


default search action
11th ICIT 2008: Bhubaneswar, India
- 2008 International Conference on Information Technology, ICIT '08, Bhubaneswar, India, December 17-20, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-3745-0

- L. Sunil Chandran, Mathew C. Francis, Rogers Mathew

:
Finding a Box Representation for a Graph in O(n2Δ2lnn) Time. 3-8 - Alok Singh

:
A New Heuristic for the Minimum Routing Cost Spanning Tree Problem. 9-13 - Malay K. Pakhira:

Fast Image Segmentation Using Modified CLARA Algorithm. 14-18 - Banshidhar Majhi, Deepak Kumar Sahu, RamNarayan Subudhi:

An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature. 19-23 - Satchidananda Dehuri

, Sung-Bae Cho, Alok Kumar Jagadev:
Honey Bee Behavior: A Multi-agent Approach for Multiple Campaigns Assignment Problem. 24-29 - Malay K. Pakhira, Prasenjit Das:

On Development of a Generalized Visual Stochastic Optimizer. 30-35 - Shakti Prasad Mohanty, B. N. Bhramar Ray, S. N. Patro, Alok Ranjan Tripathy

:
Topological Properties of a New Fault Tolerant Interconnection Network for Parallel Computer. 36-40 - A. R. Bharath Kumar, Pradhan Bagur Umesh:

An Improved Algorithm for Distributed Mutual Exclusion by Restricted Message Exchange in Voting Districts. 41-44 - Satyasai Jagannath Nanda

, Ganapati Panda
, Babita Majhi, Prakash Tha:
Development of a New Optimization Algorithm Based on Artificial Immune System and Its Application. 45-48 - Vivekananda Bhat K.

, Indranil Sengupta, Abhijit Das:
Audio Watermarking Based on BCH Coding Using CT and DWT. 49-50 - Satyendra N. Biswas, Sunil R. Das, Mansour H. Assaf

:
A Novel Technique for Input Vector Compression in System-on-Chip Testing. 53-58 - Alpana Rajan, Anil Rawat, Rajesh Kumar Verma:

Virtual Computing Grid Using Resource Pooling. 59-64 - Vinod Kumar, Kanchan Bokil, Ashwin Nivangune, Peeyush Jain:

Semantics Preserving Micro-Instant Implementation of Synchronous Programs. 65-70 - S. Siva Sathya, K. Naga Seshu:

Synchronous Replica Consistency Protocol with Notification and Response. 71-74 - Nibedita Adhikari

, C. R. Tripathy:
Folded Dualcube: A New Interconnection Topology for Parallel Systems. 75-78 - Pabitra Pal Choudhury, Sudhakar Sahoo, Mithun Chakraborty

:
Implementation of Basic Arithmetic Operations Using Cellular Automaton. 79-80 - T. Sobha Rani, Raju S. Bapi

:
Cascaded Multi-level Promoter Recognition of E. coli Using Dinucleotide Features. 83-88 - Ankit Agrawal

, Xiaoqiu Huang:
Pairwise DNA Alignment with Sequence Specific Transition-Transversion Ratio Using Multiple Parameter Sets. 89-93 - Ankit Agrawal

, Xiaoqiu Huang:
Pairwise Statistical Significance of Local Sequence Alignment Using Substitution Matrices with Sequence-Pair-Specific Distance. 94-99 - Anindya Halder

, Susmita Ghosh
, Ashish Ghosh
:
Aggregation Pheromone Density Based Classification. 100-105 - Asif Ekbal, Sivaji Bandyopadhyay:

Part of Speech Tagging in Bengali Using Support Vector Machine. 106-111 - Abhijit R. Tendulkar, Nikola Stojanovic, Robert Barber:

Web - Enabled Classification of SNPs for Genome - Wide Association Studies. 112-117 - Biswa Ranjan Meher

, Mattaparthi Venkata Satish Kumar
, K. Sen:
Pressure Induced Conformational Dynamics of HIV-1 Protease: A Molecular Dynamics Simulation Study. 118-122 - Swarup Roy

, D. K. Bhattacharyya
:
SCOPE: An Efficient One Pass Approach to Find Strongly Correlated Item Pairs. 123-126 - Chandra Das, Pradipta Maji

:
Prediction of Protein Functional Sites Using Novel String Kernels. 127-130 - Ruchi Jain, Sandeep Ramineni, Nita Parekh

:
Integrated Genomic Island Prediction Tool (IGIPT). 131-132 - Siba K. Udgata

, Shobhit Srivastava, Hitesh Mahajan, Gauri K. Udgata:
Channel Assignment and Reassignment Using Co-channel Cells in Mobile Communication Networks. 135-140 - N. Ashokraj, C. Arun, K. Murugan:

Route Cache Optimization Mechanism Using Smart Packets for On-demand Routing Procotol in MANET. 141-146 - Amrita Bose Paul, Sukumar Nandi

:
Modified Optimized Link State Routing (M-OLSR) for Wireless Mesh Networks. 147-152 - Pabitra Mohan Khilar

