


default search action
BAIP 2010: Trivandrum, Kerala, India
- Vinu V. Das

, R. Vijayakumar, Narayan C. Debnath, Janahanlal Stephen, Natarajan Meghanathan, Suresh Sankaranarayanan, P. M. Thankachan, Ford Lumban Gaol, Nessy Thankachan:
Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings. Communications in Computer and Information Science 70, Springer 2010, ISBN 978-3-642-12213-2 - Swanirbhar Majumder, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar:

SVD and Neural Network Based Watermarking Scheme. 1-5 - Akshi Kumar

, Mahinder Pal Singh Bhatia:
Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms. 6-11 - Navneet Tiwari, Siddarth Jain, Saifuddin Tariwala, Ankit Salgia:

Network Management Initialization for Wired and Wireless Communication: A Real Time Study. 12-16 - J. Gnana Jayanthi, S. Albert Rabara:

IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network. 17-21 - Srinivas Sethi

, Siba K. Udgata
:
An Efficient Multicast Hybrid Routing Protocol for MANETs. 22-27 - Dakshina Ranjan Kisku

, Phalguni Gupta, Jamuna Kanta Sing:
Applications of Graph Theory in Face Biometrics. 28-33 - Anil Kumar

, Mrinal Kanti Ghose:
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map. 34-38 - Srinivas Sethi

, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath Narayan Sahoo:
Hybrid Activities of AODV for Wireless Ad hoc Sensor Network. 39-44 - Shatha J. Kadhim, Kasim M. Al-Aubidy:

Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm. 45-52 - Prasad Naik Hamsavath, G. V. Singh, Sanjay K. Dhurandher:

Object Location in Cluster Based Mobile Ad Hoc Networks. 53-59 - Alok Joshi, Davinder S. Saini:

Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications. 60-64 - Davinder S. Saini, Vipin Balyan

, Kanika Mittal, Mansi Saini, Manika Kishore:
Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks. 65-70 - Rajib Kar, Vikas Maheshwari

, Md. Maqbool, Ashish Kumar Mal, A. K. Bhattacharjee:
A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects. 71-75 - K. Srinivasan, M. Ramasubba Reddy:

Wavelet-Domain L ∞ -Constrained Two-Stage Near-Lossless EEG Coder. 76-80 - Jayashree D. Mallapur, Syed Abidhusain, Soumya S. Vastrad

, Ajayakumar Katageri:
Fuzzy Based Bandwidth Management for Wireless Multimedia Networks. 81-90 - Jagadish H. Pujar, D. S. Shambhavi:

A Novel Digital Algorithm for Sobel Edge Detection. 91-95 - B. Kavitha, S. Karthikeyan, B. Chitra:

Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison. 96-101 - Anup Nandy, Jay Shankar Prasad

, Soumik Mondal, Pavan Chakraborty, Gora Chand Nandi:
Recognition of Isolated Indian Sign Language Gesture in Real Time. 102-107 - Megalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel:

Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors. 108-113 - Megalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham:

Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor. 114-119 - Alex Pappachen James

, Sima Dimitrijev
:
Role of Resolution in Noisy Pattern Matching. 120-124 - V. Ruckmani, G. Sudha Sadasivam:

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security. 125-129 - Deepak Vidhate, Anita Patil, Supriya Sarkar:

Bandwidth Estimation Scheme for Mobile Adhoc Network. 130-135 - P. Viswanathan

, P. Venkata Krishna
, S. Hariharan:
Multimodal Biometric Invariant Moment Fusion Authentication System. 136-143 - Anjali Naik, Shubhangi Vinayak Tikhe, S. D. Bhide:

Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography. 144-151 - Bikesh Kumar Singh, G. R. Sinha, Imroze Khan:

Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images. 152-156 - H. B. Kekre, Tanuja K. Sarode

, Saylee M. Gharge
:
Vector Quantization for Tumor Demarcation of Mammograms. 157-163 - L. M. Varalakshmi, G. Florence Sudha:

Selective Encryption of Video Using Multiple Chaotic Maps. 164-168 - Neeta S. Bosamiya, Devesh C. Jinwala

:
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks. 169-174 - Parma Nand, Sunita Sharma, Rani Astya:

Tracking Based Secure AODV Routing Protocol. 175-180 - V. V. R. Maheswara Rao, V. Valli Kumari

, K. V. S. V. N. Raju:
Study of Visitor Behavior by Web Usage Mining. 181-187 - N. Sengottaiyan, R. M. Somasundaram, Balasubramanie:

A Hybrid Routing Protocol for Wireless Sensor Network. 188-193 - D. V. Naga Raju, V. Valli Kumari

, K. V. S. V. N. Raju:
Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring. 194-201 - A. K. Dwivedi, V. K. Patle

, O. P. Vyas:
Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks. 202-208 - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:

A Novel Multipath Routing Scheme in Mobile Adhoc Networks. 209-216 - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:

A Novel Security Approach for Detecting Black Hole Attack in MANET. 217-223 - Neera Batra, A. K. Kapil:

NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database. 224-232 - Saroj Kumar Panigrahy

, Debasish Jena, Sanjay Kumar Jena:
A Secure e-Shopping Using Voice Ordering. 233-237 - Manoj Kr. Dutta, Vinod Kumar Chaubey:

Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model. 238-244 - Janani Arthanari

, Arputharaj Kannan:
A Concurrent Synchronization Model for Distributed Multimedia Systems. 245-249 - Rajneesh Gujral

, Anil Kapil
:
Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS. 250-257 - Shakti Mishra

, Dharmender Singh Kushwaha, Arun Kumar Misra:
A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System. 258-262 - Divya Mohandass, Jude Janet:

An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine. 263-268 - Abhishek Ray

, Debasis Das:
Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata. 269-275 - Dhaval K. Patel, S. K. Shah, Minesh P. Thaker:

Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network. 276-280 - Deepali Virmani

, Satbir Jain:
Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks. 281-289 - Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan:

A Cryptographic Approach to Defend against IP Spoofing. 290-296 - Valliyammai Chinnaiah

, S. Thamarai Selvi
, R. Satheesh Kumar, E. Pradeep, K. Naveen:
Multi-agent Based Network Performance Tuning in Grid. 297-304 - Saeed Parsa

, Somaye Arabi Naree, Neda Ebrahimi, Mojtaba Vahidi-Asl:
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs. 305-309 - Manoj V. N. Vadakkepalisseri, K. Chandrashekaran:

Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information. 310-319 - Balachandra Muniyal, K. V. Prema:

Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures. 320-324 - G. Savithiri, A. Murugan:

Iris Recognition Technique Using Gaussian Pyramid Compression. 325-331 - Leena Arya

, Sunita Sharma, Millie Pant:
Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN. 332-336 - Devaraju Suganya Devi, Ganapathi Padmavathi

:
Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks. 337-341 - P. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi:

An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid. 342-348 - P. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha:

Reactive Network Monitor for DDoS Attacks. 349-355 - P. J. Antony

, V. P. Ajith, K. P. Soman:
Statistical Method for English to Kannada Transliteration. 356-362 - R. B. Patel, Deepika Jain, Bhanu Kaushik:

RIFMAS: River Flow Management System Using Wireless Sensing Agents. 363-368 - Neha Jain:

Finite Element Approach to Radial Heat Flow in Human Dermal Tissues. 369-375 - Sajal Mukhopadhyay, Roshan Kumar Singh, Debidas Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee:

An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas. 376-381 - M. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli:

Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA. 382-384 - K. Latha, R. Manivelu:

Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback. 385-387 - K. Sharma Rajiv, S. Dhiman Amardeep:

Challenges in Segmentation of Text in Handwritten Gurmukhi Script. 388-392 - Bala Dhandayuthapani Veerasamy

:
Exploring the Contrasts of VoIP Phone Services. 393-395 - Shaily Mittal

, Prabhjot Kaur:
Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET'S. 396-400 - Tamanna Siddiqui, Munior Ahmad Wani:

Impact Factor of E - Learning: Using Secondary Education Case Study. 401-404 - Sanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary:

Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology. 405-410 - Chandrashekar M. Patil, Sudarshan Patilkulkarni

:
A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System. 411-416 - Jagadish H. Pujar, Pallavi S. Gurjal:

Binary Data Compression Using Medial Axis Transform Algorithm. 417-419 - Sandeep A. Thorat, Samadhan R. Manore:

Internet Usage Monitoring for Crime Detection. 420-423 - S. Gunasekaran, K. Revathy:

Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition. 424-429 - Sanjeev Rana, Anil Kapil

:
Defending against Node Misbehavior to Discover Secure Route in OLSR. 430-436 - J. Bagyamani, K. Thangavel:

SIMBIC: SIMilarity Based BIClustering of Expression Data. 437-441 - Neera Batra, A. K. Kapil:

An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System. 442-445 - D. S. Guru, B. Vijaya Kumari, S. K. Lathamba:

Automatic Incorporation of Corrections into Reviewed Documents. 446-451 - Maya Mohan, S. Mary Saira Bhanu:

Performance Comparison of Multicast Routing Protocols for MANETs. 452-454 - Ravindra Kumar Singh, Kanak Saxena, Reena Singh:

Traffic Aware LSP Selection Method in MPLS Networks. 455-457 - R. S. Ambili Chandran, S. Mary Saira Bhanu:

Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks. 458-460 - V. R. Sarma Dhulipala

, V. Aarthy, R. M. Chandrasekaran:
Energy and Fault Aware Management Framework for Wireless Sensor Network. 461-464 - B. Janet

, A. V. Reddy, S. Domnic:
An Image Index Model for Retrieval. 465-467 - N. Bhalaji

, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam:
Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet. 468-474 - S. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj:

Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns. 475-481 - Sahil Seth, Anil Gankotiya

, Gurdit Singh
, Vishal Kumar, Amit Kumar Jaiswal
:
Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks. 482-484 - Dharam Veer Sharma

:
Separation of Machine Printed Roman and Gurmukhi Script Words. 485-490 - Balwinder Singh

, Harpreet Kaur
, Himanshu Monga
:
FPGA Implementation of AES Co-processor in Counter Mode. 491-496 - Shanmugasundaram Hariharan

, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman:
Detecting Plagiarism in Text Documents. 497-500 - Madhusmita Das, Mahamaya Mohanty:

Hiding Relevant Information in an Image. 501-504 - G. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya:

Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques. 505-507 - Arun Mishra

, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra:
Context-Aware System Using .NET Approach. 508-513 - Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo:

Genetic Audio Watermarking. 514-517 - Keyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia:

Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure. 518-520 - N. Bhalaji, Nandini Sundara Raman:

Natural Disaster Impact Assessment Using Genetic Algorithm. 521-526 - Chandrashekar M. Patil, Sudarshan Patilkulkarni

:
An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition. 527-530 - A. Kumar, R. K. Chauhan, Rajan Vohra:

A Framework for Priority-Based Inter Vehicle Communication for Highway Safety. 531-534 - P. S. Revankar, Vijay B. Patil, W. Z. Gandhare:

Data Compression on Embedded System. 535-537 - Chirag Modi

, Udai Pratap Rao, Dhiren R. Patel:
A Survey on Preserving Privacy for Sensitive Association Rules in Databases. 538-544 - G. Geetha

, V. Ragavi
, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya:
Boon and Bane of Curvelet Transform. 545-551 - Urvashi Chugh

, Amit Chugh:
Security in High Performance Computing. 552-556 - V. R. Sarma Dhulipala

, B. Vishnu Prabha, R. M. Chandrasekaran:
Trust Worthy Architecture for Mobile Ad Hoc Network Environment. 557-560 - V. R. Sarma Dhulipala

, K. Kavitha, R. M. Chandrasekaran:
A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks. 561-564 - Aruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala:

Security Solutions to the Phishing: Transactions Based on Security Questions and Image. 565-567 - Egambaram Kodhai, Selvadurai Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya:

CloneManager: A Tool for Detection of Type1 and Type2 Code Clones. 568-570 - Dharam Veer Sharma

, Bibanjot Kaur:
Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification. 571-576 - Inderjeet Kaur

:
An Analysis to BER Performances of Differential OFDM Systems. 577-581 - S. Britto R. Kumar

, S. Albert Rabara:
MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions. 582-585 - Jaisankar Narayanasamy

, Sankaradass Veeramalai, Arputharaj Kannan:
Team Automata Based Framework for Spatio-Temporal RBAC Model. 586-591 - Malay Bhatt, Rituraj Jain

, C. K. Bhensdadia
:
Knowledge Discovery in Feedback System Using Pixel Oriented Technique. 592-594 - Neeraj Kumar Shukla

, Shilpi Birla
, Rakesh Kumar Singh:
Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level. 595-597 - Mamatha Balachandra, K. V. Prema:

Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks. 598-600 - Sukhwant Kaur, H. K. Kaura, Mritunjay Ojha

:
Design Issues for Replacing Credit Card on Mobile Phone. 601-604 - R. Padmavathy, Chakravarthy Bhagvati:

Unknown Key Share Attack on STPKE' Protocol. 605-608 - Sasmita Pani, Mahamaya Mohanty:

An Effective SOA Model for Developing Efficient Systems. 609-612 - Santosh Kumar Pani

, Priya Arundhati
, Mahamaya Mohanty:
Refactoring Interprocedural Dynamic Slicing for Handling Pointers. 613-616 - Mamta Juneja, Parvinder Singh Sandhu:

Image Segmentaion and Steganography for Secured Information Transmission. 617-620 - Surya Prakash Singh:

Ant System Embedded with Local Search for Solving Facility Layout Problem. 621-628 - Asim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb:

Strategic Initiatives and Automated Decision Support with ERP System Environment. 629-635 - Fumihiko Isada:

A Case Study of Strategic Design Management. 636-640 - N. Anitha, C. Selvaraj

:
The Effects of Mannequins on Consumers' Perception and Shopping Attitude. 641-647 - Jaya Chitranshi, Shailja Agarwal:

Knowledge Transfer: Do Instructor Characteristics Matter? 648-655 - Priyanka Verma, R. R. K. Sharma:

Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem. 656-659 - Ritu Sinha, Chandrashekhar Kaushik

:
CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment. 660-664 - Shweta Maheshwari:

HR Roadmap: Becoming a Strategic Business Partner. 665-669 - J. S. Kadam, J. J. Nirmal, M. Y. Khire:

Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra. 670-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














