Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Volume 2 /

Saved in:
Bibliographic Details
Meeting name:ICCSEA 2012 (2012 : New Delhi, India)
Imprint:Berlin ; New York : Springer, c2012.
Description:1 online resource (xxiii, 1098 p.)
Language:English
Series:Advances in intelligent and soft computing, 1867-5662 ; 167
Advances in Intelligent and Soft Computing ; 167.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8874056
Hidden Bibliographic Details
Varying Form of Title:ICCSEA 2012
Other authors / contributors:Wyld, David C.
Žižka, Jan
Nagamalai, Dhinaharan.
ISBN:9783642301117 (electronic bk.)
3642301118 (electronic bk.)
9783642301100
Notes:International conference proceedings.
Includes bibliographical references and author index.

MARC

LEADER 00000cam a2200000Ka 4500
001 8874056
003 ICU
005 20200826080851.7
006 m d
007 cr cnu---unuuu
008 120524s2012 gw ob 101 0 eng d
020 |a 9783642301117 (electronic bk.) 
020 |a 3642301118 (electronic bk.) 
020 |z 9783642301100 
035 |a (OCoLC)794223058 
035 |a (ICU)8874056 
040 |a GW5XE  |c GW5XE  |d ZMC 
049 |a CGUA 
082 0 4 |a 004  |2 23 
090 |a QA75.5  |b .I23 2012 
111 2 |a ICCSEA 2012  |d (2012 :  |c New Delhi, India) 
245 1 0 |a Advances in computer science, engineering & applications :  |b proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India.  |n Volume 2 /  |c David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.). 
246 3 |a ICCSEA 2012 
260 |a Berlin ;  |a New York :  |b Springer,  |c c2012. 
300 |a 1 online resource (xxiii, 1098 p.) 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Advances in intelligent and soft computing,  |x 1867-5662 ;  |v 167 
500 |a International conference proceedings. 
504 |a Includes bibliographical references and author index. 
505 0 0 |t Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning /  |r Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate --  |t A New Secret Key Cipher: C128 /  |r Indrajit Das and R. Saravanan --  |t Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET) /  |r R. Mynuddin Sulthani and D. Sreenivasa Rao --  |t Trusted AODV for Trustworthy Routing in MANET /  |r Sridhar Subramanian and Baskaran Ramachandran --  |t Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network /  |r Arifa Azeez and K. G. Preetha --  |t Policy Based Traffic in Video on Demand System /  |r Soumen Kanrar --  |t Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization /  |r Dhanya Sudarsan, P. R. Mahalingam and G. Jisha --  |t Mobile Data Offloading: Benefits, Issues, and Technological Solutions /  |r Vishal Gupta and Mukesh Kumar Rohil --  |t Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA /  |r V. R. Gad, R. S. Gad and G. M. Naik --  |t Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective /  |r Neeraj Kumar and Raees A. Khan --  |t Modeling Soft Handoffs' Performance in a Realistic CDMA Network /  |r Moses E. Ekpenyong and Enobong Umana --  |t A Security Approach for Mobile Agent Based Crawler /  |r Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal 
505 0 0 |t Prospects and Limitations of Organic Thin Film Transistors (OTFTs) /  |r B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal --  |t Active Learning with Bagging for NLP Tasks /  |r Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta --  |t Mining Queries for Constructing Materialized Views in a Data Warehouse /  |r T. V. Vijay Kumar, Archana Singh and Gaurav Dubey --  |t Similarity Based Cluster Analysis on Engineering Materials Data Sets /  |r Doreswamy and K. S. Hemanth --  |t A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack /  |r Mina Mishra and V. H. Mankar --  |t Introducing Session Relevancy Inspection in Web Page /  |r Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta --  |t Way Directing Node Routing Protocol for Mobile Ad Hoc Networks /  |r M. Neelakantappa, A. Damodaram and B. Satyanarayana --  |t Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask /  |r Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay --  |t Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation /  |r Minati Mishra, Sunit Kumar and Subhadra Mishra --  |t Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network /  |r K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob --  |t Conceptualizing an Adaptive Framework for Pervasive Computing Environment /  |r Akhil Mohan and Nitin Upadhyay --  |t Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks /  |r B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan 
505 0 0 |t Hybrid Cluster Validation Techniques /  |r Satish Gajawada and Durga Toshniwal --  |t Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks /  |r S. Taruna, Sheena Kohli and G. N. Purohit --  |t Texel Identification Using K-Means Clustering Method /  |r S. Padmavathi, C. Rajalaxmi and K. P. Soman --  |t Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol /  |r Zulfa Shaikh and Poonam Garg --  |t Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory /  |r Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al. --  |t A Secured Transport System by Authenticating Vehicles and Drivers Using RFID /  |r C. K. Marigowda, J. Thriveni and Javid K. Karangi --  |t Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing /  |r Ajay Kumar and Seema Bawa --  |t Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies /  |r S. Karthika, A. Kiruthiga and S. Bose --  |t A Quantitative Model of Operating System Security Evaluation /  |r Hammad Afzali and Hassan Mokhtari --  |t Energy Management in Zone Routing Protocol (ZRP) /  |r Dilli Ravilla and Chandra Shekar Reddy Putta --  |t A New Approach for Vertical Handoff in Wireless 4G Network /  |r Vijay Malviya, Praneet Saurabh and Bhupendra Verma 
505 0 0 |t An Analysis on Critical Information Security Systems /  |r A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques /  |r Sona Kaushik and Shalini Puri --  |t Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform /  |r Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam --  |t Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks /  |r Gnana Jayanthi Joseph and S. Albert Rabara --  |t Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks /  |r Natarajan Meghanathan and Michael Terrell --  |t OERD - On Demand and Efficient Replication Dereplication /  |r Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh --  |t A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks /  |r Abhishek Majumder --  |t Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks /  |r Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed --  |t Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks /  |r Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal --  |t A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment /  |r Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi --  |t A Study of Location-Based Data Replication Techniques and Location Services for MANETs /  |r C. B. Chandrakala, K. V. Prema and K. S. Hareesha 
505 0 0 |t A Comparative Analysis of Modern Day Network Simulators /  |r Debajyoti Pal --  |t Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks /  |r K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra --  |t Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets /  |r Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip --  |t Reachability Analysis of Mobility Models under Idealistic and Realistic Environments /  |r Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta --  |t Chaotic Cipher Using Arnolds and Duffings Map /  |r Mina Mishra and V. H. Mankar --  |t Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks /  |r Samedha S. Naik and Manisha J. Nene --  |t An Analytical Model for Power Control B-MAC Protocol in WSN /  |r V. Ramchand and D. K. Lobiyal --  |t Enterprise Mobility - A Future Transformation Strategy for Organizations /  |r Jitendra Maan --  |t Allocation of Guard Channels for QoS in Hierarchical Cellular Network /  |r Kashish Parwani and G. N. Purohit --  |t Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment /  |r Medha A. Shah and P. J. Kulkarni --  |t Energy Aware AODV (EA-AODV) Using Variable Range Transmission /  |r Pinki Nayak, Rekha Agarwal and Seema Verma --  |t Automatic Speech Recognizer Using Digital Signal Processor /  |r Raghavendra M. Shet and Raghunath S. Holambe --  |t Pre Decision Based Handoff in Multi Network Environment /  |r Manoj Sharma and R. K. Khola 
505 0 0 |t A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs /  |r Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri --  |t A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET /  |r Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki --  |t Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks /  |r Yingchi Mao and Ting Yin --  |t ELRM: A Generic Framework for Location Privacy in LBS /  |r Muhamed Ilyas and R. Vijayakumar --  |t Energy Efficient Administrator Based Secure Routing in MANET /  |r Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee --  |t Effect of Mobility on Trust in Mobile Ad-Hoc Network /  |r Amit Kumar Raikwar --  |t Securing Systems after Deployment /  |r David (DJ) Neal and Syed (Shawon) Rahman --  |t On the Security of Two Certificateless Signature Schemes /  |r Young-Ran Lee --  |t Information Security Using Chains Matrix Multiplication /  |r Ch. Rupa and P. S. Avadhani --  |t Formal Security Verification of Secured ECC Based Signcryption Scheme /  |r Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing --  |t Universal Steganalysis Using Contourlet Transform /  |r V. Natarajan and R. Anitha --  |t Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms /  |r M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu --  |t Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM) /  |r Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal --  |t Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) /  |r Uttam Kr. Mondal and J. K. Mandal 
