default search action
1st ACC 2011: Kochi, Kerala, India
- Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi:
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I. Communications in Computer and Information Science 190, Springer 2011, ISBN 978-3-642-22708-0
Adhoc Networks
- Jayashree Padmanabhan, Abhinaya Sukumar, Ezhilarasi Elumalai, Sunanda Ramesh:
An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment. 1-10 - Chiranjeev Kumar, Neeraj Tyagi, Rajeev Tripathi, M. Lakshmi Prasanth Kumar, Dhirendra Kumar Sharma, Sanjay Kumar Biswash:
An Efficient Routing Protocol for Ad-Hoc Networks. 11-20 - Ravi Rastogi, Rohit Verma, Nitin, Durg Singh Chauhan:
3-Disjoint Paths Fault-tolerant Multi-stage Interconnection Networks. 21-33 - Anitha Sheela Kankacharla, Tarun Kumar Juluru, Saritha Dedavath:
Reduction of Inter Carrier Interference by Pilot Aided Self Cancellation Compared to Self Cancellation Method. 34-43 - Manish Kumar, Rajbir Kaur, Vijay Laxmi, Manoj Singh Gaur:
A Novel Attack Model Simulation in OLSR. 44-53 - Surendra Singh Choudhary, Vijander Singh, Reena Dadhich:
Performance Investigations of Routing Protocols in Manets. 54-63 - Diya Thomas, Sabu M. Thampi:
Mobile Query Processing-Taxonomy, Issues and Challenges. 64-77 - Ch. Rajasekhar, D. Srinivasa Rao, M. Vanaja, K. Vijay:
A Compact Low-Cost Phase Shifter for Wireless Applications. 78-82 - Arindarjit Pal, Jyoti Prakash Singh, Paramartha Dutta:
A Study on the Effect of Traffic Patterns in Mobile Ad Hoc Network. 83-90 - Sanjeev Rana, Manpreet Singh:
I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. 91-100 - Rajiv Misra, Shailendra Shukla:
Social Network Aware Routing for Delay Tolerant Networks. 101-110 - E. A. Mary Anita:
Sybil Secure Architecture for Multicast Routing Protocols for MANETs. 111-118 - Madhu Chouhan, Manmath Narayan Sahoo, Pabitra Mohan Khilar:
Fault Diagnosis in MANET. 119-128 - Chandreyee Chowdhury, Sarmistha Neogy:
Mobile Agent Security Based on Trust Model in MANET. 129-140 - Rahul Raghuvanshi, Mukesh Kumar Giluka, Vasudev Dehalwar:
An Approach to Suppress Selfish Behavior of a Node in MANET by Hiding Destination Identity in Routing Path. 153-161 - H. Meena Sharma, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
Broken Link Fraud in DSDV Routing - Detection and Countermeasure. 162-171
Advanced Micro Architecture Techniques
- A. S. Radhamani, E. Baburaj:
Research on Power Optimization Techniques for Multi Core Architectures. 172-181 - M. Rajasekhara Babu, P. Venkata Krishna, M. Khalid:
Optimization Techniques and Performance Evaluation of a Multithreaded Multi-core Architecture Using OpenMP. 182-191 - Magesh Kannan Parthasarathy, Karthik Govindarajan, G. Gunaraj, S. Lakshmi Prabha:
Review on VLSI Architectures for Optical OFDM Receivers. 192-203 - B. Parvathy:
A Pre-fetch Enabled Cache-Core Architecture for Multi-cores. 204-212 - Avani Rao, Mahesh Devani, Mitesh Limachia, Nikhil Kothari:
Performance Analysis of Adaptive Scan Compression Methodology and Calculations of Compression Ratio. 213-222
Autonomic and Context-Aware Computing
- L. D. Dhinesh Babu, M. Nirmala, Santhoshkumar Srinivasan, S. Panneerselvam:
Better Debugging of Logical Errors Using Optimized Call Stack Restricted Slicing. 223-231 - Mohammad Oliya, Hung Keng Pung:
Towards Incremental Reasoning for Context Aware Systems. 232-241 - Abhijan Bhattacharyya:
On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing. 242-249
Bioinformatics and Bio-computing
- Shweta Srivastava, Manisha Rathi, J. P. Gupta:
Predictive Analysis of Lung Cancer Recurrence. 260-269 - P. Vipeesh, N. J. R. Muniraj:
Development and Validation of Matlab Models for Nanowire Sensors. 270-283 - Saritha Namboodiri, Chandra Verma, Pawan K. Dhar, Alessandro Giuliani, Achuthsankar S. Nair:
Application of Recurrence Quantification Analysis (RQA) in Biosequence Pattern Recognition. 284-293 - Geetha Govindan, Achuthsankar S. Nair:
New Feature Vector for Apoptosis Protein Subcellular Localization Prediction. 294-301 - Vrinda V. Nair, Anita Mallya, Bhavya Sebastian, Indu Elizabeth, Achuthsankar S. Nair:
Hurst CGR (HCGR) - A Novel Feature Extraction Method from Chaos Game Representation of Genomes. 302-309 - J. Sajeev, T. Mahalakshmi:
Hub Characterization of Tumor Protein P53 Using Artificial Neural Networks. 310-319 - G. Gopakumar, Achuthsankar S. Nair:
Lacunarity Analysis of Protein Sequences Reveal Fractal Like Behavior of Amino Acid Distributions. 320-327 - Jyotshna Dongardive, Agnes Xavier, Kavita Jain, Siby Abraham:
Classification and Rule-Based Approach to Diagnose Pulmonary Tuberculosis. 328-339 - Ai Sasho, Shenhaochen Zhu, Rahul Singh:
Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces. 340-350 - Ajay K. Mandava, Shahram Latifi, Emma E. Regentova:
Reliability Assessment of Microarray Data Using Fuzzy Classification Methods: A Comparative Study. 351-360 - Seema More, M. Vidya, N. Sujana, H. D. Soumya:
Association Rule Mining for the Identification of Activators from Gene Regulatory Network. 361-370
Cloud, Cluster, Grid and P2P Computing
- Florian Schatz, Sven Koschnicke, Niklas Paulsen, Christoph Starke, Manfred Schimmler:
MPI Performance Analysis of Amazon EC2 Cloud Services for High Performance Computing. 371-381 - Gutha Jaya Krishna, Rajeev Wankar:
Algorithmic Approach to Calculating Minimal Resource Allocation Recommender for Grid Using Reliability and Trust Computations. 382-398 - A. Binu, G. Santhosh Kumar:
Virtualization Techniques: A Methodical Review of XEN and KVM. 399-410 - P. Varalakshmi, Aravindh Ramaswamy, Aswath Balasubramanian, Palaniappan Vijaykumar:
An Optimal Workflow Based Scheduling and Resource Allocation in Cloud. 411-420 - Gopal Chand Gautam, Teek Parval Sharma:
Energy Efficient Time Synchronization Protocol for Wireless Sensor Networks. 421-430 - Wesam Dawoud, Ibrahim Takouna, Christoph Meinel:
Elastic VM for Cloud Resources Provisioning Optimization. 431-445 - Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala:
Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments. 446-460 - Naveen Kumar, Saumesh Kumar, Padam Kumar:
Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing. 461-470 - P. Varalakshmi, K. H. Priya, J. Pradeepa, V. Perumal:
SLA with Dual Party Beneficiality in Distributed Cloud. 471-479 - S. Ananthi, M. Sadish Sendil, S. Karthik:
Privacy Preserving Keyword Search over Encrypted Cloud Data. 480-487 - Sudharsan Sundararajan, Hari Narayanan, Vipin Pavithran, Kaladhar Voruganti, Krishnashree Achuthan:
Preventing Insider Attacks in the Cloud. 488-500 - Ankur Gupta, Lohit Kapoor, Manisha Wattal:
C2C (Cloud-to-Cloud): An Ecosystem of Cloud Service Providers for Dynamic Resource Provisioning. 501-510 - Ritu Sharma, Manu Sood, Divya Sharma:
Modeling Cloud SaaS with SOA and MDA. 511-518
Cognitive Radio and Cognitive Networks
- Dibyajnan Basak, Seba Maity, Santi P. Maity:
Optimized Subcarrier Power Allocation in OFDM Underlay Cognitive Radio System. 519-528 - Abdelaali Chaoub, Elhassane Ibn-Elhaj, Jamal El Abbadi:
Multimedia Traffic Transmission over Cognitive Radio Networks Using Multiple Description Coding. 529-543
Cyber Forensics
- Digambar Povar, Divya S. Vidyadharan, K. L. Thomas:
Digital Image Evidence Detection Based on Skin Tone Filtering Technique. 544-551 - Satheesh Kumar Sasidharan, K. L. Thomas:
BlackBerry Forensics: An Agent Based Approach for Database Acquisition. 552-561 - P. Vinod, Vijay Laxmi, Manoj Singh Gaur:
Scattered Feature Space for Malware Analysis. 562-571
Database and Information Systems
- Neera Batra, Manpreet Singh:
Multilevel Policy Based Security in Distributed Database. 572-580 - B. Ramasubbareddy, A. Govardhan, A. Rama Mohan Reddy:
Mining Indirect Positive and Negative Association Rules. 581-591 - Amita Sharma, S. S. Sarangdevot:
Application of FOP and AOP Methodologies in Concert for Developing Insurance Software Using Eclipse-Based Open Source Environment. 592-606 - Kushal Gore, Pankaj Doke, Sanjay Kimbahune:
Revisiting B-Trees. 607-618 - Santosh Kumar, Sumit Kumar, Sukumar Nandi:
Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset. 619-630 - S. P. Syed Ibrahim, K. R. Chandran, R. V. Nataraj:
LLAC: Lazy Learning in Associative Classification. 631-638 - K. Indira, S. Kanmani:
Association Rule Mining Using Genetic Algorithm: The role of Estimation Parameters. 639-648 - Animesh Tripathy, Sumit Kumar Maji, Prashanta Kumar Patra:
UDSCA: Uniform Distribution Based Spatial Clustering Algorithm. 649-660 - Chithra Ramaraju, Nickolas Savarimuthu:
A Classification Model for Customer Segmentation. 661-670 - M. K. Sabu, G. Raju:
A Rough Set Based Approach for Ranking Decision Rules. 671-682 - P. Jaganathan, N. Rajkumar, R. Nagalakshmi:
A Kernel Based Feature Selection Method Used in the Diagnosis of Wisconsin Breast Cancer Dataset. 683-690 - Garima Thakur, Anjana Gosain:
Comparative Study on Data Warehouse Evolution Techniques. 691-703 - Chandrika, K. R. Ananda Kumar:
An Adaptive Framework for Clustering Data Streams. 704-711
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.