


default search action
ICCCS 2011: Orissa, India
- Sanjay Kumar Jena, Rajeev Kumar, Ashok Kumar Turuk, Manoranjan Dash:

Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011. ACM 2011, ISBN 978-1-4503-0464-1
Communication
- Vivek Katiyar, Narottam Chand

, Surender Kumar Soni:
Efficient multilevel clustering for large-scale heterogeneous wireless sensor networks. 1-6 - Debabrata Sarddar, Tapas Jana, Utpal Biswas, Joydeep Banerjee, Souvik Kumar Saha, Mrinal K. Naskar:

Reducing handoff call blocking probability by hybrid channel allocation. 7-10 - Hemali B. Kotak, Hiteishi M. Diwanji

, Paresh P. Kotak:
A new approach to efficient Bluetooth Scatternet formation in adhoc wireless network. 11-16 - Naveen Chauhan

, Lalit Kumar Awasthi
, Narottam Chand
, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. 17-20 - Ashima Rout, Srinivas Sethi

, Debajyoti Mishra:
Optimized ant based routing protocol for MANET. 21-25 - Srinivas Sethi

, Ashima Rout, Debajyoti Mishra, Shatabdinalini:
A robust cluster based routing protocol for MANET. 26-31 - P. K. Guha Thakurta, Nilesh Mallick, Gargi Dutta, Subhansu Bandyopadhyay:

A new approach on caching based routing for mobile networks. 32-35 - Ved Prakash, Brajesh Kumar

, Anup Kumar Srivastava:
Energy efficiency comparison of some topology-based and location-based mobile ad hoc routing protocols. 36-39 - Rakesh Matam, Somanath Tripathy

:
THWMP: trust based secure routing for wireless mesh networks. 40-45 - (Withdrawn) Multiple antenna techniques in WiMax. 46-49

- Poonam Gera, Kumkum Garg, Manoj Misra:

Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs. 50-55 - Mangala R. Gajbhiye, J. K. Satapathy:

Performance comparison of adaptive MMSE-MRC MUD for DS-CDMA system in different multipath channels. 56-61 - Bijayananda Patnaik, Prasant Kumar Sahu:

Long-haul 64-channel 10-Gbps DWDM system design and simulation in presence of optical Kerr's effect. 62-66 - Muktikanta Sa, Amiya Kumar Rath

:
A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networks. 67-70 - Joydeep Banerjee, Souvik Kumar Mitra, Pradipta Ghosh, Mrinal K. Naskar:

Memory based message efficient clustering (MMEC) for enhancement of lifetime in wireless sensor networks using a node deployment protocol. 71-76 - Deepak Kedia

, Manoj Duhan
, Sandeep Arya
:
Peak to average power ratio of orthogonal spreading codes for multicarrier CDMA system. 77-81 - A. Wankhede Vishal, Rakesh Kumar Jha

, Upena D. Dalal:
Resource allocation for downlink OFDMA in WiMAX systems. 82-85 - Rahul Mishra, Shivam Nayak, Kapil Verma, Dayashankar Singh:

Survey on techniques to resolve problems associated with RTS/CTS mechanism. 86-91 - Jyotsana Jaiswal, Pabitra Mohan Khilar

:
Fault tolerant greedy perimeter stateless routing in wireless network. 92-95 - Brij Bihari Dubey, Naveen Chauhan

, Lalit Kumar Awasthi
:
NILDD: nearest intersection location dependent dissemination of traffic information in VANETs. 96-99 - Arunanshu Mahapatro

, Pabitra Mohan Khilar
:
On distributed self fault diagnosis for wireless multimedia sensor networks. 100-105 - P. Kishore, Prasad Gandikota, P. V. Sridevi:

Design of high speed routers using RED algorithm. 106-109 - Virendra Singh Shekhawat, K. Ohmkar, Vinod Kumar Chaubey:

A wavelength intersection cardinality based routing and wavelength assignment algorithm in optical WDM networks. 110-113 - Abhijit Das, Atiqur Rahman, Soumya Sankar Basu, Atal Chaudhuri:

Energy aware topology security scheme for mobile ad hoc network. 114-118 - Asutosh Kar

, Ravinder Nath
, Alaka Barik:
A VLMS based pseudo-fractional optimum order estimation algorithm. 119-123 - Swarup Kumar Mitra, Joydeep Banerjee, Arpita Chakraborty, Mrinal K. Naskar:

Data gathering in wireless sensor network using realistic power control. 124-127 - Kadha Vijaya Kumar, V. Sumalatha

:
Passive duplicate address detection in DYMO routing protocol for MANETS. 128-133 - Trilochan Panigrahi, A. D. Hanumantharao, Ganapati Panda

, Babita Majhi, Bernard Mulgrew:
Maximum likelihood DOA estimation in distributed wireless sensor network using adaptive particle swarm optimization. 134-137 - Niranjan Kumar Ray

, Ashok Kumar Turuk
:
A framework for disaster management using wireless ad hoc networks. 138-141 - Suman Sankar Bhunia

, Sarbani Roy
, Nandini Mukherjee:
IEMS: indoor environment monitoring system using ZigBee wireless sensor network. 142-145 - Suraj Sharma

, Sanjay Kumar Jena:
A survey on secure hierarchical routing protocols in wireless sensor networks. 146-151 - Likewin Thomas

, Kiran Manjappa, B. Annappa
, G. Ram Mohana Reddy:
Parallelized K-Means clustering algorithm for self aware mobile ad-hoc networks. 152-155 - Khushboo Tripathi

, Manjusha Pandey, Shekhar Verma
:
Comparison of reactive and proactive routing protocols for different mobility conditions in WSN. 156-161 - Abhishek Mairh, Hemanta Kumar Pati:

Quality-of-service at data link layer in wireless cellular networks. 162-165 - Manas Kumar Mishra

, M. M. Gore:
An improved forwarder selection approach for energy aware geographic routing in three dimensional wireless sensor networks. 166-171
Computing
- Pradosh Bandyopadhyay, Soumik Das, Monalisa Banerjee, Atal Chaudhuri:

A fragile color image watermarking framework focusing a new invisible domain. 172-177 - Soumik Das, Pradosh Bandyopadhyay, Monalisa Banerjee, Atal Chaudhuri:

A chip-based watermarking framework for color image authentication. 178-183 - Subrajeet Mohapatra

, Dipti Patra, Sanghamitra Satpathy:
Automated leukemia detection in blood microscopic images using statistical texture analysis. 184-187 - Gutha Jaya Krishna

, C. Raghavendra Rao, Rajeev Wankar
:
Finding minimal resource allocation in grid with reliability and trust computations using 2-way split backward search. 188-193 - R. Krishnamoorthy, R. Punidha

:
Fast requantization using self organizing feature map with orthogonal polynomials transform. 194-199 - Shailesh R. Sathe, Deepti D. Shrimankar:

Parallelization of DNA sequence alignment using OpenMP. 200-203 - Sulieman Bani-Ahmad

:
On improved processor allocation in 2D mesh-based multicomputers: controlled splitting of parallel requests. 204-209 - S. D. Pable, Mohd. Hasan

:
Performance analysis of FPGA interconnect fabric for ultra-low power applications. 210-214 - S. D. Pable, Mohd. Hasan

:
Performance optimization of CNFET for ultra-low power reconfigurable architecture. 215-220 - Shivendra Shivani

, Anoop Kumar Patel, Sushila Kamble
, Suneeta Agarwal:
An effective pixel-wise fragile watermarking scheme based on ARA bits. 221-226 - Jyothisha J. Nair, V. K. Govindan:

Automatic segmentation of MR brain images. 227-230 - V. N. Manjunath Aradhya, C. Naveena:

Text line segmentation of unconstrained handwritten Kannada script. 231-234 - Bulusu Rama, Jibitesh Mishra

:
Generation of 3D fractal images for Mandelbrot set. 235-238 - Gyanendra K. Verma

, Shitala Prasad, Gohel Bakul:
Robust face recognition using curvelet transform. 239-242 - Yogita A. Sadawarte, Mahendra A. Gaikwad

, Rajendra M. Patrikar
:
Comparative study of switching techniques for network-on-chip architecture. 243-246 - S. Saravanakumar

, A. Vadivel, C. G. Saneem Ahmed:
Multiple object tracking using HSV color space. 247-252 - Aditi Roy, Shamik Sural

, Jayanta Mukherjee, Arun K. Majumdar:
A hierarchical approach for content-based echocardiogram video indexing and retrieval. 253-258 - Rajeev Srivastava

:
A complex diffusion based nonlinear filter for speckle reduction from optical coherence tomography (OCT) images. 259-264 - Shijo M. Joseph, Reena Sebastian, P. Babu Anto:

The effect of different wavelets on speech compression. 265-268 - M. R. Pimple, Shailesh R. Sathe:

Computing on multi-core platform: performance issues. 269-272 - Anukul Chandra Panda, Pankaj Kumar Sa, Banshidhar Majhi:

Bitonic sort in shared SIMD array processor. 273-276 - Raju Barskar

, Gulfishan Firdose Ahmed:
CBIR using fuzzy edge detection mask. 277-280 - Aarti M. Karande

, V. N. Chunekar, B. B. Meshram:
Intelligent database for the SOA using BPEL. 281-284 - Punit Pandey, Deepshikha Pandey:

Reduct based Q-learning: an introduction. 285-288 - G. R. Talmale, A. V. Talhan, Rajiv V. Dharaskar

