Coverart for item
The Resource Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India, Volume 2, David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.), (electronic book)

Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India, Volume 2, David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.), (electronic book)

Label
Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India, Volume 2
Title
Advances in computer science, engineering & applications
Title remainder
proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India
Title number
Volume 2
Statement of responsibility
David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.)
Title variation
ICCSEA 2012
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
004
Index
index present
LC call number
QA75.5
LC item number
.I23 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
ICCSEA 2012
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Wyld, David C
  • Zizka, Jan
  • Nagamalai, Dhinaharan
Series statement
Advances in intelligent and soft computing,
Series volume
167
http://library.link/vocab/subjectName
  • Computer science
  • Computer networks
  • Computer networks
  • Software engineering
Label
Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India, Volume 2, David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.), (electronic book)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network
  • Arifa Azeez and K. G. Preetha
  • Policy Based Traffic in Video on Demand System
  • Soumen Kanrar
  • Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization
  • Dhanya Sudarsan, P. R. Mahalingam and G. Jisha
  • Mobile Data Offloading: Benefits, Issues, and Technological Solutions
  • Vishal Gupta and Mukesh Kumar Rohil
  • Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA
  • V. R. Gad, R. S. Gad and G. M. Naik
  • Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning
  • Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective
  • Neeraj Kumar and Raees A. Khan
  • Modeling Soft Handoffs' Performance in a Realistic CDMA Network
  • Moses E. Ekpenyong and Enobong Umana
  • A Security Approach for Mobile Agent Based Crawler
  • Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal
  • Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate
  • A New Secret Key Cipher: C128
  • Indrajit Das and R. Saravanan
  • Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET)
  • R. Mynuddin Sulthani and D. Sreenivasa Rao
  • Trusted AODV for Trustworthy Routing in MANET
  • Sridhar Subramanian and Baskaran Ramachandran
  • A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack
  • Mina Mishra and V. H. Mankar
  • Introducing Session Relevancy Inspection in Web Page
  • Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta
  • Way Directing Node Routing Protocol for Mobile Ad Hoc Networks
  • M. Neelakantappa, A. Damodaram and B. Satyanarayana
  • Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask
  • Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay
  • Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation
  • Minati Mishra, Sunit Kumar and Subhadra Mishra
  • Prospects and Limitations of Organic Thin Film Transistors (OTFTs)
  • Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network
  • K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob
  • Conceptualizing an Adaptive Framework for Pervasive Computing Environment
  • Akhil Mohan and Nitin Upadhyay
  • Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks
  • B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan
  • B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal
  • Active Learning with Bagging for NLP Tasks
  • Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta
  • Mining Queries for Constructing Materialized Views in a Data Warehouse
  • T. V. Vijay Kumar, Archana Singh and Gaurav Dubey
  • Similarity Based Cluster Analysis on Engineering Materials Data Sets
  • Doreswamy and K. S. Hemanth
  • Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory
  • Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al.
  • A Secured Transport System by Authenticating Vehicles and Drivers Using RFID
  • C. K. Marigowda, J. Thriveni and Javid K. Karangi
  • Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing
  • Ajay Kumar and Seema Bawa
  • Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies
  • S. Karthika, A. Kiruthiga and S. Bose
  • A Quantitative Model of Operating System Security Evaluation
  • Hammad Afzali and Hassan Mokhtari
  • Hybrid Cluster Validation Techniques
  • Energy Management in Zone Routing Protocol (ZRP)
  • Dilli Ravilla and Chandra Shekar Reddy Putta
  • A New Approach for Vertical Handoff in Wireless 4G Network
  • Vijay Malviya, Praneet Saurabh and Bhupendra Verma
  • Satish Gajawada and Durga Toshniwal
  • Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks
  • S. Taruna, Sheena Kohli and G. N. Purohit
  • Texel Identification Using K-Means Clustering Method
  • S. Padmavathi, C. Rajalaxmi and K. P. Soman
  • Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol
  • Zulfa Shaikh and Poonam Garg
  • Natarajan Meghanathan and Michael Terrell
  • OERD - On Demand and Efficient Replication Dereplication
  • Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh
  • A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks
  • Abhishek Majumder
  • Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks
  • Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed
  • Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks
  • Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal
  • A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment
  • An Analysis on Critical Information Security Systems
  • Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi
  • A Study of Location-Based Data Replication Techniques and Location Services for MANETs
  • C. B. Chandrakala, K. V. Prema and K. S. Hareesha
  • A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques
  • Sona Kaushik and Shalini Puri
  • Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform
  • Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam
  • Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks
  • Gnana Jayanthi Joseph and S. Albert Rabara
  • Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks
  • Chaotic Cipher Using Arnolds and Duffings Map
  • Mina Mishra and V. H. Mankar
  • Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks
  • Samedha S. Naik and Manisha J. Nene
  • An Analytical Model for Power Control B-MAC Protocol in WSN
  • V. Ramchand and D. K. Lobiyal
  • Enterprise Mobility - A Future Transformation Strategy for Organizations
  • Jitendra Maan
  • Allocation of Guard Channels for QoS in Hierarchical Cellular Network
  • Kashish Parwani and G. N. Purohit
  • A Comparative Analysis of Modern Day Network Simulators
  • Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment
  • Medha A. Shah and P. J. Kulkarni
  • Energy Aware AODV (EA-AODV) Using Variable Range Transmission
  • Pinki Nayak, Rekha Agarwal and Seema Verma
  • Automatic Speech Recognizer Using Digital Signal Processor
  • Raghavendra M. Shet and Raghunath S. Holambe
  • Pre Decision Based Handoff in Multi Network Environment
  • Manoj Sharma and R. K. Khola
  • Debajyoti Pal
  • Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks
  • K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra
  • Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets
  • Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip
  • Reachability Analysis of Mobility Models under Idealistic and Realistic Environments
  • Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta
  • Energy Efficient Administrator Based Secure Routing in MANET
  • Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee
  • Effect of Mobility on Trust in Mobile Ad-Hoc Network
  • Amit Kumar Raikwar
  • Securing Systems after Deployment
  • David (DJ) Neal and Syed (Shawon) Rahman
  • On the Security of Two Certificateless Signature Schemes
  • Young-Ran Lee
  • Information Security Using Chains Matrix Multiplication
  • Ch. Rupa and P. S. Avadhani
  • A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
  • Formal Security Verification of Secured ECC Based Signcryption Scheme
  • Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing
  • Universal Steganalysis Using Contourlet Transform
  • V. Natarajan and R. Anitha
  • Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms
  • M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu
  • Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM)
  • Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal
  • Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
  • Uttam Kr. Mondal and J. K. Mandal
  • Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri
  • A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET
  • Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki
  • Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks
  • Yingchi Mao and Ting Yin
  • ELRM: A Generic Framework for Location Privacy in LBS
  • Muhamed Ilyas and R. Vijayakumar
  • Modified Grøstl: An Efficient Hash Function
  • Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal
  • Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform
  • V. Anitha and R. Leela Velusamy
  • Recovery of Live Evidence from Internet Applications
  • Ipsita Mohanty and R. Leela Velusamy
  • Face Detection Using HMM -SVM Method
  • Nupur Rajput, Pranita Jain and Shailendra Shrivastava
  • High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
  • Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik
  • A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
  • Key Management Protocol in WIMAX Revisited
  • Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade
  • Image Authentication Technique Based on DCT (IATDCT)
  • Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal
  • Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs
  • Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar
  • J. K. Mandal and S. K. Ghosal
  • A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
  • R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam
  • Encryption of Images Based on Genetic Algorithm - A New Approach
  • Jalesh Kumar and S. Nirmala
  • Content Based Image Retrieval Using Normalization of Vector Approach to SVM
  • Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava
  • Hiding Data in FLV Video File
  • Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
  • Taxonomy of Network Layer Attacks in Wireless Mesh Network
  • K. Ganesh Reddy and P. Santhi Thilagam
  • Implementing Availability State Transition Model to Quantify Risk Factor
  • Shalini Chandra and Raees Ahmad Khan
  • Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System
  • A. V. Meenakshi, R. Kayalvizhi and S. Asha
  • DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing
  • D. I. George Amalarethinam and P. Muthulakshmi
  • A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
  • A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
  • Ved Prakash Bhardwaj and Nitin
  • Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database
  • Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu
  • Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park
  • A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers
  • P. Devaki and G. Raghavendra Rao
  • Security Assurance by Efficient Non-repudiation Requirements
  • S. K. Pandey and K. Mustafa
  • Poor Quality Watermark Barcodes Image Enhancement
  • Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
  • Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach
  • Shikha Tayal and Sandip Vijay
  • A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention
  • Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui
  • Resource Based Optimized Decentralized Grid Scheduling Algorithm
  • Piyush Chauhan and Nitin
  • Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management
  • Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik
  • A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA
  • Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri
  • A Grid Fabrication of Traffic Maintenance System
  • A Policy Driven Business Logic Change Management for Enterprise Web Services
  • M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran
  • Avula Anitha, Rajeev Wankar and C. Raghavendra Rao
  • Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment
  • Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar
  • Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning
  • Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh
  • An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach
  • M. C. Aswathy and C. Tripti
Control code
SPR794223058
Dimensions
unknown
Extent
1 online resource (xxiii, 1098 p.)
