default search action
1st ACC 2011: Kochi, Kerala, India
- Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi:
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part IV. Communications in Computer and Information Science 193, Springer 2011, ISBN 978-3-642-22725-7
Position Papers
- G. Jisha, Philip Samuel:
Impact of Node Density on Node Connectivity in MANET Routing Protocols. 1-8 - S. Roselin Mary, Paul Rodrigues:
Survey and Comparison of Frameworks in Software Architecture. 9-18 - K. Vinod Kumar, G. Lakshmi Phani, K. Venkat Sayeesh, Aparna Chaganty, Garimella Rama Murthy:
Two Layered Hierarchical Model for Cognitive Wireless Sensor Networks. 19-24 - Meenal A. Borkar, Nitin:
3D-CGIN: A 3 Disjoint Paths CGIN with Alternate Source. 25-36 - Sonam Tobgay, Rasmus L. Olsen, Ramjee Prasad:
Architecture for Running Multiple Applications on a Single Wireless Sensor Network: A Proposal. 37-45 - P. U. Nimi, C. Tripti:
Feature Based Image Retrieval Algorithm. 46-55 - Abel Palaty, Mohammad Suaib, Kumar Sambhav Pandey:
Exploiting ILP in a SIMD Type Vector Processor. 56-62 - Saranya D. Krishnan, Shimmi Asokan:
An Extension to Global Value Numbering. 63-69 - N. Sandeep Chaitanya, Ramachandram Sirandas, B. Padmavathi, S. Shiva Skandha, G. Ravi Kumar:
Data Privacy for Grid Systems. 70-78 - Rajkumar Kannan, Frédéric Andrès, Fernando Ferri, Patrizia Grifoni:
Towards Multimodal Capture, Annotation and Semantic Retrieval from Performing Arts. 79-88 - Jai Prakash Singh:
A New Indian Model for Human Intelligence. 89-97 - Thiyagarajan Paramasivan, Gnanasekaran Aghila, V. Prasanna Venkatesan:
Stepping Up Internet Banking Security Using Dynamic Pattern Based Image Steganography. 98-112 - Rahul Roy, Madhabananda Das, Satchidananda Dehuri:
A Combinatorial Multi-objective Particle Swarm Optimization Based Algorithm for Task Allocation in Distributed Computing Systems. 113-125 - G. Sreenu, P. M. Dhanya, Sabu M. Thampi:
Enhancement of BARTERCAST Using Reinforcement Learning to Effectively Manage Freeriders. 126-136 - Dhanya Sudarsan, P. R. Mahalingam, G. Jisha:
A Novel Approach to Represent Detected Point Mutation. 137-144 - A. A. Arifa Azeez, Elizabeth Isaac, Sabu M. Thampi:
Anonymous and Secured Communication Using OLSR in MANET. 145-154 - S. Saraswathi, M. Anusiya, P. Kanivadhana, S. Sathiya:
Bilingual Translation System for Weather Report. 155-164 - Sudheer Kurakula, A. S. D. P. Sudhansh, Roy Paily, Samarendra Dandapat:
Design of QRS Detection and Heart Rate Estimation System on FPGA. 165-174 - S. Saraswathi, M. Hemamalini, S. Janani, V. Priyadharshini:
Multi-document Text Summarization in E-learning System for Operating System Domain. 175-186 - Neethu Mohandas, Sabu M. Thampi:
Improving Hadoop Performance in Handling Small Files. 187-194 - Ana Elisa Ferreira, Anilton Salles Garcia, Carlos Alberto Malcher Bastos:
Studies of Management for Dynamic Circuit Networks. 195-204
International Workshop on Identity: Security, Management and Applications (ID 2011)
- Juhi Gupta, Ishan Kumar, Anil Kacholiya:
Game Theoretic Approach to Resolve Energy Conflicts in Ad-Hoc Networks. 205-210 - C. K. Raju, P. B. S. Bhadoria:
Software Secureness for Users: Significance in Public ICT Applications. 211-222 - Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay:
Vector Space Access Structure and ID Based Distributed DRM Key Management. 223-232 - Jaya, Anjali Sardana:
Multiple Secrets Sharing with Meaningful Shares. 233-243 - Brij B. Gupta, P. K. Agrawal, Anupama Mishra, M. K. Pattanshetti:
On Estimating Strength of a DDoS Attack Using Polynomial Regression Model. 244-249 - Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman:
Finding New Solutions for Services in Federated Open Systems Interconnection. 250-259 - Avinash Srinivasan, Jie Wu:
Duplicate File Names-A Novel Steganographic Data Hiding Technique. 260-268 - M. Priyadharshini, R. Baskaran, Madhan Kumar Srinivasan, Paul Rodrigues:
A Framework for Securing Web Services by Formulating an Collaborative Security Standard among Prevailing WS-* Security Standards. 269-283 - Vijayalaxmi Kakulapati, Ramakrishna Kolikipogu, P. Revathy, D. Karunanithi:
Improved Web Search Engine by New Similarity Measures. 284-292
International Workshop on Applications of Signal Processing (I-WASP 2011)
