Vai al contenuto principale della pagina

Advances in computer science, engineering & applications [electronic resource] : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Volume 2 / David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.).



(Visualizza formato Marc21)    (visualizza in BIBRAME 2.0)

Creatore: ICCSEA 2012 (2012 : New Delhi, India)
Titolo: Advances in computer science, engineering & applications [electronic resource] : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Volume 2 / David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.).
Link to work: Advances in computer science, engineering & applications : Volume 2 Visualizza cluster
Pubblicazione: Berlin ; New York : Springer, c2012
Estensione: 1 online resource (xxiii, 1098 p.)
Disciplina: 004
Titolo uniforme di collana: Advances in Intelligent and Soft Computing ; 167.
Genere/Forma: Electronic books
Index term-Uncontrolled: Engineering
Software engineering
Data mining
Telecommunication
Computational Intelligence
Communications Engineering, Networks
Software Engineering/Programming and Operating Systems
Soggetto non controllato: Engineering
Software engineering
Data mining
Telecommunication
Computational Intelligence
Communications Engineering, Networks
Software Engineering/Programming and Operating Systems
Termine d'indicizzazione-Occupazione: Engineering
Software engineering
Data mining
Telecommunication
Computational Intelligence
Communications Engineering, Networks
Software Engineering/Programming and Operating Systems
Creatori/Collaboratori: Wyld, David C.
Zizka, Jan.
Nagamalai, Dhinaharan
Note generali: International conference proceedings.
Contenuto supplementare: Includes bibliographical references and author index.
Nota di contenuto: Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning / Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate -- A New Secret Key Cipher: C128 / Indrajit Das and R. Saravanan -- Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET) / R. Mynuddin Sulthani and D. Sreenivasa Rao -- Trusted AODV for Trustworthy Routing in MANET / Sridhar Subramanian and Baskaran Ramachandran -- Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network / Arifa Azeez and K. G. Preetha -- Policy Based Traffic in Video on Demand System / Soumen Kanrar -- Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization / Dhanya Sudarsan, P. R. Mahalingam and G. Jisha -- Mobile Data Offloading: Benefits, Issues, and Technological Solutions / Vishal Gupta and Mukesh Kumar Rohil -- Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA / V. R. Gad, R. S. Gad and G. M. Naik -- Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective / Neeraj Kumar and Raees A. Khan -- Modeling Soft Handoffs' Performance in a Realistic CDMA Network / Moses E. Ekpenyong and Enobong Umana -- A Security Approach for Mobile Agent Based Crawler / Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal
Prospects and Limitations of Organic Thin Film Transistors (OTFTs) / B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal -- Active Learning with Bagging for NLP Tasks / Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta -- Mining Queries for Constructing Materialized Views in a Data Warehouse / T. V. Vijay Kumar, Archana Singh and Gaurav Dubey -- Similarity Based Cluster Analysis on Engineering Materials Data Sets / Doreswamy and K. S. Hemanth -- A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack / Mina Mishra and V. H. Mankar -- Introducing Session Relevancy Inspection in Web Page / Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta -- Way Directing Node Routing Protocol for Mobile Ad Hoc Networks / M. Neelakantappa, A. Damodaram and B. Satyanarayana -- Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask / Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay -- Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation / Minati Mishra, Sunit Kumar and Subhadra Mishra -- Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network / K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob -- Conceptualizing an Adaptive Framework for Pervasive Computing Environment / Akhil Mohan and Nitin Upadhyay -- Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks / B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan
Hybrid Cluster Validation Techniques / Satish Gajawada and Durga Toshniwal -- Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks / S. Taruna, Sheena Kohli and G. N. Purohit -- Texel Identification Using K-Means Clustering Method / S. Padmavathi, C. Rajalaxmi and K. P. Soman -- Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol / Zulfa Shaikh and Poonam Garg -- Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory / Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al. -- A Secured Transport System by Authenticating Vehicles and Drivers Using RFID / C. K. Marigowda, J. Thriveni and Javid K. Karangi -- Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing / Ajay Kumar and Seema Bawa -- Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies / S. Karthika, A. Kiruthiga and S. Bose -- A Quantitative Model of Operating System Security Evaluation / Hammad Afzali and Hassan Mokhtari -- Energy Management in Zone Routing Protocol (ZRP) / Dilli Ravilla and Chandra Shekar Reddy Putta -- A New Approach for Vertical Handoff in Wireless 4G Network / Vijay Malviya, Praneet Saurabh and Bhupendra Verma
An Analysis on Critical Information Security Systems / A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques / Sona Kaushik and Shalini Puri -- Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform / Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam -- Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks / Gnana Jayanthi Joseph and S. Albert Rabara -- Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks / Natarajan Meghanathan and Michael Terrell -- OERD - On Demand and Efficient Replication Dereplication / Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh -- A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks / Abhishek Majumder -- Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks / Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed -- Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks / Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal -- A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment / Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi -- A Study of Location-Based Data Replication Techniques and Location Services for MANETs / C. B. Chandrakala, K. V. Prema and K. S. Hareesha
