default search action
1st ACC 2011: Kochi, Kerala, India
- Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi:
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings. Communications in Computer and Information Science 191, Springer 2011, ISBN 978-3-642-22713-4
Database and Information Systems
- Korra Sathya Babu, Sanjay Kumar Jena:
Balancing between Utility and Privacy for k-Anonymity. 1-8 - Krishna Khajaria, Manoj Kumar:
Evaluation of Approaches for Modeling of Security in Data Warehouses. 9-18 - Radha Senthilkumar, C. Lingeshwaraa, Arputharaj Kannan:
Content Based Compression for Quicx System. 19-29
Distributed Software Development
- Ashfa Umber, Imran Sarwar Bajwa, M. Asif Naeem:
NL-Based Automated Software Requirements Elicitation and Specification. 30-39 - Fateh Boutekkouk, Zakaria Tolba, Mustapha Okab:
Automatic Interface Generation between Incompatible Intellectual Properties (IPs) from UML Models. 40-47 - Vaithianathan Geetha, Niladhuri Sreenath:
Deadlock Prevention in Distributed Object Oriented Systems. 48-57 - Puneet Mittal, Satwinder Singh, Karanjeet Singh Kahlon:
Identification of Error Prone Classes for Fault Prediction Using Object Oriented Metrics. 58-68 - N. Kayarvizhy, S. Kanmani:
An Automated Tool for Computing Object Oriented Metrics Using XML. 69-79 - B. Athira, Philip Samuel:
Traceability Matrix for Regression Testing in Distributed Software Development. 80-87 - N. Sivakumar, K. Vivekanandan, S. Sandhya:
Testing Agent-Oriented Software by Measuring Agent's Property Attributes. 88-98
Human Computer Interaction and Interface
- Sneha G. Gondane, M. Dhivya, D. Shyam:
Classifier Feature Extraction Techniques for Face Recognition System under Variable Illumination Conditions. 99-108 - Adity Saikia, Shyamanta M. Hazarika:
Bispectrum Analysis of EEG in Estimation of Hand Movement. 109-118 - Adity Saikia, Nayan M. Kakoty, Shyamanta M. Hazarika:
Wavelet Selection for EMG Based Grasp Recognition through CWT. 119-129 - Adityo Ashari Wirjono, Z. S. Ricky Lincoln, William, Dewi Agushinta R.:
Information Visualization for Tourist and Travelling in Indonesia. 130-137 - Dewi Agushinta R., Bima Shakti Ramadhan Utomo, Denny Satria, Jennifer Sabrina Karla Karamoy, Nuniek Nur Sahaya:
The Smart Goal Monitoring System. 138-145 - Kezia Velda Roberta, Lulu Mawaddah Wisudawati, Muhammad Razi, Dewi Agushinta R.:
Web Based Virtual Agent for Tourism Guide in Indonesia. 146-153 - Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Md. Mostafizur Rahman, Mohammad Nasiruddin, Md. Abdul Latif, Mohammad Nurul Huda:
Local Feature or Mel Frequency Cepstral Coefficients - Which One Is Better for MLN-Based Bangla Speech Recognition? 154-161 - Rohit Agrawal, C. Sasi Kumar, Darshan Moodgal:
Power Optimization Techniques for Segmented Digital Displays. 162-171 - Santa Maiti, Debasis Samanta, Satya Ranjan Das, Monalisa Sarma:
Language Independent Icon-Based Interface for Accessing Internet. 172-182 - Preety Singh, Deepika Gupta, Vijay Laxmi, Manoj Singh Gaur:
Contribution of Oral Periphery on Visual Speech Intelligibility. 183-190
ICT
- Sugam Sharma, U. Sunday Tim, Shashi K. Gadia, Patrick Smith:
Geo-spatial Pattern Determination for SNAP Eligibility in Iowa Using GIS. 191-200 - Paul Anu, Paul Varghese:
Project Management Model for e-Governance in the Context of Kerala State. 201-209 - Deka Ganesh Chandra, Dutta Borah Malaya:
ICT Its Role in e-Governance and Rural Development. 210-222 - C. K. Raju, Ashok Mishra:
Enhancing Sustainability of Software: A Case-Study with Monitoring Software for MGNREGS in India. 223-233
Internet and Web Computing
- P. Dharanyadevi, P. Dhavachelvan, S. K. V. Jayakumar, Ramachandran Baskaran, V. S. K. Venkatachalapathy:
Proficient Discovery of Service in Event Driven Service Oriented Architecture. 234-242 - G. Poornalatha, Prakash S. Raghavendra:
Web User Session Clustering Using Modified K-Means Algorithm. 243-252 - Achuthan Nair Rajimol, Gopalakrishna Kurup Raju:
FOL-Mine - A More Efficient Method for Mining Web Access Pattern. 253-262 - S. Saritha, G. Santhosh Kumar:
Semantic Association Mining on Spatial Patterns in Medical Images. 263-272 - Anjali Thukral, Varun Mendiratta, Abhishek Behl, Hema Banati, Punam Bedi:
FCHC: A Social Semantic Focused Crawler. 273-283 - Vibha Gaur, Neeraj Kumar Sharma:
A Dynamic Seller Selection Model for an Agent Mediated e-Market. 284-295 - Bhaskara Rao Boddu, Valli Kumari Vatsavayi:
A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm. 296-306 - Ash Mohammad Abbas, Ravindra Kumar:
A Client Perceived Performance Evaluation of Web Servers. 307-316 - Imran Ahmed, Sunil Kumar Kopparapu:
Enhanced Quality of Experience through IVR Mashup to Access Same Service Multiple Operator Services. 317-326 - K. Saruladha, Gnanasekaran Aghila, A. Bhuvaneswary:
Information Content Based Semantic Similarity Approaches for Multiple Biomedical Ontologies. 327-336 - Harilal Parasuram, Bipin Nair, Krishnashree Achuthan, Shyam Diwakar:
Taking Project Tiger to the Classroom: A Virtual Lab Case Study. 337-348 - Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri:
Green Communications through Network Redesign. 349-357 - D. Devakumari, K. Thangavel:
Unsupervised Modified Adaptive Floating Search Feature Selection. 358-365 - M. Thilagu, R. Nadarajan:
Fast and Efficient Mining of Web Access Sequences Using Prefix Based Minimized Trees. 366-373
Mobile Computing
- Muhammad Awais, Ashwani Singh, Guido Masera:
Scalable, High Throughput LDPC Decoder for WiMAX (802.16e) Applications. 374-385 - Gustavo Jiménez, Yezid Donoso:
Unique Mechanism of Selection of Traffic Flow Templates for Mobility IP Protocols Using Multihoming and IP Flow Mobility on the NGMN. 386-396 - Sharmishta Desai, R. K. Bedi, B. N. Jagdale, V. M. Wadhai:
Elliptic Curve Cryptography for Smart Phone OS. 397-406 - Anjani Kumar Rai, Shivendu Mishra, Pramod Narayan Tripathi:
An Improved Secure Authentication Protocol for WiMAX with Formal Verification. 407-416 - Suparna Biswas, Sarmistha Neogy:
Secured Fault Tolerant Mobile Computing. 417-429 - Suneeta Chawla, Apurv Nigam, Pankaj Doke, Sanjay Kimbahune:
A Survey of Virtualization on Mobiles. 430-441 - Abhishek Varshney, Mohammed Abdul Qadeer:
Mobile Peer to Peer Spontaneous and Real-Time Social Networking. 442-451 - Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. 452-459
Multi Agent Systems
- Vikram Saralaya, J. K. Kishore, Sateesh Reddy, Radhika M. Pai, Sanjay Singh:
Modeling and Verification of Chess Game Using NuSMV. 460-470 - Muhammad Tahir, Dominique Gaïti, Majid Iqbal Khan:
SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents. 471-479
Multimedia and Video Systems
- Pradipta K. Banerjee, Jayanta K. Chandra, Asit K. Datta:
Face Detection and Eye Localization in Video by 3D Unconstrained Filter and Neural Network. 480-489 - Noopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, S. S. Anju:
Secret Image Sharing Using Steganography with Different Cover Images. 490-497 - Aishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, S. S. Anju:
A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods. 498-505 - Sattvik Sharma, R. Sreevathsan, M. V. V. N. S. Srikanth, C. Harshith, T. Gireesh Kumar:
Cognitive Environment for Pervasive Learners. 506-515 - Anand Singh Jalal, Vrijendra Singh:
A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet Transform. 516-524 - Mukhtar Azeem, Majid Iqbal Khan, Arfan Nazir:
File System Level Circularity Requirement. 525-534 - Azzat A. Al-Sadi, El-Sayed M. El-Alfy:
An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing. 535-544
Parallel and Distributed Algorithms
- Neela Madheswari Annamalai, R. S. D. Wahida Banu:
Communication Aware Co-Scheduling For Parallel Job Scheduling In Cluster Computing. 545-554 - Rajendra Prasath:
Shared Resource Allocation Using Token Based Control Strategy in Augmented Ring Networks. 555-567 - Ved Prakash Bhardwaj, Nitin, Vipin Tyagi:
An Algorithmic Approach to Minimize the Conflicts in an Optical Multistage Interconnection Network. 568-576 - Peter Joseph Basil Morris, Saikat Roy Chowdhury, Debasish Deb:
An Efficent Methodology for Realization of Parallel FFT for Large Data Set. 577-584 - Suchetana Chakraborty, Sushanta Karmakar:
A Novel Approach for Adaptive Data Gathering in Sensor Networks by Dynamic Spanning Tree Switching. 585-594 - Vikas Agarwal, Pansoo Kim, Deock-Gil Oh, Do-Seob Ahn:
Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter for DVB-S2 Receivers. 595-603
Security, Trust and Privacy
- Zahid Akhtar, Sandeep Kale:
Security Analysis of Multimodal Biometric Systems against Spoof Attacks. 604-611 - Amitava Nag, Jyoti Prakash Singh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A Novel Copyright Protection Scheme Using Visual Cryptography. 612-619 - Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
A Weighted Location Based LSB Image Steganography Technique. 620-627 - SK Hafizul Islam, G. P. Biswas:
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. 628-635 - N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Covariance Based Steganography Using DCT. 636-647 - Usha Banerjee, A. Swaminathan:
An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures. 648-655 - R. Jayaprakash, V. Uma:
Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM. 656-665 - Jan Vykopal:
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. 666-675 - Hamed Saljooghinejad, Wilson Naik Rathore:
Multi Application User Profiling for Masquerade Attack Detection. 676-684 - Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais:
A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers. 685-692 - Justy Jameson, K. K. Sherly:
SQL Injection Disclosure Using BLAH Algorithm. 693-702
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.