


default search action
HPAGC 2011: Chandigarh, India
- Archana Mantri, Suman Nandi, Gaurav Kumar, Sandeep Kumar:

High Performance Architecture and Grid Computing - International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings. Communications in Computer and Information Science 169, Springer 2011, ISBN 978-3-642-22576-5
Theme - 1: Grid and Cloud Computing
- Tarun Gupta, Vipin Tyagi

:
A Novel Approach for Task Processing through NEST Network in a Grid. 24-29 - Pardeep Sharma, Sandeep K. Sood

, Sumeet Kaur:
Security Issues in Cloud Computing. 36-45 - Jyoti Snehi

, Manish Snehi
, Rupali Gill
:
Virtualization as an Engine to Drive Cloud Computing Security. 62-66 - Vinit Kumar

, Ajay Agarwal:
Multi-dimensional Grid Quorum Consensus for High Capacity and Availability in a Replica Control Protocol. 67-78 - S. Sindhu, Saswati Mukherjee:

Efficient Task Scheduling Algorithms for Cloud Computing Environment. 79-83 - Bharat Chhabra, Bhawna Taneja:

"Cloud Computing: Towards Risk Assessment". 84-91 - L. Yamini, G. LathaSelvi, Saswati Mukherjee:

Efficient Grid Scheduling with Clouds. 92-102 - Anshu Parashar

, Jitender Kumar Chhabra
:
Clustering Dynamic Class Coupling Data to Measure Class Reusability Pattern. 126-130 - Pankaj Deep Kaur

, Inderveer Chana:
Enhancing Grid Resource Scheduling Algorithms for Cloud Environments. 140-144 - Sumit Goyal, A. K. Sharma, R. K. Sharma:

Development of Efficient Artificial Neural Network and Statistical Models for Forecasting Shelf Life of Cow Milk Khoa - A Comparative Study. 145-149
Theme - 2: High Performance Architecture
- Manoj Kumar

, Sujata Pandey
, Sandeep Kumar Arya
:
Design of CMOS Energy Efficient Single Bit Full Adders. 159-168 - Mamta Punjabi, Vineet Kushwaha, Rashmi Ranjan:

Exploring Associative Classification Technique Using Weighted Utility Association Rules for Predictive Analytics. 169-178 - Rajkumar Sharma, Priyesh Kanungo, Manohar Chandwani:

A Destination Capability Aware Dynamic Load Balancing Algorithm for Heterogeneous Environment. 186-191 - M. Vigilson Prem

, S. Swamynathan:
Reliable Mobile Agent in Multi - Region Environment with Fault Tolerance for E-Service Applications. 192-200 - D. Paulraj, S. Swamynathan:

Composition of Composite Semantic Web Services Using Abductive Event Calculus. 201-213 - S. Rajagopalan, E. R. Naganathan, P. Herbert Raj

:
Ant Colony Optimization Based Congestion Control Algorithm for MPLS Network. 214-223 - Padma Devi, Gurinder Pal Singh

, Balwinder Singh
:
Low Power Optimized Array Multiplier with Reduced Area. 224-232 - Gurinder Pal Singh

, Balwinder Singh
:
Simulink Library Development and Implementation for VLSI Testing in Matlab. 233-240 - Swagata Samanta

, Soumi Paik, Shreedeep Gangopadhyay, Amlan Chakrabarti
:
Processing of Image Data Using FPGA-Based MicroBlaze Core. 241-246 - Rani Astya, Parma Nand, Sunita Sharma:

Parametric Analysis of Zone Routing Protocol. 247-251 - Musheer Ahmad

, Omar Farooq
:
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform. 257-264 - Shakuntla

, A. K. Lal, S. S. Bhatia:
Computational Analysis of Availability of Process Industry for High Performance. 265-274 - Jitender Kumar Chhabra

, Amarjeet Prajapati
:
A Framework for Vulnerability Analysis during Software Maintenance. 282-287 - Sanchika Gupta, Deepak Garg

:
Ontology Based Information Retrieval for Learning Styles of Autistic People. 293-298 - A. PrashanthRao, A. Govardhan

:
Self-Configurable Scheduling Algorithm for Heterogeneous Computing Systems. 306-315 - V. Shanmughaneethi, Ra. Yagna Pravin, C. Emilin Shyni, S. Swamynathan:

SQLIVD - AOP: Preventing SQL Injection Vulnerabilities Using Aspect Oriented Programming through Web Services. 327-337 - Sandeep Kaur, Anu Sheetal, Preetkanwal Singh:

Computational Model for Prokaryotic and Eukaryotic Gene Prediction. 342-348 - Rahul Agnihotri, Gursewak Singh Brar, Raju Sharma:

Optimum Controller for Automatic Generation Control. 357-363 - R. N. Kulkarni, T. Aruna, N. Amrutha:

Abstraction of Design Information from Procedural Program. 364-372 - Aarti Singh, Dimple Juneja, A. K. Sharma:

Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent Interface. 373-384 - Vaishali Sood

:
Autonomous Robot Motion Control Using Fuzzy PID Controller. 385-390 - Parvinder Kaur, Baljit Singh

:
A Multiresolution Technique to Despeckle Ultrasound Images. 391-396
Theme - 3: Information Management and Network Security
- Dimple Juneja, Atul Sharma, A. K. Sharma:

Wireless Sensor Network Security Research and Challenges: A Backdrop. 406-416 - Prasanna Mani

, K. R. Chandran
:
Automated Test Case Generation for Object Oriented Systems Using UML Object Diagrams. 417-423 - Tanu Preet Singh, Manmeet Kaur, Vishal Sharma

:
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO). 424-429 - Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh:

On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments. 430-434 - Seema Yadav, Khaleel Ahmad

, Jayant Shekhar:
Analysis of Digital Forensic Tools and Investigation Process. 435-441 - Sunil Taneja, Ashwani Kush:

Evaluation of Normalized Routing Load for MANET. 442-448 - Sheetal Kalra

, Sandeep K. Sood
:
Elliptic Curve Cryptography: Current Status and Research Challenges. 455-460 - Indrajit Banerjee

, Prasenjit Chanak
, Hafizur Rahaman
:
SBFDR: Sector Based Fault Detection and Recovery in Wireless Sensor Networks. 461-469 - Neeraj Kumar Sharma, Naresh Kumar Nagwani

:
Study and Analysis of Incremental Apriori Algorithm. 470-472 - B. Chandra Mohan

, R. Baskaran:
Energy Aware and Energy Efficient Routing Protocol for Adhoc Network Using Restructured Artificial Bee Colony System. 473-484 - Avinash Sharma, Narendra Agarwal, Satyabrata Roy

, Ajay Sharma, Pankaj Sharma:
Implementing Key Management for Security in Ad Hoc Network. 485-489 - Vishal Sharma

, Jagjit Malhotra, Harsukhpreet Singh:
Performance Evaluation of MAC- and PHY-Protocols in IEEE 802.11 WLAN. 490-496 - Vijay Kumar, Rakesh Sharma, Ashwani Kush:

Key Authentication for MANET Security. 497-504 - Mini Singh Ahuja, Sumit Chabbra:

Biometric Encryption: Combining Fingerprints and Cryptography. 505-514 - Sumit Kushwaha

, Vinay Kumar
, Sanjeev Jain:
Node Architectures and Its Deployment in Wireless Sensor Networks: A Survey. 515-526 - J. Ujwala Rekha, K. Shahu Chatrapati, A. Vinaya Babu:

Competitive Equilibrium Theory and Its Applications in Computer Science. 539-547 - Manjit Sandhu, Tajinder Kaur, Mahesh Chander, Anju Bala:

Understanding the Generation of Cellular Technologies. 557-567 - Sima Singh, Ashwani Kush:

Evaluation of Routing Schemes for MANET. 568-573 - Sonia Gupta, P. K. Bharti, Vishal Choudhary

:
Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc Networks. 574-579 - P. Kalyani, C. Chellappan:

Analysis of Security and Key Management Schemes for Authenticated Broadcast in Heterogeneous Wireless Sensor Networks. 580-587 - Naveen Chauhan

, Lalit Kumar Awasthi
, Narottam Chand
:
Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks. 594-602 - Sukhpreet Kaur, Sumeet Kaur:

An Image Steganography Approach Based upon Matching. 603-608 - G. Geetha

, Saruchi
:
From Calculus to Number Theory, Paves Way to Break OSS Scheme. 609-611 - Ekta Walia, Anu Suneja:

Digital Image Watermarking Technique Based on Dense Descriptor. 612-616 - P. K. Suri, Ekta Walia, Amit Verma:

Novel Face Detection Using Gabor Filter Bank with Variable Threshold. 617-625 - Ajay Jangra

, Nitin Goel, Chander Kant, Priyanka:
An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs). 631-639

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














