default search action
10th ICDCIT 2014: Bhubaneswar, India
- Raja Natarajan:
Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings. Lecture Notes in Computer Science 8337, Springer 2014, ISBN 978-3-319-04482-8
Section 1: Invited Talks
- Gérard Berry, Manuel Serrano:
Hop and HipHop: Multitier Web Orchestration. 1-13 - Vivek S. Borkar, Adwaitvedant S. Mathkar:
Reinforcement Learning for Matrix Computations: PageRank as an Example. 14-24 - Elizabeth Buchanan:
The New Normal? - Revisiting Ethical Issues in Internet Research. 25-33 - William Casey, Jose Andre Morales, Thomson Nguyen, Jonathan M. Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bud Mishra:
Cyber Security via Signaling Games: Toward a Science of Cyber Security. 34-42 - Anupam Datta:
Privacy through Accountability: A Computer Science Perspective. 43-49 - François Fages:
Cells as Machines: Towards Deciphering Biochemical Programs in the Cell. 50-67
Section 2: Distributed Computing
- Sonal Patil, Shrutilipi Bhattacharjee, Soumya K. Ghosh:
A Spatial Web Crawler for Discovering Geo-servers and Semantic Referencing with Spatial Features. 68-78 - Pooja Aggarwal, Smruti R. Sarangi:
Software Transactional Memory Friendly Slot Schedulers. 79-85 - Sohini De, Alok Misra, Suddhasil De:
An Improved Approach of Decoupling in Mobile Cloud Computing. 86-91 - Narayanan Vignesh, Rengaraj Shankar, Sundararajan Sathyamoorthy, V. Mary Anita Rajam:
Value Added Services on Stationary Vehicular Cloud. 92-97 - Sanjaya Kumar Panda, Pabitra Mohan Khilar, Durga Prasad Mohapatra:
FTM2: Fault Tolerant Batch Mode Heuristics in Computational Grid. 98-104 - Anupama Potluri, Krishna Vutukuri, Garvit Sharma:
SNAPWebD and SNAPSync: A Web Desktop and Transparent sync of NFS and Standalone System Logical Volumes. 105-110
Section 3: Sensor Networks
- Tarachand Amgoth, Nabin Ghosh, Prasanta K. Jana:
Energy-Aware Multi-level Routing Algorithm for Two-Tier Wireless Sensor Networks. 111-121 - Bhawani Sankar Panda, D. Pushparaj Shetty:
Minimum Range Assignment Problem for Two Connectivity in Wireless Sensor Networks. 122-133 - Dibakar Saha, Nabanita Das, Shyamosree Pal:
A Digital-Geometric Approach for Computing Area Coverage in Wireless Sensor Networks. 134-145 - Sangeeta Mittal, Krishna Gopal, Shankar Lall Maskara:
Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation. 146-151
Section 4: Internet Technologies and Applications
- Chiranjib Sur, Anupam Shukla:
Discrete Krill Herd Algorithm - A Bio-Inspired Meta-Heuristics for Graph Based Network Route Optimization. 152-163 - Koushik Sinha, Rabindranath Ghosh, Bhabani P. Sinha:
A New Number System Using Alternate Fibonacci Numbers as the Positional Weights with Some Engineering Applications. 164-175 - Deepa Anand, Bonson Sebastian Mampilli:
User Profiling Based on Keyword Clusters for Improved Recommendations. 176-187 - Dibyajyoti Guha, Abhijit Datta Banik, Veena Goswami, Souvik Ghosh:
Equilibrium Balking Strategy in an Unobservable GI/M/c Queue with Customers' Impatience. 188-199 - Arani Bhattacharya, Ansuman Banerjee, Susmita Sur-Kolay:
Energy-Aware H.264 Decoding. 200-211 - Ganesh Khandu Narwane, Shankara Narayanan Krishna, Anup Kumar Bhattacharjee:
A Cost Effective Approach for Analyzing Software Product Lines. 212-223 - Yogesh Gupta, Ashish Saini, A. K. Saxena, Aditi Sharan:
Fuzzy Logic Based Similarity Measure for Information Retrieval System Performance Improvement. 224-232 - Mohamed Mustafa Faisan, S. Durga Bhavani:
Maximizing Information or Influence Spread Using Flow Authority Model in Social Networks. 233-238
Section 5: Security
- Günter Fahrnberger:
A Second View on SecureString 2.0. 239-250 - Arjun Datt Sharma, Ansuya Ahluwalia, Shaleen Deep, Divya Bansal:
Friend or Foe: Twitter Users under Magnification. 251-262 - Arkadeep Kundu, Soumya K. Ghosh:
Game Theoretic Attack Response Framework for Enterprise Networks. 263-274 - Y. Sreenivasa Rao, Ratna Dutta:
Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy. 275-286 - Dwijen Rudrapal, Smita Das, Swapan Debbarma:
Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. 287-292 - Venkata Swamy Martha, Nitin Agarwal, Srini Ramaswamy:
Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks? 293-298
Section 6: Multimedia
- Debashis Mishra, Isita Bose, Madhabananda Das, Bhabani Shankar Prasad Mishra:
Detection and Reduction of Impulse Noise in RGB Color Image Using Fuzzy Technique. 299-310 - Suganya Ramamoorthy, Rajaram Siva Subramanian, Deebika Gandhi:
An Efficient Method for Speckle Reduction in Ultrasound Liver Images for e-Health Applications. 311-321 - Suman Deb, Subarna Sinha:
Comparative Improvement of Image Segmentation Performance with Graph Based Method over Watershed Transform Image Segmentation. 322-332 - Raghu Raman, Prema Nedungadi, Maneesha Vinodini Ramesh:
Modeling Diffusion of Tabletop for Collaborative Learning Using Interactive Science Lab Simulations. 333-340 - Amit Choudhary, Savita Ahlawat, Rahul Rishi:
A Binarization Feature Extraction Approach to OCR: MLP vs. RBF. 341-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.