top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Collaboration and technology : 17th international conference, CRIWG 2011, Paraty, Brazil, October 2-7, 2011 : proceedings / Adriana S. Vivacqua, Carl Gutwin, Marcos R.S. Borges (eds.).
Collaboration and technology : 17th international conference, CRIWG 2011, Paraty, Brazil, October 2-7, 2011 : proceedings / Adriana S. Vivacqua, Carl Gutwin, Marcos R.S. Borges (eds.).
Creatore [International Workshop on Groupware (17th : 2011 : Parati, Brazil)]
Estensione 1 online resource (x, 231 pages) : illustrations (some color).
Disciplina 005.3/76
Accesso persona Vivacqua, Adriana S.
Gutwin, Carl
Borges, Marcos R. S. (Marcos Roberto da Silva)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Information storage and retrieval systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 9783642238017
3642238017
3642238009
9783642238000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-005710874
[International Workshop on Groupware (17th : 2011 : Parati, Brazil)]  
Materiale a stampa
Lo trovi qui: New York University
Recent advances in intrusion detection [electronic resource] : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.).
Recent advances in intrusion detection [electronic resource] : 14th international symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011 : proceedings / Robin Sommer, Davide Balzarotti, Gregor Maier (eds.).
Creatore [RAID (Symposium) (14th : 2011 : Menlo Park, Calif.)]
Estensione 1 online resource (x, 397 pages) : illustrations.
Disciplina 005.8
Accesso persona Sommer, Robin
Balzarotti, Davide
Maier, Gregor, 1979-
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data structures (Computer science)
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
Data Structures, Cryptology and Information Theory
ISBN 9783642236440
3642236448
9783642236433
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Minemu: The World's Fastest Taint Tracker / Erik Bosman, Asia Slowinska and Herbert Bos -- Dymo: Tracking Dynamic Code Identity / Bob Gilbert, Richard Kemmerer, Christopher Kruegel and Giovanni Vigna -- Automated Identification of Cryptographic Primitives in Binary Programs / Felix Gröbert, Carsten Willems and Thorsten Holz -- Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode / Yanick Fratantonio, Christopher Kruegel and Giovanni Vigna -- KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware / Stefano Ortolani, Cristiano Giuffrida and Bruno Crispo -- Packed, Printable, and Polymorphic Return-Oriented Programming / Kangjie Lu, Dabi Zou, Weiping Wen and Debin Gao -- On the Expressiveness of Return-into-libc Attacks / Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang and Vincent Freeh, et al. -- Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close / Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou and Salvatore J. Stolfo -- Revisiting Traffic Anomaly Detection Using Software Defined Networking / Syed Akbar Mehdi, Junaid Khalid and Syed Ali Khayam -- Modeling User Search Behavior for Masquerade Detection / Malek Ben Salem and Salvatore J. Stolfo -- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack / Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru and Radu State -- Detecting Traffic Snooping in Tor Using Decoys / Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis and Angelos D. Keromytis -- Cross-Analysis of Botnet Victims: New Insights and Implications / Seungwon Shin, Raymond Lin and Guofei Gu -- Banksafe Information Stealer Detection Inside the Web Browser -- Armin Buescher, Felix Leder and Thomas Siebert -- IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM / Mario Heiderich, Tilman Frosch and Thorsten Holz --tSpam Filtering in Twitter Using Sender-Receiver Relationship / Jonghyuk Song, Sangho Lee and Jong Kim -- Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers / Chao Yang, Robert Chandler Harkreader and Guofei Gu -- Detecting Environment-Sensitive Malware / Martina Lindorfer, Clemens Kolbitsch and Paolo Milani Comparetti -- Defending Embedded Systems with Software Symbiotes / Ang Cui and Salvatore J. Stolfo -- What If You Can't Trust Your Network Card? / Loïc Duflot, Yves-Alexis Perez and Benjamin Morin.
Record Nr. NYU-004374102
[RAID (Symposium) (14th : 2011 : Menlo Park, Calif.)]  
Materiale a stampa
Lo trovi qui: New York University
Grid and pervasive computing workshops : International Workshops, S3E, HWTS, Doctoral Colloquium, Held in Conjunction with GPC 2011, Oulu, Finland, May 11-13, 2011. Revised selected papers / Mika Rautiainen [and others] (eds.).
Grid and pervasive computing workshops : International Workshops, S3E, HWTS, Doctoral Colloquium, Held in Conjunction with GPC 2011, Oulu, Finland, May 11-13, 2011. Revised selected papers / Mika Rautiainen [and others] (eds.).
Creatore [GPC (Conference) (2011 : Oulu, Finland)]
Estensione 1 online resource (xiv, 179 pages).
Disciplina 004
Accesso persona Rautiainen, Mika
Accesso convegno HWTS 2011 (2011 : Oulu, Finland)
S3E 2011 (2011 : Oulu, Finland)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Artificial Intelligence (incl. Robotics)
User Interfaces and Human Computer Interaction
ISBN 9783642279164
3642279163
9783642279157
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004374118
[GPC (Conference) (2011 : Oulu, Finland)]  
Materiale a stampa
Lo trovi qui: New York University
Self-organizing systems : 6th IFIP TC 6 International Workshop, IWSOS 2012, Delft, the Netherlands, March 15-16, 2012. Proceedings / Fernando A. Kuipers, Poul E. Heegaard (eds.).
Self-organizing systems : 6th IFIP TC 6 International Workshop, IWSOS 2012, Delft, the Netherlands, March 15-16, 2012. Proceedings / Fernando A. Kuipers, Poul E. Heegaard (eds.).
Creatore [IWSOS 2012 (2012 : Delft, Netherlands)]
Estensione 1 online resource (xii, 114 pages).
Disciplina 003/.7
Accesso persona Kuipers, Fernando A.
Heegaard, Poul E.
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data mining
Information storage and retrieval systems
Telecommunication
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Communications Engineering, Networks
ISBN 9783642285837
364228583X
3642285821
9783642285820
Classificazione 54.32
54.52
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed Storage Management Using Dynamic Pricing in a Self-Organized Energy Community / Ebisa Negeri and Nico Baken -- Ant-Based Systems for Wireless Networks: Retrospect and Prospects / Laurent Paquereau and Bjarne E. Helvik -- Triadic Motifs and Dyadic Self-Organization in the World Trade Network / Tiziano Squartini and Diego Garlaschelli -- On Measurement of Internal Variables of Complex Self-Organized Systems and Their Relation to Multifractal Spectra / Dalibor Štys, Petr Jizba, Štěpán Papáček, Tomáš Náhlík and Petr Císař -- Self-Organised Routing for Road Networks / Holger Prothmann, Sven Tomforde, Johannes Lyda, Jürgen Branke and Jörg Hähner, et al. -- P2P and Cloud: A Marriage of Convenience for Replica Management / Hanna Kavalionak and Alberto Montresor -- Self-Organizing Spatio-temporal Pattern Formation in Two-Dimensional Daisyworld / Dharani Punithan and R.I. (Bob) McKay -- Heuristic Resource Search in a Self-Organised Distributed Multi Agent System / Muntasir Al-Asfoor, Brendan Neville and Maria Fasli -- A Quantitative Measure, Mechanism and Attractor for Self-Organization in Networked Complex Systems / Georgi Yordanov Georgiev -- MetroNet: A Metropolitan Simulation Model Based on Commuting Processes / Efrat Blumenfeld-Lieberthal and Juval Portugali -- Robustness of Self-Organizing Consensus Algorithms: Initial Results from a Simulation-Based Study / Alexander Gogolev and Christian Bettstetter -- Initial Experiments in Using Communication Swarms to Improve the Performance of Swarm Systems / Stephen M. Majercik.
Record Nr. NYU-004374606
[IWSOS 2012 (2012 : Delft, Netherlands)]  
Materiale a stampa
Lo trovi qui: New York University
Electronic healthcare [electronic resource] : 4th International Conference, eHealth 2011, Málaga, Spain, November 21-23, 2011, Revised selected papers / Patty Kostkova, Martin Szomszor, David Fowler (eds.).
Electronic healthcare [electronic resource] : 4th International Conference, eHealth 2011, Málaga, Spain, November 21-23, 2011, Revised selected papers / Patty Kostkova, Martin Szomszor, David Fowler (eds.).
Creatore [eHealth Conference (4th : 2011 : Málaga, Spain)]
Estensione 1 online resource (xvi, 206 pages).
Disciplina 610.285
Accesso persona Kostkova, Patty
Szomszor, Martin
Fowler, David
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Artificial intelligence
Information Systems Applications (incl. Internet)
Computers and Society
User Interfaces and Human Computer Interaction
Health Informatics
ISBN 9783642292620
3642292623
3642292615
9783642292613
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Session 1: Social Media Analysis -- Social Media: A Systematic Review to Understand the Evidence and Application in Infodemiology / Stacey Guy, Alexandria Ratzki-Leewing, Raphael Bahati and Femida Gwadry-Sridhar -- An Examination of the Behaviour of Young and Older Users of Facebook / Darren Quinn, Liming Chen and Maurice Mulvenna.
Part 2. Session 2: Knowledge Integration and EPR -- An Agile Methodology for IHE-Enabled Deployments / Bruno Alves and Michael Schumacher -- Obstetric Medical Record Processing and Information Retrieval / Miroslav Bursa, Lenka Lhotska, Vaclav Chudacek, Michal Huptych and Jiri Spilka, et al.
Part 3. Session 3: Personalisation and Patient Support Systems -- Health Care Performance Monitoring Using an Inpatient Reference Process Model and Clinical KPIs / Eva Gattnar, Okan Ekinci and Vesselin Detschew -- A Model for a Motivational System Grounded on Value Based Abstract Argumentation Frameworks / Eugenio Di Tullio and Floriana Grasso -- An Assessment of the Potential for Personalization in Patient Decision Aids / Øystein Eiring and Laura Slaughter.
Part 4. Session 4: Early Warning Systems and Mobile Monitoring -- An Analysis of Twitter Messages in the 2011 Tohoku Earthquake / Son Doan, Bao-Khanh Ho Vo and Nigel Collier -- Web-Based Stress Management System Goes Mobile: Considerations of the Design of a Mobile Phone App / Åsa Smedberg and Hélène Sandmark -- Use of SMS for Tsunami Early Warnings at a Table Top Exercise / Vincenzo Lagani, Vasilis Kontogiannis, Panagiotis Argyropaidas and Catherine Chronaki.
Part 5. Session 5: Games and Learning -- Seamless Evaluation of Interactive Digital Storytelling Games: Edugames4All / Patty Kostkova -- Patient-Centered Care as a Learning Process / Jan Aidemark and Linda Askenäs -- Wireless Computer Games and Applications in the Medical Education Curriculum: Adventures in Pedagogy / Juanita Fernando and Nicolette Peters.
Part 6. Session 6: Security, Privacy and Prevention -- The Process of Policy Authoring of Patient-Controlled Privacy Preferences / Thomas Trojer, Basel Katt, Thomas Schabetsberger, Richard Mair and Ruth Breu -- Modelling a User Authorisation and Data Access Framework for Multi-specialty Research Systems in Secondary Health Care / Ire Ogunsina, Sarah N. Lim Choi Keung, Lei Zhao, Gavin Langford and Edward Tyler, et al. -- Software Engineering-Inspired Approach to Prevention Healthcare / Victor Rentea, Andrei Vasilateanu, Radu Ioanitescu and Luca Dan Serbanati.
