


default search action
1st ACC 2011: Kochi, Kerala, India
- Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi

:
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings. Communications in Computer and Information Science 191, Springer 2011, ISBN 978-3-642-22713-4
Database and Information Systems
- Korra Sathya Babu

, Sanjay Kumar Jena:
Balancing between Utility and Privacy for k-Anonymity. 1-8 - Krishna Khajaria, Manoj Kumar:

Evaluation of Approaches for Modeling of Security in Data Warehouses. 9-18 - Radha Senthilkumar

, C. Lingeshwaraa, Arputharaj Kannan
:
Content Based Compression for Quicx System. 19-29
Distributed Software Development
- Ashfa Umber, Imran Sarwar Bajwa

, Muhammad Asif Naeem
:
NL-Based Automated Software Requirements Elicitation and Specification. 30-39 - Fateh Boutekkouk

, Zakaria Tolba
, Mustapha Okab:
Automatic Interface Generation between Incompatible Intellectual Properties (IPs) from UML Models. 40-47 - Vaithianathan Geetha

, Niladhuri Sreenath
:
Deadlock Prevention in Distributed Object Oriented Systems. 48-57 - Puneet Mittal

, Satwinder Singh
, Karanjeet Singh Kahlon:
Identification of Error Prone Classes for Fault Prediction Using Object Oriented Metrics. 58-68 - N. Kayarvizhy, S. Kanmani:

An Automated Tool for Computing Object Oriented Metrics Using XML. 69-79 - B. Athira

, Philip Samuel:
Traceability Matrix for Regression Testing in Distributed Software Development. 80-87 - N. Sivakumar, K. Vivekanandan, S. Sandhya:

Testing Agent-Oriented Software by Measuring Agent's Property Attributes. 88-98
Human Computer Interaction and Interface
- Sneha G. Gondane, M. Dhivya, D. Shyam:

Classifier Feature Extraction Techniques for Face Recognition System under Variable Illumination Conditions. 99-108 - Adity Saikia, Shyamanta M. Hazarika

:
Bispectrum Analysis of EEG in Estimation of Hand Movement. 109-118 - Adity Saikia, Nayan M. Kakoty, Shyamanta M. Hazarika

:
Wavelet Selection for EMG Based Grasp Recognition through CWT. 119-129 - Adityo Ashari Wirjono, Z. S. Ricky Lincoln, William, Dewi Agushinta R.

:
Information Visualization for Tourist and Travelling in Indonesia. 130-137 - Dewi Agushinta R.

, Bima Shakti Ramadhan Utomo, Denny Satria, Jennifer Sabrina Karla Karamoy, Nuniek Nur Sahaya:
The Smart Goal Monitoring System. 138-145 - Kezia Velda Roberta, Lulu Mawaddah Wisudawati, Muhammad Razi, Dewi Agushinta R.

:
Web Based Virtual Agent for Tourism Guide in Indonesia. 146-153 - Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Md. Mostafizur Rahman, Mohammad Nasiruddin

, Md. Abdul Latif, Mohammad Nurul Huda:
Local Feature or Mel Frequency Cepstral Coefficients - Which One Is Better for MLN-Based Bangla Speech Recognition? 154-161 - Rohit Agrawal, C. Sasi Kumar, Darshan Moodgal:

Power Optimization Techniques for Segmented Digital Displays. 162-171 - Santa Maiti, Debasis Samanta, Satya Ranjan Das, Monalisa Sarma:

Language Independent Icon-Based Interface for Accessing Internet. 172-182 - Preety Singh

, Deepika Gupta, Vijay Laxmi
, Manoj Singh Gaur:
Contribution of Oral Periphery on Visual Speech Intelligibility. 183-190
ICT
- Sugam Sharma, U. Sunday Tim, Shashi K. Gadia, Patrick Smith:

Geo-spatial Pattern Determination for SNAP Eligibility in Iowa Using GIS. 191-200 - Paul Anu, Paul Varghese:

Project Management Model for e-Governance in the Context of Kerala State. 201-209 - Deka Ganesh Chandra, Dutta Borah Malaya:

ICT Its Role in e-Governance and Rural Development. 210-222 - C. K. Raju, Ashok Mishra:

Enhancing Sustainability of Software: A Case-Study with Monitoring Software for MGNREGS in India. 223-233
Internet and Web Computing
- P. Dharanyadevi, P. Dhavachelvan, S. K. V. Jayakumar, Ramachandran Baskaran, V. S. K. Venkatachalapathy:

Proficient Discovery of Service in Event Driven Service Oriented Architecture. 234-242 - G. Poornalatha

, Prakash S. Raghavendra:
Web User Session Clustering Using Modified K-Means Algorithm. 243-252 - Achuthan Nair Rajimol, Gopalakrishna Kurup Raju:

FOL-Mine - A More Efficient Method for Mining Web Access Pattern. 253-262 - S. Saritha

, G. Santhosh Kumar:
Semantic Association Mining on Spatial Patterns in Medical Images. 263-272 - Anjali Thukral

, Varun Mendiratta, Abhishek Behl, Hema Banati
, Punam Bedi
:
FCHC: A Social Semantic Focused Crawler. 273-283 - Vibha Gaur, Neeraj Kumar Sharma

:
A Dynamic Seller Selection Model for an Agent Mediated e-Market. 284-295 - Bhaskara Rao Boddu

, Valli Kumari Vatsavayi
:
A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm. 296-306 - Ash Mohammad Abbas, Ravindra Kumar

:
A Client Perceived Performance Evaluation of Web Servers. 307-316 - Imran Ahmed, Sunil Kumar Kopparapu

