


default search action
9th ICIT 2006: Orissa, India
- Saraju P. Mohanty, Anirudha Sahoo:

9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006. IEEE Computer Society 2006, ISBN 0-7695-2635-7
Bioinformatics and Computational Biology
- (Withdrawn) Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian scope. 3-6

- T. Sobha Rani, S. Durga Bhavani

, Raju S. Bapi
:
Promoter Recognition using dinucleotide Features : A Case Study for E.Coli. 7-10 - Anirban Mukhopadhyay

, Ujjwal Maulik
, Sanghamitra Bandyopadhyay:
Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data. 11-14 - Rudra N. Hota, Vijendran G. Venkoparao, Saad Bedros:

Face Detection by using Skin Color Model based on One Class Classifier. 15-16 - Anshu Bhardwaj, Shrish Tiwari:

Evaluating the Association of Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico Tool E-MIDAS. 17-20 - Laxmi Shankar Rath

:
Ayurinformatics- the application of bioinformatics in the ayurvedic system of medicine. 21-25 - S. T. Patil

, D. S. Bormane:
Electroencephalograph Signal Analysis During Bramari. 26-32
Communication Networks and Protocols
- Nejla Ghaboosi, Abolfazl Toroghi Haghighat:

A Tabu Search Based Algorithm for Multicast Routing with QoS Constraints. 33-39 - Vinod Kone, Sukumar Nandi

:
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. 40-45 - Naval Bhandari, Anirudha Sahoo, Sridhar Iyer:

Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency. 46-51 - Punit Rathod, Srinath Perur, Raghuraman Rangarajan

:
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study. 52-55 - P. Sukendar Reddy, Nityananda Sarma

, Rajib Kumar Das:
Enhancing Fault-Tolerance in a Distributed Mutual Exclusion Algorithm. 56-59 - R. Manoharan, P. Thambidurai:

Hypercube based Team Multicast Routing Protocol for Mobile Ad hoc Networks. 60-63 - Ash Mohammad Abbas:

Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks. 64-67 - Bhagi Sri Karthik, Manish Jaiswal, Vasant Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, Asoke K. Talukder, Debabrata Das

:
Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks. 68-71 - Mayank Mishra, Anirudha Sahoo:

A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs. 72-76 - Upinder Kaur

, R. B. Patel:
Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach. 77-80 - Pabitra Mohan Khilar

, Sudipta Mahapatra:
Design and Evaluation of a Distributed Diagnosis Algorithm in Dynamic Fault Environments For Not-Completely Connected Network. 81-82 - Minghui Zheng, Jianhua Zhu, Guohua Cui:

A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc Networks. 83-84 - Manju Sarvagya:

Uplink Shared Channel in 3rd Generation (UMTS) Cellular System: Performance Analysis and Enhancement. 85-86 - Muthu Tamilarasi, T. G. Palanivelu:

A Strategy to Reduce Control Packet Load of MANETs with Bidirectional Links using DSR. 87-88 - R. Anitha, N. Rajkumar:

Compensation Based Grid Scheduling. 89-93 - A. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty:

A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication Systems. 94-95 - N. Sreenath, Balaji Palanisamy:

Distributed Reconfiguration for Traffic Changes in IP-Over-WDM Networks. 96-97 - Rakesh Chandra Gangwar

, Anil K. Sarje:
Complexity Analysis of Group Key Agreement Protocols for Ad Hoc Networks. 98-99 - Aditya Dhananjay, Debabrata Das

:
Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs. 100-104
Language Processing
- Tapan Kumar Bhowmik, Swapan K. Parui, Ujjwal Bhattacharya, Bikash Shaw:

An HMM Based Recognition Scheme for Handwritten Oriya Numerals. 105-110 - K. Sreenivasa Rao, B. Yegnanarayana:

Voice Conversion by Prosody and Vocal Tract Modification. 111-116 - M. Ezhilarasan, P. Thambidurai:

A Hybrid Transform Coding for Video Codec. 117-120 - Sriparna Saha, Sanghamitra Bandyopadhyay, Ujjwal Maulik

:
A New Symmetry Based Cluster Validity Index: Application to Satellite Image Segmentation. 121-124 - Chitta Baral, Luis Tari:

Using AnsProlog with Link Grammar and WordNet for QA with deep reasoning. 125-128 - Deepa P. Gopinath, J. Divya Sree, Reshmi Mathew, S. J. Rekhila, Achuthsankar S. Nair:

Duration Analysis for Malayalam Text-To-Speech Systems. 129-132 - Nabin Sharma, U. Pal, Fumitaka Kimura:

Recognition of Handwritten Kannada Numerals. 133-136 - Ujjwal Bhattacharya, Bikash Shaw, Swapan K. Parui:

Analysis of Error Sources Towards Improved Form Processing. 137-138 - Deepak Mishra

, Naripeddy Subhash Chandra Bose, Arvind Tolambiya, Ashutosh Dwivedi, Prabhanjan Kandula, Ashiwani Kumar, Prem Kumar Kalra:
Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance Measures. 139-140 - Swarnajyoti Patra

, Susmita Ghosh
, Ashish Ghosh
:
Unsupervised Change Detection in Remote-Sensing Images using One-dimensional Self-Organizing Feature Map Neural Network. 141-142 - Rajeswari Sridhar

, T. V. Geetha:
Swara Indentification for South Indian Classical Music. 143-144 - Nagappa U. Bhajantri, P. Nagabhushan:

Camouflage Defect Identification: A Novel Approach. 145-148
Security, Content Protection, and Digital Rights Management
- Barzan Mozafari, Mohammad Hasan Savoji:

A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. 149-154 - Rajdeep Chakraborty

, J. K. Mandal:
A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT). 155-159 - Yunfang Feng, Zhiyuan Liu, Jun Li:

Securing Membership Control in Mobile Ad Hoc Networks. 160-163 - Dasari Shailaja, Phalguni Gupta:

A Simple Geometric Approach for Ear Recognition. 164-167 - G. Shailaja, K. Phani Kumar, Ashutosh Saxena:

Universal Designated Multi Verifier Signature without Random Oracles. 168-171 - A. Murali M. Rao:

Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. 172-175 - Pawan Kumar Jha, Jyotsna Kumar Mandal:

Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key. 176-177 - Sarbjeet Singh

, Seema Bawa:
Design of a Framework for Handling Security Issues in Grids. 178-179 - Atul Negi

, B. Panigrahi, Munaga V. N. K. Prasad, Madhabananda Das:
A Palmprint Classification Scheme using Heart Line Feature Extraction. 180-181 - N. Nalini

, G. Raghavendra Rao:
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. 182-185 - G. Geethakumari, Atul Negi

, V. N. Sastry:
Indirect Authorization Topologies for Grid Access Control. 186-187 - Anirban Chakraborty, Arnab Chatterjee, S. K. Basu:

Performance of Various Cost Functions in the Search for Strong S-Boxes. 188-189 - Somanath Tripathy

, Sukumar Nandi
, Atanu Roy Chowdhury:
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. 190-191 - K. Ganesan, R. Anandan:

Version Control using Cryptographic Access Control. 192-196
Databases, Information Warehousing, and Data Mining
- R. Pradeep Kumar, P. Nagabhushan, Ahlame Douzal Chouakria:

WaveSim and Adaptive WaveSim Transform for Subsequence Time-Series Clustering. 197-202 - Li Junkui, Wang Yuanzhen, Li Xinping:

LB HUST: A Symmetrical Boundary Distance for Clustering Time Series. 203-208 - Saroj K. Meher

, Ashish Ghosh
, B. Uma Shankar, Lorenzo Bruzzone
:
Neuro-Fuzzy Fusion: A New Approach to Multiple Classifier System. 209-212 - Navneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma:

