


default search action
2. ACSS 2015: Kolkata, India - Volume 2
- Rituparna Chaki, Agostino Cortesi

, Khalid Saeed, Nabendu Chaki
:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2. Advances in Intelligent Systems and Computing 396, Springer 2016, ISBN 978-81-322-2651-2
Signal Processing
- Santosh Gaikwad

, Bharti Gawali
, Suresh Mehrotra
:
Design and Development of Marathi Speech Interface System. 3-20 - Mateusz Buczkowski, Khalid Saeed:

Fusion-Based Noisy Image Segmentation Method. 21-35 - Sk Md Obaidullah

, Chayan Halder
, Nibaran Das, Kaushik Roy:
An Approach for Automatic Indic Script Identification from Handwritten Document Images. 37-51 - Chayan Halder

, Sk Md Obaidullah
, Jaya Paul, Kaushik Roy:
Writer Verification on Bangla Handwritten Characters. 53-68 - V. Mohanraj, Vaidehi V.

, Ranajith Kumar, R. Nakkeeran:
Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT). 69-80 - Parama Bagchi

, Debotosh Bhattacharjee
, Mita Nasipuri:
Registration of Range Images Using a Novel Technique of Centroid Alignment. 81-89
Software Engineering
- Debashis Mukherjee

, Rajib Mall:
An Investigation into Effective Test Coverage. 93-106 - Nachiketa Chatterjee, Saurabh Singh Thakur

, Partha Pratim Das:
Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN). 107-119 - Bibhash Roy, Ranjan Dasgupta, Nabendu Chaki

:
A Study on Software Risk Management Strategies and Mapping with SDLC. 121-138 - Adrija Bhattacharya

, Smita Ghosh, Debarun Das, Sankhayan Choudhury:
A New Service Discovery Approach for Community-Based Web. 139-151 - Sapana Rani, Preeti Kachhap, Raju Halder

:
Data-Flow Analysis-Based Approach of Database Watermarking. 153-171 - Manali Chakraborty, Nabendu Chaki

:
A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development. 173-188 - Ayan Majumder, Moumita Chakraborty, Krishnendu Guha

, Amlan Chakrabarti
:
CAD-Based Analysis of Power Distribution Network for SOC Design. 189-198
Algorithms
- Sukhendu Kanrar, Samiran Chattopadhyay

, Nabendu Chaki
:
A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus. 201-214 - Arnab Kumar Maji

, Sunanda Jana
, Rajat Kumar Pal:
A Comprehensive Sudoku Instance Generator. 215-233 - Ammlan Ghosh

, Rituparna Chaki:
Implementing Software Transactional Memory Using STM Haskell. 235-248 - Debasish Roy, Surjya Sikha Das, Swarup Ghosh:

Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming. 249-270 - Ranjan Mehera, Piyali Datta, Arpan Chakraborty, Rajat Kumar Pal:

An Algorithm to Solve 3D Guard Zone Computation Problem. 271-288 - N. Sujay Raghavendra

, Paresh Chandra Deka
:
Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS. 289-302 - Arpan Chakraborty, Joydeb Ghosh, Piyali Datta, Ankita Nandy, Rajat Kumar Pal:

Anomaly Detection and Three Anomalous Coins Problem. 303-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