505 0 0 |t A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA) /  |r J. K. Mandal and S. K. Ghosal --  |t A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System /  |r R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam --  |t Encryption of Images Based on Genetic Algorithm - A New Approach /  |r Jalesh Kumar and S. Nirmala --  |t Content Based Image Retrieval Using Normalization of Vector Approach to SVM /  |r Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava --  |t Modified Grøstl: An Efficient Hash Function /  |r Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal --  |t Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform /  |r V. Anitha and R. Leela Velusamy --  |t Recovery of Live Evidence from Internet Applications /  |r Ipsita Mohanty and R. Leela Velusamy --  |t Face Detection Using HMM -SVM Method /  |r Nupur Rajput, Pranita Jain and Shailendra Shrivastava --  |t High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain /  |r Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik --  |t Key Management Protocol in WIMAX Revisited /  |r Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade --  |t Image Authentication Technique Based on DCT (IATDCT) /  |r Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal --  |t Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs /  |r Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar 
505 0 0 |t A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks /  |r Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park --  |t A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers /  |r P. Devaki and G. Raghavendra Rao --  |t Security Assurance by Efficient Non-repudiation Requirements /  |r S. K. Pandey and K. Mustafa --  |t Poor Quality Watermark Barcodes Image Enhancement /  |r Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar --  |t Hiding Data in FLV Video File /  |r Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar --  |t Taxonomy of Network Layer Attacks in Wireless Mesh Network /  |r K. Ganesh Reddy and P. Santhi Thilagam --  |t Implementing Availability State Transition Model to Quantify Risk Factor /  |r Shalini Chandra and Raees Ahmad Khan --  |t Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System /  |r A. V. Meenakshi, R. Kayalvizhi and S. Asha --  |t DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing /  |r D. I. George Amalarethinam and P. Muthulakshmi --  |t A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network /  |r Ved Prakash Bhardwaj and Nitin --  |t Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database /  |r Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu 
505 0 0 |t A Grid Fabrication of Traffic Maintenance System /  |r Avula Anitha, Rajeev Wankar and C. Raghavendra Rao --  |t Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment /  |r Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar --  |t Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning /  |r Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh --  |t An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach /  |r M. C. Aswathy and C. Tripti --  |t Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach /  |r Shikha Tayal and Sandip Vijay --  |t A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention /  |r Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui --  |t Resource Based Optimized Decentralized Grid Scheduling Algorithm /  |r Piyush Chauhan and Nitin --  |t Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management /  |r Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik --  |t A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA /  |r Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri --  |t A Policy Driven Business Logic Change Management for Enterprise Web Services /  |r M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran. 
650 0 |a Computer science  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101220 
650 0 |a Computer networks  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101222 
650 0 |a Computer networks  |x Management  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101494 
650 0 |a Software engineering  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008111658 
650 7 |a Computer networks.  |2 fast  |0 http://id.worldcat.org/fast/fst00872297 
650 7 |a Computer networks  |x Management.  |2 fast  |0 http://id.worldcat.org/fast/fst00872323 
650 7 |a Computer science.  |2 fast  |0 http://id.worldcat.org/fast/fst00872451 
650 7 |a Software engineering.  |2 fast  |0 http://id.worldcat.org/fast/fst01124185 
653 4 |a Engineering. 
653 4 |a Software engineering. 
653 4 |a Data mining. 
653 4 |a Telecommunication. 
653 4 |a Computational Intelligence. 
653 4 |a Communications Engineering, Networks. 
653 4 |a Software Engineering/Programming and Operating Systems. 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Wyld, David C.  |0 http://id.loc.gov/authorities/names/nb99043146  |1 http://viaf.org/viaf/312859761 
700 1 |a Žižka, Jan  |0 http://id.loc.gov/authorities/names/no94039828  |1 http://viaf.org/viaf/84295768 
700 1 |a Nagamalai, Dhinaharan.  |0 http://id.loc.gov/authorities/names/no2011005178  |1 http://viaf.org/viaf/167130070 
830 0 |a Advances in Intelligent and Soft Computing ;  |v 167. 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-30111-7  |y SpringerLink 
903 |a HeVa 
903 |a HeVa 
929 |a eresource 
999 f f |i e9878558-f0dc-5238-98cb-ee57b2bc4ea1  |s 1ad9361c-121d-5cf8-bb04-74341f4cbd8f 
928 |t Library of Congress classification  |a QA75.5 .I23 2012  |l Online  |c UC-FullText  |u http://dx.doi.org/10.1007/978-3-642-30111-7  |z SpringerLink  |g ebooks  |i 11488021