A Comparative Analysis of Modern Day Network Simulators / Debajyoti Pal -- Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks / K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra -- Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets / Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip -- Reachability Analysis of Mobility Models under Idealistic and Realistic Environments / Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta -- Chaotic Cipher Using Arnolds and Duffings Map / Mina Mishra and V. H. Mankar -- Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks / Samedha S. Naik and Manisha J. Nene -- An Analytical Model for Power Control B-MAC Protocol in WSN / V. Ramchand and D. K. Lobiyal -- Enterprise Mobility - A Future Transformation Strategy for Organizations / Jitendra Maan -- Allocation of Guard Channels for QoS in Hierarchical Cellular Network / Kashish Parwani and G. N. Purohit -- Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment / Medha A. Shah and P. J. Kulkarni -- Energy Aware AODV (EA-AODV) Using Variable Range Transmission / Pinki Nayak, Rekha Agarwal and Seema Verma -- Automatic Speech Recognizer Using Digital Signal Processor / Raghavendra M. Shet and Raghunath S. Holambe -- Pre Decision Based Handoff in Multi Network Environment / Manoj Sharma and R. K. Khola
A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs / Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri -- A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET / Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki -- Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks / Yingchi Mao and Ting Yin -- ELRM: A Generic Framework for Location Privacy in LBS / Muhamed Ilyas and R. Vijayakumar -- Energy Efficient Administrator Based Secure Routing in MANET / Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee -- Effect of Mobility on Trust in Mobile Ad-Hoc Network / Amit Kumar Raikwar -- Securing Systems after Deployment / David (DJ) Neal and Syed (Shawon) Rahman -- On the Security of Two Certificateless Signature Schemes / Young-Ran Lee -- Information Security Using Chains Matrix Multiplication / Ch. Rupa and P. S. Avadhani -- Formal Security Verification of Secured ECC Based Signcryption Scheme / Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing -- Universal Steganalysis Using Contourlet Transform / V. Natarajan and R. Anitha -- Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms / M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu -- Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM) / Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal -- Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) / Uttam Kr. Mondal and J. K. Mandal
A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA) / J. K. Mandal and S. K. Ghosal -- A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System / R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam -- Encryption of Images Based on Genetic Algorithm - A New Approach / Jalesh Kumar and S. Nirmala -- Content Based Image Retrieval Using Normalization of Vector Approach to SVM / Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava -- Modified Grøstl: An Efficient Hash Function / Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal -- Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform / V. Anitha and R. Leela Velusamy -- Recovery of Live Evidence from Internet Applications / Ipsita Mohanty and R. Leela Velusamy -- Face Detection Using HMM -SVM Method / Nupur Rajput, Pranita Jain and Shailendra Shrivastava -- High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain / Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik -- Key Management Protocol in WIMAX Revisited / Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade -- Image Authentication Technique Based on DCT (IATDCT) / Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal -- Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs / Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar
A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks / Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park -- A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers / P. Devaki and G. Raghavendra Rao -- Security Assurance by Efficient Non-repudiation Requirements / S. K. Pandey and K. Mustafa -- Poor Quality Watermark Barcodes Image Enhancement / Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar -- Hiding Data in FLV Video File / Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar -- Taxonomy of Network Layer Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam -- Implementing Availability State Transition Model to Quantify Risk Factor / Shalini Chandra and Raees Ahmad Khan -- Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System / A. V. Meenakshi, R. Kayalvizhi and S. Asha -- DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing / D. I. George Amalarethinam and P. Muthulakshmi -- A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network / Ved Prakash Bhardwaj and Nitin -- Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database / Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu
A Grid Fabrication of Traffic Maintenance System / Avula Anitha, Rajeev Wankar and C. Raghavendra Rao -- Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment / Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar -- Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning / Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh -- An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach / M. C. Aswathy and C. Tripti -- Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach / Shikha Tayal and Sandip Vijay -- A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention / Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui -- Resource Based Optimized Decentralized Grid Scheduling Algorithm / Piyush Chauhan and Nitin -- Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management / Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik -- A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA / Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri -- A Policy Driven Business Logic Change Management for Enterprise Web Services / M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran.
Collana: Advances in intelligent and soft computing, 1867-5662 ; 167
Varianti del titolo: ICCSEA 2012
ISBN: 9783642301117 (electronic bk.)
3642301118 (electronic bk.)
9783642301100
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 8874056
Localizzazioni e accesso elettronico http://dx.doi.org/10.1007/978-3-642-30111-7
Lo trovi qui: University of Chicago
Item: Permalink to OPAC