callback( { "result":{ "query":":facetid:toc:\"db/conf/icacci/icacci2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"220.14" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"368", "@dc":"368", "@oc":"368", "@id":"43399252", "text":":facetid:toc:db/conf/icacci/icacci2013.bht" } }, "hits":{ "@total":"368", "@computed":"368", "@sent":"368", "@first":"0", "hit":[{ "@score":"1", "@id":"4154979", "info":{"authors":{"author":[{"@pid":"27/1664-2","text":"Sriparna Saha 0002"},{"@pid":"133/4864-4","text":"Shreya Ghosh 0004"},{"@pid":"75/6387","text":"Amit Konar"},{"@pid":"99/2308","text":"Ramadoss Janarthanan"}]},"title":"Identification of Odissi dance video using Kinect sensor.","venue":"ICACCI","pages":"1837-1842","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/0002GKJ13","doi":"10.1109/ICACCI.2013.6637461","ee":"https://doi.org/10.1109/ICACCI.2013.6637461","url":"https://dblp.org/rec/conf/icacci/0002GKJ13"}, "url":"URL#4154979" }, { "@score":"1", "@id":"4154980", "info":{"authors":{"author":[{"@pid":"138/1338","text":"Meer Soheil Abolghasemi"},{"@pid":"138/1164","text":"Mahdi Mokarrami Sefidab"},{"@pid":"16/4042","text":"Reza Ebrahimi Atani"}]},"title":"Using location based encryption to improve the security of data access in cloud computing.","venue":"ICACCI","pages":"261-265","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AbolghasemiSA13","doi":"10.1109/ICACCI.2013.6637181","ee":"https://doi.org/10.1109/ICACCI.2013.6637181","url":"https://dblp.org/rec/conf/icacci/AbolghasemiSA13"}, "url":"URL#4154980" }, { "@score":"1", "@id":"4154981", "info":{"authors":{"author":[{"@pid":"138/1118","text":"Lizy Abraham"},{"@pid":"24/1718","text":"M. Sasikumar"}]},"title":"A fuzzy based road network extraction from degraded satellite images.","venue":"ICACCI","pages":"2032-2036","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AbrahamS13","doi":"10.1109/ICACCI.2013.6637494","ee":"https://doi.org/10.1109/ICACCI.2013.6637494","url":"https://dblp.org/rec/conf/icacci/AbrahamS13"}, "url":"URL#4154981" }, { "@score":"1", "@id":"4154982", "info":{"authors":{"author":[{"@pid":"19/5896","text":"Syed Saif Abrar"},{"@pid":"38/6688","text":"Maksim Jenihhin"},{"@pid":"55/6283","text":"Jaan Raik"},{"@pid":"138/1295","text":"Shyam Kiran A."},{"@pid":"138/1466","text":"C. Babu"}]},"title":"Performance analysis of cosimulating processor core in VHDL and SystemC.","venue":"ICACCI","pages":"563-568","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AbrarJRAB13","doi":"10.1109/ICACCI.2013.6637234","ee":"https://doi.org/10.1109/ICACCI.2013.6637234","url":"https://dblp.org/rec/conf/icacci/AbrarJRAB13"}, "url":"URL#4154982" }, { "@score":"1", "@id":"4154983", "info":{"authors":{"author":[{"@pid":"138/1188","text":"Juhi Agarwal"},{"@pid":"122/1850","text":"R. H. Goudar"},{"@pid":"49/2359","text":"Pratik Kumar"},{"@pid":"138/1151","text":"Nishkarsh Sharma"},{"@pid":"138/1437","text":"Vishesh Parshav"},{"@pid":"138/1499","text":"Robin Sharma"},{"@pid":"138/1521","text":"Anubhav Srivastava"},{"@pid":"52/966","text":"Sreenivasa Rao"}]},"title":"Intelligent plagiarism detection mechanism using semantic technology: A different approach.","venue":"ICACCI","pages":"779-783","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AgarwalGKSPSSR13","doi":"10.1109/ICACCI.2013.6637273","ee":"https://doi.org/10.1109/ICACCI.2013.6637273","url":"https://dblp.org/rec/conf/icacci/AgarwalGKSPSSR13"}, "url":"URL#4154983" }, { "@score":"1", "@id":"4154984", "info":{"authors":{"author":[{"@pid":"138/1188","text":"Juhi Agarwal"},{"@pid":"122/1850","text":"R. H. Goudar"},{"@pid":"138/1151","text":"Nishkarsh Sharma"},{"@pid":"49/2359","text":"Pratik Kumar"},{"@pid":"138/1437","text":"Vishesh Parshav"},{"@pid":"138/1499","text":"Robin Sharma"},{"@pid":"52/966","text":"Sreenivasa Rao"}]},"title":"Cost effective dynamic packaging systems in E-tourism using semantic web.","venue":"ICACCI","pages":"1196-1200","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AgarwalGSKPSR13","doi":"10.1109/ICACCI.2013.6637347","ee":"https://doi.org/10.1109/ICACCI.2013.6637347","url":"https://dblp.org/rec/conf/icacci/AgarwalGSKPSR13"}, "url":"URL#4154984" }, { "@score":"1", "@id":"4154985", "info":{"authors":{"author":[{"@pid":"138/1271","text":"Raina Agarwal"},{"@pid":"138/1339","text":"Y. Pradeep"}]},"title":"Bridging the gap between traditional and online shopping methods for Indian customers through digital interactive experience.","venue":"ICACCI","pages":"1184-1189","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AgarwalP13","doi":"10.1109/ICACCI.2013.6637345","ee":"https://doi.org/10.1109/ICACCI.2013.6637345","url":"https://dblp.org/rec/conf/icacci/AgarwalP13"}, "url":"URL#4154985" }, { "@score":"1", "@id":"4154986", "info":{"authors":{"author":[{"@pid":"127/1193","text":"Basant Agarwal"},{"@pid":"138/1095","text":"Vijay Kumar Sharma"},{"@pid":"74/9075","text":"Namita Mittal"}]},"title":"Sentiment classification of review documents using phrase patterns.","venue":"ICACCI","pages":"1577-1580","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AgarwalSM13","doi":"10.1109/ICACCI.2013.6637415","ee":"https://doi.org/10.1109/ICACCI.2013.6637415","url":"https://dblp.org/rec/conf/icacci/AgarwalSM13"}, "url":"URL#4154986" }, { "@score":"1", "@id":"4154987", "info":{"authors":{"author":[{"@pid":"138/1171","text":"Anmol Aggarwal"},{"@pid":"138/1422","text":"Nikhilesh Chhabra"},{"@pid":"16/7689","text":"Manoj Sharma"}]},"title":"The use and impact of ICT for HEP in India.","venue":"ICACCI","pages":"1257-1262","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AggarwalCS13","doi":"10.1109/ICACCI.2013.6637358","ee":"https://doi.org/10.1109/ICACCI.2013.6637358","url":"https://dblp.org/rec/conf/icacci/AggarwalCS13"}, "url":"URL#4154987" }, { "@score":"1", "@id":"4154988", "info":{"authors":{"author":[{"@pid":"39/7690","text":"Bhawna Aggarwal"},{"@pid":"61/7269","text":"Maneesha Gupta"},{"@pid":"138/1540","text":"Anil Kumar Gupta"}]},"title":"A low voltage wide swing level shifted FVF based current mirror.","venue":"ICACCI","pages":"880-885","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AggarwalGG13","doi":"10.1109/ICACCI.2013.6637292","ee":"https://doi.org/10.1109/ICACCI.2013.6637292","url":"https://dblp.org/rec/conf/icacci/AggarwalGG13"}, "url":"URL#4154988" }, { "@score":"1", "@id":"4154989", "info":{"authors":{"author":[{"@pid":"60/10241","text":"Navneet Agrawal"},{"@pid":"138/1174","text":"Mayuri Jain"}]},"title":"Reconfigurable digital sequential system on chip design with its analysis of various parameters & power reduction using dynamic partial reconfiguration.","venue":"ICACCI","pages":"1346-1351","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AgrawalJ13","doi":"10.1109/ICACCI.2013.6637373","ee":"https://doi.org/10.1109/ICACCI.2013.6637373","url":"https://dblp.org/rec/conf/icacci/AgrawalJ13"}, "url":"URL#4154989" }, { "@score":"1", "@id":"4154990", "info":{"authors":{"author":[{"@pid":"125/1645","text":"Syed Jalal Ahmad"},{"@pid":"25/2701","text":"A. Damodaram"},{"@pid":"86/453","text":"V. S. K. Reddy"},{"@pid":"10/4403","text":"P. Radha Krishna 0001"}]},"title":"Packet loss estimation using Poisson random process for improving multimedia transmission in MANETs.","venue":"ICACCI","pages":"661-666","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AhmadDRK13","doi":"10.1109/ICACCI.2013.6637251","ee":"https://doi.org/10.1109/ICACCI.2013.6637251","url":"https://dblp.org/rec/conf/icacci/AhmadDRK13"}, "url":"URL#4154990" }, { "@score":"1", "@id":"4154991", "info":{"authors":{"author":[{"@pid":"138/1356","text":"Roshan Zameer Ahmed"},{"@pid":"138/1487","text":"Anusha Anigol"},{"@pid":"88/10466","text":"Rajashekhar C. Biradar"}]},"title":"Reactive security scheme using behavioral aspects of attacks for Wireless Sensor Networks.","venue":"ICACCI","pages":"1023-1028","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AhmedAB13","doi":"10.1109/ICACCI.2013.6637317","ee":"https://doi.org/10.1109/ICACCI.2013.6637317","url":"https://dblp.org/rec/conf/icacci/AhmedAB13"}, "url":"URL#4154991" }, { "@score":"1", "@id":"4154992", "info":{"authors":{"author":[{"@pid":"138/1480","text":"Idris Ahmed"},{"@pid":"61/2973","text":"Anne E. James"}]},"title":"ESKIMO 2-Way Handshake.","venue":"ICACCI","pages":"437-441","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AhmedJ13","doi":"10.1109/ICACCI.2013.6637211","ee":"https://doi.org/10.1109/ICACCI.2013.6637211","url":"https://dblp.org/rec/conf/icacci/AhmedJ13"}, "url":"URL#4154992" }, { "@score":"1", "@id":"4154993", "info":{"authors":{"author":[{"@pid":"138/1246","text":"Suresh Alse"},{"@pid":"138/1163","text":"Shreekanthadatta Eligar"},{"@pid":"138/1513","text":"Shridhar G. Domanal"},{"@pid":"72/9553","text":"G. Ram Mohana Reddy"}]},"title":"A state transition based approach to recognize gestures using multi level color tracking.","venue":"ICACCI","pages":"704-708","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AlseEDR13","doi":"10.1109/ICACCI.2013.6637259","ee":"https://doi.org/10.1109/ICACCI.2013.6637259","url":"https://dblp.org/rec/conf/icacci/AlseEDR13"}, "url":"URL#4154993" }, { "@score":"1", "@id":"4154994", "info":{"authors":{"author":[{"@pid":"138/1330","text":"Tarachand Amgoth"},{"@pid":"88/5100","text":"Prasanta K. Jana"}]},"title":"BDCP: A backoff-based distributed clustering protocol for wireless sensor networks.","venue":"ICACCI","pages":"1012-1016","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AmgothJ13","doi":"10.1109/ICACCI.2013.6637315","ee":"https://doi.org/10.1109/ICACCI.2013.6637315","url":"https://dblp.org/rec/conf/icacci/AmgothJ13"}, "url":"URL#4154994" }, { "@score":"1", "@id":"4154995", "info":{"authors":{"author":[{"@pid":"125/1618","text":"Islam Ibrahim Amin"},{"@pid":"311/5854","text":"Samar Kamal Kassim"},{"@pid":"h/AboulEllaHassanien","text":"Aboul Ella Hassanien"},{"@pid":"97/4593","text":"Hesham A. Hefny"}]},"title":"Using formal concept analysis for mining hyomethylated genes among breast cancer tumors subtypes.","venue":"ICACCI","pages":"521-526","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AminKHH13","doi":"10.1109/ICACCI.2013.6637226","ee":"https://doi.org/10.1109/ICACCI.2013.6637226","url":"https://dblp.org/rec/conf/icacci/AminKHH13"}, "url":"URL#4154995" }, { "@score":"1", "@id":"4154996", "info":{"authors":{"author":[{"@pid":"295/4941","text":"Anala M. R."},{"@pid":"138/1506","text":"Jyoti Shetty"},{"@pid":"208/4161","text":"G. Shobha"}]},"title":"A framework for secure live migration of virtual machines.","venue":"ICACCI","pages":"243-248","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AnalaSS13","doi":"10.1109/ICACCI.2013.6637178","ee":"https://doi.org/10.1109/ICACCI.2013.6637178","url":"https://dblp.org/rec/conf/icacci/AnalaSS13"}, "url":"URL#4154996" }, { "@score":"1", "@id":"4154997", "info":{"authors":{"author":[{"@pid":"138/1076","text":"Krishna Karthik N. Anantha"},{"@pid":"138/1552","text":"Ali M. S. Jameer"}]},"title":"Modulation classification of PSK signals in multipath and frequency offsets.","venue":"ICACCI","pages":"327-332","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AnanthaJ13","doi":"10.1109/ICACCI.2013.6637192","ee":"https://doi.org/10.1109/ICACCI.2013.6637192","url":"https://dblp.org/rec/conf/icacci/AnanthaJ13"}, "url":"URL#4154997" }, { "@score":"1", "@id":"4154998", "info":{"authors":{"author":[{"@pid":"203/3588","text":"Shanmukhappa A. Angadi"},{"@pid":"39/158","text":"M. M. Kodabagi"}]},"title":"A fuzzy approach for word level script identification of text in low resolution display board images using wavelet features.","venue":"ICACCI","pages":"1804-1811","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AngadiK13","doi":"10.1109/ICACCI.2013.6637455","ee":"https://doi.org/10.1109/ICACCI.2013.6637455","url":"https://dblp.org/rec/conf/icacci/AngadiK13"}, "url":"URL#4154998" }, { "@score":"1", "@id":"4154999", "info":{"authors":{"author":[{"@pid":"138/1187","text":"Sachin Angadi"},{"@pid":"138/1215","text":"V. Saikumar"},{"@pid":"138/1494","text":"B. Satyanarayana Kumari"}]},"title":"A novel digital controller for microstepping stepper motor drive using FPGA for Solar Array Drive Assembly in satellites-A comparison With alternative schemes.","venue":"ICACCI","pages":"1724-1729","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AngadiSK13","doi":"10.1109/ICACCI.2013.6637441","ee":"https://doi.org/10.1109/ICACCI.2013.6637441","url":"https://dblp.org/rec/conf/icacci/AngadiSK13"}, "url":"URL#4154999" }, { "@score":"1", "@id":"4155000", "info":{"authors":{"author":[{"@pid":"138/1207","text":"M. L. Anitha"},{"@pid":"138/1197","text":"K. A. Radhakrishna Rao"}]},"title":"An efficient palmprint identification system based on an indexing approach.","venue":"ICACCI","pages":"688-693","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AnithaR13","doi":"10.1109/ICACCI.2013.6637256","ee":"https://doi.org/10.1109/ICACCI.2013.6637256","url":"https://dblp.org/rec/conf/icacci/AnithaR13"}, "url":"URL#4155000" }, { "@score":"1", "@id":"4155001", "info":{"authors":{"author":[{"@pid":"138/1403","text":"M. Neelaveni Ammal"},{"@pid":"138/1526","text":"B. Ramachandran"},{"@pid":"12/9692","text":"Patnam Hanumantha Rao"},{"@pid":"138/1424","text":"Donthu Narendra kumar"}]},"title":"5GHz WLAN Band-Notched UWB Symmetrical slotted PI- Notched Parasitic Planar Printed Antenna.","venue":"ICACCI","pages":"338-342","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AntennaARRk13","doi":"10.1109/ICACCI.2013.6637194","ee":"https://doi.org/10.1109/ICACCI.2013.6637194","url":"https://dblp.org/rec/conf/icacci/AntennaARRk13"}, "url":"URL#4155001" }, { "@score":"1", "@id":"4155002", "info":{"authors":{"author":[{"@pid":"138/1172","text":"Md. Azharuddin"},{"@pid":"48/11140","text":"Pratyay Kuila"},{"@pid":"88/5100","text":"Prasanta K. Jana"}]},"title":"A distributed fault-tolerant clustering algorithm for wireless sensor networks.","venue":"ICACCI","pages":"997-1002","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AzharuddinKJ13","doi":"10.1109/ICACCI.2013.6637312","ee":"https://doi.org/10.1109/ICACCI.2013.6637312","url":"https://dblp.org/rec/conf/icacci/AzharuddinKJ13"}, "url":"URL#4155002" }, { "@score":"1", "@id":"4155003", "info":{"authors":{"author":[{"@pid":"87/1223","text":"Farag Azzedin"},{"@pid":"138/1505","text":"Jaweed Yazdani"},{"@pid":"138/1259","text":"Mustafa Ghaleb"}]},"title":"Survey of Disease Outbreak Notification Systems.","venue":"ICACCI","pages":"787-789","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/AzzedinYG13","doi":"10.1109/ICACCI.2013.6637275","ee":"https://doi.org/10.1109/ICACCI.2013.6637275","url":"https://dblp.org/rec/conf/icacci/AzzedinYG13"}, "url":"URL#4155003" }, { "@score":"1", "@id":"4155004", "info":{"authors":{"author":{"@pid":"27/5557","text":"A. V. Babu 0001"}},"title":"Meeting QoS-assured multi-hop connectivity requirements in vehicular ad hoc networks.","venue":"ICACCI","pages":"1041-1046","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Babu13","doi":"10.1109/ICACCI.2013.6637320","ee":"https://doi.org/10.1109/ICACCI.2013.6637320","url":"https://dblp.org/rec/conf/icacci/Babu13"}, "url":"URL#4155004" }, { "@score":"1", "@id":"4155005", "info":{"authors":{"author":[{"@pid":"138/1052","text":"Mirza Sami Baig"},{"@pid":"138/1082","text":"Srinit Das"},{"@pid":"28/5457","text":"Pachamuthu Rajalakshmi"}]},"title":"CR based WSAN for Field Area Network in Smart Grid.","venue":"ICACCI","pages":"811-816","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BaigDR13","doi":"10.1109/ICACCI.2013.6637280","ee":"https://doi.org/10.1109/ICACCI.2013.6637280","url":"https://dblp.org/rec/conf/icacci/BaigDR13"}, "url":"URL#4155005" }, { "@score":"1", "@id":"4155006", "info":{"authors":{"author":[{"@pid":"138/1491","text":"Ashmeet Kaur Bakshi"},{"@pid":"16/7689","text":"Manoj Sharma"}]},"title":"Design of basic gates using ECRL and PFAL.","venue":"ICACCI","pages":"580-585","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BakshiS13","doi":"10.1109/ICACCI.2013.6637237","ee":"https://doi.org/10.1109/ICACCI.2013.6637237","url":"https://dblp.org/rec/conf/icacci/BakshiS13"}, "url":"URL#4155006" }, { "@score":"1", "@id":"4155007", "info":{"authors":{"author":[{"@pid":"131/1067","text":"D. Balachander"},{"@pid":"61/7686","text":"Thipparaju Rama Rao"}]},"title":"In-vehicle RF propagation measurements for electronic infotainment applications at 433/868/915/2400 MHz.","venue":"ICACCI","pages":"1408-1413","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BalachanderR13","doi":"10.1109/ICACCI.2013.6637385","ee":"https://doi.org/10.1109/ICACCI.2013.6637385","url":"https://dblp.org/rec/conf/icacci/BalachanderR13"}, "url":"URL#4155007" }, { "@score":"1", "@id":"4155008", "info":{"authors":{"author":[{"@pid":"85/7480","text":"M. Tariq Banday"},{"@pid":"138/1104","text":"Shafiya Afzal Sheikh"}]},"title":"Multiple E-mail address certificate.","venue":"ICACCI","pages":"1134-1139","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BandayS13","doi":"10.1109/ICACCI.2013.6637337","ee":"https://doi.org/10.1109/ICACCI.2013.6637337","url":"https://dblp.org/rec/conf/icacci/BandayS13"}, "url":"URL#4155008" }, { "@score":"1", "@id":"4155009", "info":{"authors":{"author":[{"@pid":"138/1322","text":"Rama Krishna Bandi"},{"@pid":"95/1582","text":"Maheshanand Bhaintwal"}]},"title":"Codes over ℤ4+νℤ4 with respect to Rosenbloom-Tsfasman metric.","venue":"ICACCI","pages":"37-41","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BandiB13","doi":"10.1109/ICACCI.2013.6637143","ee":"https://doi.org/10.1109/ICACCI.2013.6637143","url":"https://dblp.org/rec/conf/icacci/BandiB13"}, "url":"URL#4155009" }, { "@score":"1", "@id":"4155010", "info":{"authors":{"author":[{"@pid":"138/1110","text":"Ankita Banerjee"},{"@pid":"70/6528","text":"Sudipta Dey"},{"@pid":"138/1078","text":"Shubhankar Parui"},{"@pid":"51/3475","text":"Mita Nasipuri"},{"@pid":"29/4599","text":"Subhadip Basu"}]},"title":"Synthetic reconstruction of human carotid vasculature using a 2-D/3-D interface.","venue":"ICACCI","pages":"60-65","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BanerjeeDPNB13","doi":"10.1109/ICACCI.2013.6637147","ee":"https://doi.org/10.1109/ICACCI.2013.6637147","url":"https://dblp.org/rec/conf/icacci/BanerjeeDPNB13"}, "url":"URL#4155010" }, { "@score":"1", "@id":"4155011", "info":{"authors":{"author":[{"@pid":"130/8575","text":"Anup Kumar Barman"},{"@pid":"130/8690","text":"Jumi Sarmah"},{"@pid":"160/9044","text":"Shikhar Kumar Sarma"}]},"title":"Automatic identification of assamese and bodo multiword expressions.","venue":"ICACCI","pages":"26-30","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BarmanSS13","doi":"10.1109/ICACCI.2013.6637141","ee":"https://doi.org/10.1109/ICACCI.2013.6637141","url":"https://dblp.org/rec/conf/icacci/BarmanSS13"}, "url":"URL#4155011" }, { "@score":"1", "@id":"4155012", "info":{"authors":{"author":[{"@pid":"72/11468","text":"Suvadip Batabyal"},{"@pid":"23/386","text":"Parama Bhaumik"}]},"title":"A fundamental traffic management strategy for mobile opportunistic network.","venue":"ICACCI","pages":"822-827","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BatabyalB13","doi":"10.1109/ICACCI.2013.6637282","ee":"https://doi.org/10.1109/ICACCI.2013.6637282","url":"https://dblp.org/rec/conf/icacci/BatabyalB13"}, "url":"URL#4155012" }, { "@score":"1", "@id":"4155013", "info":{"authors":{"author":[{"@pid":"138/1328","text":"Sangita Bavkar"},{"@pid":"138/1193","text":"Shashikant Sahare"}]},"title":"PCA based single channel speech enhancement method for highly noisy environment.","venue":"ICACCI","pages":"1103-1107","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BavkarS13","doi":"10.1109/ICACCI.2013.6637331","ee":"https://doi.org/10.1109/ICACCI.2013.6637331","url":"https://dblp.org/rec/conf/icacci/BavkarS13"}, "url":"URL#4155013" }, { "@score":"1", "@id":"4155014", "info":{"authors":{"author":{"@pid":"138/1124","text":"Megha D. Bengalur"}},"title":"Human activity recognition using body pose features and support vector machine.","venue":"ICACCI","pages":"1970-1975","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Bengalur13","doi":"10.1109/ICACCI.2013.6637484","ee":"https://doi.org/10.1109/ICACCI.2013.6637484","url":"https://dblp.org/rec/conf/icacci/Bengalur13"}, "url":"URL#4155014" }, { "@score":"1", "@id":"4155015", "info":{"authors":{"author":[{"@pid":"132/8922","text":"Deepti Bhalla"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Improving the quality of MT output using novel name entity translation scheme.","venue":"ICACCI","pages":"1548-1553","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhallaJM13","doi":"10.1109/ICACCI.2013.6637410","ee":"https://doi.org/10.1109/ICACCI.2013.6637410","url":"https://dblp.org/rec/conf/icacci/BhallaJM13"}, "url":"URL#4155015" }, { "@score":"1", "@id":"4155016", "info":{"authors":{"author":{"@pid":"138/1251","text":"Pawan S. Bhandari"}},"title":"Software controlled approach for energy efficient Radio Network Controllers.","venue":"ICACCI","pages":"1502-1505","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Bhandari13","doi":"10.1109/ICACCI.2013.6637402","ee":"https://doi.org/10.1109/ICACCI.2013.6637402","url":"https://dblp.org/rec/conf/icacci/Bhandari13"}, "url":"URL#4155016" }, { "@score":"1", "@id":"4155017", "info":{"authors":{"author":[{"@pid":"62/6990","text":"R. K. Bharathi"},{"@pid":"54/4316","text":"B. H. Shekar"}]},"title":"Off-line signature verification based on chain code histogram and Support Vector Machine.","venue":"ICACCI","pages":"2063-2068","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BharathiS13","doi":"10.1109/ICACCI.2013.6637499","ee":"https://doi.org/10.1109/ICACCI.2013.6637499","url":"https://dblp.org/rec/conf/icacci/BharathiS13"}, "url":"URL#4155017" }, { "@score":"1", "@id":"4155018", "info":{"authors":{"author":[{"@pid":"84/4278","text":"Rama Bhargava"},{"@pid":"122/1909","text":"Sonam Singh"}]},"title":"Meshfree methods: An efficient advanced computing approach for Bio-medical problems.","venue":"ICACCI","pages":"1397-1402","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhargavaS13","doi":"10.1109/ICACCI.2013.6637383","ee":"https://doi.org/10.1109/ICACCI.2013.6637383","url":"https://dblp.org/rec/conf/icacci/BhargavaS13"}, "url":"URL#4155018" }, { "@score":"1", "@id":"4155019", "info":{"authors":{"author":[{"@pid":"136/7821","text":"Veenu Bhasin"},{"@pid":"25/4147","text":"Punam Bedi"}]},"title":"Multi-class JPEG Steganalysis using Extreme Learning Machine.","venue":"ICACCI","pages":"1948-1952","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhasinB13","doi":"10.1109/ICACCI.2013.6637480","ee":"https://doi.org/10.1109/ICACCI.2013.6637480","url":"https://dblp.org/rec/conf/icacci/BhasinB13"}, "url":"URL#4155019" }, { "@score":"1", "@id":"4155020", "info":{"authors":{"author":[{"@pid":"138/1182","text":"Shruthi Bhat"},{"@pid":"138/1503","text":"K. Aishwarya"}]},"title":"Item-based Hybrid Recommender System for newly marketed pharmaceutical drugs.","venue":"ICACCI","pages":"2107-2111","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhatA13","doi":"10.1109/ICACCI.2013.6637506","ee":"https://doi.org/10.1109/ICACCI.2013.6637506","url":"https://dblp.org/rec/conf/icacci/BhatA13"}, "url":"URL#4155020" }, { "@score":"1", "@id":"4155021", "info":{"authors":{"author":[{"@pid":"138/1265","text":"Nagaraj N. Bhat"},{"@pid":"v/YVVenkatesh","text":"Y. V. Venkatesh"},{"@pid":"138/1155","text":"Ujjwal Karn"},{"@pid":"138/1247","text":"Dhruv Vig"}]},"title":"Hand gesture recognition using self organizing map for Human Computer Interaction.","venue":"ICACCI","pages":"734-738","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhatVKV13","doi":"10.1109/ICACCI.2013.6637265","ee":"https://doi.org/10.1109/ICACCI.2013.6637265","url":"https://dblp.org/rec/conf/icacci/BhatVKV13"}, "url":"URL#4155021" }, { "@score":"1", "@id":"4155022", "info":{"authors":{"author":[{"@pid":"123/3779","text":"Budhaditya Bhattacharyya"},{"@pid":"31/7006","text":"Iti Saha Misra"},{"@pid":"08/7660","text":"Salil Kumar Sanyal"}]},"title":"Phase offset reduction strategy for OFDMA based WiMAX system using Raised Cosine Filter.","venue":"ICACCI","pages":"249-254","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhattacharyyaMS13","doi":"10.1109/ICACCI.2013.6637179","ee":"https://doi.org/10.1109/ICACCI.2013.6637179","url":"https://dblp.org/rec/conf/icacci/BhattacharyyaMS13"}, "url":"URL#4155022" }, { "@score":"1", "@id":"4155023", "info":{"authors":{"author":[{"@pid":"138/1426","text":"Vidya K. Bhise"},{"@pid":"138/1388","text":"Ajit S. Mali"}]},"title":"EC2 instance provisioning for cost optimization.","venue":"ICACCI","pages":"1891-1895","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhiseM13","doi":"10.1109/ICACCI.2013.6637470","ee":"https://doi.org/10.1109/ICACCI.2013.6637470","url":"https://dblp.org/rec/conf/icacci/BhiseM13"}, "url":"URL#4155023" }, { "@score":"1", "@id":"4155024", "info":{"authors":{"author":{"@pid":"138/1195","text":"Sayak Bhowal"}},"title":"Transformation of ACS module to CSA module