, Jitendra Kumar Singh, Sudipta Mahapatra:
Design and Evaluation of a Failure Detection Algorithm for Large Scale Ad Hoc Networks Using Cluster Based Approach. 153-158 - Sanjukta Roychoudhury, Paramartha Dutta

, Biswajit Maiti:
Enhancing Efficiency towards Handling Mobility Uncertainty in Mobile Ad-Hoc Network (MANET). 159-164 - Ash Mohammad Abbas:

A Slotted and Cross-Layer Node-Disjoint Multipath Routing Protocol for Mobile Ad Hoc Networks. 165-170 - Suchismita Chinara, Santanu Kumar Rath

:
Mobility Based Clustering Algorithm and the Energy Consumption Model of Dynamic Nodes in Mobile Ad Hoc Network. 171-176 - Ash Mohammad Abbas:

Overheads and Mean Route Failure Time of a Hybrid Protocol for Node-Disjoint Multipath Routing in Mobile Ad Hoc Networks. 177-182 - Rupesh Kumar, S. V. Rao:

Directional Greedy Routing Protocol (DGRP) in Mobile Ad-Hoc Networks. 183-188 - Siba K. Udgata

, U. Anuradha, G. Pavan Kumar, Gauri K. Udgata:
Assignment of Cells to Switches in a Cellular Mobile Environment Using Swarm Intelligence. 189-194 - Dillip Kumar Puthal, Bibhudatta Sahoo

, Ashok Kumar Turuk
, Mrinal Nandi:
Modified MAC for Priority Traffic with Slow Decrease of Contention Window and Reservation Based Packet Forwarding in IEEE 802.11 for QoS Provisioning. 195-196 - Dillip Kumar Puthal, Bibhudatta Sahoo

:
A Hardware Implementation of Modified MAC Behaviour for Multimedia Traffic in Wireless LAN for QoS. 197-198 - A. Murali M. Rao, Hrushikesha Mohanty:

Design Issues of a Policy Enforcer to Secure Multi-domain Environment. 199-200 - Bikash Shaw, Swapan K. Parui, Malayappan Shridhar:

Offline Handwritten Devanagari Word Recognition: A Holistic Approach Based on Directional Chain Code Feature and HMM. 203-208 - Sapna P. G.

, Hrushikesha Mohanty:
Automated Scenario Generation Based on UML Activity Diagrams. 209-214 - Sumagna Patnaik, Hrushikesha Mohanty:

On Specification of Treatment Modules. 215-220 - Praveen Ranjan Srivastava

, Karthik Anand V, Subba Reddy V., G. Raghurama:
Regression Testing Techniques for Agent Oriented Software. 221-225 - Manik Lal Das:

Secure and Efficient Authentication Scheme for Remote Systems. 226-231 - Ashraf Armoush, Falk Salewski, Stefan Kowalewski:

Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems. 232-237 - Ali Haroonabadi, Mohammad Teshnehlab, Ali Movaghar

:
A Novel Method for Modeling and Evaluation of Uncertain Information Systems. 238-243 - Baikuntha Narayan Biswal, Pragyan Nanda

, Durga Prasad Mohapatra:
A Novel Approach for Scenario-Based Test Case Generation. 244-247 - P. Dhavachelvan, N. Saravanan, K. Satheskumar:

Validation of Complexity Metrics of Agent-Based Systems Using Weyuker's Axioms. 248-251 - Madhusmita Sahu, Durga Prasad Mohapatra

:
Slicing Java Server Pages Application. 252-253 - Anandarup Roy

, Swapan K. Parui, Amitav Paul, Utpal Roy:
Color Based Image Segmentation. 254-255 - Bikash Shaw, Swapan K. Parui, Malayappan Shridhar:

A Segmentation Based Approach to Offline Handwritten Devanagari Word Recognition. 256-257 - Suman Saha

, C. A. Murthy, Sankar K. Pal:
Tensor Space Model for Hypertext Representation. 261-266 - Debajyoti Mukhopadhyay

, Sukanta Sinha:
A New Approach to Design Graph Based Search Engine for Multiple Domains Using Different Ontologies. 267-272 - Hrushikesha Mohanty, Deepak Chenthati, Supriya Vaddi

, R. K. Shyamsundar:
HUMSAT for State Based Web Service Composition. 273-278 - Debajyoti Mukhopadhyay

, Ruma Dutta, Anirban Kundu
, Rana Dattagupta:
A Product Recommendation System Using Vector Space Model and Association Rule. 279-282 - Kamal Sarkar

:
Syntactic Sentence Compression: Facilitating Web Browsing on Mobile Devices. 283-286 - Madhavi Latha Nandi, Gopal Krishna Nayak:

Information Systems Management in Public Sector Organizations. 289-294 - Parijat Upadhyay, Pranab K. Dan:

An Explorative Study to Identify the Critical Success Factors for ERP Implementation in Indian Small and Medium Scale Enterprises. 295-299 - Satya Ranjan Das

, Sanjay Mohapatra
:
Social and Public Impact of ICT Enabled Education. 300-303 - Indranil Bose, Alvin Chung Man Leung

:
Assessment of Phishing Announcements on Market Value of Firms. 304-307

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