File format
unknown
Form of item
online
Isbn
9783642301100
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Advances in computer science, engineering & applications : proceedings of the second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India, Volume 2, David C. Wyld, Jan Zizka, and Dhinaharan Nagamalai (eds.), (electronic book)
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network
  • Arifa Azeez and K. G. Preetha
  • Policy Based Traffic in Video on Demand System
  • Soumen Kanrar
  • Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization
  • Dhanya Sudarsan, P. R. Mahalingam and G. Jisha
  • Mobile Data Offloading: Benefits, Issues, and Technological Solutions
  • Vishal Gupta and Mukesh Kumar Rohil
  • Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA
  • V. R. Gad, R. S. Gad and G. M. Naik
  • Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning
  • Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective
  • Neeraj Kumar and Raees A. Khan
  • Modeling Soft Handoffs' Performance in a Realistic CDMA Network
  • Moses E. Ekpenyong and Enobong Umana
  • A Security Approach for Mobile Agent Based Crawler
  • Vimal Upadhyay, Jai Balwan, Gori Shankar and Amritpal
  • Soma Pandey, Vijay Pande, Govind Kadambi and Stephen Bate
  • A New Secret Key Cipher: C128
  • Indrajit Das and R. Saravanan
  • Optimal Bandwidth Allocation Technique in IEEE 802.11e Mobile Ad Hoc Networks (MANET)
  • R. Mynuddin Sulthani and D. Sreenivasa Rao
  • Trusted AODV for Trustworthy Routing in MANET
  • Sridhar Subramanian and Baskaran Ramachandran
  • A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack
  • Mina Mishra and V. H. Mankar
  • Introducing Session Relevancy Inspection in Web Page
  • Sutirtha Kumar Guha, Anirban Kundu and Rana Dattagupta
  • Way Directing Node Routing Protocol for Mobile Ad Hoc Networks
  • M. Neelakantappa, A. Damodaram and B. Satyanarayana
  • Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask
  • Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay
  • Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation
  • Minati Mishra, Sunit Kumar and Subhadra Mishra
  • Prospects and Limitations of Organic Thin Film Transistors (OTFTs)
  • Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network
  • K. G. Preetha, A. Unnikrishnan and K. Paulose Jacob
  • Conceptualizing an Adaptive Framework for Pervasive Computing Environment
  • Akhil Mohan and Nitin Upadhyay
  • Dynamic DCF Backoff Algorithm(DDBA) for Enhancing TCP Performance in Wireless Ad Hoc Networks
  • B. Nithya, C. Mala, B. Vijay Kumar and N. P. Gopalan
  • B. K. Kaushik, Brijesh Kumar, Y. S. Negi and Poornima Mittal
  • Active Learning with Bagging for NLP Tasks
  • Ruy Luiz Milidiú, Daniel Schwabe and Eduardo Motta
  • Mining Queries for Constructing Materialized Views in a Data Warehouse
  • T. V. Vijay Kumar, Archana Singh and Gaurav Dubey
  • Similarity Based Cluster Analysis on Engineering Materials Data Sets
  • Doreswamy and K. S. Hemanth
  • Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory
  • Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A. Tahir, Behrang Parhizkar and Anand Ramachandran, et al.