of low-power Viterbi decoder for digital wireless communication applications.","venue":"ICACCI","pages":"266-270","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Bhowal13","doi":"10.1109/ICACCI.2013.6637182","ee":"https://doi.org/10.1109/ICACCI.2013.6637182","url":"https://dblp.org/rec/conf/icacci/Bhowal13"}, "url":"URL#4155024" }, { "@score":"1", "@id":"4155025", "info":{"authors":{"author":[{"@pid":"05/2858","text":"Wilson Naik Bhukya"},{"@pid":"01/1744-1","text":"Alok Singh 0001"}]},"title":"A study on energy issues in construction of all-to-all minimum power broadcast (A2A MPB) trees in wireless networks.","venue":"ICACCI","pages":"1496-1501","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BhukyaS13","doi":"10.1109/ICACCI.2013.6637401","ee":"https://doi.org/10.1109/ICACCI.2013.6637401","url":"https://dblp.org/rec/conf/icacci/BhukyaS13"}, "url":"URL#4155025" }, { "@score":"1", "@id":"4155026", "info":{"authors":{"author":[{"@pid":"138/1280","text":"A. Bindu"},{"@pid":"09/9222","text":"C. N. Ravi Kumar"}]},"title":"Novel Inpainting Algorithm for heavily occluded face reconstruction.","venue":"ICACCI","pages":"1822-1826","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BinduK13","doi":"10.1109/ICACCI.2013.6637458","ee":"https://doi.org/10.1109/ICACCI.2013.6637458","url":"https://dblp.org/rec/conf/icacci/BinduK13"}, "url":"URL#4155026" }, { "@score":"1", "@id":"4155027", "info":{"authors":{"author":[{"@pid":"121/3430","text":"D. Binu"},{"@pid":"121/3375","text":"Aloysius George"}]},"title":"KF-PSO: Hybridization of particle swarm optimization and kernel-based fuzzy C means algorithm.","venue":"ICACCI","pages":"512-515","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BinuG13","doi":"10.1109/ICACCI.2013.6637224","ee":"https://doi.org/10.1109/ICACCI.2013.6637224","url":"https://dblp.org/rec/conf/icacci/BinuG13"}, "url":"URL#4155027" }, { "@score":"1", "@id":"4155028", "info":{"authors":{"author":[{"@pid":"138/1477","text":"Anupam Biswas"},{"@pid":"18/8811","text":"Anoj Kumar"},{"@pid":"15/5702","text":"K. K. Mishra 0001"}]},"title":"Particle Swarm Optimization with cognitive avoidance component.","venue":"ICACCI","pages":"149-154","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BiswasKM13","doi":"10.1109/ICACCI.2013.6637162","ee":"https://doi.org/10.1109/ICACCI.2013.6637162","url":"https://dblp.org/rec/conf/icacci/BiswasKM13"}, "url":"URL#4155028" }, { "@score":"1", "@id":"4155029", "info":{"authors":{"author":[{"@pid":"63/10124","text":"Suparna Biswas"},{"@pid":"18/971","text":"Sarmistha Neogy"}]},"title":"Improving recovery probability of mobile hosts using secure checkpointing.","venue":"ICACCI","pages":"984-989","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/BiswasN13","doi":"10.1109/ICACCI.2013.6637310","ee":"https://doi.org/10.1109/ICACCI.2013.6637310","url":"https://dblp.org/rec/conf/icacci/BiswasN13"}, "url":"URL#4155029" }, { "@score":"1", "@id":"4155030", "info":{"authors":{"author":[{"@pid":"138/1488","text":"Vaishali Chahar"},{"@pid":"82/8262","text":"Supriya Raheja"}]},"title":"Fuzzy based multilevel queue scheduling algorithm.","venue":"ICACCI","pages":"115-120","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChaharR13","doi":"10.1109/ICACCI.2013.6637156","ee":"https://doi.org/10.1109/ICACCI.2013.6637156","url":"https://dblp.org/rec/conf/icacci/ChaharR13"}, "url":"URL#4155030" }, { "@score":"1", "@id":"4155031", "info":{"authors":{"author":[{"@pid":"08/6359","text":"Mohamad Chaitou"},{"@pid":"78/6664","text":"Hussein Charara"}]},"title":"Signalling aspects of optimized inter-domains point to multipoint paths in Multi Protocol Label Switched networks.","venue":"ICACCI","pages":"1861-1866","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChaitouC13","doi":"10.1109/ICACCI.2013.6637465","ee":"https://doi.org/10.1109/ICACCI.2013.6637465","url":"https://dblp.org/rec/conf/icacci/ChaitouC13"}, "url":"URL#4155031" }, { "@score":"1", "@id":"4155032", "info":{"authors":{"author":[{"@pid":"08/6359","text":"Mohamad Chaitou"},{"@pid":"78/6664","text":"Hussein Charara"}]},"title":"Simulation of multipoint to multipoint hierarchy for fast rerouting in Multi Protocol Label Switching networks.","venue":"ICACCI","pages":"1867-1872","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChaitouC13a","doi":"10.1109/ICACCI.2013.6637466","ee":"https://doi.org/10.1109/ICACCI.2013.6637466","url":"https://dblp.org/rec/conf/icacci/ChaitouC13a"}, "url":"URL#4155032" }, { "@score":"1", "@id":"4155033", "info":{"authors":{"author":[{"@pid":"70/10544","text":"Tamal Chakraborty"},{"@pid":"31/7006","text":"Iti Saha Misra"}]},"title":"An analytical framework for channel reservation scheme in Cognitive Radio Network.","venue":"ICACCI","pages":"127-132","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChakrabortyM13","doi":"10.1109/ICACCI.2013.6637158","ee":"https://doi.org/10.1109/ICACCI.2013.6637158","url":"https://dblp.org/rec/conf/icacci/ChakrabortyM13"}, "url":"URL#4155033" }, { "@score":"1", "@id":"4155034", "info":{"authors":{"author":[{"@pid":"138/1300","text":"Saarthak Chandra"},{"@pid":"138/1223","text":"Sagar M"},{"@pid":"138/1481","text":"Pushpanjali Rout"},{"@pid":"138/1307","text":"Pranay Khattri"},{"@pid":"138/1513","text":"Shridhar G. Domanal"},{"@pid":"138/1511","text":"Ram Mohana Reddy Guddeti"}]},"title":"Primary education for the specially-abled.","venue":"ICACCI","pages":"1119-1123","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChandraMRKDG13","doi":"10.1109/ICACCI.2013.6637334","ee":"https://doi.org/10.1109/ICACCI.2013.6637334","url":"https://dblp.org/rec/conf/icacci/ChandraMRKDG13"}, "url":"URL#4155034" }, { "@score":"1", "@id":"4155035", "info":{"authors":{"author":[{"@pid":"138/1173","text":"Ayan Chatterjee"},{"@pid":"138/1077","text":"Debayan Das"},{"@pid":"27/5933","text":"Mrinal K. Naskar"},{"@pid":"138/1365","text":"Nabamita Pal"},{"@pid":"98/1512-1","text":"Amitava Mukherjee 0001"}]},"title":"Heuristic for maximum matching in directed complex networks.","venue":"ICACCI","pages":"1146-1151","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChatterjeeDNPM13","doi":"10.1109/ICACCI.2013.6637339","ee":"https://doi.org/10.1109/ICACCI.2013.6637339","url":"https://dblp.org/rec/conf/icacci/ChatterjeeDNPM13"}, "url":"URL#4155035" }, { "@score":"1", "@id":"4155036", "info":{"authors":{"author":[{"@pid":"138/1245","text":"Mayurika Chatterjee"},{"@pid":"138/1152","text":"Chaitanya Rajguru"},{"@pid":"138/1053","text":"Aditya Wadkar"}]},"title":"Mathematical modelling of automotive electric power assist steering system.","venue":"ICACCI","pages":"1389-1396","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChatterjeeRW13","doi":"10.1109/ICACCI.2013.6637382","ee":"https://doi.org/10.1109/ICACCI.2013.6637382","url":"https://dblp.org/rec/conf/icacci/ChatterjeeRW13"}, "url":"URL#4155036" }, { "@score":"1", "@id":"4155037", "info":{"authors":{"author":[{"@pid":"138/1436","text":"Alok Kumar Chaudhary"},{"@pid":"138/1288","text":"Pranay Pratik"},{"@pid":"138/1381","text":"Swastik Gupta"},{"@pid":"18/10452","text":"Vipan Kakkar"}]},"title":"Improved digital design of BPSK modulator using look-up table technique.","venue":"ICACCI","pages":"47-52","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChaudharyPGK13","doi":"10.1109/ICACCI.2013.6637145","ee":"https://doi.org/10.1109/ICACCI.2013.6637145","url":"https://dblp.org/rec/conf/icacci/ChaudharyPGK13"}, "url":"URL#4155037" }, { "@score":"1", "@id":"4155038", "info":{"authors":{"author":[{"@pid":"138/1301","text":"Dilip D. Chaudhary"},{"@pid":"24/7800","text":"Laxman M. Waghmare"}]},"title":"Energy efficiency and latency improving protocol for wireless sensor networks.","venue":"ICACCI","pages":"1303-1308","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChaudharyW13","doi":"10.1109/ICACCI.2013.6637366","ee":"https://doi.org/10.1109/ICACCI.2013.6637366","url":"https://dblp.org/rec/conf/icacci/ChaudharyW13"}, "url":"URL#4155038" }, { "@score":"1", "@id":"4155039", "info":{"authors":{"author":[{"@pid":"138/1139","text":"Erwinna Chendra"},{"@pid":"55/9137","text":"Kuntjoro Adji Sidarto"},{"@pid":"138/1557","text":"Dila Puspita"},{"@pid":"138/1476","text":"Muhammad Syamsuddin"},{"@pid":"138/1385","text":"Siska Lismayanti"}]},"title":"On the modeling of employee voluntary early exercise for the valuation of Employee Stock Options.","venue":"ICACCI","pages":"1403-1407","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChendraSPSL13","doi":"10.1109/ICACCI.2013.6637384","ee":"https://doi.org/10.1109/ICACCI.2013.6637384","url":"https://dblp.org/rec/conf/icacci/ChendraSPSL13"}, "url":"URL#4155039" }, { "@score":"1", "@id":"4155040", "info":{"authors":{"author":[{"@pid":"33/1606","text":"Su Fong Chien"},{"@pid":"127/0558","text":"Tiew On Ting"},{"@pid":"14/6178-1","text":"Xin-She Yang 0001"},{"@pid":"85/4955","text":"Alvin Kee Ngoh Ting"},{"@pid":"132/7426","text":"Derek William Holtby"}]},"title":"Optimizing energy efficiency in multi-user OFDMA systems with genetic algorithm.","venue":"ICACCI","pages":"1330-1334","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChienTYTH13","doi":"10.1109/ICACCI.2013.6637370","ee":"https://doi.org/10.1109/ICACCI.2013.6637370","url":"https://dblp.org/rec/conf/icacci/ChienTYTH13"}, "url":"URL#4155040" }, { "@score":"1", "@id":"4155041", "info":{"authors":{"author":[{"@pid":"138/1497","text":"Mahesh Chikkanna"},{"@pid":"138/1511","text":"Ram Mohana Reddy Guddeti"}]},"title":"Kinect based real-time gesture spotting using HCRF.","venue":"ICACCI","pages":"925-928","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChikkannaG13","doi":"10.1109/ICACCI.2013.6637300","ee":"https://doi.org/10.1109/ICACCI.2013.6637300","url":"https://dblp.org/rec/conf/icacci/ChikkannaG13"}, "url":"URL#4155041" }, { "@score":"1", "@id":"4155042", "info":{"authors":{"author":[{"@pid":"138/1376","text":"Chethan Chithapuram"},{"@pid":"87/5925","text":"Yogananda V. Jeppu"},{"@pid":"37/10687","text":"Cherukuri Aswani Kumar"}]},"title":"Artificial Intelligence learning based on proportional navigation guidance.","venue":"ICACCI","pages":"1140-1145","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChithapuramJK13","doi":"10.1109/ICACCI.2013.6637338","ee":"https://doi.org/10.1109/ICACCI.2013.6637338","url":"https://dblp.org/rec/conf/icacci/ChithapuramJK13"}, "url":"URL#4155042" }, { "@score":"1", "@id":"4155043", "info":{"authors":{"author":[{"@pid":"55/8147","text":"K. Chitra"},{"@pid":"138/1317","text":"Sudin Dinesh"},{"@pid":"65/6758","text":"Deepak Mishra"},{"@pid":"137/3059","text":"V. Brinda"},{"@pid":"137/2867","text":"V. R. Lalithambika"},{"@pid":"138/1194","text":"B. Manoj Kumar"}]},"title":"3D information retrieval for visual odometry system of planetary exploration rovers - A stereo vision approach.","venue":"ICACCI","pages":"354-360","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChitraDMBLK13","doi":"10.1109/ICACCI.2013.6637197","ee":"https://doi.org/10.1109/ICACCI.2013.6637197","url":"https://dblp.org/rec/conf/icacci/ChitraDMBLK13"}, "url":"URL#4155043" }, { "@score":"1", "@id":"4155044", "info":{"authors":{"author":[{"@pid":"55/10122","text":"S. Chitrakala"},{"@pid":"138/2111","text":"S. P. Surendernath"},{"@pid":"138/1336","text":"N. Roophini"}]},"title":"GLC based multi label image annotation.","venue":"ICACCI","pages":"947-952","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChitrakalaSR13","doi":"10.1109/ICACCI.2013.6637304","ee":"https://doi.org/10.1109/ICACCI.2013.6637304","url":"https://dblp.org/rec/conf/icacci/ChitrakalaSR13"}, "url":"URL#4155044" }, { "@score":"1", "@id":"4155045", "info":{"authors":{"author":[{"@pid":"67/3180","text":"Hyuntae Cho"},{"@pid":"30/2681","text":"Chong-Min Kyung"},{"@pid":"46/1047","text":"Yunju Baek"}]},"title":"Energy-efficient and fast collection method for smart sensor monitoring systems.","venue":"ICACCI","pages":"1440-1445","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChoKB13","doi":"10.1109/ICACCI.2013.6637391","ee":"https://doi.org/10.1109/ICACCI.2013.6637391","url":"https://dblp.org/rec/conf/icacci/ChoKB13"}, "url":"URL#4155045" }, { "@score":"1", "@id":"4155046", "info":{"authors":{"author":[{"@pid":"138/1049","text":"Nitish Chopra"},{"@pid":"68/6690","text":"Sarbjeet Singh"}]},"title":"Deadline and cost based workflow scheduling in hybrid cloud.","venue":"ICACCI","pages":"840-846","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChopraS13","doi":"10.1109/ICACCI.2013.6637285","ee":"https://doi.org/10.1109/ICACCI.2013.6637285","url":"https://dblp.org/rec/conf/icacci/ChopraS13"}, "url":"URL#4155046" }, { "@score":"1", "@id":"4155047", "info":{"authors":{"author":[{"@pid":"138/1252","text":"Paromita Choudhury"},{"@pid":"39/3828","text":"K. R. Prasanna Kumar"},{"@pid":"30/2552","text":"G. Athithan 0001"},{"@pid":"20/4077","text":"Sukumar Nandi"}]},"title":"Analysis of VBR coded VoIP for traffic classification.","venue":"ICACCI","pages":"90-95","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChoudhuryKAN13","doi":"10.1109/ICACCI.2013.6637152","ee":"https://doi.org/10.1109/ICACCI.2013.6637152","url":"https://dblp.org/rec/conf/icacci/ChoudhuryKAN13"}, "url":"URL#4155047" }, { "@score":"1", "@id":"4155048", "info":{"authors":{"author":[{"@pid":"138/1441","text":"Srijit Chowdhury"},{"@pid":"96/3731","text":"Chandan Giri"}]},"title":"Data collection point based mobile data gathering scheme with relay hop constraint.","venue":"ICACCI","pages":"282-287","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ChowdhuryG13","doi":"10.1109/ICACCI.2013.6637185","ee":"https://doi.org/10.1109/ICACCI.2013.6637185","url":"https://dblp.org/rec/conf/icacci/ChowdhuryG13"}, "url":"URL#4155048" }, { "@score":"1", "@id":"4155049", "info":{"authors":{"author":[{"@pid":"58/9638-7","text":"Priyanka Das 0007"},{"@pid":"127/0097","text":"Arjun Das"}]},"title":"Bengali Noun Morphological Analyzer.","venue":"ICACCI","pages":"1538-1543","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DasD13","doi":"10.1109/ICACCI.2013.6637408","ee":"https://doi.org/10.1109/ICACCI.2013.6637408","url":"https://dblp.org/rec/conf/icacci/DasD13"}, "url":"URL#4155049" }, { "@score":"1", "@id":"4155050", "info":{"authors":{"author":[{"@pid":"138/1242","text":"Renjith Das"},{"@pid":"138/1379","text":"Aditya Mandsorwale"},{"@pid":"138/1206","text":"P. P. Antony"},{"@pid":"138/1387","text":"R. G. Harikumar Warrier"},{"@pid":"138/1194","text":"B. Manoj Kumar"}]},"title":"Angular measurement using MEMS digital gyroscope with PIC and LabVIEW interface for space applications.","venue":"ICACCI","pages":"1744-1747","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DasMAWK13","doi":"10.1109/ICACCI.2013.6637444","ee":"https://doi.org/10.1109/ICACCI.2013.6637444","url":"https://dblp.org/rec/conf/icacci/DasMAWK13"}, "url":"URL#4155050" }, { "@score":"1", "@id":"4155051", "info":{"authors":{"author":[{"@pid":"136/4527","text":"Anamika Das"},{"@pid":"136/4640","text":"Manish Puri"},{"@pid":"136/4691","text":"Jitendra Singh Sengar"}]},"title":"A novel monolithic integrated phased array antenna using 4-bit distributed MEMS phase shifter and triangular patch antenna.","venue":"ICACCI","pages":"913-918","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DasPS13","doi":"10.1109/ICACCI.2013.6637298","ee":"https://doi.org/10.1109/ICACCI.2013.6637298","url":"https://dblp.org/rec/conf/icacci/DasPS13"}, "url":"URL#4155051" }, { "@score":"1", "@id":"4155052", "info":{"authors":{"author":[{"@pid":"128/4886","text":"Aloke Datta"},{"@pid":"09/6303","text":"Susmita Ghosh"},{"@pid":"86/6753","text":"Ashish Ghosh"}]},"title":"Band elimination of hyperspectral imagery using correlation of partitioned band images.","venue":"ICACCI","pages":"412-417","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DattaGG13","doi":"10.1109/ICACCI.2013.6637207","ee":"https://doi.org/10.1109/ICACCI.2013.6637207","url":"https://dblp.org/rec/conf/icacci/DattaGG13"}, "url":"URL#4155052" }, { "@score":"1", "@id":"4155053", "info":{"authors":{"author":[{"@pid":"84/4035","text":"Arijit De"},{"@pid":"49/6239","text":"Sunil Kumar Kopparapu"}]},"title":"Unsupervised clustering technique to harness ideas from an Ideas Portal.","venue":"ICACCI","pages":"1563-1568","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeK13","doi":"10.1109/ICACCI.2013.6637413","ee":"https://doi.org/10.1109/ICACCI.2013.6637413","url":"https://dblp.org/rec/conf/icacci/DeK13"}, "url":"URL#4155053" }, { "@score":"1", "@id":"4155054", "info":{"authors":{"author":[{"@pid":"225/6867","text":"Kayiparambil S. Deepak"},{"@pid":"27/5557","text":"A. V. Babu 0001"}]},"title":"Energy efficiency of IEEE 802.15.6 based wireless body area networks in scheduled access mode.","venue":"ICACCI","pages":"301-307","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeepakB13","doi":"10.1109/ICACCI.2013.6637188","ee":"https://doi.org/10.1109/ICACCI.2013.6637188","url":"https://dblp.org/rec/conf/icacci/DeepakB13"}, "url":"URL#4155054" }, { "@score":"1", "@id":"4155055", "info":{"authors":{"author":{"@pid":"138/1404","text":"Aditya R. Desai"}},"title":"Big data on small screens.","venue":"ICACCI","pages":"853-856","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Desai13","doi":"10.1109/ICACCI.2013.6637287","ee":"https://doi.org/10.1109/ICACCI.2013.6637287","url":"https://dblp.org/rec/conf/icacci/Desai13"}, "url":"URL#4155055" }, { "@score":"1", "@id":"4155056", "info":{"authors":{"author":[{"@pid":"138/1160","text":"Padmashree Desai"},{"@pid":"138/1549","text":"Jagadeesh Pujari"},{"@pid":"70/86","text":"N. H. Ayachit"},{"@pid":"44/3321","text":"V. Kamakshi Prasad"}]},"title":"Classification of archaeological monuments for different art forms with an application to CBIR.","venue":"ICACCI","pages":"1108-1112","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DesaiPAP13","doi":"10.1109/ICACCI.2013.6637332","ee":"https://doi.org/10.1109/ICACCI.2013.6637332","url":"https://dblp.org/rec/conf/icacci/DesaiPAP13"}, "url":"URL#4155056" }, { "@score":"1", "@id":"4155057", "info":{"authors":{"author":[{"@pid":"138/1201","text":"Ajinkya S. Deshmukh"},{"@pid":"138/1464","text":"Swarup S. Medasani"},{"@pid":"11/8327","text":"G. Ramachandra Reddy"}]},"title":"A fast hierarchical patch-based approach for mitigating atmospheric turbulence.","venue":"ICACCI","pages":"1-7","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeshmukhMR13","doi":"10.1109/ICACCI.2013.6637137","ee":"https://doi.org/10.1109/ICACCI.2013.6637137","url":"https://dblp.org/rec/conf/icacci/DeshmukhMR13"}, "url":"URL#4155057" }, { "@score":"1", "@id":"4155058", "info":{"authors":{"author":[{"@pid":"53/7799","text":"Arti Deshpande"},{"@pid":"60/1837","text":"Anjali Mahajan"},{"@pid":"138/1249","text":"Apurva Kulkarni"},{"@pid":"138/1472","text":"Sayali Sakhalkar"}]},"title":"Domain driven approach for coherent rule mining.","venue":"ICACCI","pages":"109-114","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeshpandeMKS13","doi":"10.1109/ICACCI.2013.6637155","ee":"https://doi.org/10.1109/ICACCI.2013.6637155","url":"https://dblp.org/rec/conf/icacci/DeshpandeMKS13"}, "url":"URL#4155058" }, { "@score":"1", "@id":"4155059", "info":{"authors":{"author":[{"@pid":"00/1231","text":"N. Devarajan"},{"@pid":"138/1200","text":"S. Navneeth"},{"@pid":"292/9789","text":"Mohanavalli Subramaniam"}]},"title":"GPU accelerated relational hash join operation.","venue":"ICACCI","pages":"891-896","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DevarajanNM13","doi":"10.1109/ICACCI.2013.6637294","ee":"https://doi.org/10.1109/ICACCI.2013.6637294","url":"https://dblp.org/rec/conf/icacci/DevarajanNM13"}, "url":"URL#4155059" }, { "@score":"1", "@id":"4155060", "info":{"authors":{"author":[{"@pid":"138/1473","text":"O. Mema Devi"},{"@pid":"138/1394","text":"Shahin Ara Begum"}]},"title":"A new cluster validity index for type-2 fuzzy c-means algorithm.","venue":"ICACCI","pages":"2049-2056","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeviB13","doi":"10.1109/ICACCI.2013.6637497","ee":"https://doi.org/10.1109/ICACCI.2013.6637497","url":"https://dblp.org/rec/conf/icacci/DeviB13"}, "url":"URL#4155060" }, { "@score":"1", "@id":"4155061", "info":{"authors":{"author":[{"@pid":"53/11346","text":"Aryadevi Remanidevi Devidas"},{"@pid":"136/4607","text":"T. S. Subeesh"},{"@pid":"117/5227","text":"Maneesha Vinodini Ramesh"}]},"title":"Design and implementation of user interactive wireless smart home energy management system.","venue":"ICACCI","pages":"626-631","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DevidasSR13","doi":"10.1109/ICACCI.2013.6637245","ee":"https://doi.org/10.1109/ICACCI.2013.6637245","url":"https://dblp.org/rec/conf/icacci/DevidasSR13"}, "url":"URL#4155061" }, { "@score":"1", "@id":"4155062", "info":{"authors":{"author":[{"@pid":"138/1202","text":"Dnyaneshar Dewadkar"},{"@pid":"138/1264","text":"Bharat Raisingani"},{"@pid":"138/1170","text":"Anandkumar Chandran"},{"@pid":"138/1146","text":"Aniket Upganlawar"}]},"title":"Tourist activity extraction from text.","venue":"ICACCI","pages":"1560-1562","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DewadkarRCU13","doi":"10.1109/ICACCI.2013.6637412","ee":"https://doi.org/10.1109/ICACCI.2013.6637412","url":"https://dblp.org/rec/conf/icacci/DewadkarRCU13"}, "url":"URL#4155062" }, { "@score":"1", "@id":"4155063", "info":{"authors":{"author":[{"@pid":"15/4841","text":"Sandip Dey"},{"@pid":"39/3217","text":"Indrajit Saha"},{"@pid":"93/3249","text":"Ujjwal Maulik"},{"@pid":"22/3484","text":"Siddhartha Bhattacharyya"}]},"title":"New quantum inspired meta-heuristic methods for multi-level thresholding.","venue":"ICACCI","pages":"1236-1240","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DeySMB13","doi":"10.1109/ICACCI.2013.6637354","ee":"https://doi.org/10.1109/ICACCI.2013.6637354","url":"https://dblp.org/rec/conf/icacci/DeySMB13"}, "url":"URL#4155063" }, { "@score":"1", "@id":"4155064", "info":{"authors":{"author":[{"@pid":"138/1254","text":"V. R. Dhawale"},{"@pid":"138/1556","text":"J. A. Tidke"},{"@pid":"35/7800","text":"Sanjay V. Dudul"}]},"title":"Neural network based classification of pollen grains.","venue":"ICACCI","pages":"79-84","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DhawaleTD13","doi":"10.1109/ICACCI.2013.6637150","ee":"https://doi.org/10.1109/ICACCI.2013.6637150","url":"https://dblp.org/rec/conf/icacci/DhawaleTD13"}, "url":"URL#4155064" }, { "@score":"1", "@id":"4155065", "info":{"authors":{"author":[{"@pid":"02/10519","text":"Tanuja Satish Dhope"},{"@pid":"35/10235","text":"Dina Simunic"},{"@pid":"138/1474","text":"Nikhil Suresh Dhokariya"},{"@pid":"122/2281","text":"Vishal Pawar"},{"@pid":"138/1081","text":"Bhawana Gupta"}]},"title":"Performance analysis of angle of arrival estimation algorithms for dynamic spectrum access in cognitive radio networks.","venue":"ICACCI","pages":"121-126","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DhopeSDPG13","doi":"10.1109/ICACCI.2013.6637157","ee":"https://doi.org/10.1109/ICACCI.2013.6637157","url":"https://dblp.org/rec/conf/icacci/DhopeSDPG13"}, "url":"URL#4155065" }, { "@score":"1", "@id":"4155066", "info":{"authors":{"author":[{"@pid":"138/1478","text":"Yugchhaya Dhote"},{"@pid":"138/1079","text":"Nishchol Mishra"},{"@pid":"122/1934","text":"Sanjeev Kumar Sharma"}]},"title":"Survey and analysis of temporal link prediction in online social networks.","venue":"ICACCI","pages":"1178-1183","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DhoteMS13","doi":"10.1109/ICACCI.2013.6637344","ee":"https://doi.org/10.1109/ICACCI.2013.6637344","url":"https://dblp.org/rec/conf/icacci/DhoteMS13"}, "url":"URL#4155066" }, { "@score":"1", "@id":"4155067", "info":{"authors":{"author":[{"@pid":"12/7555","text":"M. Divya"},{"@pid":"138/1099","text":"J. S. Vidya"},{"@pid":"138/1060","text":"Purva Shrivastava"},{"@pid":"138/1363","text":"M. Susila"},{"@pid":"61/7686","text":"T. Rama Rao"}]},"title":"Microstrip-fed dipole antenna for UWB wireless communications.","venue":"ICACCI","pages":"671-674","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DivyaVSSR13","doi":"10.1109/ICACCI.2013.6637253","ee":"https://doi.org/10.1109/ICACCI.2013.6637253","url":"https://dblp.org/rec/conf/icacci/DivyaVSSR13"}, "url":"URL#4155067" }, { "@score":"1", "@id":"4155068", "info":{"authors":{"author":[{"@pid":"14/10547","text":"Manoj Diwakar"},{"@pid":"138/1313","text":"Pawan Kumar Patel"},{"@pid":"42/3840","text":"Kunal Gupta"}]},"title":"Cellular automata based edge-detection for brain tumor.","venue":"ICACCI","pages":"53-59","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DiwakarPG13","doi":"10.1109/ICACCI.2013.6637146","ee":"https://doi.org/10.1109/ICACCI.2013.6637146","url":"https://dblp.org/rec/conf/icacci/DiwakarPG13"}, "url":"URL#4155068" }, { "@score":"1", "@id":"4155069", "info":{"authors":{"author":[{"@pid":"63/10121","text":"Jyotshna Dongardive"},{"@pid":"30/2511","text":"Siby Abraham"}]},"title":"Predicting 3D structure of proteins from genomic sequences: A genetic algorithm