Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Volume 2 /
Saved in:
Meeting name: | ICCSEA 2012 (2012 : New Delhi, India) |
---|---|
Imprint: | Berlin ; New York : Springer, c2012. |
Description: | 1 online resource (xxiii, 1098 p.) |
Language: | English |
Series: | Advances in intelligent and soft computing, 1867-5662 ; 167 Advances in Intelligent and Soft Computing ; 167. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/8874056 |
MARC
LEADER | 00000cam a2200000Ka 4500 | ||
---|---|---|---|
001 | 8874056 | ||
003 | ICU | ||
005 | 20200826080851.7 | ||
006 | m d | ||
007 | cr cnu---unuuu | ||
008 | 120524s2012 gw ob 101 0 eng d | ||
020 | |a 9783642301117 (electronic bk.) | ||
020 | |a 3642301118 (electronic bk.) | ||
020 | |z 9783642301100 | ||
035 | |a (OCoLC)794223058 | ||
035 | |a (ICU)8874056 | ||
040 | |a GW5XE |c GW5XE |d ZMC | ||
049 | |a CGUA | ||
082 | 0 | 4 | |a 004 |2 23 |
090 | |a QA75.5 |b .I23 2012 | ||
111 | 2 | |a ICCSEA 2012 |d (2012 : |c New Delhi, India) | |
245 | 1 | 0 | |a Advances in computer science, engineering & applications : |b proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. |n Volume 2 / |c David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.). |
246 | 3 | |a ICCSEA 2012 | |
260 | |a Berlin ; |a New York : |b Springer, |c c2012. | ||
300 | |a 1 online resource (xxiii, 1098 p.) | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
490 | 1 | |a Advances in intelligent and soft computing, |x 1867-5662 ; |v 167 | |
500 | |a International conference proceedings. | ||
504 | |a Includes bibliographical references and author index. | ||
505 | 0 | 0 | |t Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning / |r Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate -- |t A New Secret Key Cipher: C128 / |r Indrajit Das and R. Saravanan -- |t Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET) / |r R. Mynuddin Sulthani and D. Sreenivasa Rao -- |t Trusted AODV for Trustworthy Routing in MANET / |r Sridhar Subramanian and Baskaran Ramachandran -- |t Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network / |r Arifa Azeez and K. G. Preetha -- |t Policy Based Traffic in Video on Demand System / |r Soumen Kanrar -- |t Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization / |r Dhanya Sudarsan, P. R. Mahalingam and G. Jisha -- |t Mobile Data Offloading: Benefits, Issues, and Technological Solutions / |r Vishal Gupta and Mukesh Kumar Rohil -- |t Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA / |r V. R. Gad, R. S. Gad and G. M. Naik -- |t Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective / |r Neeraj Kumar and Raees A. Khan -- |t Modeling Soft Handoffs' Performance in a Realistic CDMA Network / |r Moses E. Ekpenyong and Enobong Umana -- |t A Security Approach for Mobile Agent Based Crawler / |r Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal |
505 | 0 | 0 | |t Prospects and Limitations of Organic Thin Film Transistors (OTFTs) / |r B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal -- |t Active Learning with Bagging for NLP Tasks / |r Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta -- |t Mining Queries for Constructing Materialized Views in a Data Warehouse / |r T. V. Vijay Kumar, Archana Singh and Gaurav Dubey -- |t Similarity Based Cluster Analysis on Engineering Materials Data Sets / |r Doreswamy and K. S. Hemanth -- |t A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack / |r Mina Mishra and V. H. Mankar -- |t Introducing Session Relevancy Inspection in Web Page / |r Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta -- |t Way Directing Node Routing Protocol for Mobile Ad Hoc Networks / |r M. Neelakantappa, A. Damodaram and B. Satyanarayana -- |t Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask / |r Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay -- |t Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation / |r Minati Mishra, Sunit Kumar and Subhadra Mishra -- |t Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network / |r K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob -- |t Conceptualizing an Adaptive Framework for Pervasive Computing Environment / |r Akhil Mohan and Nitin Upadhyay -- |t Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks / |r B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan |
505 | 0 | 0 | |t Hybrid Cluster Validation Techniques / |r Satish Gajawada and Durga Toshniwal -- |t Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks / |r S. Taruna, Sheena Kohli and G. N. Purohit -- |t Texel Identification Using K-Means Clustering Method / |r S. Padmavathi, C. Rajalaxmi and K. P. Soman -- |t Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol / |r Zulfa Shaikh and Poonam Garg -- |t Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory / |r Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al. -- |t A Secured Transport System by Authenticating Vehicles and Drivers Using RFID / |r C. K. Marigowda, J. Thriveni and Javid K. Karangi -- |t Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing / |r Ajay Kumar and Seema Bawa -- |t Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies / |r S. Karthika, A. Kiruthiga and S. Bose -- |t A Quantitative Model of Operating System Security Evaluation / |r Hammad Afzali and Hassan Mokhtari -- |t Energy Management in Zone Routing Protocol (ZRP) / |r Dilli Ravilla and Chandra Shekar Reddy Putta -- |t A New Approach for Vertical Handoff in Wireless 4G Network / |r Vijay Malviya, Praneet Saurabh and Bhupendra Verma |
505 | 0 | 0 | |t An Analysis on Critical Information Security Systems / |r A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques / |r Sona Kaushik and Shalini Puri -- |t Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform / |r Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam -- |t Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks / |r Gnana Jayanthi Joseph and S. Albert Rabara -- |t Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks / |r Natarajan Meghanathan and Michael Terrell -- |t OERD - On Demand and Efficient Replication Dereplication / |r Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh -- |t A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks / |r Abhishek Majumder -- |t Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks / |r Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed -- |t Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks / |r Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal -- |t A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment / |r Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi -- |t A Study of Location-Based Data Replication Techniques and Location Services for MANETs / |r C. B. Chandrakala, K. V. Prema and K. S. Hareesha |
505 | 0 | 0 | |t A Comparative Analysis of Modern Day Network Simulators / |r Debajyoti Pal -- |t Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks / |r K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra -- |t Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets / |r Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip -- |t Reachability Analysis of Mobility Models under Idealistic and Realistic Environments / |r Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta -- |t Chaotic Cipher Using Arnolds and Duffings Map / |r Mina Mishra and V. H. Mankar -- |t Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks / |r Samedha S. Naik and Manisha J. Nene -- |t An Analytical Model for Power Control B-MAC Protocol in WSN / |r V. Ramchand and D. K. Lobiyal -- |t Enterprise Mobility - A Future Transformation Strategy for Organizations / |r Jitendra Maan -- |t Allocation of Guard Channels for QoS in Hierarchical Cellular Network / |r Kashish Parwani and G. N. Purohit -- |t Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment / |r Medha A. Shah and P. J. Kulkarni -- |t Energy Aware AODV (EA-AODV) Using Variable Range Transmission / |r Pinki Nayak, Rekha Agarwal and Seema Verma -- |t Automatic Speech Recognizer Using Digital Signal Processor / |r Raghavendra M. Shet and Raghunath S. Holambe -- |t Pre Decision Based Handoff in Multi Network Environment / |r Manoj Sharma and R. K. Khola |
505 | 0 | 0 | |t A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs / |r Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri -- |t A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET / |r Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki -- |t Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks / |r Yingchi Mao and Ting Yin -- |t ELRM: A Generic Framework for Location Privacy in LBS / |r Muhamed Ilyas and R. Vijayakumar -- |t Energy Efficient Administrator Based Secure Routing in MANET / |r Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee -- |t Effect of Mobility on Trust in Mobile Ad-Hoc Network / |r Amit Kumar Raikwar -- |t Securing Systems after Deployment / |r David (DJ) Neal and Syed (Shawon) Rahman -- |t On the Security of Two Certificateless Signature Schemes / |r Young-Ran Lee -- |t Information Security Using Chains Matrix Multiplication / |r Ch. Rupa and P. S. Avadhani -- |t Formal Security Verification of Secured ECC Based Signcryption Scheme / |r Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing -- |t Universal Steganalysis Using Contourlet Transform / |r V. Natarajan and R. Anitha -- |t Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms / |r M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu -- |t Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM) / |r Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal -- |t Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) / |r Uttam Kr. Mondal and J. K. Mandal |
