top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Frontiers of combining systems : 8th International Symposium, FroCoS 2011, Saarbrücken, Germany, October 5-7, 2011 : proceedings / Cesare Tinelli, Viorica Sofronie-Stokkermans (eds.).
Frontiers of combining systems : 8th International Symposium, FroCoS 2011, Saarbrücken, Germany, October 5-7, 2011 : proceedings / Cesare Tinelli, Viorica Sofronie-Stokkermans (eds.).
Creatore [FroCoS (Symposium) (8th : 2011 : Saarbrücken, Germany)]
Estensione 1 online resource (viii, 274 pages) : illustrations (some color).
Disciplina 005.1/31
Accesso persona Tinelli, C. (Cesare)
Sofronie-Stokkermans, Viorica
Soggetto non controllato Computer science
Software engineering
Computer software
Logic design
Artificial intelligence
Artificial Intelligence (incl. Robotics)
Mathematical Logic and Formal Languages
Logics and Meanings of Programs
Algorithm Analysis and Problem Complexity
Programming Techniques
ISBN 9783642243646
3642243649
9783642243639
3642243630
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9369995
[FroCoS (Symposium) (8th : 2011 : Saarbrücken, Germany)]  
Materiale a stampa
Lo trovi qui: Stanford University
Transactions on data hiding and multimedia security VI / Yun Q. Shi [and others] (eds.).
Transactions on data hiding and multimedia security VI / Yun Q. Shi [and others] (eds.).
Estensione 1 online resource (xii, 108 pages) : illustrations.
Disciplina 005.8/2
Accesso persona Shi, Yun Q.
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Optical pattern recognition
Systems and Data Security
Algorithm Analysis and Problem Complexity
Pattern Recognition
ISBN 9783642245565
3642245560
9783642245558
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Markovian Rake Transform for Digital Image Tampering Detection -- Embedding Binary Watermarks In Dual-Tree Complex Wavelets Domain for Access Control of Digital Images -- Robust Watermarking of Compressed JPEG Images in Encrypted Domain -- A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units -- Histogram-Based Image Hashing for Searching Content-Preserving Copies.
Record Nr. STANFORD-a9393934
Materiale a stampa
Lo trovi qui: Stanford University
Biometric recognition : 6th Chinese Conference, CCBR 2011, Beijing, China, December 3-4, 2011, proceedings / edited by Zhenan Sun [and others]
Biometric recognition : 6th Chinese Conference, CCBR 2011, Beijing, China, December 3-4, 2011, proceedings / edited by Zhenan Sun [and others]
Creatore [Chinese Conference on Biometric Recognition (6th : 2011 : Beijing, China)]
Estensione 1 online resource (xiv, 290 pages) : illustrations (some color).
Disciplina 006.4
Accesso persona Sun, Zhenan
Soggetto non controllato Computer science
Computer software
Computer graphics
Computer vision
Optical pattern recognition
Biometrics
Pattern Recognition
Image Processing and Computer Vision
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
ISBN 9783642254499
3642254497
9783642254482
3642254489
Classificazione BIO 110f
DAT 770f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro; Title; Preface; Organization; Table of Contents; Face; Video-Based Face Recognition: State of the Art; Introduction; Video-Image Face Recognition; Video-Video Face Recognition; Feature Vector Based Methods; Distribution of Faces in Videos; Dynamic Changes of Faces in Videos; Video Face Database; Conclusion; References; Face Recognition with Directional Local Binary Patterns; Introduction; Directional Local Binary Patterns (DLBP); Classification; Experiments; Results on the FERET Database; Results on the PolyU-NIRFD Database; Conclusion; References
A Novel Feature Extraction Method for Face Recognition under Different Lighting ConditionsIntroduction; Outline of Locally Adaptive Regression Kernels Descriptor; Image Decomposition Based on Locally Adaptive Regression Kernels Descriptors (ID-LARK); Image Decomposition and Feature Representation; Relationship to LARK; Experiments; Experiment Using the Extend Yale B Database; Experiment Using the PIE Database; Conclusions; References; Large Scale Identity Deduplication Using Face Recognition Based on Facial Feature Points; Introduction; Stability of 105 Facial Feature Points