approach.","venue":"ICACCI","pages":"1207-1212","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DongardiveA13","doi":"10.1109/ICACCI.2013.6637349","ee":"https://doi.org/10.1109/ICACCI.2013.6637349","url":"https://dblp.org/rec/conf/icacci/DongardiveA13"}, "url":"URL#4155069" }, { "@score":"1", "@id":"4155070", "info":{"authors":{"author":[{"@pid":"129/9390","text":"Rahul Dutta"},{"@pid":"01/9555","text":"B. Annappa"}]},"title":"Privacy and trust in cloud database using threshold-based secret sharing.","venue":"ICACCI","pages":"800-805","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DuttaA13","doi":"10.1109/ICACCI.2013.6637278","ee":"https://doi.org/10.1109/ICACCI.2013.6637278","url":"https://dblp.org/rec/conf/icacci/DuttaA13"}, "url":"URL#4155070" }, { "@score":"1", "@id":"4155071", "info":{"authors":{"author":[{"@pid":"121/3336","text":"Ipsita Dutta"},{"@pid":"121/3458","text":"Rajib Banerjee"},{"@pid":"31/11078","text":"Sipra Das Bit"}]},"title":"Energy efficient audio compression scheme based on red black wavelet lifting for wireless multimedia sensor network.","venue":"ICACCI","pages":"1070-1075","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DuttaBB13","doi":"10.1109/ICACCI.2013.6637325","ee":"https://doi.org/10.1109/ICACCI.2013.6637325","url":"https://dblp.org/rec/conf/icacci/DuttaBB13"}, "url":"URL#4155071" }, { "@score":"1", "@id":"4155072", "info":{"authors":{"author":[{"@pid":"94/7998","text":"Nitul Dutta"},{"@pid":"20/10413","text":"Hiren Kumar Deva Sarma"}]},"title":"A routing protocol for cognitive networks in presence of co-operative Primary User.","venue":"ICACCI","pages":"143-148","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DuttaS13","doi":"10.1109/ICACCI.2013.6637161","ee":"https://doi.org/10.1109/ICACCI.2013.6637161","url":"https://dblp.org/rec/conf/icacci/DuttaS13"}, "url":"URL#4155072" }, { "@score":"1", "@id":"4155073", "info":{"authors":{"author":[{"@pid":"86/10548","text":"Sanjay K. Dwivedi"},{"@pid":"06/10549","text":"Pramod P. Sukhadeve"}]},"title":"Comparative structure of Homoeopathy language with other medical languages in machine translation system.","venue":"ICACCI","pages":"775-778","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/DwivediS13","doi":"10.1109/ICACCI.2013.6637272","ee":"https://doi.org/10.1109/ICACCI.2013.6637272","url":"https://dblp.org/rec/conf/icacci/DwivediS13"}, "url":"URL#4155073" }, { "@score":"1", "@id":"4155074", "info":{"authors":{"author":[{"@pid":"11/3590","text":"Asif Ekbal"},{"@pid":"27/1664-1","text":"Sriparna Saha 0001"}]},"title":"Two stage genetic approach for bio-chemical named entity recognition.","venue":"ICACCI","pages":"709-713","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Ekbal013","doi":"10.1109/ICACCI.2013.6637260","ee":"https://doi.org/10.1109/ICACCI.2013.6637260","url":"https://dblp.org/rec/conf/icacci/Ekbal013"}, "url":"URL#4155074" }, { "@score":"1", "@id":"4155075", "info":{"authors":{"author":[{"@pid":"138/1405","text":"Hanaa Ismail Elshazly"},{"@pid":"67/9796","text":"Ahmad Taher Azar"},{"@pid":"142/1886","text":"Abeer Elkorany 0001"},{"@pid":"h/AboulEllaHassanien","text":"Aboul Ella Hassanien"}]},"title":"Hybrid system for lymphatic diseases diagnosis.","venue":"ICACCI","pages":"343-347","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ElshazlyAEH13","doi":"10.1109/ICACCI.2013.6637195","ee":"https://doi.org/10.1109/ICACCI.2013.6637195","url":"https://dblp.org/rec/conf/icacci/ElshazlyAEH13"}, "url":"URL#4155075" }, { "@score":"1", "@id":"4155076", "info":{"authors":{"author":[{"@pid":"138/1333","text":"Varsha R. Embar"},{"@pid":"138/1189","text":"Surabhi R. Deshpande"},{"@pid":"138/1454","text":"A. K. Vaishnavi"},{"@pid":"138/1459","text":"Vishakha Jain"},{"@pid":"25/10886","text":"Jagadish S. Kallimani"}]},"title":"sArAmsha - A Kannada abstractive summarizer.","venue":"ICACCI","pages":"540-544","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/EmbarDVJK13","doi":"10.1109/ICACCI.2013.6637229","ee":"https://doi.org/10.1109/ICACCI.2013.6637229","url":"https://dblp.org/rec/conf/icacci/EmbarDVJK13"}, "url":"URL#4155076" }, { "@score":"1", "@id":"4155077", "info":{"authors":{"author":[{"@pid":"35/10882","text":"Sobers L. X. Francis"},{"@pid":"55/4292","text":"Sreenatha G. Anavatti"},{"@pid":"38/616","text":"Matthew A. Garratt"}]},"title":"Real time cooperative path planning for multi-autonomous vehicles.","venue":"ICACCI","pages":"1053-1057","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/FrancisAG13","doi":"10.1109/ICACCI.2013.6637322","ee":"https://doi.org/10.1109/ICACCI.2013.6637322","url":"https://dblp.org/rec/conf/icacci/FrancisAG13"}, "url":"URL#4155077" }, { "@score":"1", "@id":"4155078", "info":{"authors":{"author":[{"@pid":"39/9572","text":"Mahesh Gadiraju"},{"@pid":"88/1336","text":"Vastavayi Valli Kumari"}]},"title":"Primal-dual parallel algorithm for continuous aggregate query dissemination.","venue":"ICACCI","pages":"545-549","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GadirajuK13","doi":"10.1109/ICACCI.2013.6637230","ee":"https://doi.org/10.1109/ICACCI.2013.6637230","url":"https://dblp.org/rec/conf/icacci/GadirajuK13"}, "url":"URL#4155078" }, { "@score":"1", "@id":"4155079", "info":{"authors":{"author":[{"@pid":"138/1527","text":"Ashwini Galande"},{"@pid":"138/1135","text":"Ratna Patil"}]},"title":"The art of medical image fusion: A survey.","venue":"ICACCI","pages":"400-405","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GalandeP13","doi":"10.1109/ICACCI.2013.6637205","ee":"https://doi.org/10.1109/ICACCI.2013.6637205","url":"https://dblp.org/rec/conf/icacci/GalandeP13"}, "url":"URL#4155079" }, { "@score":"1", "@id":"4155080", "info":{"authors":{"author":[{"@pid":"138/1433","text":"Akila. A. Ganesh"},{"@pid":"138/1539","text":"Chandra Ravichandran"}]},"title":"Syllable based continuous speech recognizer with varied length maximum likelihood character segmentation.","venue":"ICACCI","pages":"935-940","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GaneshR13","doi":"10.1109/ICACCI.2013.6637302","ee":"https://doi.org/10.1109/ICACCI.2013.6637302","url":"https://dblp.org/rec/conf/icacci/GaneshR13"}, "url":"URL#4155080" }, { "@score":"1", "@id":"4155081", "info":{"authors":{"author":[{"@pid":"04/8658","text":"Rachit Mohan Garg"},{"@pid":"138/1267","text":"Mohpreet Singh"},{"@pid":"138/1533","text":"Surabhi Dharmendra Pandey"}]},"title":"Evolving conspicuous and profligate web applications.","venue":"ICACCI","pages":"1190-1195","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GargSP13","doi":"10.1109/ICACCI.2013.6637346","ee":"https://doi.org/10.1109/ICACCI.2013.6637346","url":"https://dblp.org/rec/conf/icacci/GargSP13"}, "url":"URL#4155081" }, { "@score":"1", "@id":"4155082", "info":{"authors":{"author":[{"@pid":"127/0115-1","text":"Navneet Garg 0001"},{"@pid":"44/9648","text":"Aditya Trivedi"}]},"title":"Improved cooperative sensing strategies using wavelet denoising.","venue":"ICACCI","pages":"8-13","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GargT13","doi":"10.1109/ICACCI.2013.6637138","ee":"https://doi.org/10.1109/ICACCI.2013.6637138","url":"https://dblp.org/rec/conf/icacci/GargT13"}, "url":"URL#4155082" }, { "@score":"1", "@id":"4155083", "info":{"authors":{"author":{"@pid":"g/AlexanderFGelbukh","text":"Alexander F. Gelbukh"}},"title":"Natutal language processing: Perspective of CIC-IPN.","venue":"ICACCI","pages":"2112-2121","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Gelbukh13","doi":"10.1109/ICACCI.2013.6637507","ee":"https://doi.org/10.1109/ICACCI.2013.6637507","url":"https://dblp.org/rec/conf/icacci/Gelbukh13"}, "url":"URL#4155083" }, { "@score":"1", "@id":"4155084", "info":{"authors":{"author":[{"@pid":"138/1282","text":"Sourabh Ghorpade"},{"@pid":"138/1397","text":"Nikhil Chavan"},{"@pid":"138/1067","text":"Akash Gokhale"},{"@pid":"138/1237","text":"Deepak Sapkal"}]},"title":"A framework for executing android applications on the cloud.","venue":"ICACCI","pages":"230-235","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GhorpadeCGS13","doi":"10.1109/ICACCI.2013.6637176","ee":"https://doi.org/10.1109/ICACCI.2013.6637176","url":"https://dblp.org/rec/conf/icacci/GhorpadeCGS13"}, "url":"URL#4155084" }, { "@score":"1", "@id":"4155085", "info":{"authors":{"author":[{"@pid":"49/622","text":"Debabrata Ghosh"},{"@pid":"138/1329","text":"Ramasamy Subramanian"},{"@pid":"138/1312","text":"Vinay Murthy"}]},"title":"A randomized methodology for post-silicon validation of CAN and other communication modules.","venue":"ICACCI","pages":"886-890","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GhoshSM13","doi":"10.1109/ICACCI.2013.6637293","ee":"https://doi.org/10.1109/ICACCI.2013.6637293","url":"https://dblp.org/rec/conf/icacci/GhoshSM13"}, "url":"URL#4155085" }, { "@score":"1", "@id":"4155086", "info":{"authors":{"author":[{"@pid":"138/1550","text":"Joydev Ghosh"},{"@pid":"138/1486","text":"Supratim Sen"},{"@pid":"23/8285","text":"Amit Saha"},{"@pid":"138/1212","text":"Samir Basak"}]},"title":"Electrical power generation using foot step for urban area energy applications.","venue":"ICACCI","pages":"1367-1369","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GhoshSSB13","doi":"10.1109/ICACCI.2013.6637377","ee":"https://doi.org/10.1109/ICACCI.2013.6637377","url":"https://dblp.org/rec/conf/icacci/GhoshSSB13"}, "url":"URL#4155086" }, { "@score":"1", "@id":"4155087", "info":{"authors":{"author":[{"@pid":"121/3556","text":"Satinder Singh Gill"},{"@pid":"96/3582","text":"Brent R. Petersen"}]},"title":"Line-of-sight multi-input multi-output capacity improvement using change of carrier frequency.","venue":"ICACCI","pages":"321-326","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GillP13","doi":"10.1109/ICACCI.2013.6637191","ee":"https://doi.org/10.1109/ICACCI.2013.6637191","url":"https://dblp.org/rec/conf/icacci/GillP13"}, "url":"URL#4155087" }, { "@score":"1", "@id":"4155088", "info":{"authors":{"author":[{"@pid":"138/1236","text":"Venkateswarlu Ginkala"},{"@pid":"138/1428","text":"Shoeb Mohammad"},{"@pid":"78/4606","text":"A. D. Sarma"}]},"title":"Forecasting of ionospheric time delay using Holt-winter method for GPS applications in low latitude region.","venue":"ICACCI","pages":"784-786","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GinkalaMS13","doi":"10.1109/ICACCI.2013.6637274","ee":"https://doi.org/10.1109/ICACCI.2013.6637274","url":"https://dblp.org/rec/conf/icacci/GinkalaMS13"}, "url":"URL#4155088" }, { "@score":"1", "@id":"4155089", "info":{"authors":{"author":[{"@pid":"138/1460","text":"Siva. V. Girish"},{"@pid":"138/1225","text":"R. K. Sababathy"},{"@pid":"17/1666","text":"S. Vijayakumar"},{"@pid":"63/7733","text":"B. Venkatalakshmi"}]},"title":"Advanced estimator based sensorless BLDC motor control.","venue":"ICACCI","pages":"1748-1752","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GirishSVV13","doi":"10.1109/ICACCI.2013.6637445","ee":"https://doi.org/10.1109/ICACCI.2013.6637445","url":"https://dblp.org/rec/conf/icacci/GirishSVV13"}, "url":"URL#4155089" }, { "@score":"1", "@id":"4155090", "info":{"authors":{"author":[{"@pid":"138/1465-2","text":"Nidhi Goel 0002"},{"@pid":"44/782","text":"Priti Sehgal"}]},"title":"Weighted semantic fusion of text and content for image retrieval.","venue":"ICACCI","pages":"681-687","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GoelS13","doi":"10.1109/ICACCI.2013.6637255","ee":"https://doi.org/10.1109/ICACCI.2013.6637255","url":"https://dblp.org/rec/conf/icacci/GoelS13"}, "url":"URL#4155090" }, { "@score":"1", "@id":"4155091", "info":{"authors":{"author":[{"@pid":"138/1068","text":"K. Gopika Gopan"},{"@pid":"138/1205","text":"A. Harsha"},{"@pid":"138/1414","text":"Liza Annie Joseph"},{"@pid":"138/1069","text":"Eldho S. Kollialil"}]},"title":"Adaptive neuro-fuzzy classifier for 'Petit Mal' epilepsy detection using Mean Teager Energy.","venue":"ICACCI","pages":"752-757","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GopanHJK13","doi":"10.1109/ICACCI.2013.6637268","ee":"https://doi.org/10.1109/ICACCI.2013.6637268","url":"https://dblp.org/rec/conf/icacci/GopanHJK13"}, "url":"URL#4155091" }, { "@score":"1", "@id":"4155092", "info":{"authors":{"author":[{"@pid":"135/0261","text":"Y. G. Goutam"},{"@pid":"91/5383","text":"M. Girish Chandra"},{"@pid":"135/0551","text":"Krishnan Srinivasarengan"},{"@pid":"17/9715","text":"Swanand Kadhe"}]},"title":"On electrical load disaggregation using factor graphs.","venue":"ICACCI","pages":"1759-1764","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GoutamCSK13","doi":"10.1109/ICACCI.2013.6637447","ee":"https://doi.org/10.1109/ICACCI.2013.6637447","url":"https://dblp.org/rec/conf/icacci/GoutamCSK13"}, "url":"URL#4155092" }, { "@score":"1", "@id":"4155093", "info":{"authors":{"author":[{"@pid":"46/5726","text":"Jayavardhana Gubbi"},{"@pid":"38/2970","text":"Slaven Marusic"},{"@pid":"135/6524","text":"Aravinda S. Rao"},{"@pid":"62/4404","text":"Yee Wei Law"},{"@pid":"10/5477","text":"Marimuthu Palaniswami"}]},"title":"A pilot study of urban noise monitoring architecture using wireless sensor networks.","venue":"ICACCI","pages":"1047-1052","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GubbiMRLP13","doi":"10.1109/ICACCI.2013.6637321","ee":"https://doi.org/10.1109/ICACCI.2013.6637321","url":"https://dblp.org/rec/conf/icacci/GubbiMRLP13"}, "url":"URL#4155093" }, { "@score":"1", "@id":"4155094", "info":{"authors":{"author":[{"@pid":"136/5799","text":"Vaishali Gupta"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Subjective and objective evaluation of English to Urdu Machine translation.","venue":"ICACCI","pages":"1520-1525","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaJM13","doi":"10.1109/ICACCI.2013.6637405","ee":"https://doi.org/10.1109/ICACCI.2013.6637405","url":"https://dblp.org/rec/conf/icacci/GuptaJM13"}, "url":"URL#4155094" }, { "@score":"1", "@id":"4155095", "info":{"authors":{"author":[{"@pid":"24/3213","text":"Rahul Gupta"},{"@pid":"75/4520","text":"Arpit Jain"},{"@pid":"138/1290","text":"Satakshi Rana"},{"@pid":"27/6533-2","text":"Sanjay Singh 0002"}]},"title":"Contextual information based recommender system using Singular Value Decomposition.","venue":"ICACCI","pages":"2084-2089","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaJRS13","doi":"10.1109/ICACCI.2013.6637502","ee":"https://doi.org/10.1109/ICACCI.2013.6637502","url":"https://dblp.org/rec/conf/icacci/GuptaJRS13"}, "url":"URL#4155095" }, { "@score":"1", "@id":"4155096", "info":{"authors":{"author":[{"@pid":"49/10220","text":"Sanchika Gupta"},{"@pid":"88/640","text":"Padam Kumar"}]},"title":"A desktop notification based scheme for preventing online frauds attempts to cloud users S pp S.","venue":"ICACCI","pages":"255-260","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaK13","doi":"10.1109/ICACCI.2013.6637180","ee":"https://doi.org/10.1109/ICACCI.2013.6637180","url":"https://dblp.org/rec/conf/icacci/GuptaK13"}, "url":"URL#4155096" }, { "@score":"1", "@id":"4155097", "info":{"authors":{"author":[{"@pid":"138/1406","text":"Anant Gupta"},{"@pid":"81/4530-1","text":"Kuldeep Singh 0001"}]},"title":"Location based personalized restaurant recommendation system for mobile environments.","venue":"ICACCI","pages":"507-511","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaS13","doi":"10.1109/ICACCI.2013.6637223","ee":"https://doi.org/10.1109/ICACCI.2013.6637223","url":"https://dblp.org/rec/conf/icacci/GuptaS13"}, "url":"URL#4155097" }, { "@score":"1", "@id":"4155098", "info":{"authors":{"author":[{"@pid":"138/1281","text":"Yachna Gupta"},{"@pid":"138/1111","text":"Anmol Sarwana"},{"@pid":"138/1496","text":"Meenal Gogia"},{"@pid":"138/1364","text":"M. K. Nallakaruppan 0001"}]},"title":"A software for insurance consultancy.","venue":"ICACCI","pages":"1288-1292","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaSGN13","doi":"10.1109/ICACCI.2013.6637363","ee":"https://doi.org/10.1109/ICACCI.2013.6637363","url":"https://dblp.org/rec/conf/icacci/GuptaSGN13"}, "url":"URL#4155098" }, { "@score":"1", "@id":"4155099", "info":{"authors":{"author":[{"@pid":"66/841","text":"Aditya Gupta"},{"@pid":"37/640","text":"Durga Toshniwal"},{"@pid":"20/266","text":"Pramod K. Gupta"},{"@pid":"138/1296","text":"Vikas Khurana"},{"@pid":"138/1128","text":"Pushp Upadhyay"}]},"title":"Extracting anomalies from time sequences derived from nuclear power plant data by using fixed width clustering algorithm.","venue":"ICACCI","pages":"1587-1592","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GuptaTGKU13","doi":"10.1109/ICACCI.2013.6637417","ee":"https://doi.org/10.1109/ICACCI.2013.6637417","url":"https://dblp.org/rec/conf/icacci/GuptaTGKU13"}, "url":"URL#4155099" }, { "@score":"1", "@id":"4155100", "info":{"authors":{"author":[{"@pid":"138/1413","text":"Kiran Kumar Gurrala"},{"@pid":"38/7799","text":"Susmita Das"}]},"title":"Performance study of hybrid decode-amplify-forward (HDAF) scheme in distributed Alamouti coded cooperative network.","venue":"ICACCI","pages":"271-276","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/GurralaD13","doi":"10.1109/ICACCI.2013.6637183","ee":"https://doi.org/10.1109/ICACCI.2013.6637183","url":"https://dblp.org/rec/conf/icacci/GurralaD13"}, "url":"URL#4155100" }, { "@score":"1", "@id":"4155101", "info":{"authors":{"author":[{"@pid":"138/1143","text":"Ashfia Binte Habib"},{"@pid":"138/1243","text":"Tasnim Khanam"},{"@pid":"34/5792","text":"Rajesh Palit"}]},"title":"Simplified File Assured Deletion (SFADE) - A user friendly overlay approach for data security in cloud storage system.","venue":"ICACCI","pages":"1640-1644","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HabibKP13","doi":"10.1109/ICACCI.2013.6637427","ee":"https://doi.org/10.1109/ICACCI.2013.6637427","url":"https://dblp.org/rec/conf/icacci/HabibKP13"}, "url":"URL#4155101" }, { "@score":"1", "@id":"4155102", "info":{"authors":{"author":[{"@pid":"138/1535","text":"Abdullah Al Hadi"},{"@pid":"138/1125","text":"Jamal Uddin Ahmed"}]},"title":"Polarization encoded optical shadow casting logic units: Design of trinary half subtractor using various input coding scheme.","venue":"ICACCI","pages":"594-598","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HadiA13","doi":"10.1109/ICACCI.2013.6637239","ee":"https://doi.org/10.1109/ICACCI.2013.6637239","url":"https://dblp.org/rec/conf/icacci/HadiA13"}, "url":"URL#4155102" }, { "@score":"1", "@id":"4155103", "info":{"authors":{"author":[{"@pid":"136/8769","text":"Kalyan Kumar Halder"},{"@pid":"18/1696","text":"Murat Tahtali"},{"@pid":"55/4292","text":"Sreenatha G. Anavatti"}]},"title":"A fast restoration method for atmospheric turbulence degraded images using non-rigid image registration.","venue":"ICACCI","pages":"394-399","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HalderTA13","doi":"10.1109/ICACCI.2013.6637204","ee":"https://doi.org/10.1109/ICACCI.2013.6637204","url":"https://dblp.org/rec/conf/icacci/HalderTA13"}, "url":"URL#4155103" }, { "@score":"1", "@id":"4155104", "info":{"authors":{"author":[{"@pid":"138/1508","text":"Sarvenaz Hamidi"},{"@pid":"n/MahmoudNaghibzadeh","text":"Mahmoud Naghibzadeh"},{"@pid":"25/1726","text":"Javad Sadri"}]},"title":"Protein multiple sequence alignment based on secondary structure similarity.","venue":"ICACCI","pages":"1224-1229","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HamidiNS13","doi":"10.1109/ICACCI.2013.6637352","ee":"https://doi.org/10.1109/ICACCI.2013.6637352","url":"https://dblp.org/rec/conf/icacci/HamidiNS13"}, "url":"URL#4155104" }, { "@score":"1", "@id":"4155105", "info":{"authors":{"author":{"@pid":"138/1286","text":"Maha Attia Hana"}},"title":"E-government cloud computing proposed model: Egyptian E_Government Cloud Computing.","venue":"ICACCI","pages":"847-852","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Hana13","doi":"10.1109/ICACCI.2013.6637286","ee":"https://doi.org/10.1109/ICACCI.2013.6637286","url":"https://dblp.org/rec/conf/icacci/Hana13"}, "url":"URL#4155105" }, { "@score":"1", "@id":"4155106", "info":{"authors":{"author":[{"@pid":"58/10199","text":"Shivanand M. Handigund"},{"@pid":"138/1427","text":"B. N. Arunakumari"}]},"title":"An ameliorated methodology for the identification of project activities of software development projects.","venue":"ICACCI","pages":"172-177","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HandigundA13","doi":"10.1109/ICACCI.2013.6637166","ee":"https://doi.org/10.1109/ICACCI.2013.6637166","url":"https://dblp.org/rec/conf/icacci/HandigundA13"}, "url":"URL#4155106" }, { "@score":"1", "@id":"4155107", "info":{"authors":{"author":[{"@pid":"58/10199","text":"Shivanand M. Handigund"},{"@pid":"138/1169","text":"S. B. Kshama"},{"@pid":"69/3027","text":"N. Ranjana"}]},"title":"An ameliorated methodology for design and development of a work process diagram to be incorporated in UML.","venue":"ICACCI","pages":"184-190","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HandigundKR13","doi":"10.1109/ICACCI.2013.6637168","ee":"https://doi.org/10.1109/ICACCI.2013.6637168","url":"https://dblp.org/rec/conf/icacci/HandigundKR13"}, "url":"URL#4155107" }, { "@score":"1", "@id":"4155108", "info":{"authors":{"author":[{"@pid":"16/9554","text":"M. C. Hanumantharaju"},{"@pid":"54/9553","text":"M. Ravishankar"},{"@pid":"79/2689","text":"D. R. Ramesh Babu"}]},"title":"Design and FPGA implementation of an 2D Gaussian surround function with reduced on-chip memory utilization.","venue":"ICACCI","pages":"604-609","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HanumantharajuRB13","doi":"10.1109/ICACCI.2013.6637241","ee":"https://doi.org/10.1109/ICACCI.2013.6637241","url":"https://dblp.org/rec/conf/icacci/HanumantharajuRB13"}, "url":"URL#4155108" }, { "@score":"1", "@id":"4155109", "info":{"authors":{"author":[{"@pid":"138/1408","text":"U. Hari"},{"@pid":"138/1526","text":"B. Ramachandran"},{"@pid":"57/1159-7","text":"Chris Johnson 0007"}]},"title":"An Unequally Clustered Multihop Routing protocol for Wireless Sensor Networks.","venue":"ICACCI","pages":"1007-1011","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HariRJ13","doi":"10.1109/ICACCI.2013.6637314","ee":"https://doi.org/10.1109/ICACCI.2013.6637314","url":"https://dblp.org/rec/conf/icacci/HariRJ13"}, "url":"URL#4155109" }, { "@score":"1", "@id":"4155110", "info":{"authors":{"author":[{"@pid":"11/5183","text":"S. Hariharan"},{"@pid":"138/1551","text":"S. Venkata Siva Prasad"},{"@pid":"127/4890","text":"P. Muthuchidambaranathan"}]},"title":"Average detection probability analysis for cooperative - MIMO spectrum sensing in cognitive radio networks.","venue":"ICACCI","pages":"133-136","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HariharanPM13","doi":"10.1109/ICACCI.2013.6637159","ee":"https://doi.org/10.1109/ICACCI.2013.6637159","url":"https://dblp.org/rec/conf/icacci/HariharanPM13"}, "url":"URL#4155110" }, { "@score":"1", "@id":"4155111", "info":{"authors":{"author":[{"@pid":"57/7965","text":"B. S. Harish"},{"@pid":"138/1532","text":"Aditi Hedge"},{"@pid":"138/1315","text":"OmPriya Venkatesh"},{"@pid":"138/1156","text":"D. G. Spoorthy"},{"@pid":"138/1283","text":"D. Sushma"}]},"title":"Classification of plant leaves using Morphological features and Zernike moments.","venue":"ICACCI","pages":"1827-1831","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HarishHVSS13","doi":"10.1109/ICACCI.2013.6637459","ee":"https://doi.org/10.1109/ICACCI.2013.6637459","url":"https://dblp.org/rec/conf/icacci/HarishHVSS13"}, "url":"URL#4155111" }, { "@score":"1", "@id":"4155112", "info":{"authors":{"author":[{"@pid":"138/1530","text":"Aditya Narayan Hati"},{"@pid":"138/1167","text":"Rajkumar Darbar"},{"@pid":"96/10605","text":"Nanda Dulal Jana"},{"@pid":"63/6758","text":"Jaya Sil"}]},"title":"Modified Artificial Bee Colony Algorithm using differential evolution and polynomial mutation for real-parameter optimization.","venue":"ICACCI","pages":"534-539","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HatiDJS13","doi":"10.1109/ICACCI.2013.6637228","ee":"https://doi.org/10.1109/ICACCI.2013.6637228","url":"https://dblp.org/rec/conf/icacci/HatiDJS13"}, "url":"URL#4155112" }, { "@score":"1", "@id":"4155113", "info":{"authors":{"author":[{"@pid":"138/1492","text":"Yashaswini Hegde"},{"@pid":"40/6070","text":"Shubha Kadambe"},{"@pid":"138/1450","text":"Prashantha Naduthota"}]},"title":"Suffix stripping algorithm for Kannada information retrieval.","venue":"ICACCI","pages":"527-533","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HegdeKN13","doi":"10.1109/ICACCI.2013.6637227","ee":"https://doi.org/10.1109/ICACCI.2013.6637227","url":"https://dblp.org/rec/conf/icacci/HegdeKN13"}, "url":"URL#4155113" }, { "@score":"1", "@id":"4155114", "info":{"authors":{"author":[{"@pid":"121/2209","text":"Manu S. Hegde"},{"@pid":"27/6533-2","text":"Sanjay Singh 0002"}]},"title":"Alert-BDI: BDI model with adaptive alertness through situational awareness.","venue":"ICACCI","pages":"442-447","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HegdeS13","doi":"10.1109/ICACCI.2013.6637212","ee":"https://doi.org/10.1109/ICACCI.2013.6637212","url":"https://dblp.org/rec/conf/icacci/HegdeS13"}, "url":"URL#4155114" }, { "@score":"1", "@id":"4155115", "info":{"authors":{"author":{"@pid":"42/5039","text":"Hanno Hildmann"}},"title":"The players of games: Evaluating and recording human and AI game playing behaviour.","venue":"ICACCI","pages":"724-729","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Hildmann13","doi":"10.1109/ICACCI.2013.6637263","ee":"https://doi.org/10.1109/ICACCI.2013.6637263","url":"https://dblp.org/rec/conf/icacci/Hildmann13"}, "url":"URL#4155115" }, { "@score":"1", "@id":"4155116", "info":{"authors":{"author":[{"@pid":"138/1123","text":"Sushma R. Huddar"},{"@pid":"138/1484","text":"Sudhir Rao Rupanagudi"},{"@pid":"138/1469","text":"Ramya Ravi"},{"@pid":"138/1063","text":"Shikha Yadav"},{"@pid":"j/SanjayJain","text":"Sanjay Jain"}]},"title":"Novel architecture for inverse mix columns for AES using ancient Vedic Mathematics on FPGA.","venue":"ICACCI","pages":"1924-1929","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/HuddarRRYJ13","doi":"10.1109/ICACCI.2013.6637476","ee":"https://doi.org/10.1109/ICACCI.2013.6637476","url":"https://dblp.org/rec/conf/icacci/HuddarRRYJ13"}, "url":"URL#4155116" }, { "@score":"1", "@id":"4155117", "info":{"authors":{"author":[{"@pid":"138/1102","text":"Rohan Isawe"},{"@pid":"138/1384","text":"Mukta Darekar"},{"@pid":"04/1090","text":"Tejas Shah"},{"@pid":"69/8964-3","text":"Y. S. Rao 0003"}]},"title":"Grid tie inverter based interfacing model and its design.","venue":"ICACCI","pages":"1691-1696","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/IsaweDSR13","doi":"10.1109/ICACCI.2013.6637436","ee":"https://doi.org/10.1109/ICACCI.2013.6637436","url":"https://dblp.org/rec/conf/icacci/IsaweDSR13"}, "url":"URL#4155117" }, { "@score":"1", "@id":"4155118", "info":{"authors":{"author":[{"@pid":"138/1308","text":"Syed Zeeshan Ismail"},{"@pid":"121/3351","text":"Nanda Kishore Chavali"}]},"title":"Impact of spatial expansion on channel estimation accuracy in HT and VHT wireless LAN systems.","venue":"ICACCI","pages":"643-648","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/IsmailC13","doi":"10.1109/ICACCI.2013.6637248","ee":"https://doi.org/10.1109/ICACCI.2013.6637248","url":"https://dblp.org/rec/conf/icacci/IsmailC13"}, "url":"URL#4155118" }, { "@score":"1", "@id":"4155119", "info":{"authors":{"author":[{"@pid":"138/1266","text":"Swapnil Ashok Jadhav"},{"@pid":"72/4050","text":"Durvasula V. L. N. Somayajulu"},{"@pid":"138/1523","text":"S. Nagesh Bhattu"},{"@pid":"41/5773","text":"R. B. V. Subramanyam"},{"@pid":"66/6633","text":"P. Suresh"}]},"title":"Topic dependent cross-word Spelling Corrections for Web Sentiment Analysis.","venue":"ICACCI","pages":"1093-1096","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JadhavSBSS13","doi":"10.1109/ICACCI.2013.6637329","ee":"https://doi.org/10.1109/ICACCI.2013.6637329","url":"https://dblp.org/rec/conf/icacci/JadhavSBSS13"}, "url":"URL#4155119" }, { "@score":"1", "@id":"4155120", "info":{"authors":{"author":[{"@pid":"138/1266","text":"Swapnil Ashok Jadhav"},{"@pid":"72/4050","text":"Durvasula V. L. N. Somayajulu"},{"@pid":"138/1523","text":"S. Nagesh Bhattu"},{"@pid":"41/5773","text":"R. B. V. Subramanyam"},{"@pid":"66/6633","text":"P. Suresh"}]},"title":"Context Dependent Bag of words generation.","venue":"ICACCI","pages":"1526-1531","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JadhavSBSS13a","doi":"10.1109/ICACCI.2013.6637406","ee":"https://doi.org/10.1109/ICACCI.2013.6637406","url":"https://dblp.org/rec/conf/icacci/JadhavSBSS13a"}, "url":"URL#4155120" }, { "@score":"1", "@id":"4155121", "info":{"authors":{"author":[{"@pid":"36/2142","text":"Ankita Jain"},{"@pid":"138/1391","text":"Krishnan Kutty"},{"@pid":"138/1528","text":"Suresh Yerva"}]},"title":"GMM based approach for human face verification using relative depth features.","venue":"ICACCI","pages":"675-680","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JainKY13","doi":"10.1109/ICACCI.2013.6637254","ee":"https://doi.org/10.1109/ICACCI.2013.6637254","url":"https://dblp.org/rec/conf/icacci/JainKY13"}, "url":"URL#4155121" }, { "@score":"1", "@id":"4155122", "info":{"authors":{"author":[{"@pid":"138/1468","text":"Manasvi Jain"},{"@pid":"145/4015","text":"Rahul C. P. Raj"},{"@pid":"153/4337","text":"Seshubabu Tolety"}]},"title":"A study on Indoor navigation techniques using smartphones.","venue":"ICACCI","pages":"1113-1118","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JainRT13","doi":"10.1109/ICACCI.2013.6637333","ee":"https://doi.org/10.1109/ICACCI.2013.6637333","url":"https://dblp.org/rec/conf/icacci/JainRT13"}, "url":"URL#4155122" }, { "@score":"1", "@id":"4155123", "info":{"authors":{"author":[{"@pid":"138/1500","text":"Christina Jayakumaran"},{"@pid":"35/10124","text":"Komathy Karuppanan"}]},"title":"Pattern identification using rough set clustering for spatio-temporal dataset.","venue":"ICACCI","pages":"1598-1603","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JayakumaranK13","doi":"10.1109/ICACCI.2013.6637419","ee":"https://doi.org/10.1109/ICACCI.2013.6637419","url":"https://dblp.org/rec/conf/icacci/JayakumaranK13"}, "url":"URL#4155123" }, { "@score":"1", "@id":"4155124", "info":{"authors":{"author":[{"@pid":"130/2298","text":"Saurabh Jha"},{"@pid":"138/1498","text":"Priyank Trivedi"}]},"title":"An automated video surveillance system using Viewpoint Feature Histogram and CUDA-enabled GPUs.","venue":"ICACCI","pages":"1812-1816","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JhaT13","doi":"10.1109/ICACCI.2013.6637456","ee":"https://doi.org/10.1109/ICACCI.2013.6637456","url":"https://dblp.org/rec/conf/icacci/JhaT13"}, "url":"URL#4155124" }, { "@score":"1", "@id":"4155125", "info":{"authors":{"author":[{"@pid":"138/1389","text":"Ashitta T. Jia"},{"@pid":"138/1071","text":"Yahkoob Ayappally"},{"@pid":"138/1372","text":"K. Syama"}]},"title":"Malayalam OCR: N-gram approach using SVM classifier.","venue":"ICACCI","pages":"1799-1803","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JiaAS13","doi":"10.1109/ICACCI.2013.6637454","ee":"https://doi.org/10.1109/ICACCI.2013.6637454","url":"https://dblp.org/rec/conf/icacci/JiaAS13"}, "url":"URL#4155125" }, { "@score":"1", "@id":"4155126", "info":{"authors":{"author":[{"@pid":"138/1208","text":"D. Jokhakar Jignesh"},{"@pid":"54/11299","text":"U. Sripati"},{"@pid":"31/9275","text":"Muralidhar Kulkarni"}]},"title":"Performance enhancement of optical QPSK systems with coherent reception for high speed links.","venue":"ICACCI","pages":"632-637","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JigneshSK13","doi":"10.1109/ICACCI.2013.6637246","ee":"https://doi.org/10.1109/ICACCI.2013.6637246","url":"https://dblp.org/rec/conf/icacci/JigneshSK13"}, "url":"URL#4155126" }, { "@score":"1", "@id":"4155127", "info":{"authors":{"author":[{"@pid":"127/4452","text":"Miriam Guadalupe Cruz Jiménez"},{"@pid":"63/6338","text":"Gordana Jovanovic-Dolecek"}]},"title":"On the design of very sharp narrowband FIR filters by using IFIR technique with time-multiplexed subfilters.","venue":"ICACCI","pages":"2002-2006","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JimenezJ13","doi":"10.1109/ICACCI.2013.6637489","ee":"https://doi.org/10.1109/ICACCI.2013.6637489","url":"https://dblp.org/rec/conf/icacci/JimenezJ13"}, "url":"URL#4155127" }, { "@score":"1", "@id":"4155128", "info":{"authors":{"author":[{"@pid":"120/7333","text":"H. K. Jnanamurthy"},{"@pid":"27/6533-2","text":"Sanjay Singh 0002"}]},"title":"Detection and filtering of collaborative malicious users in reputation system using quality repository approach.","venue":"ICACCI","pages":"466-471","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JnanamurthyS13","doi":"10.1109/ICACCI.2013.6637216","ee":"https://doi.org/10.1109/ICACCI.2013.6637216","url":"https://dblp.org/rec/conf/icacci/JnanamurthyS13"}, "url":"URL#4155128" }, { "@score":"1", "@id":"4155129", "info":{"authors":{"author":[{"@pid":"138/1257","text":"Deepa Jose"},{"@pid":"13/1421","text":"P. Nirmal Kumar"},{"@pid":"138/1241","text":"L. Saravakanthan"},{"@pid":"138/1303","text":"R. Dheeraj"}]},"title":"Computer aided partitioning for design of parallel testable VLSI systems.","venue":"ICACCI","pages":"1363-1366","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JoseKSD13","doi":"10.1109/ICACCI.2013.6637376","ee":"https://doi.org/10.1109/ICACCI.2013.6637376","url":"https://dblp.org/rec/conf/icacci/JoseKSD13"}, "url":"URL#4155129" }, { "@score":"1", "@id":"4155130", "info":{"authors":{"author":[{"@pid":"12/10557","text":"Manish R. Joshi"},{"@pid":"80/7798","text":"Ravindra Vaidya"}]},"title":"A review of paradigm shift from conventional to personalized e-learning.","venue":"ICACCI","pages":"1263-1269","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/JoshiV13","doi":"10.1109/ICACCI.2013.6637359","ee":"https://doi.org/10.1109/ICACCI.2013.6637359","url":"https://dblp.org/rec/conf/icacci/JoshiV13"}, "url":"URL#4155130" }, { "@score":"1", "@id":"4155131", "info":{"authors":{"author":{"@pid":"63/6338","text":"Gordana Jovanovic-Dolecek"}},"title":"On wideband comb compensator.","venue":"ICACCI","pages":"1247-1250","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Jovanovic-Dolecek13","doi":"10.1109/ICACCI.2013.6637356","ee":"https://doi.org/10.1109/ICACCI.2013.6637356","url":"https://dblp.org/rec/conf/icacci/Jovanovic-Dolecek13"}, "url":"URL#4155131" }, { "@score":"1", "@id":"4155132", "info":{"authors":{"author":[{"@pid":"87/11139","text":"Muni Venkateswarlu K."},{"@pid":"42/7866","text":"A. Kandasamy"},{"@pid":"51/5979-1","text":"K. Chandrasekaran 0001"}]},"title":"Energy-efficient edge-based network partitioning scheme for wireless sensor networks.","venue":"ICACCI","pages":"1017-1022","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KKS13","doi":"10.1109/ICACCI.2013.6637316","ee":"https://doi.org/10.1109/ICACCI.2013.6637316","url":"https://dblp.org/rec/conf/icacci/KKS13"}, "url":"URL#4155132" }, { "@score":"1", "@id":"4155133", "info":{"authors":{"author":[{"@pid":"138/1064","text":"M. Kalamani"},{"@pid":"138/1324","text":"S. Valarmathy"}]},"title":"Improved noise tracking algorithms For speech enhancement using LabVIEW.","venue":"ICACCI","pages":"1991-1996","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KalamaniV13","doi":"10.1109/ICACCI.2013.6637487","ee":"https://doi.org/10.1109/ICACCI.2013.6637487","url":"https://dblp.org/rec/conf/icacci/KalamaniV13"}, "url":"URL#4155133" }, { "@score":"1", "@id":"4155134", "info":{"authors":{"author":[{"@pid":"138/1395","text":"Sonali S. Kale"},{"@pid":"138/1373","text":"Ravindra H. Borhade"}]},"title":"Development of Multitenant SaaS framework at single instance and with zero effort multitenancy.","venue":"ICACCI","pages":"834-839","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KaleB13","doi":"10.1109/ICACCI.2013.6637284","ee":"https://doi.org/10.1109/ICACCI.2013.6637284","url":"https://dblp.org/rec/conf/icacci/KaleB13"}, "url":"URL#4155134" }, { "@score":"1", "@id":"4155135", "info":{"authors":{"author":[{"@pid":"25/10886","text":"Jagadish S. Kallimani"},{"@pid":"24/4176","text":"K. G. Srinivasa 0001"},{"@pid":"72/5927","text":"B. Eswara Reddy"}]},"title":"Extraction and interpretation of charts in technical documents.","venue":"ICACCI","pages":"382-387","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KallimaniSE13","doi":"10.1109/ICACCI.2013.6637202","ee":"https://doi.org/10.1109/ICACCI.2013.6637202","url":"https://dblp.org/rec/conf/icacci/KallimaniSE13"}, "url":"URL#4155135" }, { "@score":"1", "@id":"4155136", "info":{"authors":{"author":[{"@pid":"138/1238","text":"Usha Kamle"},{"@pid":"138/1555","text":"K. Jaya Sankar"}]},"title":"Performance evaluation of new multi level spreading codes for DS CDMA communication over Rayleigh fading channel.","venue":"ICACCI","pages":"649-654","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KamleS13","doi":"10.1109/ICACCI.2013.6637249","ee":"https://doi.org/10.1109/ICACCI.2013.6637249","url":"https://dblp.org/rec/conf/icacci/KamleS13"}, "url":"URL#4155136" }, { "@score":"1", "@id":"4155137", "info":{"authors":{"author":[{"@pid":"138/1260","text":"M. Barathi Kannamma"},{"@pid":"138/1490","text":"B. Chanthini"},{"@pid":"09/5902-2","text":"D. Manivannan 0002"}]},"title":"Controlling and monitoring process in industrial automation using Zigbee.","venue":"ICACCI","pages":"806-810","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KannammaCM13","doi":"10.1109/ICACCI.2013.6637279","ee":"https://doi.org/10.1109/ICACCI.2013.6637279","url":"https://dblp.org/rec/conf/icacci/KannammaCM13"}, "url":"URL#4155137" }, { "@score":"1", "@id":"4155138", "info":{"authors":{"author":[{"@pid":"138/1425","text":"Prabhu T. Kannan"},{"@pid":"13/2193","text":"Srividya K. Bansal"}]},"title":"Unimate: A student information system.","venue":"ICACCI","pages":"1251-1256","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KannanB13","doi":"10.1109/ICACCI.2013.6637357","ee":"https://doi.org/10.1109/ICACCI.2013.6637357","url":"https://dblp.org/rec/conf/icacci/KannanB13"}, "url":"URL#4155138" }, { "@score":"1", "@id":"4155139", "info":{"authors":{"author":[{"@pid":"138/1199","text":"Deepak Karia"},{"@pid":"138/1097","text":"Jaypal Baviskar"},{"@pid":"138/1430","text":"Raj Makwana"},{"@pid":"138/1273","text":"Niraj Panchal"}]},"title":"Performance analysis of ZigBee based Load Control and power monitoring system.","venue":"ICACCI","pages":"1479-1484","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KariaBMP13","doi":"10.1109/ICACCI.2013.6637398","ee":"https://doi.org/10.1109/ICACCI.2013.6637398","url":"https://dblp.org/rec/conf/icacci/KariaBMP13"}, "url":"URL#4155139" }, { "@score":"1", "@id":"4155140", "info":{"authors":{"author":[{"@pid":"18/8377","text":"Anil Kumar Karna"},{"@pid":"21/6510","text":"Yuting Chen"}]},"title":"Anticrasher: Predicting and preventing impending crashes on runtime at user end.","venue":"ICACCI","pages":"448-453","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KarnaC13","doi":"10.1109/ICACCI.2013.6637213","ee":"https://doi.org/10.1109/ICACCI.2013.6637213","url":"https://dblp.org/rec/conf/icacci/KarnaC13"}, "url":"URL#4155140" }, { "@score":"1", "@id":"4155141", "info":{"authors":{"author":{"@pid":"138/1435","text":"Girija Ramesan Karthik"}},"title":"Modified error insertion technique for information set based decoders.","venue":"ICACCI","pages":"874-879","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Karthik13","doi":"10.1109/ICACCI.2013.6637291","ee":"https://doi.org/10.1109/ICACCI.2013.6637291","url":"https://dblp.org/rec/conf/icacci/Karthik13"}, "url":"URL#4155141" }, { "@score":"1", "@id":"4155142", "info":{"authors":{"author":[{"@pid":"35/10124","text":"Komathy Karuppanan"},{"@pid":"138/1375","text":"S. Mahalaksmi"}]},"title":"Enhanced Optimized Link State Routing protocol for VANET using Fuzzy Rough Set.","venue":"ICACCI","pages":"1942-1947","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KaruppananM13","doi":"10.1109/ICACCI.2013.6637479","ee":"https://doi.org/10.1109/ICACCI.2013.6637479","url":"https://dblp.org/rec/conf/icacci/KaruppananM13"}, "url":"URL#4155142" }, { "@score":"1", "@id":"4155143", "info":{"authors":{"author":[{"@pid":"35/10124","text":"Komathy Karuppanan"},{"@pid":"138/1504","text":"Adhirai Manickam"},{"@pid":"138/1159","text":"Elakya Karthikeyan"},{"@pid":"138/1451","text":"Monica Narayanan"}]},"title":"Air quality based optimal path search model for spatio-temporal data set.","venue":"ICACCI","pages":"73-78","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KaruppananMKN13","doi":"10.1109/ICACCI.2013.6637149","ee":"https://doi.org/10.1109/ICACCI.2013.6637149","url":"https://dblp.org/rec/conf/icacci/KaruppananMKN13"}, "url":"URL#4155143" }, { "@score":"1", "@id":"4155144", "info":{"authors":{"author":[{"@pid":"138/1140","text":"Parismita A. Kashyap"},{"@pid":"85/2300","text":"Kandarpa Kumar Sarma"}]},"title":"Magnitude and phase tracking with adaptive aperture for multi-antenna framework in high data rate wireless channels.","venue":"ICACCI","pages":"308-314","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KashyapS13","doi":"10.1109/ICACCI.2013.6637189","ee":"https://doi.org/10.1109/ICACCI.2013.6637189","url":"https://dblp.org/rec/conf/icacci/KashyapS13"}, "url":"URL#4155144" }, { "@score":"1", "@id":"4155145", "info":{"authors":{"author":[{"@pid":"86/9523","text":"Amritpal Kaur"},{"@pid":"138/1228","text":"Supriya Kinger"}]},"title":"Temperature aware resource scheduling in Green Clouds.","venue":"ICACCI","pages":"1919-1923","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KaurK13","doi":"10.1109/ICACCI.2013.6637475","ee":"https://doi.org/10.1109/ICACCI.2013.6637475","url":"https://dblp.org/rec/conf/icacci/KaurK13"}, "url":"URL#4155145" }, { "@score":"1", "@id":"4155146", "info":{"authors":{"author":[{"@pid":"138/1489","text":"Mummaneni Kavicharan"},{"@pid":"09/8666","text":"Nukala Suryanarayana Murthy"},{"@pid":"138/1544","text":"N. Bheema Rao"}]},"title":"An efficient delay estimation model for high speed VLSI interconnects.","venue":"ICACCI","pages":"1358-1362","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KavicharanMR13","doi":"10.1109/ICACCI.2013.6637375","ee":"https://doi.org/10.1109/ICACCI.2013.6637375","url":"https://dblp.org/rec/conf/icacci/KavicharanMR13"}, "url":"URL#4155146" }, { "@score":"1", "@id":"4155147", "info":{"authors":{"author":[{"@pid":"138/1358","text":"Mrunal M. Khedkar"},{"@pid":"87/9689","text":"S. A. Ladhake"}]},"title":"Neural network based iris pattern recognition system using discrete Walsh Hadamard transform features.","venue":"ICACCI","pages":"388-393","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KhedkarL13","doi":"10.1109/ICACCI.2013.6637203","ee":"https://doi.org/10.1109/ICACCI.2013.6637203","url":"https://dblp.org/rec/conf/icacci/KhedkarL13"}, "url":"URL#4155147" }, { "@score":"1", "@id":"4155148", "info":{"authors":{"author":[{"@pid":"138/1084","text":"Andrey Kirsanov"},{"@pid":"55/4292","text":"Sreenatha G. Anavatti"},{"@pid":"53/1561","text":"Tapabrata Ray"}]},"title":"3D tools for the Robust Design Optimization of an Autonomous Underwater Vehicle.","venue":"ICACCI","pages":"1730-1737","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KirsanovAR13","doi":"10.1109/ICACCI.2013.6637442","ee":"https://doi.org/10.1109/ICACCI.2013.6637442","url":"https://dblp.org/rec/conf/icacci/KirsanovAR13"}, "url":"URL#4155148" }, { "@score":"1", "@id":"4155149", "info":{"authors":{"author":{"@pid":"132/0035","text":"Ravi Kishore Kodali"}},"title":"Experimental analysis of an event tracking energy-efficient WSN.","venue":"ICACCI","pages":"1293-1298","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Kodali13","doi":"10.1109/ICACCI.2013.6637364","ee":"https://doi.org/10.1109/ICACCI.2013.6637364","url":"https://dblp.org/rec/conf/icacci/Kodali13"}, "url":"URL#4155149" }, { "@score":"1", "@id":"4155150", "info":{"authors":{"author":[{"@pid":"132/0035","text":"Ravi Kishore Kodali"},{"@pid":"138/1348","text":"Narasimha Sarma"}]},"title":"Test bed for wireless sensor networks using XMesh networking protocol.","venue":"ICACCI","pages":"1506-1511","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KodaliS13","doi":"10.1109/ICACCI.2013.6637403","ee":"https://doi.org/10.1109/ICACCI.2013.6637403","url":"https://dblp.org/rec/conf/icacci/KodaliS13"}, "url":"URL#4155150" }, { "@score":"1", "@id":"4155151", "info":{"authors":{"author":[{"@pid":"121/3509","text":"Sharada Laxman Kore"},{"@pid":"259/3719","text":"Shaila D. Apte"}]},"title":"Ink width independent global features for writer verification.","venue":"ICACCI","pages":"1770-1774","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KoreA13","doi":"10.1109/ICACCI.2013.6637449","ee":"https://doi.org/10.1109/ICACCI.2013.6637449","url":"https://dblp.org/rec/conf/icacci/KoreA13"}, "url":"URL#4155151" }, { "@score":"1", "@id":"4155152", "info":{"authors":{"author":[{"@pid":"138/1086","text":"Tulasi Krishna"},{"@pid":"138/1180","text":"Priyam Sachdeva"},{"@pid":"138/1337","text":"Suraj Kumar Dhanuka"},{"@pid":"138/1092","text":"Mohit Gagrani"},{"@pid":"51/10455","text":"Pallabi Sarkar"}]},"title":"A multi parametric optimization based novel approach for an efficient design space exploration for ASIC design.","venue":"ICACCI","pages":"868-873","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KrishnaSDGS13","doi":"10.1109/ICACCI.2013.6637290","ee":"https://doi.org/10.1109/ICACCI.2013.6637290","url":"https://dblp.org/rec/conf/icacci/KrishnaSDGS13"}, "url":"URL#4155152" }, { "@score":"1", "@id":"4155153", "info":{"authors":{"author":[{"@pid":"138/1165","text":"Andey Krishnaji"},{"@pid":"24/3334","text":"Allam Appa Rao"}]},"title":"An improved Hybrid Neuro Fuzzy Genetic System (I-HNFGS) for protein secondary structure prediction from amino acid sequence.","venue":"ICACCI","pages":"1218-1223","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KrishnajiR13","doi":"10.1109/ICACCI.2013.6637351","ee":"https://doi.org/10.1109/ICACCI.2013.6637351","url":"https://dblp.org/rec/conf/icacci/KrishnajiR13"}, "url":"URL#4155153" }, { "@score":"1", "@id":"4155154", "info":{"authors":{"author":[{"@pid":"138/1109","text":"Amruta Kulkarni"},{"@pid":"31/9187","text":"Faruk Kazi 0001"},{"@pid":"68/9184","text":"Navdeep M. Singh"}]},"title":"Multiagent synchronization under delay in position and velocity with application to formation control.","venue":"ICACCI","pages":"1981-1986","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KulkarniKS13","doi":"10.1109/ICACCI.2013.6637486","ee":"https://doi.org/10.1109/ICACCI.2013.6637486","url":"https://dblp.org/rec/conf/icacci/KulkarniKS13"}, "url":"URL#4155154" }, { "@score":"1", "@id":"4155155", "info":{"authors":{"author":[{"@pid":"138/1181","text":"Rajesh Kulkarni"},{"@pid":"53/2489","text":"P. Padmanabham"},{"@pid":"138/1515","text":"Varsha Sagare"},{"@pid":"138/1553","text":"Vipul Maheshwari"}]},"title":"Usability evaluation of PS using SUMI (Software Usability Measurement Inventory).","venue":"ICACCI","pages":"1270-1273","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KulkarniPSM13","doi":"10.1109/ICACCI.2013.6637360","ee":"https://doi.org/10.1109/ICACCI.2013.6637360","url":"https://dblp.org/rec/conf/icacci/KulkarniPSM13"}, "url":"URL#4155155" }, { "@score":"1", "@id":"4155156", "info":{"authors":{"author":[{"@pid":"95/537","text":"K. P. Krishna Kumar"},{"@pid":"27/5376","text":"G. Geethakumari"}]},"title":"Information diffusion model for spread of misinformation in online social networks.","venue":"ICACCI","pages":"1172-1177","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarG13","doi":"10.1109/ICACCI.2013.6637343","ee":"https://doi.org/10.1109/ICACCI.2013.6637343","url":"https://dblp.org/rec/conf/icacci/KumarG13"}, "url":"URL#4155156" }, { "@score":"1", "@id":"4155157", "info":{"authors":{"author":[{"@pid":"138/1089","text":"Lingenahalli Jayadev Vijaya Kumar"},{"@pid":"18/6054","text":"J. K. Kishore"},{"@pid":"138/1130","text":"P. Kesava Rao"}]},"title":"Unsupervised classification based on decomposition of RISAT-1 images for oil spill detection.","venue":"ICACCI","pages":"739-746","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarKR13","doi":"10.1109/ICACCI.2013.6637266","ee":"https://doi.org/10.1109/ICACCI.2013.6637266","url":"https://dblp.org/rec/conf/icacci/KumarKR13"}, "url":"URL#4155157" }, { "@score":"1", "@id":"4155158", "info":{"authors":{"author":[{"@pid":"138/1087","text":"Gummaluri Sai Kumar"},{"@pid":"138/1268","text":"Gudipudi Manikanta"},{"@pid":"35/9337","text":"B. Srinivas"}]},"title":"A novel framework for video content infringement detection and prevention.","venue":"ICACCI","pages":"424-429","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarMS13","doi":"10.1109/ICACCI.2013.6637209","ee":"https://doi.org/10.1109/ICACCI.2013.6637209","url":"https://dblp.org/rec/conf/icacci/KumarMS13"}, "url":"URL#4155158" }, { "@score":"1", "@id":"4155159", "info":{"authors":{"author":[{"@pid":"120/5099","text":"Niteesh Kumar"},{"@pid":"20/4077","text":"Sukumar Nandi"}]},"title":"DisTree: A scheme for DHT.","venue":"ICACCI","pages":"794-799","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarN13","doi":"10.1109/ICACCI.2013.6637277","ee":"https://doi.org/10.1109/ICACCI.2013.6637277","url":"https://dblp.org/rec/conf/icacci/KumarN13"}, "url":"URL#4155159" }, { "@score":"1", "@id":"4155160", "info":{"authors":{"author":[{"@pid":"122/3122","text":"P. U. Praveen Kumar"},{"@pid":"86/6835","text":"C. J. Prabhakar"}]},"title":"Stereo correspondence for underwater images using adaptive weight-based cross-correlation.","venue":"ICACCI","pages":"348-353","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarP13","doi":"10.1109/ICACCI.2013.6637196","ee":"https://doi.org/10.1109/ICACCI.2013.6637196","url":"https://dblp.org/rec/conf/icacci/KumarP13"}, "url":"URL#4155160" }, { "@score":"1", "@id":"4155161", "info":{"authors":{"author":[{"@pid":"30/4308-7","text":"Arun Kumar 0007"},{"@pid":"16/7689","text":"Manoj Sharma"}]},"title":"Design and analysis of Mux using adiabatic techniques ECRL and