


Остановите войну!
for scientists:


default search action
15th ICDCIT 2019: Bhubaneswar, India
- Günter Fahrnberger, Sapna Gopinathan, Laxmi Parida:
Distributed Computing and Internet Technology - 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10-13, 2019, Proceedings. Lecture Notes in Computer Science 11319, Springer 2019, ISBN 978-3-030-05365-9
Invited Papers
- Meenakshi D'Souza, Rajanikanth N. Kashi
:
Avionics Self-adaptive Software: Towards Formal Verification and Validation. 3-23 - Christian Erfurth
:
The Digital Turn: On the Quest for Holistic Approaches. 24-30 - Hacène Fouchal
, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
Secured Communications on Vehicular Networks over Cellular Networks. 31-41 - Ulrike Lechner:
IT-Security in Critical Infrastructures Experiences, Results and Research Directions. 42-59 - Hrushikesha Mohanty:
Digital Society: A Computing Science Prospective. 60-70
Distributed Computing
- Indrajeet Gupta, Shivangi Gupta, Anubhav Choudhary, Prasanta K. Jana:
A Hybrid Meta-heuristic Approach for Load Balanced Workflow Scheduling in IaaS Cloud. 73-89 - Madhu Sudan Kumar, Indrajeet Gupta, Prasanta K. Jana:
Duplication Based Budget Effective Workflow Scheduling for Cloud Computing. 90-98 - Sabuzima Nayak
, Ripon Patgiri
:
Dr. Hadoop: In Search of a Needle in a Haystack. 99-107 - Krishan Kumar Sethi
, Dharavath Ramesh
, M. Sreenu:
Parallel High Average-Utility Itemset Mining Using Better Search Space Division Approach. 108-124 - Pratik Shrivastava, Udai Shanker
:
Supporting Transaction Predictability in Replicated DRTDBS. 125-140 - Wei Wang, Guanyu Wu, Zhe Guo, Liang Qian, Lianghui Ding, Feng Yang:
Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT. 141-149 - Yuting Zhu, Liang Qian, Chuyan Wang, Lianghui Ding, Feng Yang, Hao Wang:
Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming Architecture. 150-158
Emerging Areas
- Sandeep Bavkar, Brijesh Iyer
, Shankar B. Deosarkar:
Detection of Alcoholism: An EEG Hybrid Features and Ensemble Subspace K-NN Based Approach. 161-168 - Ajay D. Kshemkalyani, Bhargav Voleti:
On the Growth of the Prime Numbers Based Encoded Vector Clock. 169-184 - Gaurav Kumar
, N. Parimala:
A Sensitivity Analysis on Weight Sum Method MCDM Approach for Product Recommendation. 185-193 - Abhaya Kumar Pradhan
, Hrushikesha Mohanty, Rajendra Prasad Lal:
Event Detection and Aspects in Twitter: A BoW Approach. 194-211 - Rajendra Kumar Roul, Samarth Mehrotra, Yash Pungaliya, Jajati Keshari Sahoo:
A New Automatic Multi-document Text Summarization using Topic Modeling. 212-221 - Ishrath Unissa, Syed Jalal Ahmad, P. Radha Krishna:
Improved Visible Light Communication Using Code Shift Keying Modulation. 222-232
Networks
- Aditi, Rasita Pai, S. Mini:
Optimization of Transmission Range for a Fault Tolerant Wireless Sensor Network. 235-242 - Laxmi Chaudhary, Buddha Singh:
Community Detection Using an Enhanced Louvain Method in Complex Networks. 243-250 - Debasis Das:
A Fast Handoff Technique for Wireless Mobile Networks. 251-259 - Bhumika Kalavadia, Tarushi Bhatia, Trupti Padiya, Ami Pandat, Minal Bhise:
Adaptive Partitioning Using Partial Replication for Sensor Data. 260-269 - Mariappan Ramasamy, Rama Subramanian M.:
Design and Implementation of Cognitive Radio Sensor Network for Emergency Communication Using Discrete Wavelet Packet Transform Technique. 270-278 - Ankur Sharma, S. Durga Bhavani:
A Network Formation Model for Collaboration Networks. 279-294 - Jerzy Dembski, Julian Szymanski
:
Bees Detection on Images: Study of Different Color Models for Neural Networks. 295-308 - Abhinav Tomar
, Prasanta K. Jana:
Mobile Charging of Wireless Sensor Networks for Internet of Things: A Multi-Attribute Decision Making Approach. 309-324
Security
- Varad Deshpande, Debasis Das:
Efficient Searching Over Encrypted Database: Methodology and Algorithms. 327-338 - Ruchi Kachhia, Prachi Agrawal, Manik Lal Das:
Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding. 339-348 - Shravani Mahesh Patil
, B. R. Purushothama
:
RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication. 349-363 - Srilekha Mukherjee, Goutam Sanyal:
Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. 364-379 - Ripon Patgiri
, Hemanth Katari, Ronit Kumar, Dheeraj Sharma:
Empirical Study on Malicious URL Detection Using Machine Learning. 380-388 - Luke Owens, Benoît Razet, W. Bryan Smith, Theodore C. Tanner Jr.:
Inter-family Communication in Hyperledger Sawtooth and Its Application to a Crypto-Asset Framework. 389-401 - Rajesh Kumar Shrivastava, Bazila Bashir, Chittaranjan Hota
:
Attack Detection and Forensics Using Honeypot in IoT Environment. 402-409 - Pranav Kumar Singh
, Anish V. Monsy, Rajan Garg, Sukanta Dey
, Sukumar Nandi
:
JSpongeGen: A Pseudo Random Generator for Low Resource Devices. 410-421 - Pranav Kumar Singh
, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi
:
Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity. 422-439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.