default search action
ACAI 2011: Rajpura/Punjab, India
- Archana Mantri, Meenu Khurana:
International Conference on Advances in Computing and Artificial Intelligence, ACAI '11, Rajpura/Punjab, India - July 21 - 22, 2011. ACM 2011, ISBN 978-1-4503-0635-5 - Heena, Ranjna Garg:
A comparative study of UML tools. 1-4 - Ranjna Garg, Heena:
Study of text based mining. 5-8 - Jatinder Singh Manhas:
Educational web sites accessibility design model. 9-12 - Santosh Kumar, Sumit Kumar:
Automated taxi/cab system using A* algorithm. 13-20 - Sumit Kumar, Santosh Kumar, Sukumar Nandi:
Distributed smart camera network and mobile devices. 21-24 - Aniket Bera:
Scene flow estimation from stereo video source. 25-28 - Shalvi Dave, Jimit Mahadevia, Bhushan Trivedi:
Security policy implementation using connection and event log to achieve network access control. 29-33 - Gurdip Kaur, Meenu Khurana, Monika Sethi:
Intrusion detection system using honeypots and swarm intelligence. 34-38 - Anuj Kumar Gupta, Anil K. Verma, Harsh Sadawarti:
Analysis of various swarm-based & ant-based algorithms. 39-43 - Manish Khare, Rajneesh Kumar Srivastava, Ashish Khare:
Performance evaluation on segmentation methods for medical images. 44-49 - Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh:
DMX in MANETs: major research trends since 2004. 50-55 - Poonam Saini, Awadhesh Kumar Singh:
Efficient fault tolerant consensus using preemptive token. 56-60 - Qaim Mehdi Rizvi, Qamar Abbas, Hasan Ahmad:
A hybrid method for 3D face localization. 61-64 - Kamaldeep Kaur:
Topic tracking techniques for natural language processing. 65-71 - Gaurav Raj:
An efficient broker cloud management system. 72-76 - Anirban Sengupta, Reza Sedaghat, Pallabi Sarkar:
Integrated design space exploration based on power-performance trade-off using genetic algorithm. 77-81 - Pallabi Sarkar, Reza Sedaghat, Anirban Sengupta:
Application specific processor vs. microblaze soft core RISC processor: FPGA based performance and CPR analysis. 82-85 - Anil Kumar, C. L. Varshney, Sajjan Lal:
Crank-Nicolson scheme to transient MHD free convective flow through semi-infinite vertical porous plate with constant suction and temperature dependent heat source. 86-92 - Raj Kumar, Divya Gupta:
Security in real time multimedia data based on generalized keys. 93-96 - Chandra Mani Sharma, Alok Kumar Singh Kushwaha, Swati Nigam, Ashish Khare:
Automatic human activity recognition in video using background modeling and spatio-temporal template matching based technique. 97-101 - Sheetal Kalra, Sandeep K. Sood:
Elliptic curve cryptography: survey and its security applications. 102-106 - S. Thenmalar, T. V. Geetha, S. Renuga Devi:
Ontology based semantic similarly ranking of documents. 107-110 - Awadhesh Kumar Singh, Shantanu Sharma:
Trivial solution for a non-trivial problem in MANETs. 111-119 - Manjot Bhatia:
RR based grid scheduling algorithm. 120-123 - Sanjeev Kumar Sharma, Ritu Tiwari, Anupam Shukla, Vikas Singh:
Frontal view gait based recognition using PCA. 124-127 - Prabhakaran Sethuraman, Lakshmi Rajamani:
Complexity study on "Carry-along Sort" algorithm. 128-134 - Mohammad Sarfraz, Francis F. Li, Mohammad Javed:
A comparative study of ICA algorithms for ECG signal processing. 135-138 - Avneet Kaur Dhawan, Jaswinder Singh:
Modeling and designing of machine learning procedures as applied to game playing using artificial intelligence. 139-143 - Ashwani Kush, Sunil Taneja:
Secured routing over MANET with power management. 144-149 - Arpit, Ashwini Kumar:
Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environment. 150-154 - Jaspreet Kaur, Narinder Kehar:
RFID enabled cards skimming: enhanced technology. 155-157 - Vaishali Sood:
Adapting intelligence in robot using fuzzy logic. 158-161 - Sandeep Mehan, Vandana Sharma:
Development of traffic light control system based on fuzzy logic. 162-165 - Amit Kumar Singh, Barjeev Tyagi, Vishal Kumar:
Fuzzy rule-based controller for binary distillation column. 166-169 - Gulshan Kumar, Krishan Kumar:
AI based supervised classifiers: an analysis for intrusion detection. 170-174 - Kawal Jeet, Renu Dhir:
A model for estimating efforts required to make changes in a software development project. 175-178 - Sangeet Kumar, Nitin Bhatia, Namarta Kapoor:
Fuzzy logic based decision support system for loan risk assessment. 179-182 - Darshan Singh, Ritu Garg:
A robust multi-objective optimization to workflow scheduling for dynamic grid. 183-188 - Prasanta Kumar Pany, S. P. Ghoshal:
Forecasting the hourly Ontario energy price by local linear wavelet neural network and ARMA models. 189-193 - K. Koteswara Rao, G. SVP Raju:
Error correction in function point estimation using soft computing technique. 194-198 - Bikramjit Singh, Saurabh Puri, Prateek Kesarwani:
Wireless machine monitoring embodiment using mobile computing. 199-203 - Archana Mishra, Abhishek Agrawal, Rajeev Ranjan:
Artificial intelligent firewall. 204-207 - Kuldeep Singh, Sunil Agrawal:
Feature extraction based IP traffic classification using machine learning. 208-212 - Neeraj Sanduja, Pavneet Kaur:
Architecture for intelligent transport system for automated vehicle. 213-215 - Sarpreet Singh, R. K. Bawa:
An efficient job scheduling algorithm for grid computing. 216-219 - Jyoti Snehi, Manish Snehi, Sudha Goyal:
Security threats to mobile agents. 220-222 - Deepti Malhotra, Devanand:
MGC middleware for grid computing: the Globus Toolkit. 223-228 - Gurparkash Singh Kang, Jaiteg Singh, Maninderjit Singh Khanna:
Semantic web services in clouds for semantic computing. 229-232 - Vinay Kukreja, Jaiteg Singh, Anju Sharma:
Contemporary study of cloud computing environment. 233-235
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.