:
Analysis of multimedia forensic technique. 289-294 - Pradipta K. Banerjee

, Jayanta K. Chandra, Asit K. Datta:
Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authentication. 295-300 - Nabanita Bhattacharjee, Ranjan Parekh:

Skin texture analysis for medical diagnosis. 301-306 - Debahuti Mishra

, Kailash Shaw
, Sashikala Mishra
, Amiya Kumar Rath
, Milu Acharya:
Gene expression network discovery: a pattern based biclustering approach. 307-312 - Bithin Kanti Shee, Swati Vipsita

, Santanu Ku. Rath
:
Protein feature classification using particle swarm optimization and artificial neural networks. 313-318 - Pawan Kumar, Nitika Jakhanwal, Anirban Bhowmick, Mahesh Chandra

:
Gender classification using pitch and formants. 319-324 - R. Krishnamoorthy, D. Indradevi:

Fast and iterative algorithm for iris detection with orthogonal polynomials transform. 325-330 - Anand Kunwar Singh, Prasanna Kumar Acharya, Basant Kumar:

High capacity digital image watermarking with increased number of blocks. 331-334 - Sambit Bakshi

, Hunny Mehrotra, Banshidhar Majhi:
Real-time iris segmentation based on image morphology. 335-338 - Sunita Kumari, Pankaj Kumar Sa, Banshidhar Majhi:

Gender classification by principal component analysis and support vector machine. 339-342 - Shitala Prasad, Krishna Mohan Kudiri, R. C. Tripathi:

Relative sub-image based features for leaf recognition using support vector machine. 343-346 - Mohammad Imroze Khan, Bibhudendra Acharya

, Shrish Verma:
Comparison between different illumination independent change detection techniques. 347-350 - R. Krishnamoorthy, K. Rajavijayalakshmi, R. Punidha

:
Low-bit-rate lossless image coding using classified vector quantization with orthogonal polynomials transform. 351-354 - Dipankar Dutta

, Paramartha Dutta
:
A real coded MOGA for mining classification rules with missing attribute values. 355-358 - V. N. Manjunath Aradhya:

Document skew estimation: an approach based on wavelets. 359-364 - Bikesh Kumar Singh

, Jitendra Singh Parihar, Pritish Pal:
Wavelet based information for retrieval and classification of mammographic images. 365-370 - Mohammad Imroze Khan, Bikesh Kumar Singh

:
Retrieval of changes in moving objects in multiple and color images. 371-376 - Ratnakar Dash, Pankaj Kumar Sa, Banshidhar Majhi:

Restoration of images corrupted with blur and impulse noise. 377-382 - Sumit R. Vaidya, Deepak R. Dandekar:

A hierarchical design of high performance 8x8 bit multiplier based on Vedic mathematics. 383-386 - Amol P. Bhagat

, Mohammad Atique
:
Medical image retrieval, indexing and enhancement techniques: a survey. 387-390 - Suman Sau, Chandrajit Pal

, Amlan Chakrabarti
:
Design and implementation of real time secured RS232 link for multiple FPGA communication. 391-396 - B. Janet

, A. V. Reddy:
Cube index for unstructured text analysis and mining. 397-402 - M. C. Hanumantharaju

, M. Ravishankar, D. R. Ramesh Babu, S. Ramachandran:
Adaptive color image enhancement based geometric mean filter. 403-408 - Bhabani Shankar Prasad Mishra, A. K. Addy, Rahul Roy, Satchidananda Dehuri

:
Parallel multi-objective genetic algorithms for associative classification rule mining. 409-414 - Likewin Thomas

, B. Annappa
:
Utilization of map-reduce for parallelization of resource scheduling using MPI: PRS. 415-420 - J. Mridula, Dipti Patra:

Utilization of grey level co-occurrence matrix and Markov random field model for segmentation of colour textured images. 421-426 - D. Doreen Hephzibah Miriam, K. S. Easwarakumar

:
HPGRID: a novel architectural model for resource management systems. 427-432 - Neha Sharma

:
Comparing the performance of data mining techniques for oral cancer prediction. 433-438 - Anjali Mohapatra, P. M. Mishra, S. Padhy:

Planted (l, d) motif finding with allowable mismatches using kernel based approach. 439-442 - R. Krishnamoorthy, J. Kalpana:

Minimum distortion clustering technique for orthogonal polynomials transform vector quantizer. 443-448 - P. C. Sherimon, P. V. Vinu, Reshmy Krishnan:

Enhancing the learning experience in blended learning systems: a semantic approach. 449-452 - Bibhudendu Panda, Pabitra Mohan Khilar

:
FPGA based implementation of parallel ECC processor. 453-456 - R. Muthu Selvi, R. Rajaram:

Multiobjective optimization to provide service guarantees for window-constrained scheduling using micro-genetic algorithm. 457-461 - Punyaban Patel