PFAL.","venue":"ICACCI","pages":"1341-1345","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarS13","doi":"10.1109/ICACCI.2013.6637372","ee":"https://doi.org/10.1109/ICACCI.2013.6637372","url":"https://dblp.org/rec/conf/icacci/KumarS13"}, "url":"URL#4155161" }, { "@score":"1", "@id":"4155162", "info":{"authors":{"author":[{"@pid":"35/10263","text":"Roshan Kumar"},{"@pid":"155/4262","text":"Parasuraman Sumathi"},{"@pid":"55/3227","text":"Ashok Kumar"}]},"title":"De-noising of seismic signal based on Gabor transform.","venue":"ICACCI","pages":"1997-2001","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KumarSK13","doi":"10.1109/ICACCI.2013.6637488","ee":"https://doi.org/10.1109/ICACCI.2013.6637488","url":"https://dblp.org/rec/conf/icacci/KumarSK13"}, "url":"URL#4155162" }, { "@score":"1", "@id":"4155163", "info":{"authors":{"author":[{"@pid":"117/5190","text":"Abishek Thekkeyil Kunnath"},{"@pid":"138/1493","text":"Dilraj Nadarajan"},{"@pid":"138/1144","text":"Manesh Mohan"},{"@pid":"117/5227","text":"Maneesha Vinodini Ramesh"}]},"title":"WiCard: A context aware wearable wireless sensor for cardiac monitoring.","venue":"ICACCI","pages":"1097-1102","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/KunnathNMR13","doi":"10.1109/ICACCI.2013.6637330","ee":"https://doi.org/10.1109/ICACCI.2013.6637330","url":"https://dblp.org/rec/conf/icacci/KunnathNMR13"}, "url":"URL#4155163" }, { "@score":"1", "@id":"4155164", "info":{"authors":{"author":[{"@pid":"98/10124","text":"Chhagan Lal"},{"@pid":"10/3052","text":"Vijay Laxmi"},{"@pid":"80/7311","text":"Manoj Singh Gaur"}]},"title":"An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.","venue":"ICACCI","pages":"610-615","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/LalLG13","doi":"10.1109/ICACCI.2013.6637242","ee":"https://doi.org/10.1109/ICACCI.2013.6637242","url":"https://dblp.org/rec/conf/icacci/LalLG13"}, "url":"URL#4155164" }, { "@score":"1", "@id":"4155165", "info":{"authors":{"author":[{"@pid":"136/4614","text":"Lalitha H"},{"@pid":"136/4774","text":"Reema Sharma"},{"@pid":"77/6777-1","text":"Navin Kumar 0001"}]},"title":"Carrier frequency offset with I/Q imbalance analysis of fifth generation WiFi.","venue":"ICACCI","pages":"1458-1462","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/LalithaSK13","doi":"10.1109/ICACCI.2013.6637394","ee":"https://doi.org/10.1109/ICACCI.2013.6637394","url":"https://dblp.org/rec/conf/icacci/LalithaSK13"}, "url":"URL#4155165" }, { "@score":"1", "@id":"4155166", "info":{"authors":{"author":[{"@pid":"71/5532","text":"Caixia Li"},{"@pid":"55/4292","text":"Sreenatha Gopalarao Anavatti"},{"@pid":"53/1561","text":"Tapabrata Ray"}]},"title":"Application of a non-cooperative game theory based traffic assignment.","venue":"ICACCI","pages":"1124-1128","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/LiAR13","doi":"10.1109/ICACCI.2013.6637335","ee":"https://doi.org/10.1109/ICACCI.2013.6637335","url":"https://dblp.org/rec/conf/icacci/LiAR13"}, "url":"URL#4155166" }, { "@score":"1", "@id":"4155167", "info":{"authors":{"author":[{"@pid":"33/4528","text":"Li Liu"},{"@pid":"121/3324","text":"Haojie Wang"},{"@pid":"138/1186","text":"Meijiao Wang"},{"@pid":"82/6384","text":"Cheng Zhang"}]},"title":"Combining frequent 2-itemsets and statistical features for texture classification in wavelet domain.","venue":"ICACCI","pages":"406-411","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/LiuWWZ13","doi":"10.1109/ICACCI.2013.6637206","ee":"https://doi.org/10.1109/ICACCI.2013.6637206","url":"https://dblp.org/rec/conf/icacci/LiuWWZ13"}, "url":"URL#4155167" }, { "@score":"1", "@id":"4155168", "info":{"authors":{"author":[{"@pid":"138/1483","text":"Ahmed Loubiri"},{"@pid":"42/2144","text":"Abdel Obaid"},{"@pid":"15/1562","text":"Fatiha Sadat"}]},"title":"An ontology based system for social networking for health application support.","venue":"ICACCI","pages":"1152-1157","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/LoubiriOS13","doi":"10.1109/ICACCI.2013.6637340","ee":"https://doi.org/10.1109/ICACCI.2013.6637340","url":"https://dblp.org/rec/conf/icacci/LoubiriOS13"}, "url":"URL#4155168" }, { "@score":"1", "@id":"4155169", "info":{"authors":{"author":[{"@pid":"121/3347","text":"S. D. Madhu Kumar"},{"@pid":"138/1323","text":"Babitha Balachandran"}]},"title":"Optimization of reconfiguration time during client movement on Siena.","venue":"ICACCI","pages":"294-300","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MadhuB13","doi":"10.1109/ICACCI.2013.6637187","ee":"https://doi.org/10.1109/ICACCI.2013.6637187","url":"https://dblp.org/rec/conf/icacci/MadhuB13"}, "url":"URL#4155169" }, { "@score":"1", "@id":"4155170", "info":{"authors":{"author":[{"@pid":"27/8111","text":"Othmane Mahmoudi"},{"@pid":"39/2369","text":"Abdelkader Belkhir"}]},"title":"Contribution to intelligent environment's security.","venue":"ICACCI","pages":"1878-1883","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MahmoudiB13","doi":"10.1109/ICACCI.2013.6637468","ee":"https://doi.org/10.1109/ICACCI.2013.6637468","url":"https://dblp.org/rec/conf/icacci/MahmoudiB13"}, "url":"URL#4155170" }, { "@score":"1", "@id":"4155171", "info":{"authors":{"author":[{"@pid":"09/4201","text":"Ruchika Malhotra"},{"@pid":"127/4302","text":"Anjali Sharma"}]},"title":"A neuro-fuzzy classifier for website quality prediction.","venue":"ICACCI","pages":"1274-1279","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MalhotraS13","doi":"10.1109/ICACCI.2013.6637361","ee":"https://doi.org/10.1109/ICACCI.2013.6637361","url":"https://dblp.org/rec/conf/icacci/MalhotraS13"}, "url":"URL#4155171" }, { "@score":"1", "@id":"4155172", "info":{"authors":{"author":[{"@pid":"131/1725","text":"Aboobeker Sidhik Koyamparambil Mammu"},{"@pid":"41/7993","text":"Unai Hernández-Jayo"},{"@pid":"51/8934","text":"Nekane Sainz"}]},"title":"Cluster-based MAC in VANETs for safety applications.","venue":"ICACCI","pages":"1424-1429","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MammuHS13","doi":"10.1109/ICACCI.2013.6637388","ee":"https://doi.org/10.1109/ICACCI.2013.6637388","url":"https://dblp.org/rec/conf/icacci/MammuHS13"}, "url":"URL#4155172" }, { "@score":"1", "@id":"4155173", "info":{"authors":{"author":[{"@pid":"138/1340","text":"N. Alivelu Manga"},{"@pid":"77/3112","text":"M. Madhavi Latha"}]},"title":"An optimum ADC output word length selection for low power communication architectures.","venue":"ICACCI","pages":"569-574","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MangaL13","doi":"10.1109/ICACCI.2013.6637235","ee":"https://doi.org/10.1109/ICACCI.2013.6637235","url":"https://dblp.org/rec/conf/icacci/MangaL13"}, "url":"URL#4155173" }, { "@score":"1", "@id":"4155174", "info":{"authors":{"author":[{"@pid":"138/1332","text":"Tanumay Manna"},{"@pid":"31/7006","text":"Iti Saha Misra"}]},"title":"Collaborative spectrum sensing in real cognitive radio network.","venue":"ICACCI","pages":"137-142","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MannaM13","doi":"10.1109/ICACCI.2013.6637160","ee":"https://doi.org/10.1109/ICACCI.2013.6637160","url":"https://dblp.org/rec/conf/icacci/MannaM13"}, "url":"URL#4155174" }, { "@score":"1", "@id":"4155175", "info":{"authors":{"author":[{"@pid":"138/1507","text":"Dnyaneshwar Mantri"},{"@pid":"19/6449","text":"Neeli Rashmi Prasad"},{"@pid":"98/179","text":"Ramjee Prasad"}]},"title":"BHCDA: Bandwidth efficient heterogeneity aware cluster based data aggregation for Wireless Sensor Network.","venue":"ICACCI","pages":"1064-1069","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MantriPP13","doi":"10.1109/ICACCI.2013.6637324","ee":"https://doi.org/10.1109/ICACCI.2013.6637324","url":"https://dblp.org/rec/conf/icacci/MantriPP13"}, "url":"URL#4155175" }, { "@score":"1", "@id":"4155176", "info":{"authors":{"author":[{"@pid":"138/1277","text":"Pratibha Markande"},{"@pid":"138/1316","text":"Prashant V. Joshi"},{"@pid":"18/1365","text":"Sunilkumar S. Manvi"}]},"title":"Enhancing effectiveness and reducing time of system validation for Interactive Multimedia LED TV.","venue":"ICACCI","pages":"1738-1743","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MarkandeJM13","doi":"10.1109/ICACCI.2013.6637443","ee":"https://doi.org/10.1109/ICACCI.2013.6637443","url":"https://dblp.org/rec/conf/icacci/MarkandeJM13"}, "url":"URL#4155176" }, { "@score":"1", "@id":"4155177", "info":{"authors":{"author":[{"@pid":"138/1369","text":"M. Mathankumar"},{"@pid":"138/1479","text":"N. Sugandhi"}]},"title":"A low cost smart shopping facilitator for visually impaired.","venue":"ICACCI","pages":"1088-1092","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MathankumarS13","doi":"10.1109/ICACCI.2013.6637328","ee":"https://doi.org/10.1109/ICACCI.2013.6637328","url":"https://dblp.org/rec/conf/icacci/MathankumarS13"}, "url":"URL#4155177" }, { "@score":"1", "@id":"4155178", "info":{"authors":{"author":[{"@pid":"71/8305","text":"S. M. Meena"},{"@pid":"82/2803","text":"Sachin S. Shetty"}]},"title":"Trace transform based identifier for speech based image retrieval on mobile phones.","venue":"ICACCI","pages":"967-972","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MeenaS13","doi":"10.1109/ICACCI.2013.6637307","ee":"https://doi.org/10.1109/ICACCI.2013.6637307","url":"https://dblp.org/rec/conf/icacci/MeenaS13"}, "url":"URL#4155178" }, { "@score":"1", "@id":"4155179", "info":{"authors":{"author":[{"@pid":"128/0288","text":"Rachit Mehra"},{"@pid":"33/2410","text":"Viresh Patel"},{"@pid":"31/9187","text":"Faruk Kazi 0001"},{"@pid":"68/9184","text":"Navdeep M. Singh"},{"@pid":"130/2730","text":"S. R. Wagh"}]},"title":"Modes preserving wavelet based multi-scale PCA algorithm for compression of smart grid data.","venue":"ICACCI","pages":"817-821","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MehraPKSW13","doi":"10.1109/ICACCI.2013.6637281","ee":"https://doi.org/10.1109/ICACCI.2013.6637281","url":"https://dblp.org/rec/conf/icacci/MehraPKSW13"}, "url":"URL#4155179" }, { "@score":"1", "@id":"4155180", "info":{"authors":{"author":[{"@pid":"43/10825","text":"Harita Mehta"},{"@pid":"125/1524","text":"Veer Sain Dixit"},{"@pid":"25/4147","text":"Punam Bedi"}]},"title":"Weighted difference entropy based similarity measure at two levels in a recommendation framework.","venue":"ICACCI","pages":"2076-2083","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MehtaDB13","doi":"10.1109/ICACCI.2013.6637501","ee":"https://doi.org/10.1109/ICACCI.2013.6637501","url":"https://dblp.org/rec/conf/icacci/MehtaDB13"}, "url":"URL#4155180" }, { "@score":"1", "@id":"4155181", "info":{"authors":{"author":[{"@pid":"28/7730","text":"Prabhakar Mishra"},{"@pid":"18/6054","text":"J. K. Kishore"},{"@pid":"138/1407","text":"Rakshith Shetty"},{"@pid":"138/1120","text":"Akshay Malhotra"},{"@pid":"138/1101","text":"Rahul Kukreja"}]},"title":"Monocular vision based real-time exploration in autonomous rovers.","venue":"ICACCI","pages":"42-46","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MishraKSMK13","doi":"10.1109/ICACCI.2013.6637144","ee":"https://doi.org/10.1109/ICACCI.2013.6637144","url":"https://dblp.org/rec/conf/icacci/MishraKSMK13"}, "url":"URL#4155181" }, { "@score":"1", "@id":"4155182", "info":{"authors":{"author":[{"@pid":"138/1458","text":"Suchitra Kumari Mishra"},{"@pid":"138/1269","text":"Alina Mishra"},{"@pid":"154/0953","text":"Durga Prassad Mohapatra"}]},"title":"Risk analysis of a system at design level using UML diagrams.","venue":"ICACCI","pages":"197-202","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MishraMM13","doi":"10.1109/ICACCI.2013.6637170","ee":"https://doi.org/10.1109/ICACCI.2013.6637170","url":"https://dblp.org/rec/conf/icacci/MishraMM13"}, "url":"URL#4155182" }, { "@score":"1", "@id":"4155183", "info":{"authors":{"author":[{"@pid":"117/9895","text":"Tusar Kanti Mishra"},{"@pid":"09/1560","text":"Banshidhar Majhi"},{"@pid":"138/1070","text":"Sandeep Panda"}]},"title":"A comparative analysis of image transformations for handwritten Odia numeral recognition.","venue":"ICACCI","pages":"790-793","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MishraMP13","doi":"10.1109/ICACCI.2013.6637276","ee":"https://doi.org/10.1109/ICACCI.2013.6637276","url":"https://dblp.org/rec/conf/icacci/MishraMP13"}, "url":"URL#4155183" }, { "@score":"1", "@id":"4155184", "info":{"authors":{"author":[{"@pid":"138/1088","text":"Prasun Mishra"},{"@pid":"96/893","text":"Suman Saha"}]},"title":"Design modeling and simulation of low voltage squirrel cage induction motor for medium weight electric vehicle.","venue":"ICACCI","pages":"1697-1704","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MishraS13","doi":"10.1109/ICACCI.2013.6637437","ee":"https://doi.org/10.1109/ICACCI.2013.6637437","url":"https://dblp.org/rec/conf/icacci/MishraS13"}, "url":"URL#4155184" }, { "@score":"1", "@id":"4155185", "info":{"authors":{"author":[{"@pid":"138/1351","text":"Sadhana Mishra"},{"@pid":"44/9648","text":"Aditya Trivedi"}]},"title":"Exploiting opportunistic decode-and-forward cooperation for cognitive radio relay channels in multi-antenna cognitive radio networks.","venue":"ICACCI","pages":"155-158","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MishraT13","doi":"10.1109/ICACCI.2013.6637163","ee":"https://doi.org/10.1109/ICACCI.2013.6637163","url":"https://dblp.org/rec/conf/icacci/MishraT13"}, "url":"URL#4155185" }, { "@score":"1", "@id":"4155186", "info":{"authors":{"author":[{"@pid":"44/2300","text":"Mohammad Nazeeruddin"},{"@pid":"50/2878","text":"Shahabuddin Muhammad"},{"@pid":"19/3337","text":"Mayez Al-Mouhamed"}]},"title":"Design and implementation of reliable auctioning algorithms for multi-robot systems.","venue":"ICACCI","pages":"288-293","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MohammadMA13","doi":"10.1109/ICACCI.2013.6637186","ee":"https://doi.org/10.1109/ICACCI.2013.6637186","url":"https://dblp.org/rec/conf/icacci/MohammadMA13"}, "url":"URL#4155186" }, { "@score":"1", "@id":"4155187", "info":{"authors":{"author":[{"@pid":"132/9225","text":"Maaz M. Mohiuddin"},{"@pid":"138/1423","text":"I. Adithyan"},{"@pid":"28/5457","text":"Pachamuthu Rajalakshmi"}]},"title":"EEDF-MAC: An energy efficient MAC protocol for wireless sensor networks.","venue":"ICACCI","pages":"1323-1329","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MohiuddinAR13","doi":"10.1109/ICACCI.2013.6637369","ee":"https://doi.org/10.1109/ICACCI.2013.6637369","url":"https://dblp.org/rec/conf/icacci/MohiuddinAR13"}, "url":"URL#4155187" }, { "@score":"1", "@id":"4155188", "info":{"authors":{"author":[{"@pid":"138/1190","text":"Ajoy Mondal"},{"@pid":"09/6303","text":"Susmita Ghosh"},{"@pid":"86/6753","text":"Ashish Ghosh"}]},"title":"Efficient silhouette based contour tracking.","venue":"ICACCI","pages":"1781-1786","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MondalGG13","doi":"10.1109/ICACCI.2013.6637451","ee":"https://doi.org/10.1109/ICACCI.2013.6637451","url":"https://dblp.org/rec/conf/icacci/MondalGG13"}, "url":"URL#4155188" }, { "@score":"1", "@id":"4155189", "info":{"authors":{"author":[{"@pid":"298/7153","text":"Monica Ravishankar"},{"@pid":"138/1548","text":"H. A. Dinesha"},{"@pid":"353/5801","text":"Vinod Kumar Agrawa"}]},"title":"Cloud computing - Phone call as a service: A concept.","venue":"ICACCI","pages":"236-242","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MonicaDA13","doi":"10.1109/ICACCI.2013.6637177","ee":"https://doi.org/10.1109/ICACCI.2013.6637177","url":"https://dblp.org/rec/conf/icacci/MonicaDA13"}, "url":"URL#4155189" }, { "@score":"1", "@id":"4155190", "info":{"authors":{"author":[{"@pid":"138/1262","text":"Arjun Mudlapur"},{"@pid":"61/2378","text":"A. Raju"},{"@pid":"138/1517","text":"Uma Rao"}]},"title":"Evaluation of different PWM techniques for two level inverter in grid connected WECS.","venue":"ICACCI","pages":"1753-1758","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MudlapurRR13","doi":"10.1109/ICACCI.2013.6637446","ee":"https://doi.org/10.1109/ICACCI.2013.6637446","url":"https://dblp.org/rec/conf/icacci/MudlapurRR13"}, "url":"URL#4155190" }, { "@score":"1", "@id":"4155191", "info":{"authors":{"author":[{"@pid":"122/3225","text":"Chinmoy Mukherjee"},{"@pid":"138/1127","text":"Mehak Soni"},{"@pid":"24/8543","text":"Rajarathnam Nallusamy"}]},"title":"A context based cryptographic content sharing system.","venue":"ICACCI","pages":"477-482","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MukherjeeSN13","doi":"10.1109/ICACCI.2013.6637218","ee":"https://doi.org/10.1109/ICACCI.2013.6637218","url":"https://dblp.org/rec/conf/icacci/MukherjeeSN13"}, "url":"URL#4155191" }, { "@score":"1", "@id":"4155192", "info":{"authors":{"author":[{"@pid":"138/1440","text":"H. Muralikrishna"},{"@pid":"138/1134","text":"Ananthakrishna Thalengala"},{"@pid":"15/9192","text":"Kumara Shama"}]},"title":"HMM based isolated Kannada digit recognition system using MFCC.","venue":"ICACCI","pages":"730-733","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/MuralikrishnaAS13","doi":"10.1109/ICACCI.2013.6637264","ee":"https://doi.org/10.1109/ICACCI.2013.6637264","url":"https://dblp.org/rec/conf/icacci/MuralikrishnaAS13"}, "url":"URL#4155192" }, { "@score":"1", "@id":"4155193", "info":{"authors":{"author":[{"@pid":"30/9689","text":"Kumaresh Nandhini"},{"@pid":"62/3293","text":"S. R. Balasundaram 0001"}]},"title":"Extracting and evaluating assistive summary for reading difficulties.","venue":"ICACCI","pages":"1082-1087","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NandhiniB13","doi":"10.1109/ICACCI.2013.6637327","ee":"https://doi.org/10.1109/ICACCI.2013.6637327","url":"https://dblp.org/rec/conf/icacci/NandhiniB13"}, "url":"URL#4155193" }, { "@score":"1", "@id":"4155194", "info":{"authors":{"author":[{"@pid":"138/1108","text":"D. G. Narayan"},{"@pid":"138/1046","text":"Pavan Gandmali"},{"@pid":"75/5498","text":"Uma Mudenagudi"}]},"title":"A novel cross layer routing and interface assignment in Multi-Radio Wireless Mesh Network.","venue":"ICACCI","pages":"620-625","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NarayanGM13","doi":"10.1109/ICACCI.2013.6637244","ee":"https://doi.org/10.1109/ICACCI.2013.6637244","url":"https://dblp.org/rec/conf/icacci/NarayanGM13"}, "url":"URL#4155194" }, { "@score":"1", "@id":"4155195", "info":{"authors":{"author":{"@pid":"138/1368","text":"Nageswara Rao Narni"}},"title":"Numerical solution of breakage population balance equations using differential algebraic equations form.","venue":"ICACCI","pages":"1384-1388","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Narni13","doi":"10.1109/ICACCI.2013.6637381","ee":"https://doi.org/10.1109/ICACCI.2013.6637381","url":"https://dblp.org/rec/conf/icacci/Narni13"}, "url":"URL#4155195" }, { "@score":"1", "@id":"4155196", "info":{"authors":{"author":[{"@pid":"138/1112","text":"Aviral Nigam"},{"@pid":"138/1085","text":"Snehal Chauhan"},{"@pid":"138/1537","text":"Varsha Murali"}]},"title":"Rent or self-execute? Resource management strategies for cloud providers.","venue":"ICACCI","pages":"1657-1661","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NigamCM13","doi":"10.1109/ICACCI.2013.6637430","ee":"https://doi.org/10.1109/ICACCI.2013.6637430","url":"https://dblp.org/rec/conf/icacci/NigamCM13"}, "url":"URL#4155196" }, { "@score":"1", "@id":"4155197", "info":{"authors":{"author":[{"@pid":"138/1231","text":"Mahasivam Nivethika"},{"@pid":"138/1230","text":"Ilanthalaisingam Vithiya"},{"@pid":"138/1359","text":"Sebastiankularatnam Anntharshika"},{"@pid":"65/3485","text":"Sampath Deegalla"}]},"title":"Personalized and adaptive user interface framework for mobile application.","venue":"ICACCI","pages":"1913-1918","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NivethikaVAD13","doi":"10.1109/ICACCI.2013.6637474","ee":"https://doi.org/10.1109/ICACCI.2013.6637474","url":"https://dblp.org/rec/conf/icacci/NivethikaVAD13"}, "url":"URL#4155197" }, { "@score":"1", "@id":"4155198", "info":{"authors":{"author":[{"@pid":"288/0545","text":"Shaffi Noushath"},{"@pid":"68/8836","text":"Mohammad Imran"},{"@pid":"138/1448","text":"Karan Jetly"},{"@pid":"22/5108","text":"Ashok Rao"},{"@pid":"24/6001-1","text":"G. Hemantha Kumar 0001"}]},"title":"Multimodal biometric fusion of face and palmprint at various levels.","venue":"ICACCI","pages":"1793-1798","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NoushathIJRK13","doi":"10.1109/ICACCI.2013.6637453","ee":"https://doi.org/10.1109/ICACCI.2013.6637453","url":"https://dblp.org/rec/conf/icacci/NoushathIJRK13"}, "url":"URL#4155198" }, { "@score":"1", "@id":"4155199", "info":{"authors":{"author":[{"@pid":"138/1056","text":"Suyog S. Nyati"},{"@pid":"138/1239","text":"Shivanand Pawar"},{"@pid":"33/4541","text":"Rajesh Ingle"}]},"title":"Performance evaluation of unstructured NoSQL data over distributed framework.","venue":"ICACCI","pages":"1623-1627","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/NyatiPI13","doi":"10.1109/ICACCI.2013.6637424","ee":"https://doi.org/10.1109/ICACCI.2013.6637424","url":"https://dblp.org/rec/conf/icacci/NyatiPI13"}, "url":"URL#4155199" }, { "@score":"1", "@id":"4155200", "info":{"authors":{"author":[{"@pid":"92/3633","text":"Makoto Ohki"},{"@pid":"50/1498","text":"Satoru Kishida"}]},"title":"A parameter free algorithm of cooperative genetic algorithm for nurse scheduling problem.","venue":"ICACCI","pages":"1201-1206","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/OhkiK13","doi":"10.1109/ICACCI.2013.6637348","ee":"https://doi.org/10.1109/ICACCI.2013.6637348","url":"https://dblp.org/rec/conf/icacci/OhkiK13"}, "url":"URL#4155200" }, { "@score":"1", "@id":"4155201", "info":{"authors":{"author":[{"@pid":"138/1142","text":"Sarmila Padhy"},{"@pid":"138/1270","text":"Swati Sagarika Padhi"}]},"title":"Suppression of Gaussian noise using Bayesian classifier in an image.","venue":"ICACCI","pages":"719-723","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PadhyP13","doi":"10.1109/ICACCI.2013.6637262","ee":"https://doi.org/10.1109/ICACCI.2013.6637262","url":"https://dblp.org/rec/conf/icacci/PadhyP13"}, "url":"URL#4155201" }, { "@score":"1", "@id":"4155202", "info":{"authors":{"author":[{"@pid":"138/1218","text":"Vipin Pal"},{"@pid":"138/1559","text":"Girdhari Singh"},{"@pid":"122/0952","text":"R. P. Yadav"}]},"title":"Network adaptive round-time clustering algorithm for wireless sensor networks.","venue":"ICACCI","pages":"1299-1302","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PalSY13","doi":"10.1109/ICACCI.2013.6637365","ee":"https://doi.org/10.1109/ICACCI.2013.6637365","url":"https://dblp.org/rec/conf/icacci/PalSY13"}, "url":"URL#4155202" }, { "@score":"1", "@id":"4155203", "info":{"authors":{"author":[{"@pid":"138/1452","text":"Pratik K. Pasiyawala"},{"@pid":"138/1536","text":"Nehal N. Shah"}]},"title":"Blocking artifacts reduction for highly compressed frames with adaptive threshold.","venue":"ICACCI","pages":"758-763","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PasiyawalaS13","doi":"10.1109/ICACCI.2013.6637269","ee":"https://doi.org/10.1109/ICACCI.2013.6637269","url":"https://dblp.org/rec/conf/icacci/PasiyawalaS13"}, "url":"URL#4155203" }, { "@score":"1", "@id":"4155204", "info":{"authors":{"author":[{"@pid":"138/1184","text":"Suhradam Patel"},{"@pid":"136/4605","text":"Rakesh Kumar Bhujade"},{"@pid":"05/7943","text":"Asif Ullah Khan"},{"@pid":"138/1495","text":"Sugney Kathrotia"}]},"title":"Deadline based Virtual Machine Provisioning to improve QoS in Cloud Computing.","venue":"ICACCI","pages":"219-224","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PatelBKK13","doi":"10.1109/ICACCI.2013.6637174","ee":"https://doi.org/10.1109/ICACCI.2013.6637174","url":"https://dblp.org/rec/conf/icacci/PatelBKK13"}, "url":"URL#4155204" }, { "@score":"1", "@id":"4155205", "info":{"authors":{"author":[{"@pid":"138/1184","text":"Suhradam Patel"},{"@pid":"136/4605","text":"Rakesh Kumar Bhujade"},{"@pid":"11/67","text":"Amit Sinhal"},{"@pid":"138/1495","text":"Sugney Kathrotia"}]},"title":"Resource optimization and cost reduction by dynamic virtual machine provisioning in cloud.","venue":"ICACCI","pages":"857-861","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PatelBSK13","doi":"10.1109/ICACCI.2013.6637288","ee":"https://doi.org/10.1109/ICACCI.2013.6637288","url":"https://dblp.org/rec/conf/icacci/PatelBSK13"}, "url":"URL#4155205" }, { "@score":"1", "@id":"4155206", "info":{"authors":{"author":[{"@pid":"136/4785","text":"Kishor P. Patil"},{"@pid":"138/1233","text":"Snehal Barge"},{"@pid":"61/5522","text":"Knud Erik Skouby"},{"@pid":"98/179","text":"Ramjee Prasad"}]},"title":"Evaluation of spectrum usage for GSM band in indoor and outdoor scenario for Dynamic Spectrum Access.","venue":"ICACCI","pages":"655-660","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PatilBSP13","doi":"10.1109/ICACCI.2013.6637250","ee":"https://doi.org/10.1109/ICACCI.2013.6637250","url":"https://dblp.org/rec/conf/icacci/PatilBSP13"}, "url":"URL#4155206" }, { "@score":"1", "@id":"4155207", "info":{"authors":{"author":[{"@pid":"138/1297","text":"Prakashgoud Patil"},{"@pid":"53/423","text":"Umakant P. Kulkarni"}]},"title":"SVM based data redundancy elimination for data aggregation in Wireless Sensor Networks.","venue":"ICACCI","pages":"1309-1316","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PatilK13","doi":"10.1109/ICACCI.2013.6637367","ee":"https://doi.org/10.1109/ICACCI.2013.6637367","url":"https://dblp.org/rec/conf/icacci/PatilK13"}, "url":"URL#4155207" }, { "@score":"1", "@id":"4155208", "info":{"authors":{"author":[{"@pid":"138/1510","text":"Dimple Valayil Paul"},{"@pid":"138/1525","text":"Jyoti D. Pawar"}]},"title":"Pareto-optimal solutions for question paper template generation.","venue":"ICACCI","pages":"747-751","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PaulP13","doi":"10.1109/ICACCI.2013.6637267","ee":"https://doi.org/10.1109/ICACCI.2013.6637267","url":"https://dblp.org/rec/conf/icacci/PaulP13"}, "url":"URL#4155208" }, { "@score":"1", "@id":"4155209", "info":{"authors":{"author":[{"@pid":"138/1293","text":"Akshit Peer"},{"@pid":"09/4201","text":"Ruchika Malhotra"}]},"title":"Application of adaptive neuro-fuzzy inference system for predicting software change proneness.","venue":"ICACCI","pages":"2026-2031","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PeerM13","doi":"10.1109/ICACCI.2013.6637493","ee":"https://doi.org/10.1109/ICACCI.2013.6637493","url":"https://dblp.org/rec/conf/icacci/PeerM13"}, "url":"URL#4155209" }, { "@score":"1", "@id":"4155210", "info":{"authors":{"author":[{"@pid":"125/1316","text":"Mrinal Phegade"},{"@pid":"225/6249","text":"Prachi Mukherji"}]},"title":"ICA based ECG signal denoising.","venue":"ICACCI","pages":"1675-1680","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PhegadeM13","doi":"10.1109/ICACCI.2013.6637433","ee":"https://doi.org/10.1109/ICACCI.2013.6637433","url":"https://dblp.org/rec/conf/icacci/PhegadeM13"}, "url":"URL#4155210" }, { "@score":"1", "@id":"4155211", "info":{"authors":{"author":[{"@pid":"138/1542","text":"Viju P. Poonthottam"},{"@pid":"121/3347","text":"S. D. Madhu Kumar"}]},"title":"A Dynamic Data Placement Scheme for Hadoop Using Real-time Access Patterns.","venue":"ICACCI","pages":"225-229","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PoonthottamK13","doi":"10.1109/ICACCI.2013.6637175","ee":"https://doi.org/10.1109/ICACCI.2013.6637175","url":"https://dblp.org/rec/conf/icacci/PoonthottamK13"}, "url":"URL#4155211" }, { "@score":"1", "@id":"4155212", "info":{"authors":{"author":{"@pid":"07/9624","text":"Pornsarp Pornsawad"}},"title":"The feedforward-feedback system of the hypothalamus-pituitary-adrenal axis.","venue":"ICACCI","pages":"1374-1379","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Pornsawad13","doi":"10.1109/ICACCI.2013.6637379","ee":"https://doi.org/10.1109/ICACCI.2013.6637379","url":"https://dblp.org/rec/conf/icacci/Pornsawad13"}, "url":"URL#4155212" }, { "@score":"1", "@id":"4155213", "info":{"authors":{"author":[{"@pid":"138/1512","text":"Sindhura Potineni"},{"@pid":"13/2193","text":"Srividya K. Bansal"},{"@pid":"00/8738","text":"Ashish Amresh"}]},"title":"ScrumTutor: A web-based interactive tutorial for Scrum Software development.","venue":"ICACCI","pages":"1884-1890","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PotineniBA13","doi":"10.1109/ICACCI.2013.6637469","ee":"https://doi.org/10.1109/ICACCI.2013.6637469","url":"https://dblp.org/rec/conf/icacci/PotineniBA13"}, "url":"URL#4155213" }, { "@score":"1", "@id":"4155214", "info":{"authors":{"author":[{"@pid":"138/1399","text":"Lopamudra Pradhan"},{"@pid":"04/6790","text":"Gi-Nam Wang"},{"@pid":"01/4699","text":"Satchidananda Dehuri"}]},"title":"A sliding window based meta-majority of voting ensemble for credit risk assessment.","venue":"ICACCI","pages":"2090-2094","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PradhanWD13","doi":"10.1109/ICACCI.2013.6637503","ee":"https://doi.org/10.1109/ICACCI.2013.6637503","url":"https://dblp.org/rec/conf/icacci/PradhanWD13"}, "url":"URL#4155214" }, { "@score":"1", "@id":"4155215", "info":{"authors":{"author":[{"@pid":"138/1392","text":"Geetha Prakash"},{"@pid":"31/9275","text":"Muralidhar Kulkarni"},{"@pid":"54/11299","text":"U. Sripati"}]},"title":"BER performance and energy efficiency of Luby Transform codes with varying BPSK thresholds over the Free Space Optical channel.","venue":"ICACCI","pages":"1473-1478","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PrakashKS13","doi":"10.1109/ICACCI.2013.6637397","ee":"https://doi.org/10.1109/ICACCI.2013.6637397","url":"https://dblp.org/rec/conf/icacci/PrakashKS13"}, "url":"URL#4155215" }, { "@score":"1", "@id":"4155216", "info":{"authors":{"author":[{"@pid":"138/1196","text":"Sudir Prakash"},{"@pid":"54/9553","text":"M. Ravishankar"}]},"title":"Multi-Oriented Video text detection and extraction using DCT feature extraction and Projection based rotation calculation.","venue":"ICACCI","pages":"714-718","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PrakashR13","doi":"10.1109/ICACCI.2013.6637261","ee":"https://doi.org/10.1109/ICACCI.2013.6637261","url":"https://dblp.org/rec/conf/icacci/PrakashR13"}, "url":"URL#4155216" }, { "@score":"1", "@id":"4155217", "info":{"authors":{"author":[{"@pid":"138/1126","text":"K. V. Prashanth"},{"@pid":"138/1234","text":"H. Girisha Navada"}]},"title":"Position control of Interior Permanent Magnet Synchronous Motor using Adaptive Backstepping technique.","venue":"ICACCI","pages":"1718-1723","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PrashanthN13","doi":"10.1109/ICACCI.2013.6637440","ee":"https://doi.org/10.1109/ICACCI.2013.6637440","url":"https://dblp.org/rec/conf/icacci/PrashanthN13"}, "url":"URL#4155217" }, { "@score":"1", "@id":"4155218", "info":{"authors":{"author":[{"@pid":"21/2152","text":"C. R. Prashanth"},{"@pid":"138/1457","text":"T. Sagar"},{"@pid":"138/1470","text":"Naresh Bhat"},{"@pid":"138/1432","text":"D. Naveen"},{"@pid":"138/1484","text":"Sudhir Rao Rupanagudi"},{"@pid":"67/7391","text":"R. Ashok Kumar"}]},"title":"Obstacle detection & elimination of shadows for an image processing based automated vehicle.","venue":"ICACCI","pages":"367-372","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PrashanthSBNRK13","doi":"10.1109/ICACCI.2013.6637199","ee":"https://doi.org/10.1109/ICACCI.2013.6637199","url":"https://dblp.org/rec/conf/icacci/PrashanthSBNRK13"}, "url":"URL#4155218" }, { "@score":"1", "@id":"4155219", "info":{"authors":{"author":[{"@pid":"78/9691","text":"P. Prema"},{"@pid":"49/4330","text":"Balakrishnan Ramadoss"},{"@pid":"62/3293","text":"S. R. Balasundaram 0001"}]},"title":"An approach for reduced test path set selection.","venue":"ICACCI","pages":"191-196","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PremaRB13","doi":"10.1109/ICACCI.2013.6637169","ee":"https://doi.org/10.1109/ICACCI.2013.6637169","url":"https://dblp.org/rec/conf/icacci/PremaRB13"}, "url":"URL#4155219" }, { "@score":"1", "@id":"4155220", "info":{"authors":{"author":[{"@pid":"138/1074","text":"P. L. K. Priyadarsini"},{"@pid":"138/1547","text":"Ramakalyan Ayyagari"}]},"title":"Ciphers based on special graphs.","venue":"ICACCI","pages":"460-465","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PriyadarsiniA13","doi":"10.1109/ICACCI.2013.6637215","ee":"https://doi.org/10.1109/ICACCI.2013.6637215","url":"https://dblp.org/rec/conf/icacci/PriyadarsiniA13"}, "url":"URL#4155220" }, { "@score":"1", "@id":"4155221", "info":{"authors":{"author":[{"@pid":"138/1045","text":"C. Priyanka"},{"@pid":"17/5917","text":"Deepa Gupta"}]},"title":"Identifying the best feature combination for sentiment analysis of customer reviews.","venue":"ICACCI","pages":"102-108","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PriyankaG13","doi":"10.1109/ICACCI.2013.6637154","ee":"https://doi.org/10.1109/ICACCI.2013.6637154","url":"https://dblp.org/rec/conf/icacci/PriyankaG13"}, "url":"URL#4155221" }, { "@score":"1", "@id":"4155222", "info":{"authors":{"author":{"@pid":"138/1154","text":"Adarsh Punnolil"}},"title":"A novel approach for diagnosis and severity grading of diabetic maculopathy.","venue":"ICACCI","pages":"1230-1235","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Punnolil13","doi":"10.1109/ICACCI.2013.6637353","ee":"https://doi.org/10.1109/ICACCI.2013.6637353","url":"https://dblp.org/rec/conf/icacci/Punnolil13"}, "url":"URL#4155222" }, { "@score":"1", "@id":"4155223", "info":{"authors":{"author":[{"@pid":"122/2250","text":"Seema Purohit"},{"@pid":"138/1346","text":"Shruti Mantri"}]},"title":"Game theoretic multi-agent approach to traffic flow control.","venue":"ICACCI","pages":"1902-1905","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PurohitM13","doi":"10.1109/ICACCI.2013.6637472","ee":"https://doi.org/10.1109/ICACCI.2013.6637472","url":"https://dblp.org/rec/conf/icacci/PurohitM13"}, "url":"URL#4155223" }, { "@score":"1", "@id":"4155224", "info":{"authors":{"author":[{"@pid":"53/7526","text":"B. R. Purushothama"},{"@pid":"27/6530","text":"B. B. Amberker"}]},"title":"Provable data possession scheme with constant proof size for outsourced data in public cloud.","venue":"ICACCI","pages":"1662-1667","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PurushothamaA13","doi":"10.1109/ICACCI.2013.6637431","ee":"https://doi.org/10.1109/ICACCI.2013.6637431","url":"https://dblp.org/rec/conf/icacci/PurushothamaA13"}, "url":"URL#4155224" }, { "@score":"1", "@id":"4155225", "info":{"authors":{"author":[{"@pid":"138/1434","text":"Arthur Menaka Pushpa"},{"@pid":"177/5722","text":"Kannan Kathiravan"}]},"title":"Resilient PUMA (Protocol for Unified Multicasting through Announcement) against internal attacks in Mobile Ad hoc Networks.","venue":"ICACCI","pages":"1906-1912","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/PushpaK13","doi":"10.1109/ICACCI.2013.6637473","ee":"https://doi.org/10.1109/ICACCI.2013.6637473","url":"https://dblp.org/rec/conf/icacci/PushpaK13"}, "url":"URL#4155225" }, { "@score":"1", "@id":"4155226", "info":{"authors":{"author":[{"@pid":"138/1179","text":"Rajikha Raja"},{"@pid":"49/2583","text":"Neelam Sinha"}]},"title":"Edge-enhanced Dynamic MR imaging using compressed sensing.","venue":"ICACCI","pages":"1686-1690","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RajaS13","doi":"10.1109/ICACCI.2013.6637435","ee":"https://doi.org/10.1109/ICACCI.2013.6637435","url":"https://dblp.org/rec/conf/icacci/RajaS13"}, "url":"URL#4155226" }, { "@score":"1", "@id":"4155227", "info":{"authors":{"author":[{"@pid":"138/1285","text":"Ganpat Singh G. Rajput"},{"@pid":"138/1047","text":"Rajeshwari Horakeri"}]},"title":"Zone based handwritten Kannada character recognition using crack code and SVM.","venue":"ICACCI","pages":"1817-1821","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RajputH13","doi":"10.1109/ICACCI.2013.6637457","ee":"https://doi.org/10.1109/ICACCI.2013.6637457","url":"https://dblp.org/rec/conf/icacci/RajputH13"}, "url":"URL#4155227" }, { "@score":"1", "@id":"4155228", "info":{"authors":{"author":[{"@pid":"138/1057","text":"Amitesh Singh Rajput"},{"@pid":"138/1079","text":"Nishchol Mishra"},{"@pid":"122/1934","text":"Sanjeev Kumar Sharma"}]},"title":"Towards the growth of image encryption and authentication schemes.","venue":"ICACCI","pages":"454-459","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RajputMS13","doi":"10.1109/ICACCI.2013.6637214","ee":"https://doi.org/10.1109/ICACCI.2013.6637214","url":"https://dblp.org/rec/conf/icacci/RajputMS13"}, "url":"URL#4155228" }, { "@score":"1", "@id":"4155229", "info":{"authors":{"author":[{"@pid":"16/4976","text":"R. Geetha Ramani"},{"@pid":"138/1107","text":"Lakshmi Balasubramanian"},{"@pid":"121/3443","text":"Shomona Gracia Jacob"}]},"title":"ROC analysis of classifiers in automatic detection of Diabetic Retinopathy using shape features of fundus images.","venue":"ICACCI","pages":"66-72","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RamaniBJ13","doi":"10.1109/ICACCI.2013.6637148","ee":"https://doi.org/10.1109/ICACCI.2013.6637148","url":"https://dblp.org/rec/conf/icacci/RamaniBJ13"}, "url":"URL#4155229" }, { "@score":"1", "@id":"4155230", "info":{"authors":{"author":[{"@pid":"135/6524","text":"Aravinda S. Rao"},{"@pid":"46/5726","text":"Jayavardhana Gubbi"},{"@pid":"38/2970","text":"Slaven Marusic"},{"@pid":"138/1133","text":"Paul Stanley"},{"@pid":"10/5477","text":"Marimuthu Palaniswami"}]},"title":"Crowd density estimation based on optical flow and hierarchical clustering.","venue":"ICACCI","pages":"494-499","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RaoGMSP13","doi":"10.1109/ICACCI.2013.6637221","ee":"https://doi.org/10.1109/ICACCI.2013.6637221","url":"https://dblp.org/rec/conf/icacci/RaoGMSP13"}, "url":"URL#4155230" }, { "@score":"1", "@id":"4155231", "info":{"authors":{"author":[{"@pid":"138/1148","text":"Rohini R. Rao"},{"@pid":"42/11139","text":"Krishnamoorthi Makkithaya"}]},"title":"An informal method for identifying standards to enable meaningful exchange of public health records.","venue":"ICACCI","pages":"2037-2042","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RaoM13","doi":"10.1109/ICACCI.2013.6637495","ee":"https://doi.org/10.1109/ICACCI.2013.6637495","url":"https://dblp.org/rec/conf/icacci/RaoM13"}, "url":"URL#4155231" }, { "@score":"1", "@id":"4155232", "info":{"authors":{"author":[{"@pid":"135/6524","text":"Aravinda S. Rao"},{"@pid":"94/1778","text":"Stephen Marshall"},{"@pid":"46/5726","text":"Jayavardhana Gubbi"},{"@pid":"10/5477","text":"Marimuthu Palaniswami"},{"@pid":"99/6289","text":"Richard O. Sinnott"},{"@pid":"138/1158","text":"Vincent Pettigrovet"}]},"title":"Design of low-cost autonomous water quality monitoring system.","venue":"ICACCI","pages":"14-19","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RaoMGPSP13","doi":"10.1109/ICACCI.2013.6637139","ee":"https://doi.org/10.1109/ICACCI.2013.6637139","url":"https://dblp.org/rec/conf/icacci/RaoMGPSP13"}, "url":"URL#4155232" }, { "@score":"1", "@id":"4155233", "info":{"authors":{"author":[{"@pid":"34/7455","text":"Majid Rastegar-Mojarad"},{"@pid":"68/4703","text":"Brian Harrington 0001"},{"@pid":"138/1253","text":"Steven M. Belknap"}]},"title":"Automatic detection of drug interaction mismatches in package inserts.","venue":"ICACCI","pages":"373-377","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Rastegar-MojaradHB13","doi":"10.1109/ICACCI.2013.6637200","ee":"https://doi.org/10.1109/ICACCI.2013.6637200","url":"https://dblp.org/rec/conf/icacci/Rastegar-MojaradHB13"}, "url":"URL#4155233" }, { "@score":"1", "@id":"4155234", "info":{"authors":{"author":[{"@pid":"138/1080","text":"Anagha. P. Rathkanthiwar"},{"@pid":"240/6900","text":"Abhay S. Gandhi"}]},"title":"New algorithm with simple training symbol for timing error estimation Of OFDM system.","venue":"ICACCI","pages":"277-281","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RathkanthiwarG13","doi":"10.1109/ICACCI.2013.6637184","ee":"https://doi.org/10.1109/ICACCI.2013.6637184","url":"https://dblp.org/rec/conf/icacci/RathkanthiwarG13"}, "url":"URL#4155234" }, { "@score":"1", "@id":"4155235", "info":{"authors":{"author":[{"@pid":"138/1534","text":"Maya Rathore"},{"@pid":"62/11325","text":"Ugrasen Suman"}]},"title":"An ARSM approach using PCB-QoS classification for web services: A multi-perspective view.","venue":"ICACCI","pages":"165-171","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RathoreS13","doi":"10.1109/ICACCI.2013.6637165","ee":"https://doi.org/10.1109/ICACCI.2013.6637165","url":"https://dblp.org/rec/conf/icacci/RathoreS13"}, "url":"URL#4155235" }, { "@score":"1", "@id":"4155236", "info":{"authors":{"author":{"@pid":"31/5408","text":"Kaliappa Ravindran"}},"title":"Knowledge-theoretic methods for certification of cloud-based network systems.","venue":"ICACCI","pages":"1280-1287","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Ravindran13","doi":"10.1109/ICACCI.2013.6637362","ee":"https://doi.org/10.1109/ICACCI.2013.6637362","url":"https://dblp.org/rec/conf/icacci/Ravindran13"}, "url":"URL#4155236" }, { "@score":"1", "@id":"4155237", "info":{"authors":{"author":[{"@pid":"94/2985","text":"K. Ravindran"},{"@pid":"181/2816","text":"S. Ramesh"}]},"title":"Model-based engineering of cyber-physical software systems for smart worlds: A case study of automobile control systems.","venue":"ICACCI","pages":"1710-1717","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RavindranR13","doi":"10.1109/ICACCI.2013.6637439","ee":"https://doi.org/10.1109/ICACCI.2013.6637439","url":"https://dblp.org/rec/conf/icacci/RavindranR13"}, "url":"URL#4155237" }, { "@score":"1", "@id":"4155238", "info":{"authors":{"author":[{"@pid":"319/5146","text":"Husnabad Venkateswara Reddy"},{"@pid":"138/1545","text":"Pratibha Agrawal"},{"@pid":"09/2715","text":"S. Viswanadha Raju"}]},"title":"Data labeling method based on cluster purity using relative rough entropy for categorical data clustering.","venue":"ICACCI","pages":"500-506","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ReddyAR13","doi":"10.1109/ICACCI.2013.6637222","ee":"https://doi.org/10.1109/ICACCI.2013.6637222","url":"https://dblp.org/rec/conf/icacci/ReddyAR13"}, "url":"URL#4155238" }, { "@score":"1", "@id":"4155239", "info":{"authors":{"author":[{"@pid":"138/1157","text":"N. GouthamSekhar Reddy"},{"@pid":"138/1227","text":"Neeranjan Chitare"},{"@pid":"s/SrinivasSampalli","text":"Srinivas Sampalli"}]},"title":"Deployment of multiple base-stations in clustering protocols of wireless sensor networks (WSNs).","venue":"ICACCI","pages":"1003-1006","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ReddyCS13","doi":"10.1109/ICACCI.2013.6637313","ee":"https://doi.org/10.1109/ICACCI.2013.6637313","url":"https://dblp.org/rec/conf/icacci/ReddyCS13"}, "url":"URL#4155239" }, { "@score":"1", "@id":"4155240", "info":{"authors":{"author":[{"@pid":"138/1044","text":"A. Ramakrishna Reddy"},{"@pid":"41/1172","text":"M. Parvathi"}]},"title":"Efficient carry select adder using 0.12µm technology for low power applications.","venue":"ICACCI","pages":"550-553","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ReddyP13","doi":"10.1109/ICACCI.2013.6637231","ee":"https://doi.org/10.1109/ICACCI.2013.6637231","url":"https://dblp.org/rec/conf/icacci/ReddyP13"}, "url":"URL#4155240" }, { "@score":"1", "@id":"4155241", "info":{"authors":{"author":{"@pid":"138/1367","text":"Amr Rekaby"}},"title":"Directed Artificial Bat Algorithm (DABA) - A new bio-inspired algorithm.","venue":"ICACCI","pages":"1241-1246","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Rekaby13","doi":"10.1109/ICACCI.2013.6637355","ee":"https://doi.org/10.1109/ICACCI.2013.6637355","url":"https://dblp.org/rec/conf/icacci/Rekaby13"}, "url":"URL#4155241" }, { "@score":"1", "@id":"4155242", "info":{"authors":{"author":[{"@pid":"138/1214","text":"Dinesh V. Rojatkar"},{"@pid":"138/1502","text":"Krushna D. Chinchkhede"},{"@pid":"137/3644","text":"G. G. Sarate"}]},"title":"Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach.","venue":"ICACCI","pages":"96-101","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RojatkarCS13","doi":"10.1109/ICACCI.2013.6637153","ee":"https://doi.org/10.1109/ICACCI.2013.6637153","url":"https://dblp.org/rec/conf/icacci/RojatkarCS13"}, "url":"URL#4155242" }, { "@score":"1", "@id":"4155243", "info":{"authors":{"author":{"@pid":"138/1217","text":"Goutam Roy"}},"title":"Prototype development of dynamic predictive models for disease prevention.","venue":"ICACCI","pages":"1681-1685","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Roy13","doi":"10.1109/ICACCI.2013.6637434","ee":"https://doi.org/10.1109/ICACCI.2013.6637434","url":"https://dblp.org/rec/conf/icacci/Roy13"}, "url":"URL#4155243" }, { "@score":"1", "@id":"4155244", "info":{"authors":{"author":[{"@pid":"40/7770","text":"Pranab Roy"},{"@pid":"23/2194-1","text":"Hafizur Rahaman 0001"},{"@pid":"116/4731","text":"Partha Sarathi Gupta"},{"@pid":"d/PSDasgupta","text":"Parthasarathi Dasgupta"}]},"title":"A new customized testing technique using a novel design of droplet motion detector for digital microfluidic Biochip systems.","venue":"ICACCI","pages":"897-902","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/RoyRGD13","doi":"10.1109/ICACCI.2013.6637295","ee":"https://doi.org/10.1109/ICACCI.2013.6637295","url":"https://dblp.org/rec/conf/icacci/RoyRGD13"}, "url":"URL#4155244" }, { "@score":"1", "@id":"4155245", "info":{"authors":{"author":[{"@pid":"138/1220","text":"Nitish Saboo"},{"@pid":"138/1362","text":"Prajna Pandurang Bhat"},{"@pid":"138/1209","text":"Suresh Panwar"},{"@pid":"138/1229","text":"Rahul Yadav"},{"@pid":"72/9553","text":"G. Ram Mohana Reddy"}]},"title":"A unique method to uniformly distribute the load in LEACH and simulation.","venue":"ICACCI","pages":"667-670","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SabooBPYR13","doi":"10.1109/ICACCI.2013.6637252","ee":"https://doi.org/10.1109/ICACCI.2013.6637252","url":"https://dblp.org/rec/conf/icacci/SabooBPYR13"}, "url":"URL#4155245" }, { "@score":"1", "@id":"4155246", "info":{"authors":{"author":[{"@pid":"336/0597","text":"Ashwini B. Sadlapur"},{"@pid":"138/1402","text":"P. V. Pushpa"}]},"title":"Computing optimal data collection rate for energy harvesting sensor networks.","venue":"ICACCI","pages":"1468-1472","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SadlapurP13","doi":"10.1109/ICACCI.2013.6637396","ee":"https://doi.org/10.1109/ICACCI.2013.6637396","url":"https://dblp.org/rec/conf/icacci/SadlapurP13"}, "url":"URL#4155246" }, { "@score":"1", "@id":"4155247", "info":{"authors":{"author":[{"@pid":"39/3217","text":"Indrajit Saha"},{"@pid":"138/1344","text":"Debasree Maity"},{"@pid":"93/3249","text":"Ujjwal Maulik"}]},"title":"Categorical data analysis using Multiobjective Differential Evolution based Fuzzy Clustering.","venue":"ICACCI","pages":"2013-2017","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SahaMM13","doi":"10.1109/ICACCI.2013.6637491","ee":"https://doi.org/10.1109/ICACCI.2013.6637491","url":"https://dblp.org/rec/conf/icacci/SahaMM13"}, "url":"URL#4155247" }, { "@score":"1", "@id":"4155248", "info":{"authors":{"author":[{"@pid":"138/1378","text":"Partha Pratim Saha"},{"@pid":"12/7641","text":"Sumanta Saha"},{"@pid":"06/2908","text":"Tuhina Samanta"}]},"title":"An efficient intersection avoiding rectilinear routing technique in VLSI.","venue":"ICACCI","pages":"559-562","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SahaSS13","doi":"10.1109/ICACCI.2013.6637233","ee":"https://doi.org/10.1109/ICACCI.2013.6637233","url":"https://dblp.org/rec/conf/icacci/SahaSS13"}, "url":"URL#4155248" }, { "@score":"1", "@id":"4155249", "info":{"authors":{"author":[{"@pid":"138/1113","text":"Basant Kumar Sahu"},{"@pid":"05/5219","text":"Madan M. Gupta"},{"@pid":"70/2028","text":"Bidyadhar Subudhi"}]},"title":"Stability analysis of nonlinear systems using dynamic-Routh's stability criterion: A new approach.","venue":"ICACCI","pages":"1765-1769","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SahuGS13","doi":"10.1109/ICACCI.2013.6637448","ee":"https://doi.org/10.1109/ICACCI.2013.6637448","url":"https://dblp.org/rec/conf/icacci/SahuGS13"}, "url":"URL#4155249" }, { "@score":"1", "@id":"4155250", "info":{"authors":{"author":[{"@pid":"131/5074","text":"Eyad Saleh"},{"@pid":"50/10121","text":"Ibrahim Takouna"},{"@pid":"m/CMeinel","text":"Christoph Meinel"}]},"title":"SignedQuery: Protecting users data in multi-tenant SaaS environments.","venue":"ICACCI","pages":"213-218","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SalehTM13","doi":"10.1109/ICACCI.2013.6637173","ee":"https://doi.org/10.1109/ICACCI.2013.6637173","url":"https://dblp.org/rec/conf/icacci/SalehTM13"}, "url":"URL#4155250" }, { "@score":"1", "@id":"4155251", "info":{"authors":{"author":[{"@pid":"132/9014","text":"Rakshith Saligram"},{"@pid":"138/1438","text":"T. R. Rakshith"}]},"title":"Towards the design of fault tolerant reversible circuits components of ALU using new PCMF gate.","venue":"ICACCI","pages":"862-867","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SaligramR13","doi":"10.1109/ICACCI.2013.6637289","ee":"https://doi.org/10.1109/ICACCI.2013.6637289","url":"https://dblp.org/rec/conf/icacci/SaligramR13"}, "url":"URL#4155251" }, { "@score":"1", "@id":"4155252", "info":{"authors":{"author":[{"@pid":"26/8395","text":"Sanat Sarangi"},{"@pid":"69/3743","text":"Subrat Kar"}]},"title":"A scriptable rapid application deployment framework for sensor networks.","venue":"ICACCI","pages":"1035-1040","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SarangiK13","doi":"10.1109/ICACCI.2013.6637319","ee":"https://doi.org/10.1109/ICACCI.2013.6637319","url":"https://dblp.org/rec/conf/icacci/SarangiK13"}, "url":"URL#4155252" }, { "@score":"1", "@id":"4155253", "info":{"authors":{"author":[{"@pid":"26/8395","text":"Sanat Sarangi"},{"@pid":"69/3743","text":"Subrat Kar"}]},"title":"On implementing graded precision localization with sensor networks in indoor spaces.","venue":"ICACCI","pages":"1058-1063","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SarangiK13a","doi":"10.1109/ICACCI.2013.6637323","ee":"https://doi.org/10.1109/ICACCI.2013.6637323","url":"https://dblp.org/rec/conf/icacci/SarangiK13a"}, "url":"URL#4155253" }, { "@score":"1", "@id":"4155254", "info":{"authors":{"author":[{"@pid":"40/2874","text":"Bhaskar Sardar"},{"@pid":"s/DebashisSaha","text":"Debashis Saha"}]},"title":"Performance analysis of Basic Support Protocol (BSP) in nested Network Mobility (NeNEMO).","venue":"ICACCI","pages":"1430-1435","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SardarS13","doi":"10.1109/ICACCI.2013.6637389","ee":"https://doi.org/10.1109/ICACCI.2013.6637389","url":"https://dblp.org/rec/conf/icacci/SardarS13"}, "url":"URL#4155254" }, { "@score":"1", "@id":"4155255", "info":{"authors":{"author":[{"@pid":"130/8690","text":"Jumi Sarmah"},{"@pid":"130/8575","text":"Anup Kumar Barman"},{"@pid":"160/9044","text":"Shikhar Kumar Sarma"}]},"title":"Automatic assamese text categorization using WordNet.","venue":"ICACCI","pages":"85-89","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SarmahBS13","doi":"10.1109/ICACCI.2013.6637151","ee":"https://doi.org/10.1109/ICACCI.2013.6637151","url":"https://dblp.org/rec/conf/icacci/SarmahBS13"}, "url":"URL#4155255" }, { "@score":"1", "@id":"4155256", "info":{"authors":{"author":[{"@pid":"138/1409","text":"Shashank Mouli Satapathy"},{"@pid":"88/4978-5","text":"Mukesh Kumar 0005"},{"@pid":"85/7502","text":"Santanu Kumar Rath"}]},"title":"Class point approach for software effort estimation using soft computing techniques.","venue":"ICACCI","pages":"178-183","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SatapathyKR13","doi":"10.1109/ICACCI.2013.6637167","ee":"https://doi.org/10.1109/ICACCI.2013.6637167","url":"https://dblp.org/rec/conf/icacci/SatapathyKR13"}, "url":"URL#4155256" }, { "@score":"1", "@id":"4155257", "info":{"authors":{"author":[{"@pid":"138/1183","text":"Gayatri Sattiraju"},{"@pid":"192/7511","text":"Lalit Mohan S."},{"@pid":"81/7683","text":"Shakti Mishra"}]},"title":"IDRBT Community Cloud for Indian Banks.","venue":"ICACCI","pages":"1634-1639","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SattirajuMM13","doi":"10.1109/ICACCI.2013.6637426","ee":"https://doi.org/10.1109/ICACCI.2013.6637426","url":"https://dblp.org/rec/conf/icacci/SattirajuMM13"}, "url":"URL#4155257" }, { "@score":"1", "@id":"4155258", "info":{"authors":{"author":[{"@pid":"138/1386","text":"Gaurav Dutta Saxena"},{"@pid":"138/1072","text":"Etika Agarwal"},{"@pid":"138/1516","text":"P. Selveraj"},{"@pid":"138/1055","text":"V. Thamarai"},{"@pid":"138/1410","text":"Jiju John"},{"@pid":"138/1390","text":"Kalpana Arvind"},{"@pid":"99/999","text":"Rafiqul Islam"}]},"title":"Design, development and testing of MEMS based seismometer for space application.","venue":"ICACCI","pages":"1705-1709","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SaxenaASTJAI13","doi":"10.1109/ICACCI.2013.6637438","ee":"https://doi.org/10.1109/ICACCI.2013.6637438","url":"https://dblp.org/rec/conf/icacci/SaxenaASTJAI13"}, "url":"URL#4155258" }, { "@score":"1", "@id":"4155259", "info":{"authors":{"author":[{"@pid":"46/1686","text":"Amitabh Saxena"},{"@pid":"33/5030","text":"Shubhashis Sengupta"},{"@pid":"138/1421","text":"Pradeepkumar Duraisamy"},{"@pid":"09/6043","text":"Vikrant S. Kaulgud"},{"@pid":"02/3815","text":"Amit Chakraborty"}]},"title":"Detecting SOQL-injection vulnerabilities in SalesForce applications.","venue":"ICACCI","pages":"489-493","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SaxenaSDKC13","doi":"10.1109/ICACCI.2013.6637220","ee":"https://doi.org/10.1109/ICACCI.2013.6637220","url":"https://dblp.org/rec/conf/icacci/SaxenaSDKC13"}, "url":"URL#4155259" }, { "@score":"1", "@id":"4155260", "info":{"authors":{"author":[{"@pid":"138/1538","text":"Eko Sediyono"},{"@pid":"138/1558","text":"Kartika Imam Santoso"},{"@pid":"129/8823","text":"Suhartono"}]},"title":"Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS.","venue":"ICACCI","pages":"1604-1608","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SediyonoSS13","doi":"10.1109/ICACCI.2013.6637420","ee":"https://doi.org/10.1109/ICACCI.2013.6637420","url":"https://dblp.org/rec/conf/icacci/SediyonoSS13"}, "url":"URL#4155260" }, { "@score":"1", "@id":"4155261", "info":{"authors":{"author":[{"@pid":"69/10474","text":"R. S. Selvaraj"},{"@pid":"138/1153","text":"Venkatrajam Marka"}]},"title":"Normality of binary codes in Rosenbloom-Tsfasman Metric.","venue":"ICACCI","pages":"1370-1373","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SelvarajM13","doi":"10.1109/ICACCI.2013.6637378","ee":"https://doi.org/10.1109/ICACCI.2013.6637378","url":"https://dblp.org/rec/conf/icacci/SelvarajM13"}, "url":"URL#4155261" }, { "@score":"1", "@id":"4155262", "info":{"authors":{"author":{"@pid":"37/258","text":"Anirban Sengupta"}},"title":"A methodology for self correction scheme based fast multi criterion exploration and architectual synthesis of data dominated applications.","venue":"ICACCI","pages":"430-436","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Sengupta13","doi":"10.1109/ICACCI.2013.6637210","ee":"https://doi.org/10.1109/ICACCI.2013.6637210","url":"https://dblp.org/rec/conf/icacci/Sengupta13"}, "url":"URL#4155262" }, { "@score":"1", "@id":"4155263", "info":{"authors":{"author":[{"@pid":"37/258","text":"Anirban Sengupta"},{"@pid":"138/1219","text":"Vipul Kumar Mishra"}]},"title":"D-logic exploration: Rapid search of Pareto fronts during architectural synthesis of custom processors.","venue":"ICACCI","pages":"586-593","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SenguptaM13","doi":"10.1109/ICACCI.2013.6637238","ee":"https://doi.org/10.1109/ICACCI.2013.6637238","url":"https://dblp.org/rec/conf/icacci/SenguptaM13"}, "url":"URL#4155263" }, { "@score":"1", "@id":"4155264", "info":{"authors":{"author":[{"@pid":"138/1192","text":"Axita Shah"},{"@pid":"90/10829","text":"Jyoti Pareek"},{"@pid":"138/1310","text":"Hemal Patel"},{"@pid":"138/1456","text":"Namrata Panchal"}]},"title":"NLKBIDB - Natural language and keyword based interface to database.","venue":"ICACCI","pages":"1569-1576","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShahPPP13","doi":"10.1109/ICACCI.2013.6637414","ee":"https://doi.org/10.1109/ICACCI.2013.6637414","url":"https://dblp.org/rec/conf/icacci/ShahPPP13"}, "url":"URL#4155264" }, { "@score":"1", "@id":"4155265", "info":{"authors":{"author":[{"@pid":"138/1311","text":"M. Shanmugasundaram"},{"@pid":"74/10858","text":"S. Sukumaran"},{"@pid":"39/7610","text":"N. Shanmugavadivu"}]},"title":"Fusion based denoise-engine for underwater images using curvelet transform.","venue":"ICACCI","pages":"941-946","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShanmugasundaramSS13","doi":"10.1109/ICACCI.2013.6637303","ee":"https://doi.org/10.1109/ICACCI.2013.6637303","url":"https://dblp.org/rec/conf/icacci/ShanmugasundaramSS13"}, "url":"URL#4155265" }, { "@score":"1", "@id":"4155266", "info":{"authors":{"author":[{"@pid":"122/3367","text":"Fatemeh Sharifkhani"},{"@pid":"59/1337","text":"Mohammad Reza Pakravan"}]},"title":"A review of new advances in resource discovery approaches in unstructured P2P networks.","venue":"ICACCI","pages":"828-833","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SharifkhaniP13","doi":"10.1109/ICACCI.2013.6637283","ee":"https://doi.org/10.1109/ICACCI.2013.6637283","url":"https://dblp.org/rec/conf/icacci/SharifkhaniP13"}, "url":"URL#4155266" }, { "@score":"1", "@id":"4155267", "info":{"authors":{"author":[{"@pid":"16/7689","text":"Manoj Sharma"},{"@pid":"43/2719","text":"Arti Noor"}]},"title":"CPL-Adiabatic Gated logic (CPLAG) XOR gate.","venue":"ICACCI","pages":"575-579","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SharmaN13","doi":"10.1109/ICACCI.2013.6637236","ee":"https://doi.org/10.1109/ICACCI.2013.6637236","url":"https://dblp.org/rec/conf/icacci/SharmaN13"}, "url":"URL#4155267" }, { "@score":"1", "@id":"4155268", "info":{"authors":{"author":[{"@pid":"07/3736","text":"Satish Sharma"},{"@pid":"77/7689","text":"Sunil Kulkarni"},{"@pid":"67/7689","text":"H. S. Vasudevamurthy"},{"@pid":"138/1314","text":"N. Valarmathi"}]},"title":"Design and FPGA implementation of block synchronizer for Viterbi decoder.","venue":"ICACCI","pages":"908-912","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SharmaSVV13","doi":"10.1109/ICACCI.2013.6637297","ee":"https://doi.org/10.1109/ICACCI.2013.6637297","url":"https://dblp.org/rec/conf/icacci/SharmaSVV13"}, "url":"URL#4155268" }, { "@score":"1", "@id":"4155269", "info":{"authors":{"author":[{"@pid":"138/1213","text":"V. Sharmila"},{"@pid":"06/10527","text":"E. Hari Krishna"},{"@pid":"56/9271","text":"K. Ashoka Reddy"}]},"title":"Cumulant based Teager energy operator for ECG signal modeling.","venue":"ICACCI","pages":"1959-1963","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SharmilaKR13","doi":"10.1109/ICACCI.2013.6637482","ee":"https://doi.org/10.1109/ICACCI.2013.6637482","url":"https://dblp.org/rec/conf/icacci/SharmilaKR13"}, "url":"URL#4155269" }, { "@score":"1", "@id":"4155270", "info":{"authors":{"author":[{"@pid":"138/1284","text":"Siddharth Shelly"},{"@pid":"27/5557","text":"A. V. Babu 0001"}]},"title":"Probability distribution of link life time in vehicular ad hoc networks.","venue":"ICACCI","pages":"1418-1423","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShellyB13","doi":"10.1109/ICACCI.2013.6637387","ee":"https://doi.org/10.1109/ICACCI.2013.6637387","url":"https://dblp.org/rec/conf/icacci/ShellyB13"}, "url":"URL#4155270" }, { "@score":"1", "@id":"4155271", "info":{"authors":{"author":[{"@pid":"138/1366","text":"Sanath S. Shenoy"},{"@pid":"138/1051","text":"C. R. Vijeth"},{"@pid":"138/1398","text":"Raghavendra Eeratta"}]},"title":"Apriori resource-determination based task scheduling algorithm (ARTS).","venue":"ICACCI","pages":"1129-1133","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShenoyVE13","doi":"10.1109/ICACCI.2013.6637336","ee":"https://doi.org/10.1109/ICACCI.2013.6637336","url":"https://dblp.org/rec/conf/icacci/ShenoyVE13"}, "url":"URL#4155271" }, { "@score":"1", "@id":"4155272", "info":{"authors":{"author":[{"@pid":"138/1554","text":"Pritam Prakash Shete"},{"@pid":"138/1334","text":"Dinesh Madhukar Sarode"},{"@pid":"138/1105","text":"Surojit Kumar Bose"}]},"title":"A real-time stereoscopic viewer for telerobotics using open source software.","venue":"ICACCI","pages":"31-36","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SheteSB13","doi":"10.1109/ICACCI.2013.6637142","ee":"https://doi.org/10.1109/ICACCI.2013.6637142","url":"https://dblp.org/rec/conf/icacci/SheteSB13"}, "url":"URL#4155272" }, { "@score":"1", "@id":"4155273", "info":{"authors":{"author":[{"@pid":"138/1061","text":"Ganeshayya Ishwarayya Shidaganti"},{"@pid":"83/9463","text":"Satyadhyan Chickerur"}]},"title":"Rational Value Sequence based Singular Value Decomposition for facial recognition.","venue":"ICACCI","pages":"979-983","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShidagantiC13","doi":"10.1109/ICACCI.2013.6637309","ee":"https://doi.org/10.1109/ICACCI.2013.6637309","url":"https://dblp.org/rec/conf/icacci/ShidagantiC13"}, "url":"URL#4155273" }, { "@score":"1", "@id":"4155274", "info":{"authors":{"author":[{"@pid":"06/4518","text":"Keiko Shimazu"},{"@pid":"64/5871","text":"Masahiko Ito"},{"@pid":"138/1382","text":"Yoichi Kitsuta"},{"@pid":"138/1302","text":"Naohiro Kawashima"}]},"title":"Project concept: Design concept of ad-hoc Information Network System for disaster mitigation.","venue":"ICACCI","pages":"1436-1439","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShimazuIKK13","doi":"10.1109/ICACCI.2013.6637390","ee":"https://doi.org/10.1109/ICACCI.2013.6637390","url":"https://dblp.org/rec/conf/icacci/ShimazuIKK13"}, "url":"URL#4155274" }, { "@score":"1", "@id":"4155275", "info":{"authors":{"author":[{"@pid":"138/1501","text":"Bahubali K. Shiragapur"},{"@pid":"138/1191","text":"Uday Wali"},{"@pid":"138/1117","text":"Sandeep Bidwai"}]},"title":"Novel technique to reduce PAPR in OFDM systems by clipping and filtering.","venue":"ICACCI","pages":"1593-1597","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShiragapurWB13","doi":"10.1109/ICACCI.2013.6637418","ee":"https://doi.org/10.1109/ICACCI.2013.6637418","url":"https://dblp.org/rec/conf/icacci/ShiragapurWB13"}, "url":"URL#4155275" }, { "@score":"1", "@id":"4155276", "info":{"authors":{"author":[{"@pid":"116/4710","text":"Rahul Shrestha"},{"@pid":"60/4004","text":"Roy P. Paily"}]},"title":"A novel state metric normalization technique for high-throughput maximum-a-posteriori-probability decoder.","venue":"ICACCI","pages":"903-907","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShresthaP13","doi":"10.1109/ICACCI.2013.6637296","ee":"https://doi.org/10.1109/ICACCI.2013.6637296","url":"https://dblp.org/rec/conf/icacci/ShresthaP13"}, "url":"URL#4155276" }, { "@score":"1", "@id":"4155277", "info":{"authors":{"author":[{"@pid":"96/9887","text":"B. R. Shubhamangala"},{"@pid":"88/794","text":"V. Suma 0001"},{"@pid":"138/1447","text":"P. Amarendra Reddy"},{"@pid":"138/1439","text":"C. Goodluck Singh"}]},"title":"Quality attribute focused multilayer requirement elicitation: Judicious approach to drive business value.","venue":"ICACCI","pages":"2069-2075","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShubhamangalaSRS13","doi":"10.1109/ICACCI.2013.6637500","ee":"https://doi.org/10.1109/ICACCI.2013.6637500","url":"https://dblp.org/rec/conf/icacci/ShubhamangalaSRS13"}, "url":"URL#4155277" }, { "@score":"1", "@id":"4155278", "info":{"authors":{"author":[{"@pid":"136/4690","text":"Mahendra Kumar Shukla"},{"@pid":"44/9648","text":"Aditya Trivedi"},{"@pid":"136/4590","text":"Om Jee Pandey"}]},"title":"Physical layer authentication for mobile terminals over MIMO fading wiretap channels.","venue":"ICACCI","pages":"638-642","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ShuklaTP13","doi":"10.1109/ICACCI.2013.6637247","ee":"https://doi.org/10.1109/ICACCI.2013.6637247","url":"https://dblp.org/rec/conf/icacci/ShuklaTP13"}, "url":"URL#4155278" }, { "@score":"1", "@id":"4155279", "info":{"authors":{"author":[{"@pid":"67/6275","text":"Axel Sikora"},{"@pid":"138/1509","text":"Rico Werner"},{"@pid":"138/1147","text":"Jan O. Grafmuller"}]},"title":"Design and implementation of an energy aware routing extension for energy autarkic Wireless M-Bus networks.","venue":"ICACCI","pages":"1446-1451","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SikoraWG13","doi":"10.1109/ICACCI.2013.6637392","ee":"https://doi.org/10.1109/ICACCI.2013.6637392","url":"https://dblp.org/rec/conf/icacci/SikoraWG13"}, "url":"URL#4155279" }, { "@score":"1", "@id":"4155280", "info":{"authors":{"author":{"@pid":"59/7700","text":"Dhananjay Singh 0001"}},"title":"Developing an architecture: Scalability, mobility, control, and isolation on future internet services.","venue":"ICACCI","pages":"1873-1877","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Singh13","doi":"10.1109/ICACCI.2013.6637467","ee":"https://doi.org/10.1109/ICACCI.2013.6637467","url":"https://dblp.org/rec/conf/icacci/Singh13"}, "url":"URL#4155280" }, { "@score":"1", "@id":"4155281", "info":{"authors":{"author":[{"@pid":"77/10848","text":"Deep Singh"},{"@pid":"95/1582","text":"Maheshanand Bhaintwal"}]},"title":"On the sum-of-squares-modulus indicator of q-ary functions.","venue":"ICACCI","pages":"599-603","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghB13","doi":"10.1109/ICACCI.2013.6637240","ee":"https://doi.org/10.1109/ICACCI.2013.6637240","url":"https://dblp.org/rec/conf/icacci/SinghB13"}, "url":"URL#4155281" }, { "@score":"1", "@id":"4155282", "info":{"authors":{"author":[{"@pid":"16/7496","text":"Pankaj Pratap Singh"},{"@pid":"61/7386","text":"R. D. Garg 0001"}]},"title":"Study of spectral reflectance characteristics of asphalt road surface using geomatics techniques.","venue":"ICACCI","pages":"516-520","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghG13","doi":"10.1109/ICACCI.2013.6637225","ee":"https://doi.org/10.1109/ICACCI.2013.6637225","url":"https://dblp.org/rec/conf/icacci/SinghG13"}, "url":"URL#4155282" }, { "@score":"1", "@id":"4155283", "info":{"authors":{"author":[{"@pid":"22/7495","text":"Jyoti Singh"},{"@pid":"117/9131","text":"Nisheeth Joshi"},{"@pid":"117/9130","text":"Iti Mathur"}]},"title":"Development of Marathi part of speech tagger using statistical approach.","venue":"ICACCI","pages":"1554-1559","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghJM13","doi":"10.1109/ICACCI.2013.6637411","ee":"https://doi.org/10.1109/ICACCI.2013.6637411","url":"https://dblp.org/rec/conf/icacci/SinghJM13"}, "url":"URL#4155283" }, { "@score":"1", "@id":"4155284", "info":{"authors":{"author":[{"@pid":"138/1520","text":"Jagannath Singh"},{"@pid":"39/4048","text":"Durga Prasad Mohapatra"}]},"title":"A unique aspect-oriented program slicing technique.","venue":"ICACCI","pages":"159-164","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghM13","doi":"10.1109/ICACCI.2013.6637164","ee":"https://doi.org/10.1109/ICACCI.2013.6637164","url":"https://dblp.org/rec/conf/icacci/SinghM13"}, "url":"URL#4155284" }, { "@score":"1", "@id":"4155285", "info":{"authors":{"author":[{"@pid":"35/1141-2","text":"Sunil Kr. Singh 0002"},{"@pid":"138/1043","text":"Aman Madaan"},{"@pid":"138/1327","text":"Ankur Aggarwal"},{"@pid":"138/1075","text":"Ankur Dewan"}]},"title":"Design and implementation of a high performance computing system using distributed compilation.","venue":"ICACCI","pages":"1352-1357","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghMAD13","doi":"10.1109/ICACCI.2013.6637374","ee":"https://doi.org/10.1109/ICACCI.2013.6637374","url":"https://dblp.org/rec/conf/icacci/SinghMAD13"}, "url":"URL#4155285" }, { "@score":"1", "@id":"4155286", "info":{"authors":{"author":[{"@pid":"123/4747","text":"Nanhay Singh"},{"@pid":"138/1294","text":"Arvind Panwar"},{"@pid":"51/10029","text":"Ram Shringar Raw"}]},"title":"Enhancing the performance of web proxy server through cluster based prefetching techniques.","venue":"ICACCI","pages":"1158-1165","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghPR13","doi":"10.1109/ICACCI.2013.6637341","ee":"https://doi.org/10.1109/ICACCI.2013.6637341","url":"https://dblp.org/rec/conf/icacci/SinghPR13"}, "url":"URL#4155286" }, { "@score":"1", "@id":"4155287", "info":{"authors":{"author":[{"@pid":"138/1416","text":"Brijraj Singhawat"},{"@pid":"08/4450","text":"Saroj K. Meher"}]},"title":"An efficient and computationally effective random valued impulse noise detector.","venue":"ICACCI","pages":"1787-1792","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinghawatM13","doi":"10.1109/ICACCI.2013.6637452","ee":"https://doi.org/10.1109/ICACCI.2013.6637452","url":"https://dblp.org/rec/conf/icacci/SinghawatM13"}, "url":"URL#4155287" }, { "@score":"1", "@id":"4155288", "info":{"authors":{"author":[{"@pid":"63/3945","text":"Shweta Sinha"},{"@pid":"62/9277","text":"Shyam S. Agrawal"},{"@pid":"138/1166","text":"Aruna Jain"}]},"title":"Continuous density Hidden Markov Model for context dependent Hindi speech recognition.","venue":"ICACCI","pages":"1953-1958","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SinhaAJ13","doi":"10.1109/ICACCI.2013.6637481","ee":"https://doi.org/10.1109/ICACCI.2013.6637481","url":"https://dblp.org/rec/conf/icacci/SinhaAJ13"}, "url":"URL#4155288" }, { "@score":"1", "@id":"4155289", "info":{"authors":{"author":[{"@pid":"138/1145","text":"Marjana Prifti Skenduli"},{"@pid":"08/5978","text":"Marenglen Biba"}]},"title":"A Named Entity Recognition approach for Albanian.","venue":"ICACCI","pages":"1532-1537","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SkenduliB13","doi":"10.1109/ICACCI.2013.6637407","ee":"https://doi.org/10.1109/ICACCI.2013.6637407","url":"https://dblp.org/rec/conf/icacci/SkenduliB13"}, "url":"URL#4155289" }, { "@score":"1", "@id":"4155290", "info":{"authors":{"author":[{"@pid":"49/4933","text":"Przemyslaw Sliwinski"},{"@pid":"38/2213","text":"Pawel Wachel"}]},"title":"Application of stochastic counterpart optimization to contrast-detection autofocusing.","venue":"ICACCI","pages":"333-337","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SliwinskiW13","doi":"10.1109/ICACCI.2013.6637193","ee":"https://doi.org/10.1109/ICACCI.2013.6637193","url":"https://dblp.org/rec/conf/icacci/SliwinskiW13"}, "url":"URL#4155290" }, { "@score":"1", "@id":"4155291", "info":{"authors":{"author":[{"@pid":"83/10614","text":"Shahab Saquib Sohail"},{"@pid":"134/7091","text":"Jamshed Siddiqui"},{"@pid":"64/100","text":"Rashid Ali"}]},"title":"Book recommendation system using opinion mining technique.","venue":"ICACCI","pages":"1609-1614","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SohailSA13","doi":"10.1109/ICACCI.2013.6637421","ee":"https://doi.org/10.1109/ICACCI.2013.6637421","url":"https://dblp.org/rec/conf/icacci/SohailSA13"}, "url":"URL#4155291" }, { "@score":"1", "@id":"4155292", "info":{"authors":{"author":[{"@pid":"138/1162","text":"Mitesh Soni"},{"@pid":"54/10293","text":"Jyoti Namjoshi"},{"@pid":"138/1090","text":"Sreekumar Pillai"}]},"title":"Robustness and oppurtuneness based approach for Cloud deployment model selection.","venue":"ICACCI","pages":"207-212","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SoniNP13","doi":"10.1109/ICACCI.2013.6637172","ee":"https://doi.org/10.1109/ICACCI.2013.6637172","url":"https://dblp.org/rec/conf/icacci/SoniNP13"}, "url":"URL#4155292" }, { "@score":"1", "@id":"4155293", "info":{"authors":{"author":[{"@pid":"138/1100","text":"Durlav Sonowal"},{"@pid":"65/9292","text":"Manabendra Bhuyan"}]},"title":"Linearizing thermistor characteristics by piecewise linear interpolation in real time FPGA.","venue":"ICACCI","pages":"1976-1980","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SonowalB13","doi":"10.1109/ICACCI.2013.6637485","ee":"https://doi.org/10.1109/ICACCI.2013.6637485","url":"https://dblp.org/rec/conf/icacci/SonowalB13"}, "url":"URL#4155293" }, { "@score":"1", "@id":"4155294", "info":{"authors":{"author":[{"@pid":"138/1177","text":"N. Soumyalatha"},{"@pid":"138/1240","text":"Rakesh Kumar Ambhati"},{"@pid":"138/1244","text":"Manjunath R. Kounte"}]},"title":"Performance evaluation of ip wireless networks using two way active measurement protocol.","venue":"ICACCI","pages":"1896-1901","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SoumyalathaAK13","doi":"10.1109/ICACCI.2013.6637471","ee":"https://doi.org/10.1109/ICACCI.2013.6637471","url":"https://dblp.org/rec/conf/icacci/SoumyalathaAK13"}, "url":"URL#4155294" }, { "@score":"1", "@id":"4155295", "info":{"authors":{"author":[{"@pid":"129/1260","text":"Kamath S. Sowmya"},{"@pid":"09/6634","text":"V. S. Ananthanarayana"}]},"title":"A bottom-up approach towards achieving semantic web services.","venue":"ICACCI","pages":"1317-1322","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SowmyaA13","doi":"10.1109/ICACCI.2013.6637368","ee":"https://doi.org/10.1109/ICACCI.2013.6637368","url":"https://dblp.org/rec/conf/icacci/SowmyaA13"}, "url":"URL#4155295" }, { "@score":"1", "@id":"4155296", "info":{"authors":{"author":[{"@pid":"138/1278","text":"M. V. Sreedhanya"},{"@pid":"57/6103","text":"Sabu M. Thampi"}]},"title":"Discriminating most urgent trajectories in a road network using density based online clustering.","venue":"ICACCI","pages":"2018-2025","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SreedhanyaT13","doi":"10.1109/ICACCI.2013.6637492","ee":"https://doi.org/10.1109/ICACCI.2013.6637492","url":"https://dblp.org/rec/conf/icacci/SreedhanyaT13"}, "url":"URL#4155296" }, { "@score":"1", "@id":"4155297", "info":{"authors":{"author":[{"@pid":"13/1401","text":"Rajeswari Sridhar"},{"@pid":"138/1258","text":"K. V. Madhavan"},{"@pid":"121/9683","text":"S. Nagarajan"},{"@pid":"138/1129","text":"S. Nishanth"}]},"title":"Incremental language model and dynamic decoder for Tamil chat system.","venue":"ICACCI","pages":"2057-2062","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SridharMNN13","doi":"10.1109/ICACCI.2013.6637498","ee":"https://doi.org/10.1109/ICACCI.2013.6637498","url":"https://dblp.org/rec/conf/icacci/SridharMNN13"}, "url":"URL#4155297" }, { "@score":"1", "@id":"4155298", "info":{"authors":{"author":[{"@pid":"90/9568","text":"Madhan Kumar Srinivasan"},{"@pid":"06/10826","text":"K. Sarukesi"},{"@pid":"76/10124","text":"P. Revathy"}]},"title":"Architectural design for iCloudIDM Layer-II (iCloudIDM-LII) Subsystem of eCloudIDS generic security framework.","venue":"ICACCI","pages":"1668-1674","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SrinivasanSR13","doi":"10.1109/ICACCI.2013.6637432","ee":"https://doi.org/10.1109/ICACCI.2013.6637432","url":"https://dblp.org/rec/conf/icacci/SrinivasanSR13"}, "url":"URL#4155298" }, { "@score":"1", "@id":"4155299", "info":{"authors":{"author":[{"@pid":"138/1357","text":"Ritesh Srivastava"},{"@pid":"183/7076","text":"Mahinder Pal Singh Bhatia"}]},"title":"Quantifying modified opinion strength: A fuzzy inference system for Sentiment Analysis.","venue":"ICACCI","pages":"1512-1519","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SrivastavaB13","doi":"10.1109/ICACCI.2013.6637404","ee":"https://doi.org/10.1109/ICACCI.2013.6637404","url":"https://dblp.org/rec/conf/icacci/SrivastavaB13"}, "url":"URL#4155299" }, { "@score":"1", "@id":"4155300", "info":{"authors":{"author":[{"@pid":"138/1106","text":"Agrima Srivastava"},{"@pid":"27/5376","text":"G. Geethakumari"}]},"title":"Measuring privacy leaks in Online Social Networks.","venue":"ICACCI","pages":"2095-2100","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SrivastavaG13","doi":"10.1109/ICACCI.2013.6637504","ee":"https://doi.org/10.1109/ICACCI.2013.6637504","url":"https://dblp.org/rec/conf/icacci/SrivastavaG13"}, "url":"URL#4155300" }, { "@score":"1", "@id":"4155301", "info":{"authors":{"author":[{"@pid":"138/1417","text":"Juhi R. Srivastava"},{"@pid":"72/568","text":"T. S. B. Sudarshan"}]},"title":"ZEEP: Zone based energy efficient routing protocol for mobile sensor networks.","venue":"ICACCI","pages":"990-996","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SrivastavaS13","doi":"10.1109/ICACCI.2013.6637311","ee":"https://doi.org/10.1109/ICACCI.2013.6637311","url":"https://dblp.org/rec/conf/icacci/SrivastavaS13"}, "url":"URL#4155301" }, { "@score":"1", "@id":"4155302", "info":{"authors":{"author":[{"@pid":"120/3097","text":"Alexander Stanik"},{"@pid":"137/2886","text":"Patrick Bittner"},{"@pid":"138/1418","text":"Marvin Byfield"},{"@pid":"138/1462","text":"Fridtjof Sander"},{"@pid":"138/1175","text":"Daniel Schoder"}]},"title":"Local authentication and authorization system for immediate setup of cloud environments.","venue":"ICACCI","pages":"1651-1656","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/StanikBBSS13","doi":"10.1109/ICACCI.2013.6637429","ee":"https://doi.org/10.1109/ICACCI.2013.6637429","url":"https://dblp.org/rec/conf/icacci/StanikBBSS13"}, "url":"URL#4155302" }, { "@score":"1", "@id":"4155303", "info":{"authors":{"author":[{"@pid":"14/6448","text":"Badri Narayan Subudhi"},{"@pid":"09/6303","text":"Susmita Ghosh"},{"@pid":"86/6753","text":"Ashish Ghosh"}]},"title":"Moving object detection using Gaussian background model and Wronskian framework.","venue":"ICACCI","pages":"1775-1780","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SubudhiGG13","doi":"10.1109/ICACCI.2013.6637450","ee":"https://doi.org/10.1109/ICACCI.2013.6637450","url":"https://dblp.org/rec/conf/icacci/SubudhiGG13"}, "url":"URL#4155303" }, { "@score":"1", "@id":"4155304", "info":{"authors":{"author":[{"@pid":"138/1444","text":"Sherin Sugathan"},{"@pid":"03/8462","text":"Alex Pappachen James"}]},"title":"Directional edge detection using parallel cognitive logic cells.","venue":"ICACCI","pages":"694-697","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SugathanJ13","doi":"10.1109/ICACCI.2013.6637257","ee":"https://doi.org/10.1109/ICACCI.2013.6637257","url":"https://dblp.org/rec/conf/icacci/SugathanJ13"}, "url":"URL#4155304" }, { "@score":"1", "@id":"4155305", "info":{"authors":{"author":[{"@pid":"15/2559","text":"Sangheethaa Sukumaran"},{"@pid":"40/4155","text":"Lakshmi Ramachandran"},{"@pid":"138/1275","text":"Surya Rani Sunny"}]},"title":"Intersection based Traffic Aware Routing in VANET.","venue":"ICACCI","pages":"1414-1417","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SukumaranRS13","doi":"10.1109/ICACCI.2013.6637386","ee":"https://doi.org/10.1109/ICACCI.2013.6637386","url":"https://dblp.org/rec/conf/icacci/SukumaranRS13"}, "url":"URL#4155305" }, { "@score":"1", "@id":"4155306", "info":{"authors":{"author":[{"@pid":"138/1178","text":"V. Sunnydayal"},{"@pid":"91/7689","text":"T. Kishore Kumar"}]},"title":"Speech enhancement using sub-band wiener filter with pitch synchronous analysis.","venue":"ICACCI","pages":"20-25","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SunnydayalK13","doi":"10.1109/ICACCI.2013.6637140","ee":"https://doi.org/10.1109/ICACCI.2013.6637140","url":"https://dblp.org/rec/conf/icacci/SunnydayalK13"}, "url":"URL#4155306" }, { "@score":"1", "@id":"4155307", "info":{"authors":{"author":[{"@pid":"27/3860","text":"Bharti Suri"},{"@pid":"138/1325","text":"Pooja Jajoria"}]},"title":"Using ant colony optimization in software development project scheduling.","venue":"ICACCI","pages":"2101-2106","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SuriJ13","doi":"10.1109/ICACCI.2013.6637505","ee":"https://doi.org/10.1109/ICACCI.2013.6637505","url":"https://dblp.org/rec/conf/icacci/SuriJ13"}, "url":"URL#4155307" }, { "@score":"1", "@id":"4155308", "info":{"authors":{"author":[{"@pid":"128/7635","text":"G. Swapna"},{"@pid":"59/10330","text":"Punugu Vasudeva Reddy"},{"@pid":"158/5907","text":"Thumbur Gowri"}]},"title":"Efficient identity based multi-proxy multi-signcryption scheme using bilinear pairings over elliptic curves.","venue":"ICACCI","pages":"418-423","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/SwapnaRG13","doi":"10.1109/ICACCI.2013.6637208","ee":"https://doi.org/10.1109/ICACCI.2013.6637208","url":"https://dblp.org/rec/conf/icacci/SwapnaRG13"}, "url":"URL#4155308" }, { "@score":"1", "@id":"4155309", "info":{"authors":{"author":[{"@pid":"138/1119","text":"M. R. N. Tagore"},{"@pid":"80/4062","text":"Giri Babu Kande"},{"@pid":"39/5063","text":"E. V. Krishna Rao"},{"@pid":"17/7499","text":"B. Prabhakar Rao 0001"}]},"title":"Segmentation of retinal vasculature using phase congruency and hierarchical clustering.","venue":"ICACCI","pages":"361-366","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TagoreKRR13","doi":"10.1109/ICACCI.2013.6637198","ee":"https://doi.org/10.1109/ICACCI.2013.6637198","url":"https://dblp.org/rec/conf/icacci/TagoreKRR13"}, "url":"URL#4155309" }, { "@score":"1", "@id":"4155310", "info":{"authors":{"author":[{"@pid":"138/1371","text":"Sayed Mostafa Taheri"},{"@pid":"138/1341","text":"Jafar Boostanpour"},{"@pid":"138/1137","text":"Bahareh Mohammadi"}]},"title":"A Novel Algorithm for determinant calculation of N×N matrix.","venue":"ICACCI","pages":"764-769","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TaheriBM13","doi":"10.1109/ICACCI.2013.6637270","ee":"https://doi.org/10.1109/ICACCI.2013.6637270","url":"https://dblp.org/rec/conf/icacci/TaheriBM13"}, "url":"URL#4155310" }, { "@score":"1", "@id":"4155311", "info":{"authors":{"author":[{"@pid":"92/10847","text":"Mohit P. Tahiliani"},{"@pid":"58/5027","text":"K. C. Shet"}]},"title":"Analysis of cautious adaptive RED (CARED).","venue":"ICACCI","pages":"1029-1034","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TahilianiS13","doi":"10.1109/ICACCI.2013.6637318","ee":"https://doi.org/10.1109/ICACCI.2013.6637318","url":"https://dblp.org/rec/conf/icacci/TahilianiS13"}, "url":"URL#4155311" }, { "@score":"1", "@id":"4155312", "info":{"authors":{"author":[{"@pid":"138/1345","text":"Anuradha D. Thakare"},{"@pid":"86/4225","text":"C. A. Dhote"}]},"title":"An improved matching functions for information retrieval using Genetic Algorithm.","venue":"ICACCI","pages":"770-774","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThakareD13","doi":"10.1109/ICACCI.2013.6637271","ee":"https://doi.org/10.1109/ICACCI.2013.6637271","url":"https://dblp.org/rec/conf/icacci/ThakareD13"}, "url":"URL#4155312" }, { "@score":"1", "@id":"4155313", "info":{"authors":{"author":[{"@pid":"138/1411","text":"Abhishek Thakur"},{"@pid":"50/4401","text":"Chittaranjan Hota"}]},"title":"Sustainable wireless internet connectivity for rural areas.","venue":"ICACCI","pages":"1335-1340","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThakurH13","doi":"10.1109/ICACCI.2013.6637371","ee":"https://doi.org/10.1109/ICACCI.2013.6637371","url":"https://dblp.org/rec/conf/icacci/ThakurH13"}, "url":"URL#4155313" }, { "@score":"1", "@id":"4155314", "info":{"authors":{"author":[{"@pid":"74/8327","text":"Sudeep D. Thepade"},{"@pid":"136/4748","text":"Smita S. Chavan"}]},"title":"Robust image steganography with wavelet transform and Hybrid wavelet transform generated using Kekre, Walsh and sine transforms.","venue":"ICACCI","pages":"1964-1969","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThepadeC13","doi":"10.1109/ICACCI.2013.6637483","ee":"https://doi.org/10.1109/ICACCI.2013.6637483","url":"https://dblp.org/rec/conf/icacci/ThepadeC13"}, "url":"URL#4155314" }, { "@score":"1", "@id":"4155315", "info":{"authors":{"author":[{"@pid":"74/8327","text":"Sudeep D. Thepade"},{"@pid":"138/1541","text":"Santwana S. Gudadhe"}]},"title":"Fractional coefficients of transformed edge palm images with Cosine, Kekre and Slant wavelet transforms for palm print identification.","venue":"ICACCI","pages":"698-703","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThepadeG13","doi":"10.1109/ICACCI.2013.6637258","ee":"https://doi.org/10.1109/ICACCI.2013.6637258","url":"https://dblp.org/rec/conf/icacci/ThepadeG13"}, "url":"URL#4155315" }, { "@score":"1", "@id":"4155316", "info":{"authors":{"author":[{"@pid":"74/8327","text":"Sudeep D. Thepade"},{"@pid":"138/1514","text":"Vandana Mhaske"},{"@pid":"138/1261","text":"Vedant Kurhade"}]},"title":"Thepade's Hartley Error Vector Rotation for codebook generation in Vector Quantization.","venue":"ICACCI","pages":"2007-2012","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThepadeMK13","doi":"10.1109/ICACCI.2013.6637490","ee":"https://doi.org/10.1109/ICACCI.2013.6637490","url":"https://dblp.org/rec/conf/icacci/ThepadeMK13"}, "url":"URL#4155316" }, { "@score":"1", "@id":"4155317", "info":{"authors":{"author":[{"@pid":"74/8327","text":"Sudeep D. Thepade"},{"@pid":"138/1531","text":"Krishnasagar. S. Subhedarpage"},{"@pid":"138/1291","text":"Ankur A. Mali"}]},"title":"Performance rise in Content Based Video retrieval using multi-level Thepade's sorted ternary Block Truncation Coding with intermediate block videos and even-odd videos.","venue":"ICACCI","pages":"962-966","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThepadeSM13","doi":"10.1109/ICACCI.2013.6637306","ee":"https://doi.org/10.1109/ICACCI.2013.6637306","url":"https://dblp.org/rec/conf/icacci/ThepadeSM13"}, "url":"URL#4155317" }, { "@score":"1", "@id":"4155318", "info":{"authors":{"author":[{"@pid":"138/1276","text":"Chethan C. Thimmarayappa"},{"@pid":"138/1305","text":"Anandhi Jayadharmarajan"}]},"title":"VMON-Virtual Environment application monitoring.","venue":"ICACCI","pages":"1936-1941","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThimmarayappaJ13","doi":"10.1109/ICACCI.2013.6637478","ee":"https://doi.org/10.1109/ICACCI.2013.6637478","url":"https://dblp.org/rec/conf/icacci/ThimmarayappaJ13"}, "url":"URL#4155318" }, { "@score":"1", "@id":"4155319", "info":{"authors":{"author":[{"@pid":"138/1401","text":"Manoj V. Thomas"},{"@pid":"51/5979-1","text":"K. Chandrasekaran 0001"}]},"title":"Agent-based approach for distributed access control in cloud environments.","venue":"ICACCI","pages":"1628-1633","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ThomasS13","doi":"10.1109/ICACCI.2013.6637425","ee":"https://doi.org/10.1109/ICACCI.2013.6637425","url":"https://dblp.org/rec/conf/icacci/ThomasS13"}, "url":"URL#4155319" }, { "@score":"1", "@id":"4155320", "info":{"authors":{"author":{"@pid":"91/1861","text":"Abhishek Tiwari"}},"title":"A novel zero overhead obfuscation technique for securing FPGA designs.","venue":"ICACCI","pages":"554-558","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Tiwari13","doi":"10.1109/ICACCI.2013.6637232","ee":"https://doi.org/10.1109/ICACCI.2013.6637232","url":"https://dblp.org/rec/conf/icacci/Tiwari13"}, "url":"URL#4155320" }, { "@score":"1", "@id":"4155321", "info":{"authors":{"author":[{"@pid":"138/1546","text":"P. K. Tiwari"},{"@pid":"12/8325","text":"Shyam Parthasarathy"},{"@pid":"138/1048","text":"A. N. Chatterjee"},{"@pid":"311/5797","text":"Neeraj Krishna"}]},"title":"Integrated wireless sensor network for large scale intelligent systems.","venue":"ICACCI","pages":"1849-1854","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TiwariPCK13","doi":"10.1109/ICACCI.2013.6637463","ee":"https://doi.org/10.1109/ICACCI.2013.6637463","url":"https://dblp.org/rec/conf/icacci/TiwariPCK13"}, "url":"URL#4155321" }, { "@score":"1", "@id":"4155322", "info":{"authors":{"author":[{"@pid":"138/1203","text":"Saurabh Trikande"},{"@pid":"138/1380","text":"M. K. Kodmelwar"}]},"title":"Visualization technique for Unmanned Ground Vehicles using Point Clouds.","venue":"ICACCI","pages":"1832-1836","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TrikandeK13","doi":"10.1109/ICACCI.2013.6637460","ee":"https://doi.org/10.1109/ICACCI.2013.6637460","url":"https://dblp.org/rec/conf/icacci/TrikandeK13"}, "url":"URL#4155322" }, { "@score":"1", "@id":"4155323", "info":{"authors":{"author":[{"@pid":"138/1498","text":"Priyank Trivedi"},{"@pid":"126/5003","text":"Tejaswi Agarwal"},{"@pid":"44/10529","text":"K. Muthunagai"}]},"title":"MC-RANSAC: A Pre-processing Model for RANSAC using Monte Carlo method implemented on a GPU.","venue":"ICACCI","pages":"1380-1383","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TrivediAM13","doi":"10.1109/ICACCI.2013.6637380","ee":"https://doi.org/10.1109/ICACCI.2013.6637380","url":"https://dblp.org/rec/conf/icacci/TrivediAM13"}, "url":"URL#4155323" }, { "@score":"1", "@id":"4155324", "info":{"authors":{"author":[{"@pid":"128/3320","text":"Sudhanshu Tyagi"},{"@pid":"52/45","text":"Sumit Kumar Gupta"},{"@pid":"138/1054","text":"Sudeep Tanwar"},{"@pid":"04/8395","text":"Neeraj Kumar 0001"}]},"title":"EHE-LEACH: Enhanced heterogeneous LEACH protocol for lifetime enhancement of wireless SNs.","venue":"ICACCI","pages":"1485-1490","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/TyagiGTK13","doi":"10.1109/ICACCI.2013.6637399","ee":"https://doi.org/10.1109/ICACCI.2013.6637399","url":"https://dblp.org/rec/conf/icacci/TyagiGTK13"}, "url":"URL#4155324" }, { "@score":"1", "@id":"4155325", "info":{"authors":{"author":[{"@pid":"138/1419","text":"Mohamed Shaik Honnur Vali"},{"@pid":"61/7686","text":"T. Rama Rao"}]},"title":"Concave lens integrated conical horn at 60 GHz for energy efficient wireless applications.","venue":"ICACCI","pages":"1491-1495","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ValiR13","doi":"10.1109/ICACCI.2013.6637400","ee":"https://doi.org/10.1109/ICACCI.2013.6637400","url":"https://dblp.org/rec/conf/icacci/ValiR13"}, "url":"URL#4155325" }, { "@score":"1", "@id":"4155326", "info":{"authors":{"author":[{"@pid":"138/1518","text":"Raisa Varghese"},{"@pid":"138/1326","text":"M. Jayasree"}]},"title":"Aspect based Sentiment Analysis using support vector machine classifier.","venue":"ICACCI","pages":"1581-1586","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VargheseJ13","doi":"10.1109/ICACCI.2013.6637416","ee":"https://doi.org/10.1109/ICACCI.2013.6637416","url":"https://dblp.org/rec/conf/icacci/VargheseJ13"}, "url":"URL#4155326" }, { "@score":"1", "@id":"4155327", "info":{"authors":{"author":[{"@pid":"138/1132","text":"M. S. Vasanthi"},{"@pid":"138/1093","text":"Dharmesh Kumar"},{"@pid":"61/7686","text":"T. Rama Rao"}]},"title":"Performance comparison study of AQ-DBPSK modulation scheme for energy efficient wireless sensor communications.","venue":"ICACCI","pages":"1452-1457","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VasanthiKR13","doi":"10.1109/ICACCI.2013.6637393","ee":"https://doi.org/10.1109/ICACCI.2013.6637393","url":"https://dblp.org/rec/conf/icacci/VasanthiKR13"}, "url":"URL#4155327" }, { "@score":"1", "@id":"4155328", "info":{"authors":{"author":[{"@pid":"138/1355","text":"Shanthi Vellingiri"},{"@pid":"37/6890","text":"Deepaknath Tandur"},{"@pid":"138/1065","text":"Mallikarjun Kande"}]},"title":"Energy efficient wireless infrastructure solution for open pit mine.","venue":"ICACCI","pages":"1463-1467","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VellingiriTK13","doi":"10.1109/ICACCI.2013.6637395","ee":"https://doi.org/10.1109/ICACCI.2013.6637395","url":"https://dblp.org/rec/conf/icacci/VellingiriTK13"}, "url":"URL#4155328" }, { "@score":"1", "@id":"4155329", "info":{"authors":{"author":[{"@pid":"138/1420","text":"Kishore Venkateshan"},{"@pid":"138/1349","text":"Arvind Shekar"},{"@pid":"130/3938","text":"Snehanshu Saha"}]},"title":"Baseball hand tracking from monocular video.","venue":"ICACCI","pages":"953-961","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VenkateshanSS13","doi":"10.1109/ICACCI.2013.6637305","ee":"https://doi.org/10.1109/ICACCI.2013.6637305","url":"https://dblp.org/rec/conf/icacci/VenkateshanSS13"}, "url":"URL#4155329" }, { "@score":"1", "@id":"4155330", "info":{"authors":{"author":[{"@pid":"00/7258","text":"Mridula Verma"},{"@pid":"08/8876","text":"Utpal Kumar Sikdar"},{"@pid":"27/1664-1","text":"Sriparna Saha 0001"},{"@pid":"11/3590","text":"Asif Ekbal"}]},"title":"Ensemble based active annotation for biomedical named entity recognition.","venue":"ICACCI","pages":"973-978","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VermaS0E13","doi":"10.1109/ICACCI.2013.6637308","ee":"https://doi.org/10.1109/ICACCI.2013.6637308","url":"https://dblp.org/rec/conf/icacci/VermaS0E13"}, "url":"URL#4155330" }, { "@score":"1", "@id":"4155331", "info":{"authors":{"author":[{"@pid":"194/1239","text":"Vikram C. M."},{"@pid":"138/1150","text":"K. Umarani"}]},"title":"Phoneme independent pathological voice detection using wavelet based MFCCs, GMM-SVM hybrid classifier.","venue":"ICACCI","pages":"929-934","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/VikramU13","doi":"10.1109/ICACCI.2013.6637301","ee":"https://doi.org/10.1109/ICACCI.2013.6637301","url":"https://dblp.org/rec/conf/icacci/VikramU13"}, "url":"URL#4155331" }, { "@score":"1", "@id":"4155332", "info":{"authors":{"author":[{"@pid":"138/1309","text":"Pooja Wadhwa"},{"@pid":"183/7076","text":"Mahinder Pal Singh Bhatia"}]},"title":"An insight into properties of real world networks.","venue":"ICACCI","pages":"1930-1935","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WadhwaB13","doi":"10.1109/ICACCI.2013.6637477","ee":"https://doi.org/10.1109/ICACCI.2013.6637477","url":"https://dblp.org/rec/conf/icacci/WadhwaB13"}, "url":"URL#4155332" }, { "@score":"1", "@id":"4155333", "info":{"authors":{"author":[{"@pid":"138/1168","text":"Anandghan Waghmare"},{"@pid":"121/3310","text":"Arka Prokash Mazumdar"},{"@pid":"45/173","text":"Ashok Singh Sairam"}]},"title":"Time synchronization protocol for 6LoWPAN.","venue":"ICACCI","pages":"1855-1860","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WaghmareMS13","doi":"10.1109/ICACCI.2013.6637464","ee":"https://doi.org/10.1109/ICACCI.2013.6637464","url":"https://dblp.org/rec/conf/icacci/WaghmareMS13"}, "url":"URL#4155333" }, { "@score":"1", "@id":"4155334", "info":{"authors":{"author":[{"@pid":"138/1377","text":"Pranav Waila"},{"@pid":"00/6451-1","text":"Vivek Kumar Singh 0001"},{"@pid":"66/7481","text":"Manoj Kumar Singh"}]},"title":"Blog text analysis using topic modeling, named entity recognition and sentiment classifier combine.","venue":"ICACCI","pages":"1166-1171","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WailaSS13","doi":"10.1109/ICACCI.2013.6637342","ee":"https://doi.org/10.1109/ICACCI.2013.6637342","url":"https://dblp.org/rec/conf/icacci/WailaSS13"}, "url":"URL#4155334" }, { "@score":"1", "@id":"4155335", "info":{"authors":{"author":{"@pid":"138/1042","text":"Rhythm Walia"}},"title":"Steganography based on neighbourhood pixels.","venue":"ICACCI","pages":"203-206","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/Walia13","doi":"10.1109/ICACCI.2013.6637171","ee":"https://doi.org/10.1109/ICACCI.2013.6637171","url":"https://dblp.org/rec/conf/icacci/Walia13"}, "url":"URL#4155335" }, { "@score":"1", "@id":"4155336", "info":{"authors":{"author":[{"@pid":"128/5259","text":"Kapil Keshao Wankhade"},{"@pid":"138/1114","text":"Tasneem Hasan"},{"@pid":"138/1058","text":"Ravindra Thool"}]},"title":"A method for evolving data streams.","venue":"ICACCI","pages":"1619-1622","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WankhadeHT13","doi":"10.1109/ICACCI.2013.6637423","ee":"https://doi.org/10.1109/ICACCI.2013.6637423","url":"https://dblp.org/rec/conf/icacci/WankhadeHT13"}, "url":"URL#4155336" }, { "@score":"1", "@id":"4155337", "info":{"authors":{"author":[{"@pid":"128/5259","text":"Kapil Keshao Wankhade"},{"@pid":"138/1361","text":"Sadia Patka"},{"@pid":"138/1058","text":"Ravindra Thool"}]},"title":"An efficient approach for Intrusion Detection using data mining methods.","venue":"ICACCI","pages":"1615-1618","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WankhadePT13","doi":"10.1109/ICACCI.2013.6637422","ee":"https://doi.org/10.1109/ICACCI.2013.6637422","url":"https://dblp.org/rec/conf/icacci/WankhadePT13"}, "url":"URL#4155337" }, { "@score":"1", "@id":"4155338", "info":{"authors":{"author":[{"@pid":"128/5259","text":"Kapil Keshao Wankhade"},{"@pid":"138/1248","text":"Dhiraj Rane"},{"@pid":"138/1058","text":"Ravindra Thool"}]},"title":"A new feature selection algorithm for stream Data Classification.","venue":"ICACCI","pages":"1843-1848","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WankhadeRT13","doi":"10.1109/ICACCI.2013.6637462","ee":"https://doi.org/10.1109/ICACCI.2013.6637462","url":"https://dblp.org/rec/conf/icacci/WankhadeRT13"}, "url":"URL#4155338" }, { "@score":"1", "@id":"4155339", "info":{"authors":{"author":[{"@pid":"123/9184","text":"Chirag Warty"},{"@pid":"133/4821","text":"Sandeep Mattigiri"},{"@pid":"47/5527","text":"Ennio Gambi"},{"@pid":"81/3887","text":"Susanna Spinsante"}]},"title":"De Bruijn sequences as secure spreading codes for wireless communications.","venue":"ICACCI","pages":"315-320","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WartyMGS13","doi":"10.1109/ICACCI.2013.6637190","ee":"https://doi.org/10.1109/ICACCI.2013.6637190","url":"https://dblp.org/rec/conf/icacci/WartyMGS13"}, "url":"URL#4155339" }, { "@score":"1", "@id":"4155340", "info":{"authors":{"author":[{"@pid":"138/1235","text":"Isha Wasnik"},{"@pid":"138/1274","text":"Rucha Sawlekar"},{"@pid":"31/9187","text":"Faruk Kazi 0001"},{"@pid":"68/9184","text":"Navdeep M. Singh"}]},"title":"Dual quaternion applications to bioinformatics for kinematical analysis of Protein Backbone.","venue":"ICACCI","pages":"2043-2048","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WasnikSKS13","doi":"10.1109/ICACCI.2013.6637496","ee":"https://doi.org/10.1109/ICACCI.2013.6637496","url":"https://dblp.org/rec/conf/icacci/WasnikSKS13"}, "url":"URL#4155340" }, { "@score":"1", "@id":"4155341", "info":{"authors":{"author":[{"@pid":"138/1232","text":"Bency Wilson"},{"@pid":"47/11266","text":"K. G. Preetha"}]},"title":"Enhanced beaconless routing mechanism in VANET.","venue":"ICACCI","pages":"1076-1081","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/WilsonP13","doi":"10.1109/ICACCI.2013.6637326","ee":"https://doi.org/10.1109/ICACCI.2013.6637326","url":"https://dblp.org/rec/conf/icacci/WilsonP13"}, "url":"URL#4155341" }, { "@score":"1", "@id":"4155342", "info":{"authors":{"author":[{"@pid":"138/1096","text":"Sonal Yadav"},{"@pid":"80/7311","text":"Manoj Singh Gaur"},{"@pid":"10/3052","text":"Vijay Laxmi"}]},"title":"Ns-3 emulation on ORBIT testbed.","venue":"ICACCI","pages":"616-619","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/YadavGL13","doi":"10.1109/ICACCI.2013.6637243","ee":"https://doi.org/10.1109/ICACCI.2013.6637243","url":"https://dblp.org/rec/conf/icacci/YadavGL13"}, "url":"URL#4155342" }, { "@score":"1", "@id":"4155343", "info":{"authors":{"author":[{"@pid":"14/6178-1","text":"Xin-She Yang 0001"},{"@pid":"30/7976","text":"Suash Deb"},{"@pid":"41/2700","text":"Xingshi He"}]},"title":"Eagle strategy with flower algorithm.","venue":"ICACCI","pages":"1213-1217","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/YangDH13","doi":"10.1109/ICACCI.2013.6637350","ee":"https://doi.org/10.1109/ICACCI.2013.6637350","url":"https://dblp.org/rec/conf/icacci/YangDH13"}, "url":"URL#4155343" }, { "@score":"1", "@id":"4155344", "info":{"authors":{"author":[{"@pid":"138/1066","text":"Sanjay R. Zadokar"},{"@pid":"138/1529","text":"Vishal B. Raskar"},{"@pid":"138/1319","text":"Sachin V. Shinde"}]},"title":"A digital watermarking for anaglyph 3D images.","venue":"ICACCI","pages":"483-488","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ZadokarRS13","doi":"10.1109/ICACCI.2013.6637219","ee":"https://doi.org/10.1109/ICACCI.2013.6637219","url":"https://dblp.org/rec/conf/icacci/ZadokarRS13"}, "url":"URL#4155344" }, { "@score":"1", "@id":"4155345", "info":{"authors":{"author":[{"@pid":"38/10151","text":"Jiuwen Zhang"},{"@pid":"00/5867","text":"Chao Yang"},{"@pid":"138/1115","text":"Zhiquan Yu"}]},"title":"Sharpness for texture retrieval in multiscale domain.","venue":"ICACCI","pages":"378-381","year":"2013","type":"Conference and Workshop Papers","access":"closed","key":"conf/icacci/ZhangYY13","doi":"10.1109/ICACCI.2013.6637201","ee":"https://doi.org/10.1109/ICACCI.2013.6637201","url":"https://dblp.org/rec/conf/icacci/ZhangYY13"}, "url":"URL#4155345" }, { "@score":"1", "@id":"4249171", "info":{"title":"International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, Mysore, India, August 22-25, 2013","venue":"ICACCI","publisher":"IEEE","year":"2013","type":"Editorship","key":"conf/icacci/2013","ee":"https://ieeexplore.ieee.org/xpl/conhome/6621059/proceeding","url":"https://dblp.org/rec/conf/icacci/2013"}, "url":"URL#4249171" } ] } } } )