


default search action
10. CISIM 2011: Kolkata, India
- Nabendu Chaki, Agostino Cortesi:

Computer Information Systems - Analysis and Technologies - 10th International Conference, CISIM 2011, Kolkata, India, December 14-16, 2011. Proceedings. Communications in Computer and Information Science 245, Springer 2011, ISBN 978-3-642-27244-8
Keynote and Plenary Lectures
- Young Im Cho:

The Future of Intelligent Ubiquitous Computing Systems. 1-3 - Dipankar Dasgupta:

Who Is Responsible for Security and Privacy in the Cloud? 4 - Aditya Ghose:

The Optimizing Web: Leveraging Agent Technology for Sustainability. 5-8 - Massimiliano Albanese

, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian:
Scalable Detection of Cyber Attacks. 9-18 - Dong Hwa Kim, Khalid Saeed, Cha Geun Jung:

An Effective Research of Emotion. 19-21 - Heinrich Voss, Jörg Lampe

:
Regularization of Large Scale Total Least Squares Problems. 22-37
Networking and Its Applications
- Chandreyee Chowdhury, Sarmistha Neogy:

Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET. 38-47 - Michal Choras, Rafal Kozik

:
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. 48-54 - Anupam Saha, Rituparna Chaki:

VAMI - A Novel Architecture for Vehicular Ambient Intelligent System. 55-64 - Subhendu Barat, Ashok Kumar Pradhan, Tanmay De:

A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network. 65-73
Agent-Based Systems
- Mohamed Achraf Dhouib, Lamine Bougueroua, Katarzyna Wegrzyn-Wolska

:
Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent Approach. 74-84 - Debdutta Barman Roy, Rituparna Chaki:

MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. 85-94 - Rakesh Kumar Mishra

, Suparna Saha, Sankhayan Choudhury, Nabendu Chaki
:
Agent Based Approach for Radio Resource Optimization for Cellular Networks. 95-104
Biometric Applications
- Piotr Panasiuk, Khalid Saeed:

Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. 105-112 - Jakub Karwan, Khalid Saeed:

A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech. 113-120 - Michal Choras, Rafal Kozik

:
Fast Feature Extractors for Palmprint Biometrics. 121-127
Pattern Recognition and Image Processing
- Rafal Doroz

, Piotr Porwik
:
Handwritten Signature Recognition with Adaptive Selection of Behavioral Features. 128-136 - Kamil Surmacz, Khalid Saeed:

Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor. 137-144 - Arijit Sinharay, Syed Mohd Bilal, Tanushyam Chattopadhyay:

A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence Plot. 145-151 - Tomás Kocyan, Jan Martinovic

, Jiri Dvorský, Václav Snásel:
Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann law. 152-160 - Soharab Hossain Shaikh

, Asis Kumar Maiti, Nabendu Chaki
:
On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method. 161-169 - Pramit Ghosh

, Debotosh Bhattacharjee
, Mita Nasipuri, Dipak Kumar Basu:
Medical Aid for Automatic Detection of Malaria. 170-178
Industrial Applications
- Pouyeh Rezazadeh:

Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment Analysis. 179-191 - Antonio Candiello, Agostino Cortesi

:
KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment. 192-201 - Sudip Kundu, Sriyankar Acharyya:

Stochastic Local Search Approaches in Solving the Nurse Scheduling Problem. 202-211
Algorithmic Applications and Data Management
- Jyotsna Kumar Mandal

, Somnath Mukhopadhyay
:
GA Based Denoising of Impulses (GADI). 212-220 - Sangeeta Sen

, Rituparna Chaki:
Handling Write Lock Assignment in Cloud Computing Environment. 221-230 - Sundarapandian Vaidyanathan

, Sarasu Pakiriswamy:
The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems. 231-238 - Lukás Vojácek

, Jan Martinovic
, Jiri Dvorský, Katerina Slaninová
, Ivo Vondrák:
Parallel Hybrid SOM Learning on High Dimensional Sparse Data. 239-246 - Abhijit Sanyal

, Sankhayan Choudhury:
Operational Algebra for a Graph Based Semantic Web Data Model. 247-256 - Supriya Chakraborty

, Nabendu Chaki
:
A Survey on the Semi-Structured Data Models. 257-266
Information and Network Security
- Raju Halder

, Agostino Cortesi
:
Observation-Based Fine Grained Access Control for XML Documents. 267-276 - Subhasis Dasgupta

, Aditya Bagchi:
Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology. 277-285 - Prabir Kumar Naskar

, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri:
Secret Image Sharing with Embedded Session Key. 286-294 - Anna Bartkowiak:

Command and Block Profiles for Legitimate Users of a Computer Network. 295-304 - Uttam Kr. Mondal

, Jyotsna Kumar Mandal
:
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). 305-313 - Riti Chowdhury, Debashis De:

Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques. 314-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














