


default search action
ADCONS 2013: Mangalore, India
- 2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, December 15-17, 2013. IEEE 2013

Advanced Computing
- S. Dere Kundan, G. Ram Mohana Reddy:

Projection and Interaction with Ad-hoc Interfaces on Non-planar Surfaces. 1-6 - Ram Prasad Mohanty, Ashok Kumar Turuk

, Bibhudatta Sahoo
:
Performance Evaluation of Multi-core Processors with Varied Interconnect Networks. 7-11 - Udaya M. Visweswara, Atul Gohad, Sachin Kumar Yadav, N. V. S. Karthik, S. Mahesh Babu:

Smarter Commerce: NLP SpokenWeb Based B2B Messaging. 12-17 - Shilpi Bose

, Chandra Das, Tamaghna Gangopadhyay, Samiran Chattopadhyay
:
A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data. 18-23 - Tushar Bisht, Kishore Kothapalli:

An Empirical Study of Two MIS Algorithms. 24-28 - Kapil Agarwal, Durga Toshniwal, Pramod K. Gupta, Vikas Khurana, Pushp Upadhyay:

Anomaly Detection and Similarity Search in Neutron Monitor Data for Predictive Maintenance of Nuclear Power Plants. 29-34 - Demian Antony D'Mello

, Mevida S. Crasta, Roanne N. Gomes, V. Abhishiktha, Shareeta J. D'Souzav:
A Broker Based E-learning Service Integration and Execution Architecture for the Complex Requirements on Learning Resources. 35-40
Image and Speech Processing
- Yogesh H. Dandawate

, Sneha Kinlekar:
Rivers and Coastlines Detection in Multispectral Satellite Images Using Level Set Method and Modified Chan Vese Algorithm. 41-46 - P. Sudheer Reddy, Palanisamy Ponnusamy

:
Multitaper Spectrum Sensing Using Sinusoidal Tapers. 47-50 - Shrinivas D. Desai

, Kavita V. Horadi, P. Navaneet, B. Niriksha, V. Siddeshvar:
Detection and Removal of Cracks from Digitized Paintings and Images by User Intervention. 51-55 - P. V. Sudeep

, Palanisamy Ponnusamy
, Jeny Rajan
:
A Hybrid Model for Rician Noise Reduction in MRI. 56-61 - M. Geetha, P. V. Aswathi, M. R. Kaimal:

A Stroke Based Representation of Indian Sign Language Signs Incorporating Global and Local Motion Information. 62-67 - Varun P. Gopi

, M. Pavithran, T. Nishanth, S. Balaji, V. Rajavelu, Ponnusamy Palanisamy
:
Image Denoising Based on Undecimated Double Density Dual Tree Wavelet Transform and Modified Firm Shrinkage. 68-73 - Tanushri Mittal, Anurag Barthwal

, Shashidhar G. Koolagudi:
Age Approximation from Speech Using Gaussian Mixture Models. 74-78 - M. Reenu, Dayana David, S. S. Aneesh Raj, Madhu S. Nair

:
Wavelet Based Sharp Features (WASH): An Image Quality Assessment Metric Based on HVS. 79-83 - Steven Lawrence Fernandes, G. Josemin Bala, P. Nagabhushan, S. K. Mandal:

Robust Face Recognition in the Presence of Noises and Blurring Effects by Fusing Appearance Based Techniques and Sparse Representation. 84-89
Cloud Computing and Database Systems
- S. R. Surya, Philomina Simon

:
Automatic Cloud Detection Using Spectral Rationing and Fuzzy Clustering. 90-95 - Sridevi Saralaya

, Rio G. L. D'Souza:
A Review of Monitoring Techniques for Service Based Applications. 96-101 - Amit Kr Mandal

, Suvamoy Changder, Anirban Sarkar:
Selection of Services for Data-Centric Cloud Applications: A QoS Based Approach. 102-107 - Melwyn D'Souza, V. S. Ananthanarayana:

Cloud Based Service Registry for Location Based Mobile Web Services System. 108-111 - Ajay Prasad