Improved Face Recognition SystemIntroduction of THFR System; Improved Algorithm of Face Recognition; Algorithm of Deduplication; Experimental Results; Normal Query Application; Deduplication Application; Conclusion; References; A Sparse Local Feature Descriptor for Robust Face Recognition; Introduction; Overview and Analysis of SIFT Features; Overview of SIFT Features; Analysis of SIFT Features; Proposed Sparse Local Feature Descriptor; Sparse Local Feature Descriptor ( SLFD); Matching Criterion; Experiments; Verification Experiments and Discussion; Performance of the Proposed Method
ConclusionReferences; Asymmetric Facial Shape Based on Symmetry Assumption; Introduction; Reflectance Model; Reflectance Model; Fitting Compared; Shape Recovery; Symmetry; Shape Recovery; Experimental Results; Face Relighting; Shape Recovery; Conclusion; References; Fuzzy Cyclic Random Mapping for Face Recognition Based on MD-RiuLBP Feature; Introduction; The Realization of FCRM; The Framework of FCRM; Face Feature Extraction; Random Mapping; Feature Binarization; Template Generation in Registration Stage; Key Extraction and Judgment in Authentication and Identification
Experimental AnalysisValidation of Binarization and Random Mapping; Performance of Authentication; Performance of Identification; Conclusions; References; Color Face Recognition Based on Statistically Orthogonal Analysis of Projection Transforms; Introduction; Statistically Orthogonal Analysis (SOA); Projection Transform of R Component; Projection Transform of G Component; Projection Transform of B Component; Realization Algorithm of SOA; Experiments; Conclusions; References; Real-Time Head Pose Estimation Using Random Regression Forests; Introduction; Related Work
Record Nr. STANFORD-a9393935
[Chinese Conference on Biometric Recognition (6th : 2011 : Beijing, China)]  
Materiale a stampa
Lo trovi qui: Stanford University
Computational geometry, graphs and applications : 9th International Conference, CGGA 2010, Dalian, China, November 3-6, 2010, revised selected papers / Jin Akiyama [and others] (eds.).
Computational geometry, graphs and applications : 9th International Conference, CGGA 2010, Dalian, China, November 3-6, 2010, revised selected papers / Jin Akiyama [and others] (eds.).
Creatore [CGGA 2010 (2010 : Dalian, China)]
Estensione 1 online resource (viii, 225 pages) : illustrations.
Disciplina 004/.36
Accesso persona Akiyama, J.
Soggetto non controllato Computer science
Data structures (Computer science)
Computer software
Computational complexity
Computer graphics
Algorithms
Discrete groups
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Convex and Discrete Geometry
ISBN 9783642249839
3642249833
3642249825
9783642249822
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9408439
[CGGA 2010 (2010 : Dalian, China)]  
Materiale a stampa
Lo trovi qui: Stanford University
Swarm, evolutionary, and memetic computing [electronic resource] : second International Conference, SEMCCO 2011, Visakhapatnam, Andhra Pradesh, India, December 19-21, 2011, proceedings / Bijaya Ketan Panigrahi...[et al.] (eds.).
Swarm, evolutionary, and memetic computing [electronic resource] : second International Conference, SEMCCO 2011, Visakhapatnam, Andhra Pradesh, India, December 19-21, 2011, proceedings / Bijaya Ketan Panigrahi...[et al.] (eds.).
Creatore [International Conference on Swarm, Evolutionary and Memetic Computing (2nd : 2011 : Vishakhapatnam, India)]
Estensione 1 online resource (2 v.)
Accesso persona Panigrahi, Bijaya Ketan
Soggetto non controllato Computer science
Computer Communication Networks
Computer software
Artificial intelligence
Optical pattern recognition
Computation by Abstract Devices
Artificial Intelligence (incl. Robotics)
Algorithm Analysis and Problem Complexity
Pattern Recognition
Programming Techniques
ISBN 9783642271724 (pt. 1 : electronic bk.)
3642271723 (pt. 1 : electronic bk.)
9783642272424 (pt. 2 : electronic bk.)
3642272428 (pt. 2 : electronic bk.)
9783642271717 (pt. 1)
9783642272417 (pt. 2)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9438878
[International Conference on Swarm, Evolutionary and Memetic Computing (2nd : 2011 : Vishakhapatnam, India)]  
Materiale a stampa
Lo trovi qui: Stanford University
Smart card research and advanced applications : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers / Emmanuel Prouff (ed.).
Smart card research and advanced applications : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011 : revised selected papers / Emmanuel Prouff (ed.).
Creatore [CARDIS (Conference) (10th : 2011 : Leuven, Belgium)]
Estensione 1 online resource (xi, 335 pages) : illustrations.
Disciplina 006.24/6
Accesso persona Prouff, Emmanuel
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
ISBN 9783642272578
3642272576
9783642272561
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9438883
[CARDIS (Conference) (10th : 2011 : Leuven, Belgium)]  
Materiale a stampa
Lo trovi qui: Stanford University
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.).
Creatore [International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]
Estensione 1 online resource (ix, 380 pages).
Disciplina 005.8
Accesso persona Christianson, Bruce
Soggetto non controllato Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 9783642258671
3642258670
9783642258664
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Alice Doesn't Live Here Anymore (Transcript) / Bruce Christianson -- His Late Master's Voice: Barking for Location Privacy / Mike Burmester -- His Late Master's Voice (Transcript of Discussion) / Mike Burmester -- Can We Fix the Security Economics of Federated Authentication? / Ross Anderson -- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) / Ross Anderson -- Pico: No More Passwords! / -- Pico: No More Passwords! (Transcript of Discussion) / Frank Stajano -- Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords / Joseph Bonneau -- Getting Web Authentication Right (Transcript of Discussion) / Joseph Bonneau -- When Context Is Better Than Identity: Authentication / Context Using Empirical Channels / Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe -- When Context Is Better Than Identity (Transcript of Discussion) / Bangdao Chen -- Selective Location Blinding Using Hash Chains / Gabriele Lenzini, Sjouke Mauw and Jun Pang -- Selective Location Blinding Using Hash Chains (Transcript of Discussion) / Sjouke Mauw -- Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces / Alf Zugenmaier -- Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion) / Alf Zugenmaier -- How to Sync with Alice / Feng Hao and Peter Y.A. Ryan -- How to Sync with Alice (Transcript of Discussion) / Feng Hao -- Attack Detection vs. Privacy -- How to Find the Link or How to Hide It? / Jiérí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda -- Attack Detection vs Privacy -- How to Find the Link or How to Hide It (Transcript of Discussion) / Jiérí Kůr and Andriy Stetsko -- The Sense of Security and a Countermeasure for the False Sense / Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka -- The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion) / James Malcolm -- Towards a Theory of Trust in Networks of Humans and Computers / Virgil Gligor and Jeannette M. Wing -- Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion) / Virgil Gligor -- Gearing Up: How to Eat Your Cryptocake and Still Have It / Alex Shafarenko and Bruce Christianson -- Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion) / Alex Shafarenko -- Make Noise and Whisper: A Solution to Relay Attacks / Omar Choudary and Frank Stajano -- Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion) / Omar Choudary -- Scrambling for Lightweight Censorship Resistance / Joseph Bonneau and Rubin Xu -- Scrambling for Lightweight Censorship Resistance (Transcript of Discussion) / Rubin Xu -- The Metaplace Security Model / Michael Roe -- The Metaplace Security Model (Transcript of Discussion) / Michael Roe -- One-Way Cryptography / Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al. -- One-Way Cryptography (Transcript of Discussion) / Matt Blaze -- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort) / Jonathan Anderson, Frank Stajano and Robert N.M. Watson -- How to Keep Bad Papers Out of Conferences (Transcript of Discussion) / Jonathan Anderson.
Record Nr. STANFORD-a9504079
[International Workshop on Security Protocols (19th : 2011 : Cambridge, England)]  
Materiale a stampa
Lo trovi qui: Stanford University
Graph drawing : 19th international symposium, GD 2011, Eindhoven, the Netherlands, September 21-23, 2011 : revised selected papers / Marc van Kreveld, Bettina Speckmann (eds.).
