Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2835043acmotherconferencesBook PagePublication PagescomputeConference Proceedingsconference-collections
Compute '15: Proceedings of the 8th Annual ACM India Conference
ACM2015 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Compute '15: 8th Annual ACM India Conference Ghaziabad India October 29 - 31, 2015
ISBN:
978-1-4503-3650-5
Published:
29 October 2015
In-Cooperation:
ACM India

Reflects downloads up to 04 Oct 2024Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
SESSION: Session 1
research-article
Comparing Performance of Parallelizing Frameworks for Grid-Based Fluid Simulation on the CPU

In this paper we present a comparison study of two widely used parallelizing frameworks on the CPU, namely, OpenMP and Intel Threading Building Blocks (TBB). The particular problem domain we apply to is a grid-based fluid simulation solver. The standard ...

research-article
SQMMA: Software Quality Model for Maintainability Analysis

Software Quality is generally characterized by several factors which reveal the degree of success of the software developed and its future maintainability. Although many existing models provide frameworks of huge potential pertaining to quality analysis,...

research-article
Reliability on Top of Best Effort Delivery: Maximal Connectivity Test on NoC Interconnects

A scalable, packet address driven strategy that tests an open fault on network-on-chip (NoC) interconnects and maximal connectivity between neighbor routers in presence of a short fault is proposed. The open faults and maximal connectivity are tested ...

SESSION: Session 2
research-article
Trust Aware Resilient Geographic Routing in Wireless Ad Hoc and Sensor Networks

The objective of the paper is to propose trust aware routing method for cooperative and resilient geographic routing in Wireless Ad-hoc and Sensor Networks (WASNs). The proposed method calculates the trust value on the basis of node behavior in routing ...

research-article
Recommendations for Achieving Service Levels within Large-scale Resolution Service Networks

A new recommendation framework that addresses the correct and quick resolution of incidents that occur within the complex systems of an enterprise is introduced here. It uses statistical learning to mediate problem solving by large-scale Resolution ...

research-article
Lifetime Optimization for Target Coverage in Wireless Sensor Networks

Maintaining the desired coverage level and reliability is a major challenge in the field of wireless sensor networks (WSNs). WSN consists of number of resource constrained and unreliable sensors. In this paper we have proposed a node scheduling protocol ...

SESSION: Session 3
research-article
A Lightweight Stemmer for Devanagari Script

Stemming is an operation that reduces morphological variants of words to its stem. Stemming is a pre-processing tool which is used in various natural language processing applications such as text summarization, information retrieval, word sense ...

research-article
Parallel Framework for Efficient k-means Clustering

Handling and processing of larger volume of data requires efficient data mining algorithms. k-means is a very popular clustering algorithm for data mining, but its performance suffers because of initial seeding problem. The computation time of k-means ...

POSTER SESSION: Poster Presentations
research-article
An Empirical evaluation of CostBoost Extensions for Cost-Sensitive Classification

Data Mining Technique, namely Classification, is used to predict group membership for data samples. Ensemble learning, combining multiple classifiers using bagging, boosting or stacking, are proven data-mining methods, we have used boosting in this ...

research-article
Efficient Video Streaming for Interactive Session

Over the decades, researchers are trying to find an effective methodology for smooth uninterrupted multimedia data streaming through the broad band network in video on demand system. The problem is directly related to the efficiently use of methodology ...

research-article
Variable Feature Sets in Grid-based Layouts

As the digital data continues to grow unbounded, users expect intelligent processing and accurate coverage of all its domains. Advances in display technology have led to a variety of viewing devices, each with its own characteristic sizes and ...

research-article
Computing Modular Exponentiation for Fixed-Exponent

Exponentiation is computing ge, where g is an element of a group G and e is a positive integer. In modular exponentiation the underlying group is Zn or Z*n. This paper describe the methods to compute exponentiation where a fixed-exponent e is raised to ...

research-article
Scalable and Optimal Load Generation for AWS Clients

In this paper we describe techniques to use SPDY and HTTP network resources optimally for testing purposes with limited resources such as RAM. We demonstrate how to overcome the system limitations of network analysis tools such as the 64K limit on ...

research-article
A Novel Filtering and Coding Method for Image Classification and Image Retrieval

The feature extraction-coding-pooling framework improves the performance of image classification because it generates robust and discriminative image representation. The proposed system uses saliency driven multi-scale nonlinear diffusion filtering with ...

research-article
A Detection Algorithm for DoS Attack in the Cloud Environment

Cloud Computing provides an easy access to the end users i.e. users can access the services from wherever they want to without concerning about the storage, management, and cost and so on. With an increase in its number of users per day, threat for ...

research-article
Knowledge Networks and Knowledge Adjacencies

The modern enterprise is becoming larger and geographically distributed. The structure of companies is also becoming more complicated. Oraganizations are depending on knowledge within the enterprise and outside the enterprise. More and more individuals ...

research-article
Data Provenance for Historical Queries in Relational Database

Capturing, modeling, and querying data provenance in databases has gained considerable importance in the last decade. All kinds of applications developed on top of databases, now a days collect provenance for various purposes like trustworthiness of ...

research-article
A concurrent k-NN search algorithm for R-tree

k-nearest neighbor (k-NN) search is one of the commonly used query in database systems. It has its application in various domains like data mining, decision support systems, information retrieval, multimedia and spatial databases, etc. When k-NN search ...

research-article
A Novel Approach for Classification of E-Commerce Data

Classification is one of the most interesting problems in the fast evolving fields such as e-commerce and web-based businesses where the data is growing exponentially. Existing classification techniques over e-commerce data are mainly based on the users'...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 114 of 622 submissions, 18%
YearSubmittedAcceptedRate
Compute '17701927%
COMPUTE '161172219%
COMPUTE '141102119%
Compute '13962425%
COMPUTE '121161816%
COMPUTE '09113109%
Overall62211418%