default search action
3rd IC3 2010: Noida, India
- Sanjay Ranka, Arunava Banerjee, Kanad Kishore Biswas, Sumeet Dua, Prabhat Mishra, Rajat Moona, Sheung-Hung Poon, Cho-Li Wang:
Contemporary Computing - Third International Conference, IC3 2010, Noida, India, August 9-11, 2010, Proceedings, Part II. Communications in Computer and Information Science 95, Springer 2010, ISBN 978-3-642-14824-8
Part 1 / Technical Session-12: System-1 (S-1)
- Narmada Nayak, Durga Prasad Mohapatra:
Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization. 1-12 - Ashutosh Gupta, Vinay Rishiwal, Suneeta Agarwal:
Efficient Storage of Massive Biological Sequences in Compact Form. 13-22 - Hemant Kumar Mehta, Priyesh Kanungo, Manohar Chandwani:
Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing. 23-33 - Sanketh Datla, Rajdeep Niyogi:
An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture. 34-45 - Sandeep K. Singh, Sangeeta Sabharwal, J. P. Gupta:
Event-Based Metric for Computing System Complexity. 46-61
Part 2 / Technical Session-13: System-2 (S-2)
- Gaurav Somani, Sanjay Chaudhary:
Load Balancing in Xen Virtual Machine Monitor. 62-70 - Ashish Tanwer, Muzahid Hussain, Parminder Singh Reel:
Aerial Vehicle Based Sensing Framework for Structural Health Monitoring. 71-83 - Arun Prakash, Sarsij Tripathi, Rajesh Verma, Neeraj Tyagi, Rajeev Tripathi, Kshirasagar Naik:
A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks. 84-95 - Balwinder Singh, Sukhleen Bindra Narang, Arun Khosla:
Modeling and Simulation of Efficient March Algorithm for Memory Testing. 96-107 - Akshara Pande, Manjari Gupta, Anil Kumar Tripathi:
A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism. 108-119
Part 3 / Technical Session-14: System-3 (S-3)
- Abhiram Kasina, Amit Suthar, Rajeev Kumar:
Detection of Polymorphic Viruses in Windows Executables. 120-130 - Amit Prakash Singh, Pravin Chandra, Chandra Shekhar Rai:
Sensitivity Measurement of Neural Hardware: A Simulation Based Study. 131-141 - Gaurav Bansal, Deepak Vijayvargiya, Siddhant Garg, Sandeep Kumar Singh:
An Approach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools. 142-154 - Shireesh Asthana, Saurabh Tripathi, Sandeep Kumar Singh:
A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams. 155-167
Part 4 / Technical Session-15: System-4 (S-4)
- Dheerendra Singh Gangwar, Davinder Singh Saini:
Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring. 168-180 - Praveen Ranjan Srivastava:
Test Process Model with Enhanced Approach of State Variable. 181-192 - Pawan Kumar, Rashid Ahmad, Arun Kumar Rathaur, Mukul K. Sinha, Rajeev Sangal:
Re-engineering Machine Translation Systems through Symbiotic Approach. 193-204 - Bharat Singh, Akash Bansal, Sunil Kumar, Anshu Garg:
Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network. 205-216 - Sweta Verma, Ranjit Biswas, J. B. Singh:
Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph. 217-229
Part 5 / Technical Session-16: System-6 (S-6)
- Shrirang Ambaji Kulkarni, G. Raghavendra Rao:
Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm. 230-240 - Urmila Meshram, R. R. Harkare, Devendra Meshram:
Hardware and Software Co-Design for Robot Arm. 241-251 - Manoj Kumar, Aayushi Balyan:
Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP. 252-259 - Sanchit Bansal:
Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages. 260-271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.