Part 7. Session 7: Online Support for Professionals and Patients -- Evaluation of a Web-Based Patient Portal for Chronic Disease Management / Stacey Guy, Alexandria Ratzki-Leewing and Femida Gwadry-Sridhar -- Cardio Online Reader/COR: A Web 2.0-Based Tool Aimed at Clinical Decision-Making Support in Cardiology / Vendula Papíková and Miroslav Zvolský.
Part 8. Session 8: Agents in eHealth -- An Agent Based Pervasive Healthcare System: A First Scalability Study / Johannes Krampf, Stefano Bromuri, Michael Schumacher and Juan Ruiz -- An Agent-Based Approach to Real-Time Patient Identification for Clinical Trials / Gareth Tyson, Adel Taweel, Simon Miles, Michael Luck and Tjeerd Van Staa, et al.
Part 9. Session 9: Online Communities of Practice -- The Use of Social Bookmarking by Health Care Students to Create Communities of Practice / Ed de Quincey, Avril Hocking, Josephine O'Gorman, Simon Walker and Liz Bacon -- Engagement in Online Medical Communities of Practice in Healthcare: Analysis of Messages and Social Networks / David Fowler, Martin Szomszor, Simon Hammond, John Lawrenson and Patty Kostkova -- Towards Delivering Disease Support Processes for Patient Empowerment Using Mobile Virtual Communities / Bert-Jan van Beijnum, Pravin Pawar, Lamia Elloumi and Hermie Hermens.
Part 10. Session 10: eHealth Solutions -- E-Health Readiness Assessment for E-Health Framework for Africa: A Case Study of Hospitals in South Africa / Alfred Coleman, Marlien E. Herselman and Dalenca Potass -- The Physical Activity Loyalty Card Scheme: Development and Application of a Novel System for Incentivizing Behaviour Change / Ruth F. Hunter, Michael Davis, Mark A. Tully and Frank Kee.
Part 11. Session 11: Social Media Surveillance -- Tracking Media Reports on the Shiga Toxin-Producing Escherichia coli O104: H4 Outbreak in Germany / Jens P. Linge, Jas Mantero, Flavio Fuart, Jenya Belyaeva and Martin Atkinson, et al. -- Syndromic Classification of Twitter Messages / Nigel Collier and Son Doan -- Towards Spatial Description-Based Integration of Biomedical Atlases / Nurzi Juana Mohd Zaizi and Albert Burger.
Record Nr. NYU-004374805
[eHealth Conference (4th : 2011 : Málaga, Spain)]  
Materiale a stampa
Lo trovi qui: New York University
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Advanced computing, networking and security : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Creatore [ADCONS (Conference) (2011 : Surathkal, India)]
Estensione 1 online resource (xvii, 641 pages).
Disciplina 004
Accesso persona Thilagam, P. Santhi
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Data protection
Computer software
Information storage and retrieval systems
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Systems and Data Security
Information Storage and Retrieval
ISBN 9783642292804
3642292801
3642292798
9783642292798
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A New Small World Lattice / Abhishek Parakh and Subhash Kak -- SLA -- Driven Dynamic Resource Allocation on Clouds / Siddesh G.M. and Srinivasa K.G. -- An Intelligent Cloud System Adopting File Pre-fetching / Jagadeesh Balasubramaniyan and Sumalatha Ramachandran -- Replication Infrastructure for RESTful Web Services / Marcin Bazydło, Szymon Francuzik, Cezary Sobaniec and Dariusz Wawrzyniak -- Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network / Joon-Mo Yang, Jun-Yong Park and Ryum-Duck Oh -- Content Based Service Discovery in Semantic Web Services Using WordNet / D. Paulraj and S. Swamynathan -- Optimal Selection of Web Services for Efficient QoS Driven Web Service Compositions / Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya and Adithi Shenoy -- Reconfigurable Web Service Composition Using Belief Revision / Deivamani Mallayya and Baskaran Ramachandran -- Semantic Web Service Discovery with Structural Level Matching of Operations / PonHarshavardhanan, J. Akilandeswari and K.A. Anjali Krishna -- A Novel Way of Tracking People in an Indoor Area / Aditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal and Arun Agrahara Somasundara.
Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom Study / Tushar Kanti Bera, Samir Kumar Biswas, K. Rajan and J. Nagaraju -- Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language Recognition / J. Rekha, J. Bhattacharya and S. Majumder -- An Approach for Color Edge Detection with Automatic Threshold Detection / Arpitha M.D., Megha P. Arakeri and G. Ram Mohan Reddy -- Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method / Anand T.V., Madhu S. Nair and Rao Tatavarti -- Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers / Praveen Cyriac and Philomina Simon -- Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation / A. Benjamin Joseph and Baskaran Ramachandran -- Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake Engineering / T. Ashwini Reddy, K. Renuka Devi and Suryakanth V. Gangashetty -- A Sensitive Attribute Based Clustering Method for k-Anonymization / Pawan Bhaladhare and Devesh Jinwala.
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method / Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy -- Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery / Sudha Subramani and Sathiyabhama Balasubramaniam -- Clustering Biological Data Using Voronoi Diagram / Damodar Reddy Edla and Prasanta K. Jana -- Knowledge Management Techniques for Analysis of Clinical Databases / T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan -- Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference System / P.S. Hiremath and Parashuram Bannigidad -- Combining Load Balancing with Shared Storage and Primary Backup Replicaton / Marcin Bazydło -- Smart Playlist Generation Using Data Mining Techniques / Prafulla Kalapatapu and Aruna Malapati -- Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors / Durgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar and Ankush Mittal -- EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment / K.R. Guruprasad -- PEAL-Packed Executable AnaLysis / Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki and Smita Naval.
Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms / Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K. -- Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch / J. Jasper and T Aruldoss Albert Victoire -- Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor Environment / D. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem and S. Gomathi Sundari -- Recent Advancements in Parallel Algorithms for String Matching on Computing Models -- A Survey and Experimental Results / Chinta Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy -- Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology / Rakesh Kumar Jha and Upena D. Dalal -- Scalable Video Delivery over Peer-to-Peer Network / Karunakar A.K., Younsong Qio and Brian Lee -- K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments / Łukasz Piątkowski -- Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc Networks / Anshuman Biswas, Banani Saha and Saswati Guha.
Data Distribution Service on Top of FlexRay Vehicle Networks / Houda Jaouani, Rim Bouhouch, Wafa Najjar and Salem Hasnaoui -- CAMP: Congestion Adaptive Multipath Routing Protocol for VANETs / Raviteja B.L., Annappa B. and Mohit P. Tahiliani -- Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks / Harigovindan V.P., A.V. Babu and Lillykutty Jacob -- CBRM -- Cluster Based Replica Management in Mobile Adhoc Networks / Rajeev Kumar, Prashant Kumar and Naveen Chauhan -- A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G Cell / S. Nandakumar and Sibaram Khara -- An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network / Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal -- Strong Minimum Interference Topology for Wireless Sensor Networks / B.S. Panda and D. Pushparaj Shetty -- Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering / Lakshmi Priya M. and Lalit K. Awasthi -- CAs-based QoS Scheme for Remote Health Monitoring over WMSN / Bhargavi K. and Sathish Babu B.
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs / N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and L.M. Patnaik -- Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks / Pratyay Kuila and Prasanta K. Jana -- Node -- Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks -- A Survey and Conceptual Modeling / Muni Venkateswarlu K., K. Chandra Sekaran and A. Kandasamy -- Self Healing Wireless Sensor Network / Sumathi S. and Chandrasekaran M. -- Contention Detection and Minimization in All Optical Routers / Surinder Singh and Meenakshi Garg -- FARED: Fast Adapting RED Gateways for TCP/IP Networks / Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju -- An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks / Shreesha Kashyap, Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R. -- Obstacle Aware Routing in 3D Integrated Circuits / Prasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das and Parthasarathi Dasgupta -- A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism / J. Hanumanthappa and Manjaiah D.H. -- Consistency Maintenance of Modern Security Policies / Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak and Michał Szychowiak.
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation / P. Vijayakumar, S. Bose and A. Kannan -- Reputation-Based Trust for Mobile Agents / Priyanka Dadhich, Kamlesh Dutta and M.C. Govil -- Anonymity in Attribute-Based Group Signatures / Bhumika K. Patel and Devesh Jinwala -- Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography / K. Kumar, J. Nafeesa Begum and V. Sumathy -- Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext / Nishant Doshi and Devesh Jinwala -- SQL Injection Attack Mechanisms and Prevention Techniques / Roshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam and Dipankar Saha -- Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks / Abhinav Bhandari, A.L. Sangal and Krishan Kumar Saluja -- Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed / Ketki Arora, Krishan Kumar and Monika Sachdeva -- A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree Validation / V. Shanmughaneethi, Regan Abraham and S. Swamynathan.
Correlation in Distributed Intrusion Detection System Using Mobile Agent / Zakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi -- A Novel Architecture for the Generation of Picture Based CAPTCHA / S. Benson Edwin Raj, V.S. Jayanthi and V. Muthulakshmi -- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images / Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy -- Covertness Analysis of Subliminal Channels in Legitimate Communication / H.S. Gururaja, M. Seetha and Anjan K. Koundinya -- Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map / P. Devaraj -- Misbehavior Detection Based on Ensemble Learning in VANET / Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur -- An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration / Poonam Saini and Awadhesh Kumar Singh -- Application of IP Traceback Mechanism to OnlineVoting System / V.K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie and Tulika Pandey -- Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network / K. Ganesh Reddy and P. Santhi Thilagam.
Record Nr. NYU-004374875
[ADCONS (Conference) (2011 : Surathkal, India)]  
Materiale a stampa
Lo trovi qui: New York University
LATIN 2012: Theoretical informatics : 10th Latin American Symposium, Arequipa, Peru, April 16-20, 2012. Proceedings / David Fernández-Baca (ed.).
LATIN 2012: Theoretical informatics : 10th Latin American Symposium, Arequipa, Peru, April 16-20, 2012. Proceedings / David Fernández-Baca (ed.).
Creatore [Latin American Symposium on Theoretical Informatics (10th : 2012 : Arequipa, Peru)]
Estensione 1 online resource (xvii, 669 pages).
Disciplina 004
Accesso persona Fernández-Baca, David
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Computer software
Electronic data processing
Computational complexity
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Numeric Computing
Information Systems Applications (incl. Internet)
Computation by Abstract Devices
ISBN 9783642293443
3642293441
9783642293436
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Generalization of the Convex Kakeya Problem / Hee-Kap Ahn, Sang Won Bae, Otfried Cheong, Joachim Gudmundsson and Takeshi Tokuyama, et al. -- Low Complexity Scheduling Algorithm Minimizing the Energy for Tasks with Agreeable Deadlines / Eric Angel, Evripidis Bampis and Vincent Chau -- Bichromatic 2-Center of Pairs of Points / Esther M. Arkin, José Miguel Díaz-Báñez, Ferran Hurtado, Piyush Kumar and Joseph S.B. Mitchell, et al. -- Erdős-Rényi Sequences and Deterministic Construction of Expanding Cayley Graphs / Vikraman Arvind, Partha Mukhopadhyay and Prajakta Nimbhorkar -- A Better Approximation Ratio and an IP Formulation for a Sensor Cover Problem / Rafael da Ponte Barbosa and Yoshiko Wakabayashi -- On the Advice Complexity of the Knapsack Problem / Hans-Joachim Böckenhauer, Dennis Komm, Richard Královič and Peter Rossmanith -- Reoptimization of Some Maximum Weight Induced Hereditary Subgraph Problems / Nicolas Boria, Jérôme Monnot and Vangelis Th. Paschos -- On Plane Constrained Bounded-Degree Spanners / Prosenjit Bose, Rolf Fagerberg, André van Renssen and Sander Verdonschot.
Space-Efficient Approximation Scheme for Circular Earth Mover Distance / Joshua Brody, Hongyu Liang and Xiaoming Sun -- Density Classification on Infinite Lattices and Trees / Ana Bušić, Nazim Fatès, Jean Mairesse and Irène Marcovici -- Coloring Planar Homothets and Three-Dimensional Hypergraphs / Jean Cardinal and Matias Korman -- An Equivariance Theorem with Applications to Renaming / Armando Castañeda, Maurice Herlihy and Sergio Rajsbaum -- Renaming Is Weaker Than Set Agreement But for Perfect Renaming: A Map of Sub-consensus Tasks / Armando Castañeda, Damien Imbs, Sergio Rajsbaum and Michel Raynal -- Pseudorandomness of a Random Kronecker Sequence / Eda Cesaratto and Brigitte Vallée -- Revisiting the Cache Miss Analysis of Multithreaded Algorithms / Richard Cole and Vijaya Ramachandran -- Parameterized Complexity of MaxSat above Average / Robert Crowston, Gregory Gutin, Mark Jones, Venkatesh Raman and Saket Saurabh -- Solving the 2-Disjoint Connected Subgraphs Problem Faster Than 2n / Marek Cygan, Marcin Pilipczuk, Michał Pilipczuk and Jakub Onufry Wojtaszczyk.
On the Non-progressive Spread of Influence through Social Networks / MohammadAmin Fazli, Mohammad Ghodsi, Jafar Habibi, Pooya Jalaly Khalilabadi and Vahab Mirrokni, et al. -- Forbidden Patterns / Johannes Fischer, Travis Gagie, Tsvi Kopelowitz, Moshe Lewenstein and Veli Mäkinen, et al. -- Structural Complexity of Multiobjective NP Search Problems / Krzysztof Fleszar, Christian Glaßer, Fabian Lipp, Christian Reitwießner and Maximilian Witek -- k-Gap Interval Graphs / Fedor V. Fomin, Serge Gaspers, Petr Golovach, Karol Suchan and Stefan Szeider, et al. -- Decidability Classes for Mobile Agents Computing / Pierre Fraigniaud and Andrzej Pelc -- NE Is Not NP Turing Reducible to Nonexponentially Dense NP Sets / Bin Fu -- Efficient Arbitrary and Resolution Proofs of Unsatisfiability for Restricted Tree-Width / Martin Fürer -- Indexed Multi-pattern Matching / Travis Gagie, Kalle Karhu, Juha Kärkkäinen, Veli Mäkinen and Leena Salmela, et al. -- New Lower Bound on Max Cut of Hypergraphs with an Application to r-Set Splitting / Archontia C. Giannopoulou, Sudeshna Kolay and Saket Saurabh.
Cache Me If You Can: Capacitated Selfish Replication Games / Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan and Rajmohan Rajaraman, et al. -- The Efficiency of MapReduce in Parallel External Memory / Gero Greiner and Riko Jacob -- Algorithms for Some H-Join Decompositions / Michel Habib, Antoine Mamcarz and Fabien de Montgolfier -- On the Bend-Number of Planar and Outerplanar Graphs / Daniel Heldt, Kolja Knauer and Torsten Ueckerdt -- Hiring above the m-th Best Candidate: A Generalization of Records in Permutations / Ahmed Helmi, Conrado Martínez and Alois Panholzer -- On the Performance of Smith's Rule in Single-Machine Scheduling with Nonlinear Cost / Wiebke Höhn and Tobias Jacobs -- Advantage of Overlapping Clusters for Minimizing Conductance / Rohit Khandekar, Guy Kortsarz and Vahab Mirrokni -- Independence of Tabulation-Based Hash Classes / Toryn Qwyllyn Klassen and Philipp Woelfel -- Oblivious Two-Way Finite Automata: Decidability and Complexity / Martin Kutrib, Andreas Malcher and Giovanni Pighizzini.
Clique-Colouring and Biclique-Colouring Unichord-Free Graphs / Hélio B. Macêdo Filho, Raphael C.S. Machado and Celina M.H. Figueiredo -- Random Walks and Bisections in Random Circulant Graphs / Bernard Mans and Igor E. Shparlinski -- The Feedback Arc Set Problem with Triangle Inequality Is a Vertex Cover Problem / Monaldo Mastrolilli -- Fully Analyzing an Algebraic Pólya Urn Model / Basile Morcrette -- Degree-Constrained Node-Connectivity / Zeev Nutov -- Survivable Network Activation Problems / Zeev Nutov -- On the Integrality Gap of the Subtour LP for the 1,2-TSP / Jiawei Qian, Frans Schalekamp, David P. Williamson and Anke van Zuylen -- A Theory and Algorithms for Combinatorial Reoptimization / Hadas Shachnai, Gal Tamir and Tami Tamir -- Capacity Achieving Two-Write WOM Codes / Amir Shpilka -- The Relationship between Inner Product and Counting Cycles / Xiaoming Sun, Chengu Wang and Wei Yu -- Approximating Minimum Label s-t Cut via Linear Programming / Linqing Tang and Peng Zhang.