  • A Secured Transport System by Authenticating Vehicles and Drivers Using RFID
  • C. K. Marigowda, J. Thriveni and Javid K. Karangi
  • Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing
  • Ajay Kumar and Seema Bawa
  • Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies
  • S. Karthika, A. Kiruthiga and S. Bose
  • A Quantitative Model of Operating System Security Evaluation
  • Hammad Afzali and Hassan Mokhtari
  • Hybrid Cluster Validation Techniques
  • Energy Management in Zone Routing Protocol (ZRP)
  • Dilli Ravilla and Chandra Shekar Reddy Putta
  • A New Approach for Vertical Handoff in Wireless 4G Network
  • Vijay Malviya, Praneet Saurabh and Bhupendra Verma
  • Satish Gajawada and Durga Toshniwal
  • Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks
  • S. Taruna, Sheena Kohli and G. N. Purohit
  • Texel Identification Using K-Means Clustering Method
  • S. Padmavathi, C. Rajalaxmi and K. P. Soman
  • Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol
  • Zulfa Shaikh and Poonam Garg
  • Natarajan Meghanathan and Michael Terrell
  • OERD - On Demand and Efficient Replication Dereplication
  • Vardhan Manu, Gupta Paras and Kushwaha Dharmender Singh
  • A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks
  • Abhishek Majumder
  • Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks
  • Hosny M. Ibrahim, Nagwa M. Omar and Ali H. Ahmed
  • Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks
  • Prasun Chowdhury, Anindita Kundu, Iti Saha Misra and Salil K. Sanyal
  • A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment
  • An Analysis on Critical Information Security Systems
  • Hiromi Hirai, Kaori Miki, Saneyasu Yamaguchi and Masato Oguchi
  • A Study of Location-Based Data Replication Techniques and Location Services for MANETs
  • C. B. Chandrakala, K. V. Prema and K. S. Hareesha
  • A Technical Review Tour and Study of the Sensitive Information Security Methods and Techniques
  • Sona Kaushik and Shalini Puri
  • Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform
  • Prabhu Dorairaj, Saranya Ramamoorthy and Ashok Kumar Ramalingam
  • Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks
  • Gnana Jayanthi Joseph and S. Albert Rabara
  • Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks
  • Chaotic Cipher Using Arnolds and Duffings Map
  • Mina Mishra and V. H. Mankar
  • Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks
  • Samedha S. Naik and Manisha J. Nene
  • An Analytical Model for Power Control B-MAC Protocol in WSN
  • V. Ramchand and D. K. Lobiyal
  • Enterprise Mobility - A Future Transformation Strategy for Organizations
  • Jitendra Maan
  • Allocation of Guard Channels for QoS in Hierarchical Cellular Network
  • Kashish Parwani and G. N. Purohit
  • A Comparative Analysis of Modern Day Network Simulators
  • Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment
  • Medha A. Shah and P. J. Kulkarni
  • Energy Aware AODV (EA-AODV) Using Variable Range Transmission
  • Pinki Nayak, Rekha Agarwal and Seema Verma
  • Automatic Speech Recognizer Using Digital Signal Processor
  • Raghavendra M. Shet and Raghunath S. Holambe
  • Pre Decision Based Handoff in Multi Network Environment
  • Manoj Sharma and R. K. Khola
  • Debajyoti Pal
  • Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks
  • K. S. Kushal, H. K. Muttanna Kadal, S. Chetan and Shivaputra
  • Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets
  • Ajay Kumar, Shany Jophin, M. S. Sheethal and Priya Philip
  • Reachability Analysis of Mobility Models under Idealistic and Realistic Environments
  • Chirag Kumar, C. K. Nagpal, Bharat Bhushan and Shailender Gupta
  • Energy Efficient Administrator Based Secure Routing in MANET
  • Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee
  • Effect of Mobility on Trust in Mobile Ad-Hoc Network
  • Amit Kumar Raikwar
  • Securing Systems after Deployment
  • David (DJ) Neal and Syed (Shawon) Rahman
  • On the Security of Two Certificateless Signature Schemes
  • Young-Ran Lee
  • Information Security Using Chains Matrix Multiplication
  • Ch. Rupa and P. S. Avadhani
  • A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
  • Formal Security Verification of Secured ECC Based Signcryption Scheme
  • Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing
  • Universal Steganalysis Using Contourlet Transform
  • V. Natarajan and R. Anitha
  • Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms
  • M. Varaprasad Rao, A. Damodaram and N. Ch. Bhatra Charyulu
  • Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM)
  • Nabin Ghoshal, Soumit Chowdhury and Jyotsna Kumar Mandal
  • Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
  • Uttam Kr. Mondal and J. K. Mandal
  • Subhankar Joardar, Vandana Bhattacherjee and Debasis Giri
  • A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET
  • Moitreyee Dasgupta, Sankhayan Chaudhury and Nabendu Chaki
  • Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks
  • Yingchi Mao and Ting Yin
  • ELRM: A Generic Framework for Location Privacy in LBS
  • Muhamed Ilyas and R. Vijayakumar
  • Modified Grøstl: An Efficient Hash Function
  • Gurpreet Kaur, Vidyavati S. Nayak, Dhananjoy Dey and S. K. Pal
  • Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform
  • V. Anitha and R. Leela Velusamy
  • Recovery of Live Evidence from Internet Applications
  • Ipsita Mohanty and R. Leela Velusamy
  • Face Detection Using HMM -SVM Method
  • Nupur Rajput, Pranita Jain and Shailendra Shrivastava
  • High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
  • Sunita V. Dhavale, R. S. Deodhar and L. M. Patnaik
  • A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
  • Key Management Protocol in WIMAX Revisited
  • Noudjoud Kahya, Nacira Ghoualmi and Pascal Lafourcade
  • Image Authentication Technique Based on DCT (IATDCT)
  • Nabin Ghosal, Anirban Goswami, Jyotsna Kumar Mondal and Dipankar Pal
  • Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs
  • Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar
  • J. K. Mandal and S. K. Ghosal
  • A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
  • R. Anitha, R. Karthik, V. Pravin and K. Thirugnanam
  • Encryption of Images Based on Genetic Algorithm - A New Approach
  • Jalesh Kumar and S. Nirmala
  • Content Based Image Retrieval Using Normalization of Vector Approach to SVM
  • Sumit Dhariwal, Sandeep Raghuwanshi and Shailendra Shrivastava
  • Hiding Data in FLV Video File
  • Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
  • Taxonomy of Network Layer Attacks in Wireless Mesh Network
  • K. Ganesh Reddy and P. Santhi Thilagam
  • Implementing Availability State Transition Model to Quantify Risk Factor
  • Shalini Chandra and Raees Ahmad Khan
  • Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System
  • A. V. Meenakshi, R. Kayalvizhi and S. Asha
  • DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing
  • D. I. George Amalarethinam and P. Muthulakshmi
  • A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
  • A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
  • Ved Prakash Bhardwaj and Nitin
  • Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database
  • Jie Song, Tiantian Li, Xuebing Liu and Zhiliang Zhu
  • Charles A. Kamhoua, Kevin A. Kwiat and Joon S. Park
  • A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers
  • P. Devaki and G. Raghavendra Rao
  • Security Assurance by Efficient Non-repudiation Requirements
  • S. K. Pandey and K. Mustafa
  • Poor Quality Watermark Barcodes Image Enhancement
  • Mohammed A. Atiea, Yousef B. Mahdy and Abdel-Rahman Hedar
  • Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PCA Approach
  • Shikha Tayal and Sandip Vijay
  • A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention
  • Ghobad Zarrinchian, Mohsen Soryani and Morteza Analoui
  • Resource Based Optimized Decentralized Grid Scheduling Algorithm
  • Piyush Chauhan and Nitin
  • Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management
  • Sangeeta Verma, Ravindra Kumar Verma, Anju Singh and Neelima S. Naik
  • A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA
  • Vishnuvardhan Mannava, T. Ramesh and Mohammed A. R. Quadri
  • A Grid Fabrication of Traffic Maintenance System
  • A Policy Driven Business Logic Change Management for Enterprise Web Services
  • M. Thirumaran, P. Dhavachelvan and G. Naga Venkata Kiran
  • Avula Anitha, Rajeev Wankar and C. Raghavendra Rao
  • Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment
  • Raghavendra Prabhu, Basappa B. Kodada and K. M. Shivakumar
  • Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning
  • Mohammed A. R. Quadri, Vishnuvardhan Mannava and T. Ramesh
  • An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach
  • M. C. Aswathy and C. Tripti
Control code
SPR794223058
Dimensions
unknown
Extent
1 online resource (xxiii, 1098 p.)
File format
unknown
Form of item
online
Isbn
9783642301100
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...