, Divya Gupta, Prasun Chakrabarti:
Monitoring Users in Cloud Computing: Evaluating the Centralized Approach. 112-116 - Dharavath Ramesh

, Chiranjeev Kumar
:
A Scalable Matching Approach Based Density Function for Heterogeneous Database Integration. 117-123 - Sunil F. Rodd, Umakanth P. Kulkarni:

Adaptive Self-Tuning Techniques for Performance Tuning of Database Systems: A Fuzzy-Based Approach. 124-129
Computer Networking
- Ramanna Havinal, Girish V. Attimarad, M. N. Giriprasad:

Empirical Power Control Schema Using Physical Layer Optimization in MANET. 130-135 - Debasis Das

, Rajiv Misra
:
Improvised k-hop Neighbourhood Knowledge Based Routing in Wireless Sensor Networks. 136-141 - Dharmeet Singh Hora, Piyush Bansal, Kishore Kothapalli, Kannan Srinathan:

Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results. 142-147 - Dipin Kollencheri Puthenveettil, Ankur Chauhan:

Peer-to-Peer and Cellular Connection Management. 148-153 - S. Stephen Vaithiya, S. Mary Saira Bhanu:

Ontology Based Resource Discovery Mechanism for Mobile Grid Environment. 154-159 - M. Surendar, P. Muthuchidambaranathan

:
Channel Coded STBC-OFDM Based Transmit Diversity Systems in Multipath Rayleigh-Fading Channels. 160-163 - Ravitheja Tetali, Joy Bose

, Tasleem Arif:
Browser with Clustering of Web Documents. 164-168 - Kavitha Ammayappan:

Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSM. 169-174 - K. Srinivas

, A. Venugopal Reddy, A. Nagaraju
:
Network Coding-Aware Neighbor Based Topology Control in MANETs. 175-180 - D. G. Narayan

, Uma Mudengudi, G. Pavan, S. Suraj:
CL-ILD: A Cross Layer Interference-Load and Delay Aware Routing Metric for Multi-radio Wireless Mesh Network. 181-186 - Ganesh Dadaji Sonwane, Beerappa R. Chandavarkar

:
Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. 187-192 - Prabhjot Singh, Beerappa R. Chandavarkar

, Srishti Arora
, Neha Agrawal:
Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution. 193-198 - B. Naresh Kumar Reddy

, M. Naraimhulu, S. V. Sai Prasad, K. Khaja Babu:
An Efficient Online Mileage Indicator by Using Sensors for New Generation Automobiles. 199-203 - Abhijit Das, Shibendu Debbarma:

Performance of Jumbo Sized Data on Jumbo Frame and Ethernet Frame Using UDP over IPv4/IPv6. 204-207 - Jayalakshmi G. Naragund, R. M. Banakar:

Analysis of HWMP-ETX Routing in Wireless Mesh Networks. 208-213
Information Security
- P. Syam Kumar, R. Subramanian, D. Thamizh Selvam

:
An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing. 214-219 - A. Sharath Kumar, Sanjay Singh

:
Detection of User Cluster with Suspicious Activity in Online Social Networking Sites. 220-225 - Manoj V. Thomas, K. Chandrasekaran:

An Access Control Model for Cloud Computing Environments. 226-231 - Gurpreet Singh, Supriya:

Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES. 232-237 - Nidhi Grover, Amar Kumar Mohapatra:

Digital Image Authentication Model Based on Edge Adaptive Steganography. 238-242 - Rekha Bhatia, Manpreet Singh:

Trust Based Privacy Preserving Access Control in Web Services Paradigm. 243-246 - Parvez Faruki, Vijay Laxmi

, Vijay Ganmoor, Manoj Singh Gaur, Ammar Bharmal:
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets. 247-252 - V. Spoorthi, Balaji Rajendran

, K. Chandrasekaran
:
Key Update Mechanism in PKI: Study and a New Approach. 253-258 - Anila Thankappan, M. Wilscy:

(2, 3) RIVC Scheme in Visual Cryptography without Pixel Expansion. 259-263

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














