default search action
Compute 2009: Bangalore, India
- R. K. Shyamasundar:
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009. ACM 2009, ISBN 978-1-60558-476-8 - Keny T. Lucas:
Parallel algorithm for sorting on OTIS-ring multicomputer. 1 - Manish Marwah, Ratnesh K. Sharma, Rocky Shih, Chandrakant D. Patel, Vaibhav Bhatia, Mohandas Mekanapurath, Rajkumar Velumani, Sankaragopal Velayudhan:
Data analysis, visualization and knowledge discovery in sustainable data centers. 2 - R. V. Nataraj, S. Selvan:
A framework for mining top-k frequent closed itemsets using order preserving generators. 3 - Manish Kumar, Shane Moriah, Srikumar Krishnamoorthy:
Performance evaluation of similarity join for real time information integration. 4 - Nupur Giri, Siddharth Mundle, Arpita Ray, Shrikant Bodhe:
Multi agent system based service architectures for service level agreement in cellular networks. 5 - C. R. Prashanth, S. P. Ganavi, T. D. Mahalakshmi, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Iris feature extraction using directional filter bank for personal identification. 6 - A. C. Ramachandra, K. Pavithra, K. Yashasvini, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Offline signature authentication using cross-validated graph matching. 7 - Faisal Karjikar, Suman Roy, Srinivas Padmanabhuni:
Intelligent business knowledge management using topic maps. 8 - Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpreet Singh Lehal:
Segmentation of touching characters in upper zone in printed Gurmukhi script. 9 - Manisha Agarwal, Manisha Jailia:
An interactive method for generalized association rule mining using FP-tree. 10
Posters
- A. Nagaraju, Ramachandram Sirandas:
Rough set based ad-hoc on demand distance vector routing algorithm for MANETs. 11 - Kiran Kumar Reddy D, Karthiek Maralla, Raj Kumar G, M. Thirumaran:
A greedy approach with criteria factors for QoS based web service discovery. 12 - Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan:
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. 13 - A. Nagaraju, Ramachandram Sirandas:
Adaptive partial dominating set algorithm for mobile ad-hoc networks. 14 - Dayashankar Singh, Maitreyee Dutta, Sarvpal H. Singh:
Neural network based handwritten hindi character recognition system. 15 - R. Karthi, S. Arumugam, K. Rameshkumar:
A novel discrete particle swarm clustering algorithm for data clustering. 16 - Vivek Anandan Ramachandran, Ilango Krishnamurthi:
NLION: Natural Language Interface for querying ONtologies. 17 - Demian Antony D'Mello, V. S. Ananthanarayana:
A tree structure for web service compositions. 18 - Anand V. Hudli, Balasubrahmanya Shivaradhya, Raghu V. Hudli:
Level-4 SaaS applications for healthcare industry. 19 - Lalita S. Admuthe, Shaila D. Apte:
Optimization of spinning process using hybrid approach involving ANN, GA and linear programming. 20 - Nrupen Chudasma, Sanjay Chaudhary:
Service composition using service selection with WS-agreement. 21 - Navneet Goyal, Yashvardhan Sharma:
New binning strategy for bitmap indices on high cardinality attributes. 22 - Pradip Kumar Bala:
A technique for mining negative association rules. 23 - Tirthankar Das, Ellard T. Roush, Pramod Nandana:
Quantum leap cluster upgrade. 24 - Ashish Sureka, Pranav Prabhakar Mirajkar, Kishore Varma Indukuri:
A rapid application development framework for rule-based named-entity extraction. 25 - T. H. Manjula Devi, Pooja P. Shenoy, Swathi Saigali, Harsha Mathew, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Extracting hidden image using histogram, DFT and SVM. 26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.