:
Enhanced Quality of Experience through IVR Mashup to Access Same Service Multiple Operator Services. 317-326 - K. Saruladha, Gnanasekaran Aghila, A. Bhuvaneswary:

Information Content Based Semantic Similarity Approaches for Multiple Biomedical Ontologies. 327-336 - Harilal Parasuram, Bipin Nair

, Krishnashree Achuthan, Shyam Diwakar
:
Taking Project Tiger to the Classroom: A Virtual Lab Case Study. 337-348 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri

:
Green Communications through Network Redesign. 349-357 - D. Devakumari, K. Thangavel:

Unsupervised Modified Adaptive Floating Search Feature Selection. 358-365 - M. Thilagu, R. Nadarajan:

Fast and Efficient Mining of Web Access Sequences Using Prefix Based Minimized Trees. 366-373
Mobile Computing
- Muhammad Awais

, Ashwani Singh, Guido Masera
:
Scalable, High Throughput LDPC Decoder for WiMAX (802.16e) Applications. 374-385 - Gustavo Jiménez, Yezid Donoso

:
Unique Mechanism of Selection of Traffic Flow Templates for Mobility IP Protocols Using Multihoming and IP Flow Mobility on the NGMN. 386-396 - Sharmishta Desai

, R. K. Bedi, B. N. Jagdale
, V. M. Wadhai:
Elliptic Curve Cryptography for Smart Phone OS. 397-406 - Anjani Kumar Rai, Shivendu Mishra, Pramod Narayan Tripathi:

An Improved Secure Authentication Protocol for WiMAX with Formal Verification. 407-416 - Suparna Biswas, Sarmistha Neogy:

Secured Fault Tolerant Mobile Computing. 417-429 - Suneeta Chawla, Apurv Nigam, Pankaj Doke, Sanjay Kimbahune:

A Survey of Virtualization on Mobiles. 430-441 - Abhishek Varshney, Mohammed Abdul Qadeer:

Mobile Peer to Peer Spontaneous and Real-Time Social Networking. 442-451 - Chhagan Lal

, Vijay Laxmi
, Manoj Singh Gaur:
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. 452-459
Multi Agent Systems
- Vikram Saralaya, J. K. Kishore, Sateesh Reddy, Radhika M. Pai

, Sanjay Singh
:
Modeling and Verification of Chess Game Using NuSMV. 460-470 - Muhammad Tahir, Dominique Gaïti, Majid Iqbal Khan

:
SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents. 471-479
Multimedia and Video Systems
- Pradipta K. Banerjee

, Jayanta K. Chandra, Asit K. Datta:
Face Detection and Eye Localization in Video by 3D Unconstrained Filter and Neural Network. 480-489 - Noopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, S. S. Anju:

Secret Image Sharing Using Steganography with Different Cover Images. 490-497 - Aishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, S. S. Anju:

A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods. 498-505 - Sattvik Sharma, R. Sreevathsan, M. V. V. N. S. Srikanth, C. Harshith, T. Gireesh Kumar

:
Cognitive Environment for Pervasive Learners. 506-515 - Anand Singh Jalal

, Vrijendra Singh
:
A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet Transform. 516-524 - Mukhtar Azeem, Majid Iqbal Khan

, Arfan Nazir:
File System Level Circularity Requirement. 525-534 - Azzat A. Al-Sadi, El-Sayed M. El-Alfy

:
An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing. 535-544
Parallel and Distributed Algorithms
- Neela Madheswari Annamalai

, R. S. D. Wahida Banu:
Communication Aware Co-Scheduling For Parallel Job Scheduling In Cluster Computing. 545-554 - Rajendra Prasath

:
Shared Resource Allocation Using Token Based Control Strategy in Augmented Ring Networks. 555-567 - Ved Prakash Bhardwaj

, Nitin
, Vipin Tyagi
:
An Algorithmic Approach to Minimize the Conflicts in an Optical Multistage Interconnection Network. 568-576 - Peter Joseph Basil Morris, Saikat Roy Chowdhury, Debasish Deb:

An Efficent Methodology for Realization of Parallel FFT for Large Data Set. 577-584 - Suchetana Chakraborty

, Sushanta Karmakar:
A Novel Approach for Adaptive Data Gathering in Sensor Networks by Dynamic Spanning Tree Switching. 585-594 - Vikas Agarwal, Pansoo Kim, Deock-Gil Oh, Do-Seob Ahn:

Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter for DVB-S2 Receivers. 595-603
Security, Trust and Privacy
- Zahid Akhtar

, Sandeep Kale:
Security Analysis of Multimodal Biometric Systems against Spoof Attacks. 604-611 - Amitava Nag

, Jyoti Prakash Singh
, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A Novel Copyright Protection Scheme Using Visual Cryptography. 612-619 - Amitava Nag

, Jyoti Prakash Singh
, Srabani Khan, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A Weighted Location Based LSB Image Steganography Technique. 620-627 - SK Hafizul Islam, G. P. Biswas:

Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. 628-635 - N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:

Covariance Based Steganography Using DCT. 636-647 - Usha Banerjee, A. Swaminathan:

An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures. 648-655 - R. Jayaprakash, V. Uma

:
Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM. 656-665 - Jan Vykopal

:
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. 666-675 - Hamed Saljooghinejad, Wilson Naik Rathore:

Multi Application User Profiling for Masquerade Attack Detection. 676-684 - Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais

:
A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers. 685-692 - Justy Jameson, K. K. Sherly:

SQL Injection Disclosure Using BLAH Algorithm. 693-702

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