Improved Bitmap Indexing Strategy for Data Warehouses. 213-216 - Ananta Charan Ojha, Sateesh Kumar Pradhan:

Fuzzy Linguistic Approach to Matchmaking in E-Commerce. 217-220 - Satchidananda Dehuri

, Ashish Ghosh
, Rajib Mall:
Particles with Age for Data Clustering. 221-224 - Shirish S. Sane

, Ashok A. Ghatol:
Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers. 225-228 - R. Gururaj, P. Sreenivasa Kumar:

Cumulative Path Summary for Structurally Dynamic XML Documents. 229-230 - Rashid Ali

, Mirza Mohd. Sufyan Beg:
Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique. 231-234 - Ranjit Abraham, Jay B. Simha, S. S. Iyengar

:
A comparative analysis of discretization methods for Medical Datamining with Naïve Bayesian classifier. 235-236 - Prasanna H. Bammigatti, P. R. Rao:

GenericWA-RBAC: Role Based Access Control Model for Web Applications. 237-240 - M. V. Sudhamani, C. R. Venugopal:

Segmentation of Color Images using Mean Shift Algorithm for Feature Extraction. 241-242 - Ranjan Parekh:

Towards an Architecture of an Image Database. 243-244 - Jay B. Simha, S. S. Iyengar

:
Fuzzy data mining for customer loyalty analysis. 245-246 - Saeed Hassan Hisbani:

A generic prototype for storing and querying XML documents in RDBMS using model mapping methods. 247-248 - Rajesh C. Dash, Chris Hubbard, Stanley J. Robboy, Alan D. Proia:

Designing the "Next Generation" of Medical Information Systems. 249-252
Application Specific Software and Hardware Systems
- Himanshu Thapliyal

, Sumedha K. Gupta:
Design of Novel Reversible Carry Look-Ahead BCD Subtractor. 253-258 - Megha Kothari, Susmita Ghosh

, Ashish Ghosh
:
Aggregation Pheromone Density Based Clustering. 259-264 - Ash Mohammad Abbas, Vibhu Saujanya Sharma

, Anoop Jain:
A Domain Based Prioritized Model forWeb Servers. 265-268 - Bikash Kanti Sarkar, Shahid Jamal, Bhagirath Kumar:

An efficient parallel algorithm for finding the largest and the second largest elements from a list of elements. 269-272 - Amir Kaivani, Ali Zakerolhosseini, Saeid Gorgin

, Mahmood Fazlali
:
Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R. 273-276 - Kundan Kumar

, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Programmable Parallel Structure to perform Galois Field Exponentiation. 277-280 - Sriparna Saha, Susmita Sur-Kolay, Sanghamitra Bandyopadhyay, Parthasarathi Dasgupta:

Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI. 281-284 - Ravinder Thirumala, N. Usha Rani, Timothy A. Gonsalves:

An Event Notification Service based on XML Messaging on Different Transport Technologies. 285-288 - Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mikler, Elias Kougianos, Brandon Parker:

A High Performance ASIC for Cellular Automata (CA) Applications. 289-290 - Vandana Bhattacherjee:

The Soft Computing Approach to Program Development Time Estimation. 291-292 - Shang-Fang Tsai, Shanq-Jang Ruan:

DS2IS: Dictionary-based Segmented Signal Inversion Scheme for Low Power Dynamic Bus Design. 293-296 - Anirban Kundu

, Ruma Dutta, Debajyoti Mukhopadhyay
:
An Alternate Way to Rank Hyper-linked Web-Pages. 297-298 - Sumagna Patnaik:

Primitives for StructuredWorkflow Design: A Mathematical Specification and Analysis. 299-300 - Anita Das

, B. S. Panda, Rajendra P. Lal:
A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphs. 301-304 - Swatee Rekha Mohanty, Durga Prasad Mohapatra

, Himansu Sekhar Behara:
A Novel Approach for Static Slicing of Inter-Procedural Programs. 305-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