505 | 0 | 0 | |t A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA) / |r J. K. Mandal and S. K. Ghosal -- |t A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System / |r R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam -- |t Encryption of Images Based on Genetic Algorithm - A New Approach / |r Jalesh Kumar and S. Nirmala -- |t Content Based Image Retrieval Using Normalization of Vector Approach to SVM / |r Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava -- |t Modified Grøstl: An Efficient Hash Function / |r Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal -- |t Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform / |r V. Anitha and R. Leela Velusamy -- |t Recovery of Live Evidence from Internet Applications / |r Ipsita Mohanty and R. Leela Velusamy -- |t Face Detection Using HMM -SVM Method / |r Nupur Rajput, Pranita Jain and Shailendra Shrivastava -- |t High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain / |r Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik -- |t Key Management Protocol in WIMAX Revisited / |r Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade -- |t Image Authentication Technique Based on DCT (IATDCT) / |r Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal -- |t Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs / |r Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar |
505 | 0 | 0 | |t A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks / |r Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park -- |t A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers / |r P. Devaki and G. Raghavendra Rao -- |t Security Assurance by Efficient Non-repudiation Requirements / |r S. K. Pandey and K. Mustafa -- |t Poor Quality Watermark Barcodes Image Enhancement / |r Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar -- |t Hiding Data in FLV Video File / |r Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar -- |t Taxonomy of Network Layer Attacks in Wireless Mesh Network / |r K. Ganesh Reddy and P. Santhi Thilagam -- |t Implementing Availability State Transition Model to Quantify Risk Factor / |r Shalini Chandra and Raees Ahmad Khan -- |t Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System / |r A. V. Meenakshi, R. Kayalvizhi and S. Asha -- |t DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing / |r D. I. George Amalarethinam and P. Muthulakshmi -- |t A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network / |r Ved Prakash Bhardwaj and Nitin -- |t Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database / |r Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu |
505 | 0 | 0 | |t A Grid Fabrication of Traffic Maintenance System / |r Avula Anitha, Rajeev Wankar and C. Raghavendra Rao -- |t Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment / |r Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar -- |t Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning / |r Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh -- |t An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach / |r M. C. Aswathy and C. Tripti -- |t Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach / |r Shikha Tayal and Sandip Vijay -- |t A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention / |r Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui -- |t Resource Based Optimized Decentralized Grid Scheduling Algorithm / |r Piyush Chauhan and Nitin -- |t Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management / |r Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik -- |t A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA / |r Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri -- |t A Policy Driven Business Logic Change Management for Enterprise Web Services / |r M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran. |
650 | 0 | |a Computer science |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101220 | |
650 | 0 | |a Computer networks |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101222 | |
650 | 0 | |a Computer networks |x Management |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101494 | |
650 | 0 | |a Software engineering |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008111658 | |
650 | 7 | |a Computer networks. |2 fast |0 http://id.worldcat.org/fast/fst00872297 | |
650 | 7 | |a Computer networks |x Management. |2 fast |0 http://id.worldcat.org/fast/fst00872323 | |
650 | 7 | |a Computer science. |2 fast |0 http://id.worldcat.org/fast/fst00872451 | |
650 | 7 | |a Software engineering. |2 fast |0 http://id.worldcat.org/fast/fst01124185 | |
653 | 4 | |a Engineering. | |
653 | 4 | |a Software engineering. | |
653 | 4 | |a Data mining. | |
653 | 4 | |a Telecommunication. | |
653 | 4 | |a Computational Intelligence. | |
653 | 4 | |a Communications Engineering, Networks. | |
653 | 4 | |a Software Engineering/Programming and Operating Systems. | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 http://id.worldcat.org/fast/fst01423772 | |
700 | 1 | |a Wyld, David C. |0 http://id.loc.gov/authorities/names/nb99043146 |1 http://viaf.org/viaf/312859761 | |
700 | 1 | |a Žižka, Jan |0 http://id.loc.gov/authorities/names/no94039828 |1 http://viaf.org/viaf/84295768 | |
700 | 1 | |a Nagamalai, Dhinaharan. |0 http://id.loc.gov/authorities/names/no2011005178 |1 http://viaf.org/viaf/167130070 | |
830 | 0 | |a Advances in Intelligent and Soft Computing ; |v 167. | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-30111-7 |y SpringerLink |
903 | |a HeVa | ||
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i e9878558-f0dc-5238-98cb-ee57b2bc4ea1 |s 1ad9361c-121d-5cf8-bb04-74341f4cbd8f |
928 | |t Library of Congress classification |a QA75.5 .I23 2012 |l Online |c UC-FullText |u http://dx.doi.org/10.1007/978-3-642-30111-7 |z SpringerLink |g ebooks |i 11488021 |