default search action
2nd IC3 2009: Noida, India
- Sanjay Ranka, Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep K. S. Gupta, Rajeev Kumar, Vir V. Phoha:
Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings. Communications in Computer and Information Science 40, Springer 2009, ISBN 978-3-642-03546-3
Part 1 / Technical Session-1: Algorithm-1 (AL-1)
- Alok Singh, Marc Sevaux, André Rossi:
A Hybrid Grouping Genetic Algorithm for Multiprocessor Scheduling. 1-7 - Rajeev Srivastava, J. R. P. Gupta, Harish Parthasarthy, Subodh Srivastava:
PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital Images. 8-13 - Gautam A. Shah, Tejmal S. Rathore:
A New Position-Based Fast Radix-2 Algorithm for Computing the DHT. 14-25 - Rajesh Prasad, Suneeta Agarwal:
Study of Bit-Parallel Approximate Parameterized String Matching Algorithms. 26-36 - Eratt P. Sumesh, Elizabeth Elias:
Optimization of Finite Difference Method with Multiwavelet Bases. 37-48
Part 2 / Technical Session-2: Algorithm-2 (AL-2)
- Mala Chelliah, Mohanraj Loganathan, N. P. Gopalan, Balasubramanian Sivaselvan:
A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless Networks. 49-57 - Natarajan Meghanathan, Meena Sugumar:
A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc Networks. 58-69 - Selvaraj Srinivasan, Rajan Vidya, Ramasamy Rajaram:
An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed Systems. 70-80 - Arshin Rezazadeh, Mahmood Fathy:
Throughput Considerations of Fault-Tolerant Routing in Network-on-Chip. 81-92 - Deepank Gupta, Robert A. Morris, Terry Catapano, Guido Sautter:
A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation Matching. 93-102
Part 3 / Technical Session-3: Algorithm-3 (AL-3)
- Rahul Kala, Anupam Shukla, Ritu Tiwari:
Optimized Graph Search Using Multi-Level Graph Clustering. 103-114 - B. Pravin Kumar, V. Divakar, E. Vinoth, Radha Senthilkumar:
An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed Patterns. 115-126 - Musrrat Ali, Millie Pant, Ved Pal Singh:
A Modified Differential Evolution Algorithm with Cauchy Mutation for Global Optimization. 127-137 - S. V. Rajashekararadhya, P. Vanaja Ranjan:
Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian Scripts. 138-148 - Ankur Agrawal:
Local Subspace Based Outlier Detection. 149-157 - S. R. Kannan, A. Sathya, S. Ramathilagam, R. Pandiyarajan:
New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue Regions. 158-169
Part 4 / Technical Session-4: Algorithm-4 (AL-4)
- Natarajan Meghanathan:
On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc Networks. 170-181 - Saroj Kumar Panigrahy, Debasish Jena, Korra Sathya Babu, Sanjay Kumar Jena:
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature. 182-193 - Hunny Mehrotra, Badrinath G. Srinivas, Banshidhar Majhi, Phalguni Gupta:
Indexing Iris Biometric Database Using Energy Histogram of DCT Subbands. 194-204 - Rohit Pathak, Satyadhar Joshi:
Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties. 205-215 - Chandan Maity, Ashutosh Gupta, Mahua Maity:
Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic Frame. 216-227
Part 5 / Technical Session-5: Application-1 (AP-1)
- Jaydeep Howlader, Anushma Ghosh, Tandra DebRoy Pal:
Secure Receipt-Free Sealed-Bid Electronic Auction. 228-239 - Manu Pratap Singh, Rajdev Tiwari, Manish Mahajan, Diksha Dani:
An Architecture for Handling Fuzzy Queries in Data Warehouses. 240-249 - Badrinath G. Srinivas, Phalguni Gupta:
Palmprint Based Verification System Using SURF Features. 250-262 - Baisakhi Chakraborty, Meghbartma Gautam:
A Personnel Centric Knowledge Management System. 263-272
Part 6 / Technical Session-6: Application-2 (AP-2)
- Ajay Kr. Gautam, Amit Kr. Gautam:
A Protocol for Energy Efficient, Location Aware, Uniform and Grid Based Hierarchical Organization of Wireless Sensor Networks. 273-283 - Shelly Bansal, Daya Gupta, V. K. Panchal, Shashi Kumar:
Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing Approach. 284-294 - Anand Gupta, Anita Kumari, Boris Kundu, Isha Agarwal:
CDIS: Circle Density Based Iris Segmentation. 295-306 - Anvita Bajpai, Vinod Pathangay:
Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector Machines. 307-317 - Sweta Thakur, Jamuna Kanta Sing, Dipak Kumar Basu, Mita Nasipuri:
Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector Machine. 318-326
Part 7 / Technical Session-7: Application-3 (AP-3)
- Sandip Vijay, Subhash C. Sharma:
Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing. 327-335 - Naishadh K. Dave, Vanaraj B. Vaghela:
Vehicular Traffic Control: A Ubiquitous Computing Approach. 336-348 - Nameirakpam Basanta Singh, Sanjoy Deb, Guru Prasad Mishra, Samir Kumar Sarkar, Subir Kumar Sarkar:
Application of Particle Swarm Optimization Algorithm for Better Nano-Devices. 349-357 - Selwyn Justus, K. Iyakutti:
Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MES. 358-369 - Krishan Kumar Paliwal, Jinesh Shaji George, Navaneeth Rameshan, Vijay Laxmi, Manoj Singh Gaur, Vijay Janyani, Raghavendra Narasimhan:
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip. 370-380
Part 8 / Technical Session-8: Application-4 (AP-4)
- Anita Sahoo, Rohal Suchi, Neha Khan, Pooja Pandey, Mudita Srivastava:
Color Image Restoration Using Morphological Detectors and Adaptive Filter. 381-388 - Rohit Pathak, Satyadhar Joshi:
Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography. 389-399 - Vijay Harishchandra Mankar, Tirtha Shankar Das, Subir Kumar Sarkar:
An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling Distortions. 400-410 - Tarun Kumar, Ankush Mittal, Parikshit Sondhi:
Parallelization Issues of Domain Specific Question Answering System on Cell B.E. Processors. 411-421 - Ankur Gupta, Lalit Kumar Awasthi:
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions. 422-433 - A. S. Poornima, B. B. Amberker:
Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks. 434-444
Part 9 / Technical Session-9: Bioinformatics-1 (B-1)
- Sanchaita Ukil, Meenakshee Sinha, Lavneesh Varshney, Shipra Agrawal:
Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network Biology. 445-453 - Rajeshwer Shukla, Sugriva Nath Tiwari:
Study of Drug-Nucleic Acid Interactions: 9-amino- [N-2-(4-morpholinyl)ethyl]acridine-4-carboxamide. 454-460 - Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil, Derek E. Wildman:
IDChase: Mitigating Identifier Migration Trap in Biological Databases. 461-472 - Harpreet Singh, Pradeep Chowriappa, Sumeet Dua:
Multi-domain Protein Family Classification Using Isomorphic Inter-property Relationships. 473-484 - Shashidhar G. Koolagudi, Sudhamay Maity, Anil Kumar Vuppala, Saswat Chakrabarti, K. Sreenivasa Rao:
IITKGP-SESC: Speech Database for Emotion Analysis. 485-492
Part 10 / Technical Session-10: Bioinformatics-2 (B-2)
- Pritish Kumar Vardawaj, Neetesh Purohit, Bhumika Arora:
Detection of Splice Sites Using Support Vector Machine. 493-502 - Satarudra Prakash Singh, Bhartendu Nath Mishra:
Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding Peptides. 503-509 - Appala Raju Kotaru, Ramesh C. Joshi:
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach. 510-520 - Kumar Dhiraj, Santanu Kumar Rath, Korra Sathya Babu:
FCM for Gene Expression Bioinformatics Data. 521-532 - Balakrishnan Sarojini, Narayanasamy Ramaraj, Nickolas Savarimuthu:
Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature Selection. 533-543
Part 11 / Technical Session-11: System-1 (S-1)
- Sajai Vir Singh, Sudhanshu Maheshwari, Jitendra Mohan, Durg Singh Chauhan:
An Electronically Tunable SIMO Biquad Filter Using CCCCTA. 544-555 - Ravi Teja Dodda, Chris Smith, Aad P. A. van Moorsel:
An Architecture for Cross-Cloud System Management. 556-567 - Georgios Varsamopoulos, Ayan Banerjee, Sandeep K. S. Gupta:
Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling Models. 568-580 - Arun Sharma, Pritam S. Grover, Rajesh Kumar:
Predicting Maintainability of Component-Based Systems by Using Fuzzy Logic. 581-591 - Ishfaq Ahmad, Roman Arora, Derek White, Vangelis Metsis, Rebecca Ingram:
Energy-Constrained Scheduling of DAGs on Multi-core Processors. 592-603
Part 12 / Technical Session-12: System-2 (S-2)
- Jitender Kumar Chhabra, Varun Gupta:
Evaluation of Code and Data Spatial Complexity Measures. 604-614 - Vinod K. Panchal, Pramod K. Bhatnagar, Mitul Bhatnagar:
Pitcherpot: Avoiding Honeypot Detection. 615-624 - Divakar Yadav, Michael J. Butler:
Verification of Liveness Properties in Distributed Systems. 625-636 - Anand Gupta, Deepank Gupta, Nidhi Gupta:
InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices. 637-648 - Rohit Pathak, Satyadhar Joshi:
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup. 649-659
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.