default search action
15th ICDCIT 2019: Bhubaneswar, India
- Günter Fahrnberger, Sapna Gopinathan, Laxmi Parida:
Distributed Computing and Internet Technology - 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10-13, 2019, Proceedings. Lecture Notes in Computer Science 11319, Springer 2019, ISBN 978-3-030-05365-9
Invited Papers
- Meenakshi D'Souza, Rajanikanth Nagaraj Kashi:
Avionics Self-adaptive Software: Towards Formal Verification and Validation. 3-23 - Christian Erfurth:
The Digital Turn: On the Quest for Holistic Approaches. 24-30 - Hacène Fouchal, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
Secured Communications on Vehicular Networks over Cellular Networks. 31-41 - Ulrike Lechner:
IT-Security in Critical Infrastructures Experiences, Results and Research Directions. 42-59 - Hrushikesha Mohanty:
Digital Society: A Computing Science Prospective. 60-70
Distributed Computing
- Indrajeet Gupta, Shivangi Gupta, Anubhav Choudhary, Prasanta K. Jana:
A Hybrid Meta-heuristic Approach for Load Balanced Workflow Scheduling in IaaS Cloud. 73-89 - Madhu Sudan Kumar, Indrajeet Gupta, Prasanta K. Jana:
Duplication Based Budget Effective Workflow Scheduling for Cloud Computing. 90-98 - Sabuzima Nayak, Ripon Patgiri:
Dr. Hadoop: In Search of a Needle in a Haystack. 99-107 - Krishan Kumar Sethi, Dharavath Ramesh, M. Sreenu:
Parallel High Average-Utility Itemset Mining Using Better Search Space Division Approach. 108-124 - Pratik Shrivastava, Udai Shanker:
Supporting Transaction Predictability in Replicated DRTDBS. 125-140 - Wei Wang, Guanyu Wu, Zhe Guo, Liang Qian, Lianghui Ding, Feng Yang:
Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT. 141-149 - Yuting Zhu, Liang Qian, Chuyan Wang, Lianghui Ding, Feng Yang, Hao Wang:
Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming Architecture. 150-158
Emerging Areas
- Sandeep Bavkar, Brijesh Iyer, Shankar B. Deosarkar:
Detection of Alcoholism: An EEG Hybrid Features and Ensemble Subspace K-NN Based Approach. 161-168 - Ajay D. Kshemkalyani, Bhargav Voleti:
On the Growth of the Prime Numbers Based Encoded Vector Clock. 169-184 - Gaurav Kumar, N. Parimala:
A Sensitivity Analysis on Weight Sum Method MCDM Approach for Product Recommendation. 185-193 - Abhaya Kumar Pradhan, Hrushikesha Mohanty, Rajendra Prasad Lal:
Event Detection and Aspects in Twitter: A BoW Approach. 194-211 - Rajendra Kumar Roul, Samarth Mehrotra, Yash Pungaliya, Jajati Keshari Sahoo:
A New Automatic Multi-document Text Summarization using Topic Modeling. 212-221 - Ishrath Unissa, Syed Jalal Ahmad, P. Radha Krishna:
Improved Visible Light Communication Using Code Shift Keying Modulation. 222-232
Networks
- Aditi, Rasita Pai, S. Mini:
Optimization of Transmission Range for a Fault Tolerant Wireless Sensor Network. 235-242 - Laxmi Chaudhary, Buddha Singh:
Community Detection Using an Enhanced Louvain Method in Complex Networks. 243-250 - Debasis Das:
A Fast Handoff Technique for Wireless Mobile Networks. 251-259 - Bhumika Kalavadia, Tarushi Bhatia, Trupti Padiya, Ami Pandat, Minal Bhise:
Adaptive Partitioning Using Partial Replication for Sensor Data. 260-269 - Mariappan Ramasamy, Rama Subramanian M.:
Design and Implementation of Cognitive Radio Sensor Network for Emergency Communication Using Discrete Wavelet Packet Transform Technique. 270-278 - Ankur Sharma, S. Durga Bhavani:
A Network Formation Model for Collaboration Networks. 279-294 - Jerzy Dembski, Julian Szymanski:
Bees Detection on Images: Study of Different Color Models for Neural Networks. 295-308 - Abhinav Tomar, Prasanta K. Jana:
Mobile Charging of Wireless Sensor Networks for Internet of Things: A Multi-Attribute Decision Making Approach. 309-324
Security
- Varad Deshpande, Debasis Das:
Efficient Searching Over Encrypted Database: Methodology and Algorithms. 327-338 - Ruchi Kachhia, Prachi Agrawal, Manik Lal Das:
Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding. 339-348 - Shravani Mahesh Patil, B. R. Purushothama:
RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication. 349-363 - Srilekha Mukherjee, Goutam Sanyal:
Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. 364-379 - Ripon Patgiri, Hemanth Katari, Ronit Kumar, Dheeraj Sharma:
Empirical Study on Malicious URL Detection Using Machine Learning. 380-388 - Luke Owens, Benoît Razet, W. Bryan Smith, Theodore C. Tanner Jr.:
Inter-family Communication in Hyperledger Sawtooth and Its Application to a Crypto-Asset Framework. 389-401 - Rajesh Kumar Shrivastava, Bazila Bashir, Chittaranjan Hota:
Attack Detection and Forensics Using Honeypot in IoT Environment. 402-409 - Pranav Kumar Singh, Anish V. Monsy, Rajan Garg, Sukanta Dey, Sukumar Nandi:
JSpongeGen: A Pseudo Random Generator for Low Resource Devices. 410-421 - Pranav Kumar Singh, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi:
Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity. 422-439
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.