- Kiran Kumar Bhuvanagiri, Sunil Kumar Kopparapu:
Recognition of Subsampled Speech Using a Modified Mel Filter Bank. 293-299 - C. L. Biji, D. Selvathi, Asha Panicker:
Tumor Detection in Brain Magnetic Resonance Images Using Modified Thresholding Techniques. 300-308 - B. Vivekavardhana Reddy, Y. S. Kumara Swamy, N. Usha:
Generate Vision in Blind People Using Suitable Neuroprosthesis Implant of BIOMEMS in Brain. 309-317 - Ibrahim Missaoui, Zied Lachiri:
Undecimated Wavelet Packet for Blind Speech Separation Using Independent Component Analysis. 318-328 - Anand Singh Jalal, Vrijendra Singh:
A Robust Framework for Multi-object Tracking. 329-338 - Rajeev Kumaraswamy, Lekhesh V. Prabhu, K. Suchithra, P. S. Sreejith Pai:
SVM Based Classification of Traffic Signs for Realtime Embedded Platform. 339-348 - Tarun Kancharla, Sanjyot Gindi:
A Real Time Video Stabilization Algorithm. 349-357 - Aditya R. Kanitkar, Brijendra K. Bharti, Umesh N. Hivarkar:
Object Classification Using Encoded Edge Based Structural Information. 358-367 - Gaurav Kumar Yadav, Tarun Kancharla, Smita Nair:
Real Time Vehicle Detection for Rear and Forward Collision Warning Systems. 368-377 - Ramaswamy Palaniappan, Jenish Gosalia, Kenneth Revett, Andrews Samraj:
PIN Generation Using Single Channel EEG Biometric. 378-385
International Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp 2011)
- Vishal M. Karande, Alwyn R. Pais:
A Framework for Intrusion Tolerance in Cloud Computing. 386-395 - Likewin Thomas, B. Annappa:
Application of Parallel K-Means Clustering Algorithm for Prediction of Optimal Path in Self Aware Mobile Ad-Hoc Networks with Link Stability. 396-405 - Imad M. Abbadi:
Clouds' Infrastructure Taxonomy, Properties, and Management Services. 406-420 - Jie Song, Tiantian Li, Lulu Jia, Zhiliang Zhu:
A Deduced SaaS Lifecycle Model Based on Roles and Activities. 421-431 - Ryan K. L. Ko, Bu-Sung Lee, Siani Pearson:
Towards Achieving Accountability, Auditability and Trust in Cloud Computing. 432-444 - Amandeep Verma, Sakshi Kaushal:
Cloud Computing Security Issues and Challenges: A Survey. 445-454 - Venkatarami Reddy Chintapalli:
A Deadline and Budget Constrained Cost and Time Optimization Algorithm for Cloud Computing. 455-462
International Workshop on Multimedia Streaming (MultiStreams 2011)
- Kaliappan Gopalan:
A Bit Modification Technique for Watermarking Images and Streaming Video. 463-472 - R. Roopalakshmi, G. Ram Mohana Reddy:
Efficient Video Copy Detection Using Simple and Effective Extraction of Color Features. 473-480 - Tatiana Gualotuña, Diego Marcillo, Elsa María Macías López, Álvaro Suárez Sarmiento:
Mobile Video Service Disruptions Control in Android Using JADE. 481-490 - Hira Sathu, Mohib A. Shah:
Performance Analysis of Video Protocols over IP Transition Mechanisms. 491-500 - Hira Sathu, Mohib A. Shah, Kathiravelu Ganeshan:
Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms. 501-511 - Priya Gupta, Priyadarshini Londhe, Arvind Bhosale:
IPTV End-to-End Performance Monitoring. 512-523 - J. Mohamedmoideen Kader Mastan, G. A. Sathish Kumar, K. Bhoopathy Bagan:
A Color Image Encryption Technique Based on a Substitution-Permutation Network. 524-533
Second International Workshop on Trust Management in P2P Systems (IWTMP2PS 2011)
- Chenglian Liu, Marjan Kuchaki Rafsanjani, Liyun Zheng:
Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature. 534-540 - Jayashree Padmanabhan, Tamil Selvan Raman Subramaniam, Kumaresh Prakasam, Vigneswaran Ponpandiyan:
A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs. 541-548 - Subhalaxmi Das, Sujata Mohanty, Banshidhar Majhi:
A Convertible Designated Verifible Blind Multi-signcryption Scheme. 549-556 - Imad M. Abbadi:
Middleware Services at Cloud Application Layer. 557-571 - Sri Krishna Adusumalli, V. Valli Kumari:
Attribute Based Anonymity for Preserving Privacy. 572-579 - Jaydip Sen:
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks. 580-592 - Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui:
Data Dissemination and Power Management in Wireless Sensor Networks. 593-607 - Rama Krishna Challa, Rakesh Sambyal:
Performance Evaluation of ID Assignment Schemes for Wireless Sensor Networks. 608-615
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.