default search action
ADCONS 2013: Mangalore, India
- 2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, December 15-17, 2013. IEEE 2013
Advanced Computing
- S. Dere Kundan, G. Ram Mohana Reddy:
Projection and Interaction with Ad-hoc Interfaces on Non-planar Surfaces. 1-6 - Ram Prasad Mohanty, Ashok Kumar Turuk, Bibhudatta Sahoo:
Performance Evaluation of Multi-core Processors with Varied Interconnect Networks. 7-11 - Udaya M. Visweswara, Atul Gohad, Sachin Kumar Yadav, N. V. S. Karthik, S. Mahesh Babu:
Smarter Commerce: NLP SpokenWeb Based B2B Messaging. 12-17 - Shilpi Bose, Chandra Das, Tamaghna Gangopadhyay, Samiran Chattopadhyay:
A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data. 18-23 - Tushar Bisht, Kishore Kothapalli:
An Empirical Study of Two MIS Algorithms. 24-28 - Kapil Agarwal, Durga Toshniwal, Pramod K. Gupta, Vikas Khurana, Pushp Upadhyay:
Anomaly Detection and Similarity Search in Neutron Monitor Data for Predictive Maintenance of Nuclear Power Plants. 29-34 - Demian Antony D'Mello, Mevida S. Crasta, Roanne N. Gomes, V. Abhishiktha, Shareeta J. D'Souzav:
A Broker Based E-learning Service Integration and Execution Architecture for the Complex Requirements on Learning Resources. 35-40
Image and Speech Processing
- Yogesh H. Dandawate, Sneha Kinlekar:
Rivers and Coastlines Detection in Multispectral Satellite Images Using Level Set Method and Modified Chan Vese Algorithm. 41-46 - P. Sudheer Reddy, Palanisamy Ponnusamy:
Multitaper Spectrum Sensing Using Sinusoidal Tapers. 47-50 - Shrinivas D. Desai, Kavita V. Horadi, P. Navaneet, B. Niriksha, V. Siddeshvar:
Detection and Removal of Cracks from Digitized Paintings and Images by User Intervention. 51-55 - P. V. Sudeep, Palanisamy Ponnusamy, Jeny Rajan:
A Hybrid Model for Rician Noise Reduction in MRI. 56-61 - M. Geetha, P. V. Aswathi, M. R. Kaimal:
A Stroke Based Representation of Indian Sign Language Signs Incorporating Global and Local Motion Information. 62-67 - Varun P. Gopi, M. Pavithran, T. Nishanth, S. Balaji, V. Rajavelu, Ponnusamy Palanisamy:
Image Denoising Based on Undecimated Double Density Dual Tree Wavelet Transform and Modified Firm Shrinkage. 68-73 - Tanushri Mittal, Anurag Barthwal, Shashidhar G. Koolagudi:
Age Approximation from Speech Using Gaussian Mixture Models. 74-78 - M. Reenu, Dayana David, S. S. Aneesh Raj, Madhu S. Nair:
Wavelet Based Sharp Features (WASH): An Image Quality Assessment Metric Based on HVS. 79-83 - Steven Lawrence Fernandes, G. Josemin Bala, P. Nagabhushan, S. K. Mandal:
Robust Face Recognition in the Presence of Noises and Blurring Effects by Fusing Appearance Based Techniques and Sparse Representation. 84-89
Cloud Computing and Database Systems
- S. R. Surya, Philomina Simon:
Automatic Cloud Detection Using Spectral Rationing and Fuzzy Clustering. 90-95 - Sridevi Saralaya, Rio G. L. D'Souza:
A Review of Monitoring Techniques for Service Based Applications. 96-101 - Amit Kr Mandal, Suvamoy Changder, Anirban Sarkar:
Selection of Services for Data-Centric Cloud Applications: A QoS Based Approach. 102-107 - Melwyn D'Souza, V. S. Ananthanarayana:
Cloud Based Service Registry for Location Based Mobile Web Services System. 108-111 - Ajay Prasad, Divya Gupta, Prasun Chakrabarti:
Monitoring Users in Cloud Computing: Evaluating the Centralized Approach. 112-116 - Dharavath Ramesh, Chiranjeev Kumar:
A Scalable Matching Approach Based Density Function for Heterogeneous Database Integration. 117-123 - Sunil F. Rodd, Umakanth P. Kulkarni:
Adaptive Self-Tuning Techniques for Performance Tuning of Database Systems: A Fuzzy-Based Approach. 124-129
Computer Networking
- Ramanna Havinal, Girish V. Attimarad, M. N. Giriprasad:
Empirical Power Control Schema Using Physical Layer Optimization in MANET. 130-135 - Debasis Das, Rajiv Misra:
Improvised k-hop Neighbourhood Knowledge Based Routing in Wireless Sensor Networks. 136-141 - Dharmeet Singh Hora, Piyush Bansal, Kishore Kothapalli, Kannan Srinathan:
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results. 142-147 - Dipin Kollencheri Puthenveettil, Ankur Chauhan:
Peer-to-Peer and Cellular Connection Management. 148-153 - S. Stephen Vaithiya, S. Mary Saira Bhanu:
Ontology Based Resource Discovery Mechanism for Mobile Grid Environment. 154-159 - M. Surendar, P. Muthuchidambaranathan:
Channel Coded STBC-OFDM Based Transmit Diversity Systems in Multipath Rayleigh-Fading Channels. 160-163 - Ravitheja Tetali, Joy Bose, Tasleem Arif:
Browser with Clustering of Web Documents. 164-168 - Kavitha Ammayappan:
Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSM. 169-174 - K. Srinivas, A. Venugopal Reddy, A. Nagaraju:
Network Coding-Aware Neighbor Based Topology Control in MANETs. 175-180 - D. G. Narayan, Uma Mudengudi, G. Pavan, S. Suraj:
CL-ILD: A Cross Layer Interference-Load and Delay Aware Routing Metric for Multi-radio Wireless Mesh Network. 181-186 - Ganesh Dadaji Sonwane, Beerappa R. Chandavarkar:
Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. 187-192 - Prabhjot Singh, Beerappa R. Chandavarkar, Srishti Arora, Neha Agrawal:
Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution. 193-198 - B. Naresh Kumar Reddy, M. Naraimhulu, S. V. Sai Prasad, K. Khaja Babu:
An Efficient Online Mileage Indicator by Using Sensors for New Generation Automobiles. 199-203 - Abhijit Das, Shibendu Debbarma:
Performance of Jumbo Sized Data on Jumbo Frame and Ethernet Frame Using UDP over IPv4/IPv6. 204-207 - Jayalakshmi G. Naragund, R. M. Banakar:
Analysis of HWMP-ETX Routing in Wireless Mesh Networks. 208-213
Information Security
- P. Syam Kumar, R. Subramanian, D. Thamizh Selvam:
An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing. 214-219 - A. Sharath Kumar, Sanjay Singh:
Detection of User Cluster with Suspicious Activity in Online Social Networking Sites. 220-225 - Manoj V. Thomas, K. Chandrasekaran:
An Access Control Model for Cloud Computing Environments. 226-231 - Gurpreet Singh, Supriya:
Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES. 232-237 - Nidhi Grover, Amar Kumar Mohapatra:
Digital Image Authentication Model Based on Edge Adaptive Steganography. 238-242 - Rekha Bhatia, Manpreet Singh:
Trust Based Privacy Preserving Access Control in Web Services Paradigm. 243-246 - Parvez Faruki, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Ammar Bharmal:
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets. 247-252 - V. Spoorthi, Balaji Rajendran, K. Chandrasekaran:
Key Update Mechanism in PKI: Study and a New Approach. 253-258 - Anila Thankappan, M. Wilscy:
(2, 3) RIVC Scheme in Visual Cryptography without Pixel Expansion. 259-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.