Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers /

Saved in:
Bibliographic Details
Meeting name:ADCONS (Conference) (2011 : Surathkal, India)
Imprint:Berlin ; New York : Springer, ©2012.
Description:1 online resource (xvii, 641 pages).
Series:Lecture notes in computer science, 0302-9743 ; 7135
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
Lecture notes in computer science ; 7135.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Subject:Computer science -- Congresses.
Computer networks -- Congresses.
Computer security -- Congresses.
Computer network architectures -- Congresses.
Computer network architectures.
Computer networks.
Computer science.
Computer security.
Electronic books.
Conference papers and proceedings.
Format: E-Resource Book
URL for this record:
Hidden Bibliographic Details
Varying Form of Title:ADCONS 2011
Other authors / contributors:Thilagam, P. Santhi.
Notes:Includes bibliographical references and author index.
Summary:Annotation This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011. The 73 papers included in this book were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on distributed computing, image processing, pattern recognition, applied algorithms, wireless networking, sensor networks, network infrastructure, cryptography, Web security, and application security.
Table of Contents:
  • A New Small World Lattice / Abhishek Parakh and Subhash Kak
  • SLA
  • Driven Dynamic Resource Allocation on Clouds / Siddesh G.M. and Srinivasa K.G.
  • An Intelligent Cloud System Adopting File Pre-fetching / Jagadeesh Balasubramaniyan and Sumalatha Ramachandran
  • Replication Infrastructure for RESTful Web Services / Marcin Bazydło, Szymon Francuzik, Cezary Sobaniec and Dariusz Wawrzyniak
  • Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network / Joon-Mo Yang, Jun-Yong Park and Ryum-Duck Oh
  • Content Based Service Discovery in Semantic Web Services Using WordNet / D. Paulraj and S. Swamynathan
  • Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions / Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya and Adithi Shenoy
  • Reconfigurable Web Service Composition Using Belief Revision / Deivamani Mallayya and Baskaran Ramachandran
  • Semantic Web Service Discovery with Structural Level Matching of Operations / PonHarshavardhanan, J. Akilandeswari and K.A. Anjali Krishna
  • A Novel Way of Tracking People in an Indoor Area / Aditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal and Arun Agrahara Somasundara.
  • Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study / Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan and J. Nagaraju
  • Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition / J. Rekha, J. Bhattacharya and S. Majumder
  • An Approach for Color Edge Detection with Automatic Threshold Detection / Arpitha M.D., Megha P. Arakeri and G. Ram Mohan Reddy
  • Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method / Anand T.V., Madhu S. Nair and Rao Tatavarti
  • Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers / Praveen Cyriac and Philomina Simon
  • Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation / A. Benjamin Joseph and Baskaran Ramachandran
  • Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering / T. Ashwini Reddy, K. Renuka Devi and Suryakanth V. Gangashetty
  • A Sensitive Attribute Based Clustering Method for k-Anonymization / Pawan Bhaladhare and Devesh Jinwala.
  • Generalization Capability of Artificial Neural Network Incorporated with Pruning Method / Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy
  • Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery / Sudha Subramani and Sathiyabhama Balasubramaniam
  • Clustering Biological Data Using Voronoi Diagram / Damodar Reddy Edla and Prasanta K. Jana
  • Knowledge Management Techniques for Analysis of Clinical Databases / T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan
  • Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System / P.S. Hiremath and Parashuram Bannigidad
  • Combining Load Balancing with Shared Storage and Primary Backup Replicaton / Marcin Bazydło
  • Smart Playlist Generation Using Data Mining Techniques / Prafulla Kalapatapu and Aruna Malapati
  • Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors / Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar and Ankush Mittal
  • EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment / K.R. Guruprasad
  • PEAL-Packed Executable AnaLysis / Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki and Smita Naval.
  • Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms / Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K.
  • Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch / J. Jasper and T Aruldoss Albert Victoire
  • Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment / D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem and S. Gomathi Sundari
  • Recent Advancements in Parallel Algorithms for String Matching on Computing Models
  • A Survey and Experimental Results / Chinta Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy
  • Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology / Rakesh Kumar Jha and Upena D. Dalal
  • Scalable Video Delivery over Peer-to-Peer Network / Karunakar A.K., Younsong Qio and Brian Lee
  • K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments / Łukasz Piątkowski
  • Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks / Anshuman Biswas, Banani Saha and Saswati Guha.
  • Data Distribution Service on Top of FlexRay Vehicle Networks / Houda Jaouani, Rim Bouhouch, Wafa Najjar and Salem Hasnaoui
  • CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs / Raviteja B.L., Annappa B. and Mohit P. Tahiliani
  • Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks / Harigovindan V.P., A.V. Babu and Lillykutty Jacob
  • CBRM
  • Cluster Based Replica Management in Mobile Adhoc Networks / Rajeev Kumar, Prashant Kumar and Naveen Chauhan
  • A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell / S. Nandakumar and Sibaram Khara
  • An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network / Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal
  • Strong Minimum Interference Topology for Wireless Sensor Networks / B.S. Panda and D. Pushparaj Shetty
  • Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering / Lakshmi Priya M. and Lalit K. Awasthi
  • CAs-based QoS Scheme for Remote Health Monitoring over WMSN / Bhargavi K. and Sathish Babu B.
  • Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs / N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and L.M. Patnaik
  • Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks / Pratyay Kuila and Prasanta K. Jana
  • Node
  • Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks
  • A Survey and Conceptual Modeling / Muni Venkateswarlu K., K. Chandra Sekaran and A. Kandasamy
  • Self Healing Wireless Sensor Network / Sumathi S. and Chandrasekaran M.
  • Contention Detection and Minimization in All Optical Routers / Surinder Singh and Meenakshi Garg
  • FARED: Fast Adapting RED Gateways for TCP/IP Networks / Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju
  • An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks / Shreesha Kashyap, Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R.
  • Obstacle Aware Routing in 3D Integrated Circuits / Prasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das and Parthasarathi Dasgupta
  • A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism / J. Hanumanthappa and Manjaiah D.H.
  • Consistency Maintenance of Modern Security Policies / Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak and Michał Szychowiak.
  • Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation / P. Vijayakumar, S. Bose and A. Kannan
  • Reputation-Based Trust for Mobile Agents / Priyanka Dadhich, Kamlesh Dutta and M.C. Govil
  • Anonymity in Attribute-Based Group Signatures / Bhumika K. Patel and Devesh Jinwala
  • Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography / K. Kumar, J. Nafeesa Begum and V. Sumathy
  • Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext / Nishant Doshi and Devesh Jinwala
  • SQL Injection Attack Mechanisms and Prevention Techniques / Roshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam and Dipankar Saha
  • Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks / Abhinav Bhandari, A.L. Sangal and Krishan Kumar Saluja
  • Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed / Ketki Arora, Krishan Kumar and Monika Sachdeva
  • A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation / V. Shanmughaneethi, Regan Abraham and S. Swamynathan.
  • Correlation in Distributed Intrusion Detection System Using Mobile Agent / Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi
  • A Novel Architecture for the Generation of Picture Based CAPTCHA / S. Benson Edwin Raj, V.S. Jayanthi and V. Muthulakshmi
  • Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images / Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy
  • Covertness Analysis of Subliminal Channels in Legitimate Communication / H.S. Gururaja, M. Seetha and Anjan K. Koundinya
  • Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map / P. Devaraj
  • Misbehavior Detection Based on Ensemble Learning in VANET / Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur
  • An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration / Poonam Saini and Awadhesh Kumar Singh
  • Application of IP Traceback Mechanism to OnlineVoting System / V.K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie and Tulika Pandey
  • Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam.