


default search action
1st ACC 2011: Kochi, Kerala, India
- Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi

:
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I. Communications in Computer and Information Science 190, Springer 2011, ISBN 978-3-642-22708-0
Adhoc Networks
- Jayashree Padmanabhan, Abhinaya Sukumar, Ezhilarasi Elumalai, Sunanda Ramesh:

An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment. 1-10 - Chiranjeev Kumar

, Neeraj Tyagi, Rajeev Tripathi
, M. Lakshmi Prasanth Kumar, Dhirendra Kumar Sharma
, Sanjay Kumar Biswash
:
An Efficient Routing Protocol for Ad-Hoc Networks. 11-20 - Ravi Rastogi

, Rohit Verma, Nitin
, Durg Singh Chauhan:
3-Disjoint Paths Fault-tolerant Multi-stage Interconnection Networks. 21-33 - Anitha Sheela Kankacharla, Tarun Kumar Juluru

, Saritha Dedavath:
Reduction of Inter Carrier Interference by Pilot Aided Self Cancellation Compared to Self Cancellation Method. 34-43 - Manish Kumar, Rajbir Kaur

, Vijay Laxmi
, Manoj Singh Gaur:
A Novel Attack Model Simulation in OLSR. 44-53 - Surendra Singh Choudhary, Vijander Singh

, Reena Dadhich:
Performance Investigations of Routing Protocols in Manets. 54-63 - Diya Thomas

, Sabu M. Thampi
:
Mobile Query Processing-Taxonomy, Issues and Challenges. 64-77 - Ch. Rajasekhar, D. Srinivasa Rao, M. Vanaja, K. Vijay:

A Compact Low-Cost Phase Shifter for Wireless Applications. 78-82 - Arindarjit Pal, Jyoti Prakash Singh

, Paramartha Dutta
:
A Study on the Effect of Traffic Patterns in Mobile Ad Hoc Network. 83-90 - Sanjeev Rana, Manpreet Singh:

I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. 91-100 - Rajiv Misra

, Shailendra Shukla:
Social Network Aware Routing for Delay Tolerant Networks. 101-110 - E. A. Mary Anita:

Sybil Secure Architecture for Multicast Routing Protocols for MANETs. 111-118 - Madhu Chouhan, Manmath Narayan Sahoo, Pabitra Mohan Khilar

:
Fault Diagnosis in MANET. 119-128 - Chandreyee Chowdhury, Sarmistha Neogy:

Mobile Agent Security Based on Trust Model in MANET. 129-140 - Rahul Raghuvanshi, Mukesh Kumar Giluka, Vasudev Dehalwar

:
An Approach to Suppress Selfish Behavior of a Node in MANET by Hiding Destination Identity in Routing Path. 153-161 - H. Meena Sharma, Rajbir Kaur

, Manoj Singh Gaur, Vijay Laxmi
:
Broken Link Fraud in DSDV Routing - Detection and Countermeasure. 162-171
Advanced Micro Architecture Techniques
- A. S. Radhamani, E. Baburaj

:
Research on Power Optimization Techniques for Multi Core Architectures. 172-181 - M. Rajasekhara Babu, P. Venkata Krishna

, M. Khalid:
Optimization Techniques and Performance Evaluation of a Multithreaded Multi-core Architecture Using OpenMP. 182-191 - Magesh Kannan Parthasarathy, Karthik Govindarajan, G. Gunaraj, S. Lakshmi Prabha:

Review on VLSI Architectures for Optical OFDM Receivers. 192-203 - B. Parvathy:

A Pre-fetch Enabled Cache-Core Architecture for Multi-cores. 204-212 - Avani Rao, Mahesh Devani, Mitesh Limachia, Nikhil Kothari

:
Performance Analysis of Adaptive Scan Compression Methodology and Calculations of Compression Ratio. 213-222
Autonomic and Context-Aware Computing
- L. D. Dhinesh Babu

, M. Nirmala, Santhoshkumar Srinivasan, S. Panneerselvam:
Better Debugging of Logical Errors Using Optimized Call Stack Restricted Slicing. 223-231 - Mohammad Oliya, Hung Keng Pung:

Towards Incremental Reasoning for Context Aware Systems. 232-241 - Abhijan Bhattacharyya:

On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing. 242-249
Bioinformatics and Bio-computing
- Shweta Srivastava, Manisha Rathi, J. P. Gupta:

Predictive Analysis of Lung Cancer Recurrence. 260-269 - P. Vipeesh, N. J. R. Muniraj:

Development and Validation of Matlab Models for Nanowire Sensors. 270-283 - Saritha Namboodiri, Chandra Verma, Pawan K. Dhar, Alessandro Giuliani

, Achuthsankar S. Nair:
Application of Recurrence Quantification Analysis (RQA) in Biosequence Pattern Recognition. 284-293 - Geetha Govindan, Achuthsankar S. Nair:

New Feature Vector for Apoptosis Protein Subcellular Localization Prediction. 294-301 - Vrinda V. Nair, Anita Mallya, Bhavya Sebastian, Indu Elizabeth, Achuthsankar S. Nair:

Hurst CGR (HCGR) - A Novel Feature Extraction Method from Chaos Game Representation of Genomes. 302-309 - J. Sajeev, T. Mahalakshmi:

Hub Characterization of Tumor Protein P53 Using Artificial Neural Networks. 310-319 - G. Gopakumar

, Achuthsankar S. Nair:
Lacunarity Analysis of Protein Sequences Reveal Fractal Like Behavior of Amino Acid Distributions. 320-327 - Jyotshna Dongardive