Graph drawing : 19th international symposium, GD 2011, Eindhoven, the Netherlands, September 21-23, 2011 : revised selected papers / Marc van Kreveld, Bettina Speckmann (eds.).
Creatore [GD (Symposium) (19th : 2011 : Eindhoven, Netherlands)]
Estensione 1 online resource (xiv, 458 pages) : illustrations.
Disciplina 006.6
Accesso persona Kreveld, Marc van.
Speckmann, Bettina
Soggetto non controllato Computer science
Computer software
Computational complexity
Discrete Mathematics in Computer Science
Math Applications in Computer Science
Algorithm Analysis and Problem Complexity
Models and Principles
Symbolic and Algebraic Manipulation
User Interfaces and Human Computer Interaction
ISBN 9783642258787
3642258786
3642258778
9783642258770
Classificazione 54.73
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9518188
[GD (Symposium) (19th : 2011 : Eindhoven, Netherlands)]  
Materiale a stampa
Lo trovi qui: Stanford University
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Creatore [Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]
Estensione 1 online resource (vi, 224 pages) : illustrations.
Disciplina 005.8
Accesso persona Mödersheim, Sebastian
Palamidessi, Catuscia
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data encryption (Computer science)
Computer software
Computers and Society
Algorithm Analysis and Problem Complexity
Programming Languages, Compilers, Interpreters
ISBN 9783642273759
3642273750
9783642273742
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. STANFORD-a9518531
[Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (2011 : Saarbrücken, Germany)]  
Materiale a stampa
Lo trovi qui: Stanford University
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Creatore [ADCONS (Conference) (2011 : Surathkal, India)]
Estensione 1 online resource (xvii, 641 pages).
Disciplina 004
Accesso persona Thilagam, P. Santhi
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Computer software
Information storage and retrieval systems
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Systems and Data Security
Information Storage and Retrieval
ISBN 9783642292804
3642292801
3642292798
9783642292798
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A New Small World Lattice / Abhishek Parakh and Subhash Kak -- SLA -- Driven Dynamic Resource Allocation on Clouds / Siddesh G.M. and Srinivasa K.G. -- An Intelligent Cloud System Adopting File Pre-fetching / Jagadeesh Balasubramaniyan and Sumalatha Ramachandran -- Replication Infrastructure for RESTful Web Services / Marcin Bazydło, Szymon Francuzik, Cezary Sobaniec and Dariusz Wawrzyniak -- Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network / Joon-Mo Yang, Jun-Yong Park and Ryum-Duck Oh -- Content Based Service Discovery in Semantic Web Services Using WordNet / D. Paulraj and S. Swamynathan -- Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions / Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya and Adithi Shenoy -- Reconfigurable Web Service Composition Using Belief Revision / Deivamani Mallayya and Baskaran Ramachandran -- Semantic Web Service Discovery with Structural Level Matching of Operations / PonHarshavardhanan, J. Akilandeswari and K.A. Anjali Krishna -- A Novel Way of Tracking People in an Indoor Area / Aditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal and Arun Agrahara Somasundara.
Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study / Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan and J. Nagaraju -- Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition / J. Rekha, J. Bhattacharya and S. Majumder -- An Approach for Color Edge Detection with Automatic Threshold Detection / Arpitha M.D., Megha P. Arakeri and G. Ram Mohan Reddy -- Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method / Anand T.V., Madhu S. Nair and Rao Tatavarti -- Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers / Praveen Cyriac and Philomina Simon -- Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation / A. Benjamin Joseph and Baskaran Ramachandran -- Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering / T. Ashwini Reddy, K. Renuka Devi and Suryakanth V. Gangashetty -- A Sensitive Attribute Based Clustering Method for k-Anonymization / Pawan Bhaladhare and Devesh Jinwala.
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method / Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy -- Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery / Sudha Subramani and Sathiyabhama Balasubramaniam -- Clustering Biological Data Using Voronoi Diagram / Damodar Reddy Edla and Prasanta K. Jana -- Knowledge Management Techniques for Analysis of Clinical Databases / T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan -- Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System / P.S. Hiremath and Parashuram Bannigidad -- Combining Load Balancing with Shared Storage and Primary Backup Replicaton / Marcin Bazydło -- Smart Playlist Generation Using Data Mining Techniques / Prafulla Kalapatapu and Aruna Malapati -- Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors / Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar and Ankush Mittal -- EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment / K.R. Guruprasad -- PEAL-Packed Executable AnaLysis / Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki and Smita Naval.
Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms / Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K. -- Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch / J. Jasper and T Aruldoss Albert Victoire -- Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment / D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem and S. Gomathi Sundari -- Recent Advancements in Parallel Algorithms for String Matching on Computing Models -- A Survey and Experimental Results / Chinta Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy -- Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology / Rakesh Kumar Jha and Upena D. Dalal -- Scalable Video Delivery over Peer-to-Peer Network / Karunakar A.K., Younsong Qio and Brian Lee -- K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments / Łukasz Piątkowski -- Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks / Anshuman Biswas, Banani Saha and Saswati Guha.
Data Distribution Service on Top of FlexRay Vehicle Networks / Houda Jaouani, Rim Bouhouch, Wafa Najjar and Salem Hasnaoui -- CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs / Raviteja B.L., Annappa B. and Mohit P. Tahiliani -- Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks / Harigovindan V.P., A.V. Babu and Lillykutty Jacob -- CBRM -- Cluster Based Replica Management in Mobile Adhoc Networks / Rajeev Kumar, Prashant Kumar and Naveen Chauhan -- A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell / S. Nandakumar and Sibaram Khara -- An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network / Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal -- Strong Minimum Interference Topology for Wireless Sensor Networks / B.S. Panda and D. Pushparaj Shetty -- Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering / Lakshmi Priya M. and Lalit K. Awasthi -- CAs-based QoS Scheme for Remote Health Monitoring over WMSN / Bhargavi K. and Sathish Babu B.
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs / N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and L.M. Patnaik -- Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks / Pratyay Kuila and Prasanta K. Jana -- Node -- Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks -- A Survey and Conceptual Modeling / Muni Venkateswarlu K., K. Chandra Sekaran and A. Kandasamy -- Self Healing Wireless Sensor Network / Sumathi S. and Chandrasekaran M. -- Contention Detection and Minimization in All Optical Routers / Surinder Singh and Meenakshi Garg -- FARED: Fast Adapting RED Gateways for TCP/IP Networks / Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju -- An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks / Shreesha Kashyap, Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R. -- Obstacle Aware Routing in 3D Integrated Circuits / Prasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das and Parthasarathi Dasgupta -- A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism / J. Hanumanthappa and Manjaiah D.H. -- Consistency Maintenance of Modern Security Policies / Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak and Michał Szychowiak.
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation / P. Vijayakumar, S. Bose and A. Kannan -- Reputation-Based Trust for Mobile Agents / Priyanka Dadhich, Kamlesh Dutta and M.C. Govil -- Anonymity in Attribute-Based Group Signatures / Bhumika K. Patel and Devesh Jinwala -- Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography / K. Kumar, J. Nafeesa Begum and V. Sumathy -- Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext / Nishant Doshi and Devesh Jinwala -- SQL Injection Attack Mechanisms and Prevention Techniques / Roshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam and Dipankar Saha -- Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks / Abhinav Bhandari, A.L. Sangal and Krishan Kumar Saluja -- Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed / Ketki Arora, Krishan Kumar and Monika Sachdeva -- A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation / V. Shanmughaneethi, Regan Abraham and S. Swamynathan.
Correlation in Distributed Intrusion Detection System Using Mobile Agent / Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi -- A Novel Architecture for the Generation of Picture Based CAPTCHA / S. Benson Edwin Raj, V.S. Jayanthi and V. Muthulakshmi -- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images / Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy -- Covertness Analysis of Subliminal Channels in Legitimate Communication / H.S. Gururaja, M. Seetha and Anjan K. Koundinya -- Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map / P. Devaraj -- Misbehavior Detection Based on Ensemble Learning in VANET / Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur -- An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration / Poonam Saini and Awadhesh Kumar Singh -- Application of IP Traceback Mechanism to OnlineVoting System / V.K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie and Tulika Pandey -- Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam.
Record Nr. STANFORD-a9599669
[ADCONS (Conference) (2011 : Surathkal, India)]  
Materiale a stampa
Lo trovi qui: Stanford University