A O(1/ε2)n-Time Sieving Algorithm for Approximate Integer Programming / Daniel Dadush -- Two-Dimensional Range Diameter Queries / Pooya Davoodi, Michiel Smid and Freek van Walderveen -- An Improved Upper Bound on the Density of Universal Random Graphs / Domingos Dellamonica, Yoshiharu Kohayakawa, Vojtěch Rödl and Andrzej Ruciński -- Logspace Computations in Graph Groups and Coxeter Groups / Volker Diekert, Jonathan Kausch and Markus Lohrey -- Approximating the Edge Length of 2-Edge Connected Planar Geometric Graphs on a Set of Points / Stefan Dobrev, Evangelos Kranakis, Danny Krizanc, Oscar Morales-Ponce and Ladislav Stacho -- On the Radon Number for P3-Convexity / Mitre C. Dourado, Dieter Rautenbach, Vinícius Fernandes dos Santos, Philipp M. Schäfer and Jayme L. Szwarcfiter, et al. -- Computing Minimum Geodetic Sets of Proper Interval Graphs / Tınaz Ekim, Aysel Erey, Pinar Heggernes, Pim van 't Hof and Daniel Meister -- Hausdorff Rank of Scattered Context-Free Linear Orders / Zoltán Ésik and Szabolcs Iván -- Opportunistic Information Dissemination in Mobile Ad-Hoc Networks: Adaptiveness vs. Obliviousness and Randomization vs. Determinism / Martín Farach-Colton, Antonio Fernández Anta, Alessia Milani, Miguel A. Mosteiro and Shmuel Zaks.
Record Nr. NYU-004374940
[Latin American Symposium on Theoretical Informatics (10th : 2012 : Arequipa, Peru)]  
Materiale a stampa
Lo trovi qui: New York University
Reversible computation : third International Workshop, RC 2011, Gent, Belgium, July 4-5, 2011. Revised Papers / Alexis de Vos, Robert Wille (eds.).
Reversible computation : third International Workshop, RC 2011, Gent, Belgium, July 4-5, 2011. Revised Papers / Alexis de Vos, Robert Wille (eds.).
Creatore [RC (Workshop : Reversible computation) (3rd : 2011 : Ghent, Belgium)]
Estensione 1 online resource (vii, 122 pages).
Disciplina 005.13/1
Accesso persona Vos, Alexis de.
Wille, Robert
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Logic design
Logics and Meanings of Programs
Algorithm Analysis and Problem Complexity
Programming Languages, Compilers, Interpreters
Mathematical Logic and Formal Languages
ISBN 9783642295171
3642295177
3642295169
9783642295164
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Time complexity of tape reduction for reversible Turing machines / Holger Bock Axelsen -- Towards a reversible functional language / Tetsuo Yokoyama, Holger Bock Axelsen and Robert Glück -- A reversible processor architecture and its reversible logic design / Michael Kirkedal Thomsen, Holger Bock Axelsen and Robert Glück -- Optimization of reversible circuits using reconfigured templates / Md. Mazder Rahman, Gerhard W. Dueck and Anindita Banerjee -- Hybrid GF(2) -- Boolean expressions .for quantum computing circuits / Claudio Moraga -- RevKit : an open source toolkit for the design of reversible circuits / Mathias Soeken, Stefan Frehse, Robert Wille and Rolf Drechsler -- Transforming MCT circuits to NCVW circuits / Zahra Sasanian and D. Michael Miller -- Changing the gate order for optimal LNN conversion / Atsushi Matsuo and Shigeru Yamashita -- Towards the limits of cascaded reversible (quantum-inspired) circuits / Stéphane Burignat, Mariusz Olczak, Michał Klimczak and Alexis De Vos -- Interfacing reversible pass-transistor CMOS chips with conventional restoring CMOS circuits / Stéphane Burignat, Michael Kirkedal Thomsen, Michał Klimczak, Mariusz Olczak and Alexis De Vos.
Record Nr. NYU-004374968
[RC (Workshop : Reversible computation) (3rd : 2011 : Ghent, Belgium)]  
Materiale a stampa
Lo trovi qui: New York University
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Constructive side-channel analysis and secure design : Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings / edited by Werner Schindler, Sorin A. Huss
Creatore [COSADE 2012 (2012 : Darmstadt, Germany)]
Estensione 1 online resource (x, 264 pages) : illustrations (some color).
Disciplina 005.8/2
Accesso persona Schindler, Werner, 1963-
Huss, Sorin A. (Sorin Alexander)
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Computers and Society
ISBN 9783642299124
3642299121
3642299113
9783642299117
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploiting the Difference of Side-Channel Leakages / Michael Hutter, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt and Stefan Mangard -- Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario / Thomas Korak, Thomas Plos and Michael Hutter -- 700+ Attacks Published on Smart Cards: The Need for a Systematic Counter Strategy / Mathias Wagner -- An Interleaved EPE-Immune PA-DPL Structure for Resisting Concentrated EM Side Channel Attacks on FPGA Implementation / Wei He, Eduardo de la Torre and Teresa Riesgo -- An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers / Shohreh Sharif Mansouri and Elena Dubrova -- Conversion of Security Proofs from One Leakage Model to Another: A New Issue / Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Soline Renner and Matthieu Rivain, et al. -- Attacking Exponent Blinding in RSA without CRT / Sven Bauer -- A New Scan Attack on RSA in Presence of Industrial Countermeasures / Jean Da Rolt, Amitabh Das, Giorgio Di Natale, Marie-Lise Flottes and Bruno Rouzeyre, et al.
RSA Key Generation: New Attacks / Camille Vuillaume, Takashi Endo and Paul Wooderson -- A Fault Attack on the LED Block Cipher / Philipp Jovanovic, Martin Kreuzer and Ilia Polian -- Differential Fault Analysis of Full LBlock / Liang Zhao, Takashi Nishide and Kouichi Sakurai -- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator / Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer and François Poucheret, et al. -- A Closer Look at Security in Random Number Generators Design / Viktor Fischer -- Same Values Power Analysis Using Special Points on Elliptic Curves / Cédric Murdica, Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst and David Naccache -- The Schindler-Itoh-attack in Case of Partial Information Leakage / Alexander Krüger -- Butterfly-Attack on Skein's Modular Addition / Michael Zohner, Michael Kasper and Marc Stöttinger -- MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation / Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang and Zhijie Shi, et al. -- Intelligent Machine Homicide / Breaking Cryptographic Devices Using Support Vector Machines / Annelie Heuser and Michael Zohner.
Record Nr. NYU-004375032
[COSADE 2012 (2012 : Darmstadt, Germany)]  
Materiale a stampa
Lo trovi qui: New York University
Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part I / edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai
Advances in computer science and information technology : Networks and Communications : second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings. Part I / edited by Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai
Creatore [International Conference on Computer Science and Information Technology (2011- ) (2nd : 2012 : Bangalore, India)]
Estensione 1 online resource (xxix, 645 pages).
Disciplina 004
Accesso persona Meghanathan, Natarajan, 1977-
Chaki, Nabendu
Nagamalai, Dhinaharan
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Software engineering
Computer software
Information storage and retrieval systems
Artificial intelligence
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
ISBN 9783642272998
3642272991
3642272983
9783642272981
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1. Networks and Communications -- Adaptive Quorum Based MAC Protocol in Non Uniform Node Distribution of Wireless Sensor Networks / L. Sherly Puspha Annabel and K. Murugan -- Mobile Agent in InVANET -- Traffic Management / V. Arun and K.L. Shunmuganathan -- The Design of Observers for Nonlinear Control Systems around Equilibria / Sundarapandian Vaidyanathan -- A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks / Natarajan Meghanathan -- Energy Efficient Dynamic Routing Protocol for Wireless Sensor Networks / Md Golam Murshed and Alastair R. Allen -- Generalized Projective Synchronization of Hyperchaotic Lü and Hyperchaotic Cai Systems via Active Control / Sarasu Pakiriswamy and Sundarapandian Vaidyanathan -- Energy Efficient Stable Connected Dominating Set Construction in Mobile Ad Hoc Networks / R. Ramalakshmi and S. Radhakrishnan -- Hybrid Synchronization of Arneodo and Rössler Chaotic Systems by Active Nonlinear Control / Sundarapandian Vaidyanathan and Suresh Rasappan -- Realization of SDR in Partial Reconfigurable FPGA Using Different Types of Modulation Techniques / Neenu Joseph and P. Nirmal Kumar -- A Recommender System for Sweaty Sock Syndrome / L. Arockiam, S. Charles, C. Lalitha and I. Carol -- Enhanced AODV Routing Protocol for Wireless Sensor Network Based on ZigBee / Dilip Kumar Ahirwar, Prashant Verma and Jitendra Daksh -- Sliding Mode Controller Design for the Global Chaos Synchronization of Coullet Systems / Sundarapandian Vaidyanathan and Sivaperumal Sampath.
Geralized Projective Synchronization of Double-Scroll Chaotic Systems Using Active Feedback Control / Sundarapandian Vaidyanathan and Sarasu Pakiriswamy -- Mobile Ad Hoc Networks Security Attacks and Secured Routing Protocols: A Survey / Supriya and Manju Khari -- Privacy and Security in Digital Networks from the Perspective of Modeling and Software Development / Erich Ortner -- A Logical Topology to Find Alternate Routes in WDM Lightwave Network / Santosh Das and Abhijit Makhal -- A Novel Approach for MIMO OFDM Systems to Estimate I/Q Imbalance, CFO, Channel Response Using Training Sequences / J. Tarun Kumar and K. Anitha Sheela -- A Trust Based Routing Scheme for Wireless Sensor Networks / Aveek Chakrabarti, Vishal Parekh and Atin Ruia -- Survey of Trust Schemes on Ad-Hoc Network / Renu Dalal, Manju Khari and Yudhvir Singh -- Improve Service Discovery Performance over Different Networks Utilization and Sizes / Intisar Al-Mejibli, Martin Colley and Salah Al-Majeed -- Adaptive K-Means Clustering to Handle Heterogeneous Data Using Basic Rough Set Theory / B.K. Tripathy, Adhir Ghosh and G.K. Panda -- Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata / Himadri Nath Saha, Debika Bhattachayya and P.K. Banerjee -- A Location Dependent Semantic Cache Replacement Strategy in Mobile Environment / Kahkashan Tabassum, Mahmood Quadri Syed and A. Damodaram -- Connectivity of Autonomous Agents Using Ad-Hoc Mobile Router Networks / Emi Mathews and Ciby Mathew -- A New Approach to Stegnography / Soumik Mukherjee, Moumita Deb, Pratik Kumar Agarwal and Abhinava Roy -- Survey on Key Pre Distribution for Security in Wireless Sensor Networks / T.P. Rani and C. Jaya Kumar.
Part 2. Wireless and Mobile Networks -- A Link Distance Ratio Based Stable Multicast Routing Protocol for Mobile Ad Hoc Networks / Natarajan Meghanathan -- A New Security Solution Architecture (SSA) for MANETS against Network Layer Attacks / G.S. Mamatha -- Analysis of Different Associative Memory Neural Network for GPS/INS Data Fusion / S. Angel Deborah -- Handover Latency Measurement of Mobile IPv6 in a Testbed Environment / Muhammad Arif Amin, Kamalrulnizam Bin Abu Bakar, Abdul Hanan Abdullah, Mahesh Nair and Rashid Hafeez Khokhar -- Different Strategy for Data Management in Mobile Computing / Chandrani Chakravorty and J. Usha -- Generic Network Visualization Tool for Monitoring Adhoc Wireless Networks / Girish Revadigar and Chitra Javali -- Adaptive MMSE Equalizer through LMS Algorithm Based CMA Channel Equalization / R. Nirmala Devi, Tara Saikumar and K. Kishan Rao -- Weighted Angle Based Approach for Face Recognition / M. Koteswara Rao, K. Veeraswamy, K. Anitha Sheela and B. Chandra Mohan -- Multiple Mobile Agents based Data Dissemination Protocol for Wireless Sensor Networks / Govind P. Gupta, Manoj Misra and Kumkum Garg -- Enhanced Cluster Based Routing Protocol for MANETS / Kartheek Srungaram and M.H.M. Krishna Prasad -- Soft Computing Technique Based Call Admission Control Decision Mechanism / H.S. Ramesh Babu, Gowrishankar, G. Mahesh and P.S. Satyanarayana -- Mechanisms Supporting Mobility in WSNs / Saimadhavi and Y.S. Kumarswamy.
An Optimal RPC Based Approach to Increase Fault in Wireless Ad-Hoc Network / Rabindra Kumar Shial, K. Hemant Ku. Reddy and K.L. Narayana -- Location Management and Resource Allocation Using Load Balancing in Wireless Heterogeneous Networks / G. Adiline Macriga and V.S. Surya -- Cross Language Information Retrieval Approach in Peer-to-Peer Network / M. Archana and K.A. Sumithra Devi -- Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach / Saurabh Upadhyay and Brijesh Kumar Chaurasia -- Energy Efficient Hierarchical Clustering Routing Protocol for Wireless Sensor Networks / Diwakar Meenakshi and Sushil Kumar -- An Analysis on Energy Efficient System Design in Grid Computing / D. Ramesh and A. Krishnan -- Cluster-based Power Aware Scheduling (CPAS) Algorithm for Network Longevity in WSN / K. Arthi and P. Vanaja Ranjan -- Development of System for GPS Data Transmission to Web Server for Online over Head Conductor Sag Measurement / Sangeeta Kamboj and Ratna Dahiya -- A Comparative Study of Partitioning Algorithms for Wireless Sensor Networks / Zeenat Rehena, Debasree Das, Sarbani Roy and Nandini Mukherjee -- Sensor-Cloud: Assimilation of Wireless Sensor Network and the Cloud / Sanjit Kumar Dash, Jyoti Prakash Sahoo, Subasish Mohapatra and Sarada Prasanna Pati -- Game Theoretic Model for Selfish Node Avoidance in Ad Hoc Networks / Upasana Dohare, D.K. Lobiyal and Sushil Kumar -- Performance Evaluation of VANET Using Realistic Vehicular Mobility / Nidhi and D.K. Lobiyal -- Ensuring Data Confidentiality and Privacy in Mobile Ad Hoc Networks / Hamza Aldabbas, Helge Janicke, Radwan AbuJassar and Tariq Alwada'n -- Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s) / Dhyanendra Jain, Pallavi Khatri, Rishi Soni and Brijesh Kumar Chaurasia.
Part 3. Network Security -- Dependable Solutions Design by Agile Modeled Layered Security Architectures / M. Upendra Kumar, D. Sravan Kumar, B. Padmaja Rani, K. Venkateswar Rao and A.V. Krishna Prasad, et al. -- Block Lanczos to Solve Integer Factorization Problem Using GPU's / Harish Malla, Vilas SantKaustubh, Rajasekharan Ganesh and Padmavathy R. -- Lattice Based Tools for Cryptanalysis in Various Applications / R. Santosh Kumar, C. Narasimham and S. Pallam Setty -- Securing the National Knowledge Network / S.V. Nagaraj -- Pattern Based IDS Using Supervised, Semi-supervised and Unsupervised Approaches / Vinod K. Pachghare, Vaibhav K. Khatavkar and Parag Kulkarni -- A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion / Natarajan Meghanathan and Bhadrachalam Chitturi -- An Improved Anti Spam Filter Based on Content, Low Level Features and Noise / Anand Gupta, Chhavi Singhal and Somya Aggarwal.
Diameter Single Sign On -- Secure and Personalized Service Provision via Authentication and Authorization Mechanisms / Robayet Nasim -- Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems / K.G. Srinivasa -- A New Symmetric Key Cryptosystem Based on Feistel Network: Parallel Dependent Feistel Network (PDFN) / Indrajit Das and R. Saravanan -- Survey of Shape Based Boundary Methods for Leaf Retrieval / Komal Asrani, Renu Jain and Deepak Asrani -- Modified Chain Code Histogram Feature for Handwritten Character Recognition / Jitendra Jain, Soyuj Kumar Sahoo, S.R. Mahadeva Prasanna and G. Siva Reddy -- A Novel Image Edge Detection Method Using Simplified Gabor Wavelet / C. Sujatha and D. Selvathi -- Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems / Dhirendra Kumar Tripathi, S. Saravanan and HarNarayan Upadhyay.
Record Nr. NYU-004375081
[International Conference on Computer Science and Information Technology (2011- ) (2nd : 2012 : Bangalore, India)]  
Materiale a stampa
Lo trovi qui: New York University