, Agnes Xavier, Kavita Jain
, Siby Abraham
:
Classification and Rule-Based Approach to Diagnose Pulmonary Tuberculosis. 328-339 - Ai Sasho, Shenhaochen Zhu, Rahul Singh:

Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces. 340-350 - Ajay K. Mandava

, Shahram Latifi, Emma E. Regentova:
Reliability Assessment of Microarray Data Using Fuzzy Classification Methods: A Comparative Study. 351-360 - Seema More, M. Vidya, N. Sujana, H. D. Soumya:

Association Rule Mining for the Identification of Activators from Gene Regulatory Network. 361-370
Cloud, Cluster, Grid and P2P Computing
- Florian Schatz, Sven Koschnicke, Niklas Paulsen, Christoph Starke, Manfred Schimmler:

MPI Performance Analysis of Amazon EC2 Cloud Services for High Performance Computing. 371-381 - Gutha Jaya Krishna

, Rajeev Wankar
:
Algorithmic Approach to Calculating Minimal Resource Allocation Recommender for Grid Using Reliability and Trust Computations. 382-398 - A. Binu

, G. Santhosh Kumar
:
Virtualization Techniques: A Methodical Review of XEN and KVM. 399-410 - P. Varalakshmi, Aravindh Ramaswamy, Aswath Balasubramanian, Palaniappan Vijaykumar:

An Optimal Workflow Based Scheduling and Resource Allocation in Cloud. 411-420 - Gopal Chand Gautam, Teek Parval Sharma

:
Energy Efficient Time Synchronization Protocol for Wireless Sensor Networks. 421-430 - Wesam Dawoud, Ibrahim Takouna, Christoph Meinel:

Elastic VM for Cloud Resources Provisioning Optimization. 431-445 - Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala:

Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments. 446-460 - Naveen Kumar, Saumesh Kumar, Padam Kumar:

Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing. 461-470 - P. Varalakshmi, K. H. Priya, J. Pradeepa, V. Perumal:

SLA with Dual Party Beneficiality in Distributed Cloud. 471-479 - S. Ananthi, M. Sadish Sendil, S. Karthik:

Privacy Preserving Keyword Search over Encrypted Cloud Data. 480-487 - Sudharsan Sundararajan, Hari Narayanan, Vipin Pavithran, Kaladhar Voruganti, Krishnashree Achuthan:

Preventing Insider Attacks in the Cloud. 488-500 - Ankur Gupta

, Lohit Kapoor, Manisha Wattal:
C2C (Cloud-to-Cloud): An Ecosystem of Cloud Service Providers for Dynamic Resource Provisioning. 501-510 - Ritu Sharma, Manu Sood, Divya Sharma

:
Modeling Cloud SaaS with SOA and MDA. 511-518
Cognitive Radio and Cognitive Networks
- Dibyajnan Basak, Seba Maity, Santi P. Maity

:
Optimized Subcarrier Power Allocation in OFDM Underlay Cognitive Radio System. 519-528 - Abdelaali Chaoub

, Elhassane Ibn-Elhaj, Jamal El Abbadi:
Multimedia Traffic Transmission over Cognitive Radio Networks Using Multiple Description Coding. 529-543
Cyber Forensics
- Digambar Povar

, Divya S. Vidyadharan, K. L. Thomas:
Digital Image Evidence Detection Based on Skin Tone Filtering Technique. 544-551 - Satheesh Kumar Sasidharan

, K. L. Thomas:
BlackBerry Forensics: An Agent Based Approach for Database Acquisition. 552-561 - P. Vinod, Vijay Laxmi

, Manoj Singh Gaur:
Scattered Feature Space for Malware Analysis. 562-571
Database and Information Systems
- Neera Batra

, Manpreet Singh:
Multilevel Policy Based Security in Distributed Database. 572-580 - B. Ramasubbareddy, A. Govardhan

, A. Rama Mohan Reddy:
Mining Indirect Positive and Negative Association Rules. 581-591 - Amita Sharma, S. S. Sarangdevot:

Application of FOP and AOP Methodologies in Concert for Developing Insurance Software Using Eclipse-Based Open Source Environment. 592-606 - Kushal Gore, Pankaj Doke, Sanjay Kimbahune:

Revisiting B-Trees. 607-618 - Santosh Kumar, Sumit Kumar, Sukumar Nandi

:
Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset. 619-630 - S. P. Syed Ibrahim

, K. R. Chandran
, R. V. Nataraj:
LLAC: Lazy Learning in Associative Classification. 631-638 - K. Indira, S. Kanmani:

Association Rule Mining Using Genetic Algorithm: The role of Estimation Parameters. 639-648 - Animesh Tripathy, Sumit Kumar Maji, Prashanta Kumar Patra

:
UDSCA: Uniform Distribution Based Spatial Clustering Algorithm. 649-660 - Chithra Ramaraju, Nickolas Savarimuthu:

A Classification Model for Customer Segmentation. 661-670 - M. K. Sabu, G. Raju

:
A Rough Set Based Approach for Ranking Decision Rules. 671-682 - P. Jaganathan

, N. Rajkumar, R. Nagalakshmi:
A Kernel Based Feature Selection Method Used in the Diagnosis of Wisconsin Breast Cancer Dataset. 683-690 - Garima Thakur, Anjana Gosain:

Comparative Study on Data Warehouse Evolution Techniques. 691-703 - Chandrika, K. R. Ananda Kumar:

An Adaptive Framework for Clustering Data Streams. 704-711

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