, Abhishek Tripathi, Banshidhar Majhi, Chita Ranjan Tripathy:
A new adaptive median filtering technique for removal of impulse noise from images. 462-467 - Soma Saha

, Rajeev Kumar:
Improvement of bounded-diameter MST instances with hybridization of multi-objective EA. 468-473
Security
- J. Vijay Anand

, G. D. Dharaneetharan:
New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. 474-476 - Arun Kumar Singh, Pooja Tewari, Shefalika Ghosh Samaddar, Arun K. Misra:

Communication based vulnerabilities and script based solvabilities. 477-482 - Abhijit Sanyal

, Soume Sanyal
, Sankhayan Choudhury:
Physical level implementation of a web data model. 483-488 - N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:

Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs. 489-492 - Jayaprakash Kar

, Banshidhar Majhi:
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique. 493-498 - Heman Pathak:

Hybrid security architecture (HSA) for secure execution of mobile agents. 499-502 - Amol G. Muley:

Steganography by using attributes of magic number 9. 503-506 - Lalbihari Barik

, Bankim Patel, Ankita Barik
:
You are watching system (YAW system): an agent based secure real-time monitoring, capturing and analysis system for client activities on the expert agent's screen. 507-510 - Sangita Roy

, Manini Manasmita:
A novel approach to format based text steganography. 511-516 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya

:
Detection of HTTP flooding attacks in multiple scenarios. 517-522 - Harshal A. Arolkar

, Shraddha P. Sheth, Vaidehi P. Tamhane:
Ant colony based approach for intrusion detection on cluster heads in WSN. 523-526 - Pravin Soni, Shamal Firake, B. B. Meshram:

A phishing analysis of web based systems. 527-530 - Monowar H. Bhuyan, D. K. Bhattacharyya

, Jugal K. Kalita:
NADO: network anomaly detection using outlier approach. 531-536 - Sulagna Bandopadhyay, Anirban Sengupta

, Chandan Mazumdar:
A quantitative methodology for information security control gap analysis. 537-540 - Bibhudendra Acharya

, S. Sachin Sunder, M. Thiruvenkatam, Aneesh K. Sajan:
Image encryption using index based chaotic sequence, M sequence and gold sequence. 541-544 - K. C. S. Murti, Venkat R. Tadimeti:

A simplified GeoDRM model for SDI services. 545-548 - Amutha Prabakar Muniyandi

, Rajaram Ramasamy, Indrani:
Password based remote authentication scheme using ECC for smart card. 549-554 - Darshan Mhapasekar

:
Accomplishing anonymity in peer to peer network. 555-558 - Divya Prakash Nigam, Aparajita Ojha:

An aspect oriented model of efficient and secure card-based payment system. 559-564 - Asish Kumar Dalai, Sanjay Kumar Jena:

Evaluation of web application security risks and secure design patterns. 565-568 - L. David, Meenakshi Sood

, Mahesh Kumar Kajla:
Router based approach to mitigate DOS attacks on the wireless networks. 569-572 - Sankar Roy, Ranjan Parekh:

A secure keyless image steganography approach for lossless RGB images. 573-576 - Anuja Kumar Acharya:

Image encryption using a new chaos based encryption algorithm. 577-581 - Badugu Suresh

, Girija Shankar Rath:
Image encryption and authentication by orthonormal transform with CRC. 582-585 - Deepak Kumar, Rishikesh Sahay, Ganesh R. Hegde, Debasish Jena

:
A novel simple secure internet voting protocol. 586-589 - Bharati Mishra, Priyadarshini Nayak, Subhashree Behera, Debasish Jena

:
Security in vehicular adhoc networks: a survey. 590-595 - D. R. L. Prasanna, L. Jani Anbarasi

, M. Jenila Vincent:
A novel approach for secret data transfer using image steganography and visual cryptography. 596-599 - Abhishek Mairh, Debabrat Barik, Kanchan Verma, Debasish Jena

:
Honeypot in network security: a survey. 600-605 - Bibhudendra Acharya

, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad:
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. 606-609 - Chinnanadar Ramachandran Rene Robin

, G. V. Uma:
Development of educational ontology for software risk analysis. 610-615 - Raj Gaurang Tiwari

, Mohd. Husain, Vishal Srivastava
, Kuldeep Singh:
A hypercube novelty model for comparing E-commerce and M-commerce. 616-619 - S. Phani Kumar, P. Seetha Ramaiah, V. Khanaa:

Architectural patterns to design software safety based safety-critical systems. 620-623 - S. R. Balasundaram:

Securing tests in E-learning environment. 624-627 - Saroj Kumar Panigrahy

, Sanjay Kumar Jena, Ashok Kumar Turuk
:
Security in Bluetooth, RFID and wireless sensor networks. 628-633

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














