Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Volume 2 /
Saved in:
Meeting name: | ICCSEA 2012 (2012 : New Delhi, India) |
---|---|
Imprint: | Berlin ; New York : Springer, c2012. |
Description: | 1 online resource (xxiii, 1098 p.) |
Language: | English |
Series: | Advances in intelligent and soft computing, 1867-5662 ; 167 Advances in Intelligent and Soft Computing ; 167. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/8874056 |
Table of Contents:
- Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning / Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate
- A New Secret Key Cipher: C128 / Indrajit Das and R. Saravanan
- Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET) / R. Mynuddin Sulthani and D. Sreenivasa Rao
- Trusted AODV for Trustworthy Routing in MANET / Sridhar Subramanian and Baskaran Ramachandran
- Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network / Arifa Azeez and K. G. Preetha
- Policy Based Traffic in Video on Demand System / Soumen Kanrar
- Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization / Dhanya Sudarsan, P. R. Mahalingam and G. Jisha
- Mobile Data Offloading: Benefits, Issues, and Technological Solutions / Vishal Gupta and Mukesh Kumar Rohil
- Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA / V. R. Gad, R. S. Gad and G. M. Naik
- Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective / Neeraj Kumar and Raees A. Khan
- Modeling Soft Handoffs' Performance in a Realistic CDMA Network / Moses E. Ekpenyong and Enobong Umana
- A Security Approach for Mobile Agent Based Crawler / Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal
- Prospects and Limitations of Organic Thin Film Transistors (OTFTs) / B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal
- Active Learning with Bagging for NLP Tasks / Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta
- Mining Queries for Constructing Materialized Views in a Data Warehouse / T. V. Vijay Kumar, Archana Singh and Gaurav Dubey
- Similarity Based Cluster Analysis on Engineering Materials Data Sets / Doreswamy and K. S. Hemanth
- A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack / Mina Mishra and V. H. Mankar
- Introducing Session Relevancy Inspection in Web Page / Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta
- Way Directing Node Routing Protocol for Mobile Ad Hoc Networks / M. Neelakantappa, A. Damodaram and B. Satyanarayana
- Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask / Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay
- Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation / Minati Mishra, Sunit Kumar and Subhadra Mishra
- Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network / K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob
- Conceptualizing an Adaptive Framework for Pervasive Computing Environment / Akhil Mohan and Nitin Upadhyay
- Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks / B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan
- Hybrid Cluster Validation Techniques / Satish Gajawada and Durga Toshniwal
- Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks / S. Taruna, Sheena Kohli and G. N. Purohit
- Texel Identification Using K-Means Clustering Method / S. Padmavathi, C. Rajalaxmi and K. P. Soman
- Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol / Zulfa Shaikh and Poonam Garg
- Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory / Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al.
- A Secured Transport System by Authenticating Vehicles and Drivers Using RFID / C. K. Marigowda, J. Thriveni and Javid K. Karangi
- Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing / Ajay Kumar and Seema Bawa
- Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies / S. Karthika, A. Kiruthiga and S. Bose
- A Quantitative Model of Operating System Security Evaluation / Hammad Afzali and Hassan Mokhtari
- Energy Management in Zone Routing Protocol (ZRP) / Dilli Ravilla and Chandra Shekar Reddy Putta
- A New Approach for Vertical Handoff in Wireless 4G Network / Vijay Malviya, Praneet Saurabh and Bhupendra Verma
- An Analysis on Critical Information Security Systems / A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques / Sona Kaushik and Shalini Puri
- Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform / Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam
- Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks / Gnana Jayanthi Joseph and S. Albert Rabara
- Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks / Natarajan Meghanathan and Michael Terrell
- OERD - On Demand and Efficient Replication Dereplication / Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh
- A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks / Abhishek Majumder
- Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks / Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed
- Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks / Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal
- A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment / Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi
- A Study of Location-Based Data Replication Techniques and Location Services for MANETs / C. B. Chandrakala, K. V. Prema and K. S. Hareesha
- A Comparative Analysis of Modern Day Network Simulators / Debajyoti Pal
- Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks / K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra
- Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets / Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip
- Reachability Analysis of Mobility Models under Idealistic and Realistic Environments / Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta
- Chaotic Cipher Using Arnolds and Duffings Map / Mina Mishra and V. H. Mankar
- Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks / Samedha S. Naik and Manisha J. Nene
- An Analytical Model for Power Control B-MAC Protocol in WSN / V. Ramchand and D. K. Lobiyal
- Enterprise Mobility - A Future Transformation Strategy for Organizations / Jitendra Maan
- Allocation of Guard Channels for QoS in Hierarchical Cellular Network / Kashish Parwani and G. N. Purohit
- Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment / Medha A. Shah and P. J. Kulkarni
- Energy Aware AODV (EA-AODV) Using Variable Range Transmission / Pinki Nayak, Rekha Agarwal and Seema Verma
- Automatic Speech Recognizer Using Digital Signal Processor / Raghavendra M. Shet and Raghunath S. Holambe
- Pre Decision Based Handoff in Multi Network Environment / Manoj Sharma and R. K. Khola
- A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs / Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri
- A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET / Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki
- Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks / Yingchi Mao and Ting Yin
- ELRM: A Generic Framework for Location Privacy in LBS / Muhamed Ilyas and R. Vijayakumar
- Energy Efficient Administrator Based Secure Routing in MANET / Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee
- Effect of Mobility on Trust in Mobile Ad-Hoc Network / Amit Kumar Raikwar
- Securing Systems after Deployment / David (DJ) Neal and Syed (Shawon) Rahman
- On the Security of Two Certificateless Signature Schemes / Young-Ran Lee
- Information Security Using Chains Matrix Multiplication / Ch. Rupa and P. S. Avadhani
- Formal Security Verification of Secured ECC Based Signcryption Scheme / Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing
- Universal Steganalysis Using Contourlet Transform / V. Natarajan and R. Anitha
- Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms / M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu
- Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM) / Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal
- Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) / Uttam Kr. Mondal and J. K. Mandal
- A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA) / J. K. Mandal and S. K. Ghosal
- A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System / R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam
- Encryption of Images Based on Genetic Algorithm - A New Approach / Jalesh Kumar and S. Nirmala
- Content Based Image Retrieval Using Normalization of Vector Approach to SVM / Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava
- Modified Grøstl: An Efficient Hash Function / Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal
- Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform / V. Anitha and R. Leela Velusamy
- Recovery of Live Evidence from Internet Applications / Ipsita Mohanty and R. Leela Velusamy
- Face Detection Using HMM -SVM Method / Nupur Rajput, Pranita Jain and Shailendra Shrivastava
- High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain / Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik
- Key Management Protocol in WIMAX Revisited / Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade
- Image Authentication Technique Based on DCT (IATDCT) / Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal
- Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs / Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar
- A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks / Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park
- A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers / P. Devaki and G. Raghavendra Rao
- Security Assurance by Efficient Non-repudiation Requirements / S. K. Pandey and K. Mustafa
- Poor Quality Watermark Barcodes Image Enhancement / Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
- Hiding Data in FLV Video File / Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
- Taxonomy of Network Layer Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam
- Implementing Availability State Transition Model to Quantify Risk Factor / Shalini Chandra and Raees Ahmad Khan
- Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System / A. V. Meenakshi, R. Kayalvizhi and S. Asha
- DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing / D. I. George Amalarethinam and P. Muthulakshmi
- A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network / Ved Prakash Bhardwaj and Nitin
- Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database / Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu
- A Grid Fabrication of Traffic Maintenance System / Avula Anitha, Rajeev Wankar and C. Raghavendra Rao
- Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment / Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar
- Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning / Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh
- An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach / M. C. Aswathy and C. Tripti
- Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach / Shikha Tayal and Sandip Vijay
- A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention / Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui
- Resource Based Optimized Decentralized Grid Scheduling Algorithm / Piyush Chauhan and Nitin
- Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management / Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik
- A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA / Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri
- A Policy Driven Business Logic Change Management for Enterprise Web Services / M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran.