- 2016
- Bharati Ainapure, Deven Shah, A. Ananda Rao:
Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment. ICIA 2016: 27:1-27:6 - Anurag, Deepak Arora, Upendra Kumar:
Protecting Sensitive Warehouse Data through UML based Modeling. ICIA 2016: 31:1-31:6 - P. J. Arathy, Vrinda V. Nair:
Analysis of Spoofing Detection using Video Subsection Processing. ICIA 2016: 76:1-76:6 - A. Christiyana Arulselvi, Sendhilkumar Selvaraju, G. S. Mahalakshmi:
Provenance based Trust computation for Recommendation in Social Network. ICIA 2016: 114:1-114:7 - Mithlesh Arya, Namita Mittal, Girdhari Singh:
Cervical Cancer Detection Using Segmentation on Pap smear Images. ICIA 2016: 29:1-29:5 - M. Auxilia, K. Raja:
Knowledge Based Security Model for Banking in Cloud. ICIA 2016: 51:1-51:6 - R. Bala, N. P. Gopalan:
Security Enhancement using a modified AES algorithm. ICIA 2016: 4:1-4:5 - V. Balaji, K. S. Kuppusamy:
Accessibility Evaluation of Indian Railway Websites. ICIA 2016: 59:1-59:6 - S. Balamurugan, S. Saraswathi:
A Comprehensive Survey on Workflow Scheduling Algorithms in Various Environments. ICIA 2016: 21:1-21:6 - Adrija Bhattacharya, Sankhayan Choudhury:
An Efficient Service Selection Approach through a Goodness Measure of the Participating QoS. ICIA 2016: 94:1-94:6 - Pranjal S. Bogawar, Kishor K. Bhoyar:
Soft Computing Approaches to Classification of Emails for Sentiment Analysis. ICIA 2016: 22:1-22:7 - Balaji Chandrasekaran, Ramadoss Balakrishnan:
Attribute Based Encryption Using Quadratic Residue for the Big Data in Cloud Environment. ICIA 2016: 19:1-19:4 - M. Chitra, S. Siva Sathya:
Bidirectional Data Dissemination in Vehicular Ad Hoc Networks using Epidemic Spreading Model. ICIA 2016: 57:1-57:8 - K. Chitra, V. Prasanna Venkatesan:
Spatial Domain Watermarking Technique: An Introspective Study. ICIA 2016: 50:1-50:6 - T. Neelima Chowdary, P. Prudhvi Raj, Ch. Anupama, D. Haritha:
Location & User Profile based Mobile Application Access. ICIA 2016: 2:1-2:8 - Salil Dabholkar, Yuvraj Patadia, Prajyoti Dsilva:
Automatic Document Summarization using Sentiment Analysis. ICIA 2016: 49:1-49:6 - Udaya Dayanandan, K. Vivekanandan:
An Empirical Evaluation model for Software Architecture Maintainability for Object oriented Design. ICIA 2016: 98:1-98:4 - Dipankar Deb, Nabendu Chaki:
A Framework towards Generating Effective Business Process Model by Goal based Pruning. ICIA 2016: 90:1-90:4 - Padmashree Desai, Jagadeesh Pujari, Anita Kinnikar:
An Image Retrieval using combined approach Wavelets and Local Binary Pattern. ICIA 2016: 67:1-67:6 - Jayalatchumy Dhanpal, Thambidurai Perumal, Udhayakumaran:
Efficient Graph Clustering Algorithm and its use in Prediction of Students Performance. ICIA 2016: 39:1-39:5 - Leena Mary Francis, K. C. Visalatchi, N. Sreenath:
End to End Text Recognition from Natural Scene. ICIA 2016: 44:1-44:5 - A. Sivagnana Ganesan, T. Chithralekha:
A Survey on Survey of Migration of Legacy Systems. ICIA 2016: 72:1-72:10 - Vaithianathan Geetha:
Smart Sensing based Societal Applications in Public Cloud Environment. ICIA 2016: 9:1-9:6 - S. Geetha, J. Madhusudanan, M. Krishnamoorthy, V. Prasanna Venkatesan:
Design of Emotions context based Smart ATM Environment. ICIA 2016: 63:1-63:6 - Neenu George, K. Chandrasekaran, A. Binu:
Optimization-Aware Scheduling in Cloud Computing. ICIA 2016: 15:1-15:5 - Karthi Govindharaju, M. Ezhilarasan:
Securing Biometric Template using a Hybrid Scheme. ICIA 2016: 105:1-105:5 - Somya Gupta, Namita Mittal, Alok Kumar:
Rake-Pmi Automated Keyphrase Extraction: An unsupervised approach for automated extraction of keyphrases. ICIA 2016: 102:1-102:6 - Harsha Gwalani, Namita Mittal, Ankit Vidyarthi:
Classification of brain tumours Using Genetic Algorithms as a Feature Selection Method (GAFS). ICIA 2016: 32:1-32:5 - Yasir Hamid, M. Sugumaran, Ludovic Journaux:
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis. ICIA 2016: 53:1-53:6