default search action
12th ICDCIT 2016: Bhubaneswar, India
- Nikolaj S. Bjørner, Sanjiva Prasad, Laxmi Parida:
Distributed Computing and Internet Technology - 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings. Lecture Notes in Computer Science 9581, Springer 2016, ISBN 978-3-319-28033-2
Invited Talks
- Benny Chor, Assaf Zaritsky:
Teaching Computer Science in the Community. 3-9 - Danielle Movsowitz, Orna Agmon Ben-Yehuda, Assaf Schuster:
Attacks in the Resource-as-a-Service (RaaS) Cloud Context. 10-18 - John Rushby:
Trustworthy Self-Integrating Systems. 19-29
Contributed Papers
- S. Chandrakanth, P. Santhi Thilagam:
HiRE - A Heuristic Approach for User Generated Record Extraction. 33-37 - Pikkala Vijaya Laxmi, Kanithi Jyothsna:
Optimization of Service Rate in a Discrete-Time Impatient Customer Queue Using Particle Swarm Optimization. 38-42 - Seep Goel, Pooja Aggarwal, Smruti R. Sarangi:
A Wait-Free Stack. 43-55 - Jatharakonda Mallesham, S. Durga Bhavani:
Influential Degree Heuristic for RankedReplace Algorithm in Social Networks. 56-60 - Sanjaya K. Panda, Prasanta K. Jana:
An Efficient Task Consolidation Algorithm for Cloud Computing Systems. 61-74 - Kumar Dheenadayalan, V. N. Muralidhara, Gopalakrishnan Srinivasaraghavan:
Storage Load Control Through Meta-Scheduler Using Predictive Analytics. 75-86 - Sushree Bibhuprada B. Priyadarshini, Suvasini Panigrahi:
A Distributed Approach Based on Maximal Far-Flung Scalar Premier Selection for Camera Actuation. 87-91 - Anu Saini:
An Extension to UDDI for the Discovery of User Driven Web Services. 92-96 - M. M. Hafizur Rahman, Rizal Bin Mohd. Nor, Md. Rabiul Awal, Tengku Mohd Bin Tengku Sembok, Yasuyuki Miura:
Long Wire Length of Midimew-Connected Mesh Network. 97-102 - Rajendra Kumar Roul, Sanjay Kumar Sahay:
K-means and Wordnet Based Feature Selection Combined with Extreme Learning Machines for Text Classification. 103-112 - Bhumika Gupta, Gaurav Bhatt, Ankush Mittal:
Language Identification and Disambiguation in Indian Mixed-Script. 113-121 - Syed Jalal Ahmad, V. S. K. Reddy, A. Damodaram, P. Radha Krishna:
A Dynamic Priority Based Scheduling Scheme for Multimedia Streaming Over MANETs to Improve QoS. 122-126 - Alpa Gore, Siddharth Dutt Choubey, Kopal Gangrade:
Improved Bug Localization Technique Using Hybrid Information Retrieval Model. 127-131 - R. Kingsy Grace, R. Manimegalai:
HGASA: An Efficient Hybrid Technique for Optimizing Data Access in Dynamic Data Grid. 132-136 - Bandita Sahu, Pabitra Mohan Khilar:
Energy Efficient SNR Based Clustering in Underwater Sensor Network with Data Encryption. 137-141 - Nemi Chandra Rathore, Prashant Shaw, Somanath Tripathy:
Collaborative Access Control Mechanism for Online Social Networks. 142-147 - Kanagaraj Narayanasamy, Padmapriya Arumugam:
i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution Using Randomly Generated Bitmap Image. 148-156 - Anh-Hoang Truong, Dang Van Hung, Duc-Hanh Dang, Xuan-Tung Vu:
A Type System for Counting Logs of Multi-threaded Nested Transactional Programs. 157-168 - Geethapriya Ramakrishnan, Prashant Anantharaman, Saswati Mukherjee:
Proactive Resource Provisioning Model for Cloud Federation. 169-174 - Santosh Kumar Sahu, Sanjay Kumar Jena:
A Multiclass SVM Classification Approach for Intrusion Detection. 175-181 - D. S. Jayalakshmi, T. P. Rashmi Ranjana, Srinivasan Ramaswamy:
Dynamic Data Replication Across Geo-Distributed Cloud Data Centres. 182-187 - Pooja Chaturvedi, Ajai K. Daniel:
Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic. 188-192 - K. G. Srinivasa, Kartik S. Gayatri, Maaz Syed Adeeb, Nikhil N. Jannu:
An Internet of Things Based Software Framework to Handle Medical Emergencies. 193-198 - D. Sirisha, G. VijayaKumari:
Minimal Start Time Heuristics for Scheduling Workflows in Heterogeneous Computing Systems. 199-212 - P. Neelaveni, Muthuswamy Vijayalakshmi:
FC-LID: File Classifier Based Linear Indexing for Deduplication in Cloud Backup Services. 213-222
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.