default search action
2nd ACSS 2015: Kolkata, India - Volume 1
- Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1. Advances in Intelligent Systems and Computing 395, Springer 2016, ISBN 978-81-322-2648-2
Security
- Tomasz Emanuel Wesolowski, Piotr Porwik:
Computer User Profiling Based on Keystroke Analysis. 3-13 - Nazneen Akhter, Sumegh Tharewal, Vijay Kale, Ashish Bhalerao, K. V. Kale:
Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems. 15-29 - J. K. M. Sadique Uz Zaman, Sankhanil Dey, Ranjan Ghosh:
Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73). 31-48 - Bharat Kumar Ahuja, Angshuman Jana, Ankit Swarnkar, Raju Halder:
On Preventing SQL Injection Attacks. 49-64 - Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki, Khalid Saeed:
Securing Service in Remote Healthcare. 65-84
Systems Biology
- Sudip Mandal, Goutam Saha, Rajat Kumar Pal:
Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid. 87-99 - Manas Saha, Mrinal Kanti Naskar, B. N. Chatterji:
Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network. 101-109 - Tomasz Orczyk, Piotr Porwik:
Liver Fibrosis Diagnosis Support System Using Machine Learning Methods. 111-121 - Erukala Suresh Babu, C. Nagaraju, Munaga H. M. Krishna Prasad:
Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks. 123-144 - Rohit Kumar Yadav, Haider Banka:
Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment. 145-157 - Jhilam Mukherjee, Soharab Hossain Shaikh, Madhuchanda Kar, Amlan Chakrabarti:
A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules. 159-179
Networking and Cloud Computing
- Sumitra Binu, Pethuru Raj, Mohammed Misbahuddin:
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment. 183-202 - Kaushik Ghosh, Pradip Kumar Das, Sarmistha Neogy:
KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks. 203-221 - Ayan Kumar Das, Rituparna Chaki, Kashi Nath Dey:
The Design of Hierarchical Routing Protocol for Wireless Sensor Network. 223-233 - Raman Kumar Goyal, Sakshi Kaushal:
Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks. 235-243
Data Analytics
- K. Rajendra Prasad, B. Eswara Reddy:
Context-Aware Graph-Based Visualized Clustering Approach (CAVCA). 247-260 - Soumya Sen, Partha Ghosh, Agostino Cortesi:
Materialized View Construction Using Linearizable Nonlinear Regression. 261-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.