud Computing. 129-143
Access Control
- Sabitha S, M. S. Rajasree:

An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public Cloud. 147-158 - N. V. Narendra Kumar, R. K. Shyamasundar:

Analyzing Protocol Security Through Information-Flow Control. 159-171 - Arjun Londhey, Manik Lal Das:

Efficient Image Authentication Scheme Using Genetic Algorithms. 172-180
Security and Privacy
- N. V. Narendra Kumar, R. K. Shyamasundar:

Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. 183-195 - Payal Chaudhari

, Manik Lal Das:
Privacy Preserving Signcryption Scheme. 196-209 - A. K. Singh, Navneet Goyal:

MalCrawler: A Crawler for Seeking and Crawling Malicious Websites. 210-223
Poster Papers
- Sayar Kumar Dey, Prerna Choudhary, Günter Fahrnberger

:
Spying Mobrob - Innovative Mobile Number Tracking System. 227-230 - Saiyedul Islam, Sundar Balasubramaniam, Poonam Goyal

, Mohit Sati, Navneet Goyal:
A Domain Specific Language for Clustering. 231-234 - Sayantani Saha, Tanusree Parbat, Sarmistha Neogy:

Designing a Secure Data Retrieval Strategy Using NoSQL Database. 235-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














