


Остановите войну!
for scientists:


default search action
ICACCI 2012: Chennai, India
- Kaliappan Gopalan, Sabu M. Thampi:
2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012. ACM 2012, ISBN 978-1-4503-1196-0
Regular papers
- Anil G. Rao, Manish R. Joshi
:
An effective e-governance model for financial institutions in India. 1-7 - K. M. Anil Kumar, Suresha:
Sentiment dictionary for effective detection of web users' opinion. 8-15 - Vishnuprakash Puthiya Kovilakath, S. D. Madhu Kumar:
Semantic broken link detection using structured tagging scheme. 16-20 - M. Thirumaran, Dhavachelvan Ponnurangam, G. Naga Venkata Kiran, A. Divya:
A novel framework for enterprise web services change management. 21-27 - Sindhu Sudhakaran, Radha Senthilkumar
:
Efficient evaluation of partial path queries over a XML compact storage structure. 28-32 - Prajna Paramita Debata, Satyabrata Das
, Debahuti Mishra, Sashikala Mishra
, Kailash Shaw
, Gayatri Mahapatro:
Error encoding and decoding model over communication channel for synthesis of proteins from DNA sequences. 33-37 - Hasin Afzal Ahmed, Priyakshi Mahanta, D. K. Bhattacharyya
:
Finding gene coherent patterns using PATSUB+. 38-44 - Nilanjan Dey
, Anamitra Bardhan Roy, Achintya Das:
Detection and measurement of bimalleolar fractures using Harris corner. 45-51 - K. Arun Kumar, Vamshi Krishna Konishetty, Kaladhar Voruganti, G. V. Prabhakara Rao:
CASH: context aware scheduler for Hadoop. 52-61 - M. Asif Naeem, Gillian Dobbie, Imran Sarwar Bajwa
, Gerald Weber:
Resource optimization for processing of stream data in data warehouse environment. 62-68 - Indu Singh
, Manoj Kumar:
Evaluation of approaches for designing secure data warehouse. 69-73 - Harish Verma, Durga Toshniwal, Sateesh Kumar Peddoju:
Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services. 74-81 - Sandeep Varma Nadimpalli
, Valli Kumari Vatsavayi
:
Detecting dependencies in an anonymized dataset. 82-89 - Sujatha Srinivasan
, Sivakumar Ramakrishnan:
Dominators vs pure dominators on the accuracy of a classifier with a multi objective cultural algorithm. 90-96 - Prem Pujari Pati, Kaberi Das
, Debahuti Mishra, Shruti Mishra
, Lipismita Panigrahi:
Sampling correctly for improving classification accuracy: a hybrid higher order neural classifier (HHONC) approach. 97-101 - R. Vasanth Kumar Mehta
, B. Sankarasubramaniam, S. Rajalakshmi:
An algorithm for fuzzy-based sentence-level document clustering for micro-level contradiction analysis. 102-105 - Bikram Keshari Mishra, Amiya Kumar Rath
, Nihar Ranjan Nayak, Sagarika Swain:
Far efficient K-means clustering algorithm. 106-110 - R. Sethukkarasi, U. Keerthika, Arputharaj Kannan
:
A self learning rough fuzzy neural network classifier for mining temporal patterns. 111-117 - Rudra Kalyan Nayak
, Debahuti Mishra, Satyabrata Das
, Kailash Shaw
, Sashikala Mishra
, Ramamani Tripathy:
Clustering and classifying informative attributes using rough set theory. 118-123 - K. Reddy Madhavi
, A. Vinaya Babu, A. Anand Rao, S. Viswanadha Raju:
Identification of optimal cluster centroid of multi-variable functions for clustering concept-drift categorical data. 124-128 - Govinda Kannayaram
, Perla Ravitheja:
Identity anonymization and secure data storage using group signature in private cloud. 129-132 - Syed Mujib Rahaman, Mohammad Farhatullah:
A framework for preserving privacy in cloud computing with user service dependent identity. 133-136 - Pardeep Kumar, Amandeep Verma
:
Scheduling using improved genetic algorithm in cloud computing for independent tasks. 137-142 - M. K. Mohan Murthy, Sanjay Harogolige Adimurthy, Ashwini Janagal Padmanabha:
Pricing models and pricing schemes of IaaS providers: a comparison study. 143-147 - Sathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen:
V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning. 148-154 - T. P. Shabeera, Priya Chandran
, S. D. Madhu Kumar:
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications. 155-160 - Anandalakshmi Thevampalayam Kaliappan, Swamidoss Sathiakumar, Nandan Parameswaran:
Flexible power consumption management in smart homes. 161-167 - Usha Banerjee, Gaurav Bora, Gaurav Batra, Ayush Agarwal:
A novel software system to facilitate better and easier communication for people with speaking disabilities. 168-173 - Aloysius George, B. R. Rajakumar, D. Binu
:
Genetic algorithm based airlines booking terminal open/close decision system. 174-179 - Asif Ekbal, Sriparna Saha, Dhirendra Singh:
Active machine learning technique for named entity recognition. 180-186 - Kota Solomon Raju
, Gargi Baruah, Manipati Rajesham, Palash Phukan
:
FPGA based computing displacement of moving object in a real time video. 187-192 - A. Thilagavathy, K. Aarthi, A. Chilambuchelvan:
Text extraction from videos using a hybrid approach. 193-199 - C. Lakshmi Devasena, M. Hemalatha
:
Object detection in video using Lorenz information measure and discrete wavelet transform. 200-206 - Usha Bhanu Nageswaran
, A. Chilambuchelvan:
VLSI architectures for lifting based DWT: a detailed survey. 207-214 - G. Muneeswari, K. L. Shunmuganathan
:
Time based agent garbage collection algorithm for multicore architectures. 215-219 - Balaji Venu, Ashwani Singh:
Formal verification methodology considerations for network on chips. 220-225 - R. Sakthivel
, K. Sravanthi, Harish M. Kittur:
Low power energy efficient pipelined multiply-accumulate architecture. 226-231 - Gagandeep Kaur, Mohammad Ayoub Khan
:
Current differencing buffered amplifier an active element: a review of recent developments. 232-236 - Satinder Singh Gill, Brent R. Petersen
:
Advanced adaptive call admission control for mobile cellular networks: cell breathing, load shedding and bandwidth degradation. 237-243 - Aditya Ponnada, Ajaykumar Kannan:
Evaluation of mobile games using playability heuristics. 244-247 - V. P. Harigovindan
, Anchare V. Babu
, Lillykutty Jacob:
Tuning transmission opportunity (TXOP) limits for providing bit-based fairness in IEEE 802.11p V2I networks. 248-254 - Jyoti Prakash Singh
, Paramartha Dutta
, Amlan Chakrabarti
:
Temporal characteristics of clustering in mobile ad hoc network. 255-261 - Chhagan Lal
, Vijay Laxmi
, Manoj Singh Gaur:
A rate adaptive and multipath routing protocol to support video streaming in MANETs. 262-268 - R. Deepa, S. Swamynathan:
Load balancer for energy efficient clustering protocol in MANETs. 269-274 - Hema Ramachandran, G. R. Bindu:
Wireless charging of lighting gadgets using low Q resonant coupling. 275-278 - Sulata Mitra, Atanu Mondal:
Identification, authentication and tracking algorithm for vehicles using VIN in distributed VANET. 279-286 - P. Devi, A. Kannammal:
A hybrid defense mechanism for DDoS attacks using cluster analysis in MANET. 287-291 - Amali Chinnappan
, Ramachandran Balasubramanian
:
Modified weight function based network selection algorithm for 4G wireless networks. 292-299 - Vishwanath Pratap Singh, Arka Prokash Mazumdar
, Ashok Singh Sairam
:
On energy consumption analysis for ad hoc routing protocols. 300-306 - Osama A. Omer
, Ahmed Abdelreheem
:
A novel algorithm for PAPR reduction in LTE system. 307-311 - Nanda Kishore Chavali, Venkata Krishna Reddy Pilli:
Adaptive time synchronization for VHT wireless LAN. 312-317 - Maneesha V. Ramesh
, Anoop Jacob, Aryadevi R. Devidas
:
Enhanced emergency communication using mobile sensing and MANET. 318-324 - Saed Alrabaee, Anjali Agarwal, Nishith Goel, Marzia Zaman, Mahmoud Khasawneh
:
Higher layer issues in cognitive radio network. 325-330 - Rinnymol Babu, A. V. Babu
:
Resolving rate anomaly in IEEE 802.11p multi-rate vehicle-to-infrastructure networks using TXOP differentiation. 331-336 - P. R. Mahalingam
, Shimmi Asokan
:
A framework for optimizing GCC for ARM architecture. 337-342 - Shovan Maity, Arnab Raha
, Souvik Kumar Mitra, Victor Seal, Mrinal Kanti Naskar, Amitava Mukherjee
:
An efficient sleep protocol for lifetime enhancement in multi covered and multi connected WSNs. 343-347 - Sachin Gajjar
, Shrikant N. Pradhan, Kankar S. Dasgupta:
Performance analysis of cross layer protocols for wireless sensor networks. 348-354 - Gitanjali Shinde
, Swati Joshi
, Shami Jhodge:
Diversity coded directed diffusion for WSN. 355-359 - Ipsita Dutta, Rajib Banerjee, Tamaghna Acharya, DasBit Sipra
:
An energy efficient audio compression scheme using wavelet with dynamic difference detection technique in wireless sensor network. 360-366 - Maneesha Vinodini Ramesh
, P. L. Divya, Raghavendra V. Kulkarni
, Rekha Manoj:
A swarm intelligence based distributed localization technique for wireless sensor network. 367-373 - Maneesha V. Ramesh
, A. G. Sreedevi
, Kamalanathan Kandasamy, P. Venkat Rangan:
Performance comparison and node failure assessment of energy efficient two level balanced and progressive sensor networks. 374-381 - Jitendra Pradhan, Anil K. Sarje:
A fault tolerant approach for data aggregation in wireless sensor networks. 382-386 - Sabu M. Thampi
, Nithya Aniyan, K. Chitharanjan:
Hexagonal groups based key management using deployment knowledge in wireless sensor networks. 387-391 - Ash Mohammad Abbas, Khaled Abdullah Mohammed Al Soufy
:
Analysis of IEEE 802.11 DCF for ad hoc networks under nonsaturation conditions. 392-398 - Axel Sikora, Pancraç Villalonga, Klaus Landwehr:
Extensions to wireless M-Bus protocol for smart metering and smart grid application. 399-404 - G. Sreenu, P. M. Dhanya:
Inference of peer temperament in unstructured peer-to-peer networks by creating a virtual multi layer structure. 405-408 - M. Vigilson Prem
, S. Swamynathan:
Efficient dynamic itinerary and memory allocation for mobile agents. 409-415 - Raghavendra Sunku, Debabrata Das
:
Online differential charging for blended services using service capability interaction manager in IMS network. 416-420 - K. R. Remesh Babu
, P. Mathiyalagan, S. N. Sivanandam:
Task scheduling using ACO-BP neural network in computational grids. 428-432 - Jissy Liz Jose, Jayasudha Js, Sabu M. Thampi
:
Sybil resilient identity distribution in P2P networks. 433-439 - Ramkumar Dargha:
Cloud computing: from hype to reality: fast tracking cloud adoption. 440-445 - Sajad Khorsandroo, Rafidah Md Noor
, Sayid Khorsandroo:
The role of psychophysics laws in quality of experience assessment: a video streaming case study. 446-452 - Susmita Horrow, Sanchika Gupta, Anjali Sardana:
Implementing private cloud at IIT Roorkee: an initial experience. 453-458 - Sheeja S. Manakattu, S. D. Madhu Kumar:
An improved biased random sampling algorithm for load balancing in cloud based systems. 459-462 - Harkeerat Singh Bedi, Sajjan G. Shiva:
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. 463-469 - Madhan Kumar Srinivasan
, K. Sarukesi, Paul Rodrigues, M. Sai Manoj, P. Revathy:
State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. 470-476 - Narasimha Bolloju, San Murugesan
:
Cloud-based B2B systems integration for small-and-medium-sized enterprises. 477-480 - Keerthi Balasundaram, Madhan Kumar Srinivasan
, K. Sarukesi, Paul Rodrigues:
Implementation of next-generation traffic sign recognition system with two-tier classifier architecture. 481-487 - Li Liu, Cheng Zhang, Haojie Wang:
A new algorithm based on complex wavelet transform for protein sequence classification. 488-492 - Adathala Rajeev, Natarajan Sivakumaran
, Sreedharan Sujesh, Chirathodi Vayalappil Muraleedharan:
A linear after-load model for a cardio-vascular pulse duplicator. 493-497 - Nazanin Sabooniha, Danny Toohey, Kevin Lee
:
An evaluation of hospital information systems integration approaches. 498-504 - Soubhik Paul, Jayanta Mukhopadhyay, Arun K. Majumdar, Bandana Majumdar, S. Das Bhattacharya:
Methodology to visualize electronic health record for chronic diseases on small display screens. 505-510 - Anup Nandy, Soumik Mondal, Lokesh Rai, Pavan Chakraborty
, Gora Chand Nandi:
A study on damping profile for prosthetic knee. 511-517 - Komathy Karuppanan, Abinaya Sree Vairasundaram, Manjula Sigamani:
A comprehensive machine learning approach to prognose pulmonary disease from home. 518-523 - Tanmay Pal, Srinivasu Maka:
Simulation of respiratory system under normal, hypoxia and hypercapnia conditions. 524-532 - Monowar H. Bhuyan, D. K. Bhattacharyya
, Jugal K. Kalita:
An effective unsupervised network anomaly detection method. 533-539 - SK Hafizul Islam
, G. P. Biswas:
Certificateless strong designated verifier multisignature scheme using bilinear pairings. 540-546 - Shila Samantaray, Sambit Bakshi
, Pankaj Kumar Sa:
An efficient DoG based fingerprint enhancement scheme. 547-550 - Paria Ghanbari, Mahmood Ahmadi
, Arash Ahmadi
:
Error management and detection in computer networks using Bloom filters. 551-556 - Roli Bansal
, Priti Sehgal, Punam Bedi
:
Securing fingerprint images using a hybrid technique. 557-565 - Sriparna Saha, Ashok Singh Sairam
, Amulya Yadav, Asif Ekbal:
Genetic algorithm combined with support vector machine for building an intrusion detection system. 566-572 - Soumya Mukherjee, Arup Kumar Pal
:
A DCT-SVD based robust watermarking scheme for grayscale image. 573-578 - C. K. Raju, Ashok Mishra, P. B. S. Bhadoria:
Synthesis of sustainability and secureness of software in public applications using deductive-nomological model. 579-588 - R. K. N. Sai Krishna, Tummalapalli J. V. R. K. M. K. Sayi, Ravi Mukkamala, Pallav K. Baruah:
Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach. 589-595 - Jaisankar Narayanasamy
, Sannasi Ganapathy, Arputharaj Kannan
:
Intelligent intrusion detection system using fuzzy rough set based C4.5 algorithm. 596-601 - Gaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi:
Secret information display based authentication technique towards preventing phishing attacks. 602-608 - Yakkala V. Naga Manikanta, Anjali Sardana:
Protecting web applications from SQL injection attacks by using framework and database firewall. 609-613 - A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi:
FPGA based sliding window architecture for RC5 encryption. 614-618 - Dinesh Kumar Tyagi
, Virendra Singh Shekhawat, V. K. Chaubey:
Resource efficient survivability approach for resilient WDM optical networks. 619-624 - Dheerendra Mishra
, Sourav Mukhopadhyay:
Privacy rights management in multiparty multilevel DRM system. 625-631 - Suman Sau, Rourab Paul, Tanmay Biswas, Amlan Chakrabarti
:
A novel AES-256 implementation on FPGA using co-processor based architecture. 632-638 - Neelam Sharma
, Saurabh Mukherjee:
Layered approach for intrusion detection using naïve Bayes classifier. 639-644 - P. Kola Sujatha, C. Suba Priya, Arputharaj Kannan
:
Network intrusion detection system using genetic network programming with support vector machine. 645-649 - Animesh Tripathy, Matrubhumi Pradhan:
A novel framework for preserving privacy of data using correlation analysis. 650-655 - Animesh Tripathy, Jayanti Dansana, Debi Prasad Mishra
:
A secure packet marking scheme for IP traceback in IPv6. 656-659 - Animesh Tripathy, Jayanti Dansana, Ranjita Mishra:
A classification based framework for privacy preserving data mining. 660-666 - Cibile K. Kanjirathumkal, S. M. Sameer, Lillykutty Jacob:
Exploiting second order statistics of the received signals in AF relay cooperative network for compound channel estimation. 667-672 - Sangeetha Manoharan, Vidhyacharan Bhaskar:
Performance comparison of M-DCSK schemes in MIMO Nakagami channels with and without diversity combining. 673-677 - Vivek G. Rajendran, Vidhyacharan Bhaskar:
Capacity analysis of LMF channels under different adaptation policies with and without diversity combining. 678-682 - E. Ravindran Vimina
, K. Poulose Jacob:
Image retrieval using local and global properties of image regions with relevance feedback. 683-689 - Rahul Bankapur, Meena S. Maralappanavar:
Optimized trace transform based content based image retrieval algorithm. 690-696 - G. Geetha, S. N. Geethalakshmi
:
Detecting epileptic seizures using electroencephalogram: a novel frequency domain feature extraction technique for seizure classification using fast ANFIS. 697-703 - T. Sumadhi, M. Hemalatha
:
Towards improving automatic image annotation using improvised fractal SMOTE approach. 704-709 - Krishna Asawa, Vikrant Verma, Ankit Agrawal:
Recognition of vocal emotions from acoustic profile. 710-716 - M. Sharmila Kumari, B. H. Shekar, N. Harivinod, K. Raghurama Holla
:
Monogenic scale space based region covariance matrix descriptor: an efficient and accurate face recognition algorithm. 717-720 - M. C. Hanumantharaju
, V. N. Manjunath Aradhya, M. Ravishankar, A. Mamatha:
A particle swarm optimization method for tuning the parameters of multiscale retinex based color image enhancement. 721-727