Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers /
Saved in:
Meeting name: | ADCONS (Conference) (2011 : Surathkal, India) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2012. |
Description: | 1 online resource (xvii, 641 pages). |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 7135 LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI Lecture notes in computer science ; 7135. LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI. |
Subject: | Computer science -- Congresses. Computer networks -- Congresses. Computer security -- Congresses. Computer network architectures -- Congresses. Informatique. Computer network architectures. Computer networks. Computer science. Computer security. Electronic books. Conference papers and proceedings. |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076790 |
Table of Contents:
- A New Small World Lattice / Abhishek Parakh and Subhash Kak
- SLA
- Driven Dynamic Resource Allocation on Clouds / Siddesh G.M. and Srinivasa K.G.
- An Intelligent Cloud System Adopting File Pre-fetching / Jagadeesh Balasubramaniyan and Sumalatha Ramachandran
- Replication Infrastructure for RESTful Web Services / Marcin Bazydło, Szymon Francuzik, Cezary Sobaniec and Dariusz Wawrzyniak
- Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network / Joon-Mo Yang, Jun-Yong Park and Ryum-Duck Oh
- Content Based Service Discovery in Semantic Web Services Using WordNet / D. Paulraj and S. Swamynathan
- Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions / Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya and Adithi Shenoy
- Reconfigurable Web Service Composition Using Belief Revision / Deivamani Mallayya and Baskaran Ramachandran
- Semantic Web Service Discovery with Structural Level Matching of Operations / PonHarshavardhanan, J. Akilandeswari and K.A. Anjali Krishna
- A Novel Way of Tracking People in an Indoor Area / Aditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal and Arun Agrahara Somasundara.
- Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study / Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan and J. Nagaraju
- Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition / J. Rekha, J. Bhattacharya and S. Majumder
- An Approach for Color Edge Detection with Automatic Threshold Detection / Arpitha M.D., Megha P. Arakeri and G. Ram Mohan Reddy
- Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method / Anand T.V., Madhu S. Nair and Rao Tatavarti
- Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers / Praveen Cyriac and Philomina Simon
- Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation / A. Benjamin Joseph and Baskaran Ramachandran
- Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering / T. Ashwini Reddy, K. Renuka Devi and Suryakanth V. Gangashetty
- A Sensitive Attribute Based Clustering Method for k-Anonymization / Pawan Bhaladhare and Devesh Jinwala.
- Generalization Capability of Artificial Neural Network Incorporated with Pruning Method / Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy
- Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery / Sudha Subramani and Sathiyabhama Balasubramaniam
- Clustering Biological Data Using Voronoi Diagram / Damodar Reddy Edla and Prasanta K. Jana
- Knowledge Management Techniques for Analysis of Clinical Databases / T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan
- Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System / P.S. Hiremath and Parashuram Bannigidad
- Combining Load Balancing with Shared Storage and Primary Backup Replicaton / Marcin Bazydło
- Smart Playlist Generation Using Data Mining Techniques / Prafulla Kalapatapu and Aruna Malapati
- Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors / Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar and Ankush Mittal
- EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment / K.R. Guruprasad
- PEAL-Packed Executable AnaLysis / Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki and Smita Naval.
- Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms / Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K.
- Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch / J. Jasper and T Aruldoss Albert Victoire
- Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment / D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem and S. Gomathi Sundari
- Recent Advancements in Parallel Algorithms for String Matching on Computing Models
- A Survey and Experimental Results / Chinta Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy
- Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology / Rakesh Kumar Jha and Upena D. Dalal
- Scalable Video Delivery over Peer-to-Peer Network / Karunakar A.K., Younsong Qio and Brian Lee
- K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments / Łukasz Piątkowski
- Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks / Anshuman Biswas, Banani Saha and Saswati Guha.
- Data Distribution Service on Top of FlexRay Vehicle Networks / Houda Jaouani, Rim Bouhouch, Wafa Najjar and Salem Hasnaoui
- CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs / Raviteja B.L., Annappa B. and Mohit P. Tahiliani
- Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks / Harigovindan V.P., A.V. Babu and Lillykutty Jacob
- CBRM
- Cluster Based Replica Management in Mobile Adhoc Networks / Rajeev Kumar, Prashant Kumar and Naveen Chauhan
- A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell / S. Nandakumar and Sibaram Khara
- An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network / Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal
- Strong Minimum Interference Topology for Wireless Sensor Networks / B.S. Panda and D. Pushparaj Shetty
- Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering / Lakshmi Priya M. and Lalit K. Awasthi
- CAs-based QoS Scheme for Remote Health Monitoring over WMSN / Bhargavi K. and Sathish Babu B.
- Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs / N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and L.M. Patnaik
- Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks / Pratyay Kuila and Prasanta K. Jana
- Node
- Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks
- A Survey and Conceptual Modeling / Muni Venkateswarlu K., K. Chandra Sekaran and A. Kandasamy
- Self Healing Wireless Sensor Network / Sumathi S. and Chandrasekaran M.
- Contention Detection and Minimization in All Optical Routers / Surinder Singh and Meenakshi Garg
- FARED: Fast Adapting RED Gateways for TCP/IP Networks / Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju
- An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks / Shreesha Kashyap, Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R.
- Obstacle Aware Routing in 3D Integrated Circuits / Prasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das and Parthasarathi Dasgupta
- A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism / J. Hanumanthappa and Manjaiah D.H.
- Consistency Maintenance of Modern Security Policies / Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak and Michał Szychowiak.
- Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation / P. Vijayakumar, S. Bose and A. Kannan
- Reputation-Based Trust for Mobile Agents / Priyanka Dadhich, Kamlesh Dutta and M.C. Govil
- Anonymity in Attribute-Based Group Signatures / Bhumika K. Patel and Devesh Jinwala
- Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography / K. Kumar, J. Nafeesa Begum and V. Sumathy
- Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext / Nishant Doshi and Devesh Jinwala
- SQL Injection Attack Mechanisms and Prevention Techniques / Roshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam and Dipankar Saha
- Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks / Abhinav Bhandari, A.L. Sangal and Krishan Kumar Saluja
- Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed / Ketki Arora, Krishan Kumar and Monika Sachdeva
- A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation / V. Shanmughaneethi, Regan Abraham and S. Swamynathan.
- Correlation in Distributed Intrusion Detection System Using Mobile Agent / Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi
- A Novel Architecture for the Generation of Picture Based CAPTCHA / S. Benson Edwin Raj, V.S. Jayanthi and V. Muthulakshmi
- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images / Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy
- Covertness Analysis of Subliminal Channels in Legitimate Communication / H.S. Gururaja, M. Seetha and Anjan K. Koundinya
- Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map / P. Devaraj
- Misbehavior Detection Based on Ensemble Learning in VANET / Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur
- An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration / Poonam Saini and Awadhesh Kumar Singh
- Application of IP Traceback Mechanism to OnlineVoting System / V.K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie and Tulika Pandey
- Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam.