default search action
HPAGC 2011: Chandigarh, India
- Archana Mantri, Suman Nandi, Gaurav Kumar, Sandeep Kumar:
High Performance Architecture and Grid Computing - International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings. Communications in Computer and Information Science 169, Springer 2011, ISBN 978-3-642-22576-5
Theme - 1: Grid and Cloud Computing
- Tarun Gupta, Vipin Tyagi:
A Novel Approach for Task Processing through NEST Network in a Grid. 24-29 - Pardeep Sharma, Sandeep K. Sood, Sumeet Kaur:
Security Issues in Cloud Computing. 36-45 - Jyoti Snehi, Manish Snehi, Rupali Gill:
Virtualization as an Engine to Drive Cloud Computing Security. 62-66 - Vinit Kumar, Ajay Agarwal:
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control Protocol. 67-78 - S. Sindhu, Saswati Mukherjee:
Efficient Task Scheduling Algorithms for Cloud Computing Environment. 79-83 - Bharat Chhabra, Bhawna Taneja:
"Cloud Computing: Towards Risk Assessment". 84-91 - L. Yamini, G. LathaSelvi, Saswati Mukherjee:
Efficient Grid Scheduling with Clouds. 92-102 - Anshu Parashar, Jitender Kumar Chhabra:
Clustering Dynamic Class Coupling Data to Measure Class Reusability Pattern. 126-130 - Pankaj Deep Kaur, Inderveer Chana:
Enhancing Grid Resource Scheduling Algorithms for Cloud Environments. 140-144 - Sumit Goyal, A. K. Sharma, R. K. Sharma:
Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative Study. 145-149
Theme - 2: High Performance Architecture
- Manoj Kumar, Sujata Pandey, Sandeep Kumar Arya:
Design of CMOS Energy Efficient Single Bit Full Adders. 159-168 - Mamta Punjabi, Vineet Kushwaha, Rashmi Ranjan:
Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive Analytics. 169-178 - Rajkumar Sharma, Priyesh Kanungo, Manohar Chandwani:
A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous Environment. 186-191 - M. Vigilson Prem, S. Swamynathan:
Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service Applications. 192-200 - D. Paulraj, S. Swamynathan:
Composition of Composite Semantic Web Services Using Abductive Event Calculus. 201-213 - S. Rajagopalan, E. R. Naganathan, P. Herbert Raj:
Ant Colony Optimization Based Congestion Control Algorithm for MPLS Network. 214-223 - Padma Devi, Gurinder Pal Singh, Balwinder Singh:
Low Power Optimized Array Multiplier with Reduced Area. 224-232 - Gurinder Pal Singh, Balwinder Singh:
Simulink Library Development and Implementation for VLSI Testing in Matlab. 233-240 - Swagata Samanta, Soumi Paik, Shreedeep Gangopadhyay, Amlan Chakrabarti:
Processing of Image Data Using FPGA-Based MicroBlaze Core. 241-246 - Rani Astya, Parma Nand, Sunita Sharma:
Parametric Analysis of Zone Routing Protocol. 247-251 - Musheer Ahmad, Omar Farooq:
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. 257-264 - Shakuntla, A. K. Lal, S. S. Bhatia:
Computational Analysis of Availability of Process Industry for High Performance. 265-274 - Jitender Kumar Chhabra, Amarjeet Prajapati:
A Framework for Vulnerability Analysis during Software Maintenance. 282-287 - Sanchika Gupta, Deepak Garg:
Ontology Based Information Retrieval for Learning Styles of Autistic People. 293-298 - A. PrashanthRao, A. Govardhan:
Self-Configurable Scheduling Algorithm for Heterogeneous Computing Systems. 306-315 - V. Shanmughaneethi, Ra. Yagna Pravin, C. Emilin Shyni, S. Swamynathan:
SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services. 327-337 - Sandeep Kaur, Anu Sheetal, Preetkanwal Singh:
Computational Model for Prokaryotic and Eukaryotic Gene Prediction. 342-348 - Rahul Agnihotri, Gursewak Singh Brar, Raju Sharma:
Optimum Controller for Automatic Generation Control. 357-363 - R. N. Kulkarni, T. Aruna, N. Amrutha:
Abstraction of Design Information from Procedural Program. 364-372 - Aarti Singh, Dimple Juneja, A. K. Sharma:
Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent Interface. 373-384 - Vaishali Sood:
Autonomous Robot Motion Control Using Fuzzy PID Controller. 385-390 - Parvinder Kaur, Baljit Singh:
A Multiresolution Technique to Despeckle Ultrasound Images. 391-396
Theme - 3: Information Management and Network Security
- Dimple Juneja, Atul Sharma, A. K. Sharma:
Wireless Sensor Network Security Research and Challenges: A Backdrop. 406-416 - Prasanna Mani, K. R. Chandran:
Automated Test Case Generation for Object Oriented Systems Using UML Object Diagrams. 417-423 - Tanu Preet Singh, Manmeet Kaur, Vishal Sharma:
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO). 424-429 - Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh:
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments. 430-434 - Seema Yadav, Khaleel Ahmad, Jayant Shekhar:
Analysis of Digital Forensic Tools and Investigation Process. 435-441 - Sunil Taneja, Ashwani Kush:
Evaluation of Normalized Routing Load for MANET. 442-448 - Sheetal Kalra, Sandeep K. Sood:
Elliptic Curve Cryptography: Current Status and Research Challenges. 455-460 - Indrajit Banerjee, Prasenjit Chanak, Hafizur Rahaman:
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor Networks. 461-469 - Neeraj Kumar Sharma, Naresh Kumar Nagwani:
Study and Analysis of Incremental Apriori Algorithm. 470-472 - B. Chandra Mohan, R. Baskaran:
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony System. 473-484 - Avinash Sharma, Narendra Agarwal, Satyabrata Roy, Ajay Sharma, Pankaj Sharma:
Implementing Key Management for Security in Ad Hoc Network. 485-489 - Vishal Sharma, Jagjit Malhotra, Harsukhpreet Singh:
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLAN. 490-496 - Vijay Kumar, Rakesh Sharma, Ashwani Kush:
Key Authentication for MANET Security. 497-504 - Mini Singh Ahuja, Sumit Chabbra:
Biometric Encryption: Combining Fingerprints and Cryptography. 505-514 - Sumit Kushwaha, Vinay Kumar, Sanjeev Jain:
Node Architectures and Its Deployment in Wireless Sensor Networks: A Survey. 515-526 - J. Ujwala Rekha, K. Shahu Chatrapati, A. Vinaya Babu:
Competitive Equilibrium Theory and Its Applications in Computer Science. 539-547 - Manjit Sandhu, Tajinder Kaur, Mahesh Chander, Anju Bala:
Understanding the Generation of Cellular Technologies. 557-567 - Sima Singh, Ashwani Kush:
Evaluation of Routing Schemes for MANET. 568-573 - Sonia Gupta, P. K. Bharti, Vishal Choudhary:
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc Networks. 574-579 - P. Kalyani, C. Chellappan:
Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor Networks. 580-587 - Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks. 594-602 - Sukhpreet Kaur, Sumeet Kaur:
An Image Steganography Approach Based upon Matching. 603-608 - G. Geetha, Saruchi:
From Calculus to Number Theory, Paves Way to Break OSS Scheme. 609-611 - Ekta Walia, Anu Suneja:
Digital Image Watermarking Technique Based on Dense Descriptor. 612-616 - P. K. Suri, Ekta Walia, Amit Verma:
Novel Face Detection Using Gabor Filter Bank with Variable Threshold. 617-625 - Ajay Jangra, Nitin Goel, Chander Kant, Priyanka:
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs). 631-639
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.