


default search action
CUBE 2012: Pune, India
- Vidyasagar M. Potdar, Debajyoti Mukhopadhyay:

CUBE International IT Conference & Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012. ACM 2012, ISBN 978-1-4503-1185-4
Image processing track
- Siddhartha Banerjee, Subhabrata Datta, Biplab Paul, Sanjoy Kumar Saha:

Segmentation of three phase micrograph: an automated approach. 1-4 - Priyanka Srivastava, Prateek Gupta, Satyam Bhardwaj, Vikrant Bhateja

:
A new model for performance evaluation of denoising algorithms based on image quality assessment. 5-10 - Yuri L. Borissov, Moon Ho Lee:

Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequences. 11-16 - Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal:

An attempt to ensure security of payload by targeting non-linear seed pixel positions in carrier image. 17-20 - Arijit Ghosal

, Rudrasis Chakraborty, Bibhas Chandra Dhara, Sanjoy Kumar Saha:
Song/instrumental classification using spectrogram based contextual features. 21-25 - Siddharth, Rohit Gupta, Vikrant Bhateja

:
A log-ratio based unsharp masking (UM) approach for enhancement of digital mammograms. 26-31 - Sonam Singh, Akshat Jain, Vikrant Bhateja

:
A comparative evaluation of various de-speckling algorithms for medical images. 32-37 - Archana Deka, Kandarpa Kumar Sarma

:
SVD and PCA features for ANN based detection of diabetes using retinopathy. 38-41 - Bhabesh Deka

, Dipranjan Baishnab:
Removal of random-valued impulse noise using overcomplete DCT dictionary. 42-46 - Alok Kumar Singh Kushwaha

, Maheshkumar H. Kolekar, Ashish Khare:
Vision based method for object classification and multiple human activity recognition in video survelliance system. 47-52 - Amiya Halder, Avijit Dasgupta:

Image segmentation using rough set based k-means algorithm. 53-58 - Neetesh Saxena

, Narendra S. Chaudhari
:
A secure approach for SMS in GSM network. 59-64 - Akshat Jain, Vikrant Bhateja

:
A versatile denoising method for images contaminated with Gaussian noise. 65-68 - D. N. D. Harini, Dhavala Lalitha Bhaskari

:
Image retrieval system based on feature extraction and relevance feedback. 69-73 - R. Gagan, Hardik Sanghavi, S. Ramachandran, K. Manikantan:

Circular sector DCT based feature extraction for enhanced face recognition using histogram based dynamic gamma intensity correction. 74-81 - Naveen N. Murthy, R. Raghunandana, K. Manikantan, S. Ramachandran:

Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing technique. 82-89 - Jaya Thomas, Narendra S. Chaudhari

:
An analytical approach for column generation for one-dimensional cutting stock problem. 90-94 - R. Divya, Anwesha Rath, S. Ramachandran, K. Manikantan:

Astroid shaped DCT feature extraction for enhanced face recognition. 95-101 - Madhavi Gudavalli, S. Viswanadha Raju, K. S. M. V. Kumar:

A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits. 102-107 - C. Kalaiselvan, A. SivananthaRaja:

Investigation on tracking system for real time video surveillance applications. 108-112 - Ajit Danti, M. Suresha:

Texture based decision tree classification for Arecanut. 113-117 - Shashidhar G. Koolagudi, Shan E. Fatima

, K. Sreenivasa Rao:
Speaker recognition in the case of emotional environment using transformation of speech features. 118-123 - Pankaj P. Chitte

, J. G. Rana, Sachin Taware:
Iris recognition based security system using RFID. 124-127 - Sunil B. Mane

, Sandip B. Bansode, Pradeep K. Sinha:
Optimized private information retrieval using graphics processing unit with reduced accessibility. 128-132
Networks track
- Sansar Singh Chauhan, M. M. Gore:

LDC-MAC: low latency DC-MAC protocol for wireless sensor network. 133-137 - Anand Pandya

, Mrudang Mehta:
A novel energy efficient routing approach using multipath ring routing and clustering for WSN. 138-143 - Siba Mitra

, Ajanta De Sarkar
, Sarbani Roy
:
A review of fault management system in wireless sensor network. 144-148 - Avishek Mukhopadhyay, Sarbani Roy

, Nandini Mukherjee:
An approach of beacon placement and beacon based routing towards mobile sink in WSN. 149-154 - Abhineet Anand

, Vikas Kumar Sihag, S. N. Gupta:
Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: a survey. 155-159 - Tamal Chakraborty, Iti Saha Misra, Salil Kumar Sanyal:

Design and study of VoIP model in cognitive radio network under different simulation platforms. 160-165 - Mohammad Wazid

, Roshan Singh Sachan, R. H. Goudar:
Performance of a LAN under different ethernet wiring standards. 166-172 - Milind Pande, Vishal Pawar:

Mobile number portability (MNP): service providers perspective (pros & cons). 173-176 - Pooja Soman, Shishir B. Sahay:

Chirp Parameter Estimation - A New View Through Filters. 177-179 - Milind Pande, Neha Patel:

Regional study of telecom technology options for Indian rural education: with special reference to Vidarbha region, Maharashtra, India. 180-185 - Ashish Tanwer

, Rishika Mehta, Tauqir Azam:
High capacity service provider design using GPMLS for IP next generation networks. 186-191 - R. Harish, L. Swarna Jyothi:

Design and verification of flexray to CAN protocol converter node. 192-197 - Milind Pande, N. K. Choudhari, Shantanu Pathak:

Energy efficient hybrid architecture and positioning of sensors in WSN for precision agriculture. 198-203 - Suman Sangwan

, Parvinder Singh
, R. B. Patel:
Periodic route selection for secure packet delivery. 204-209 - Suman Sangwan

, Parvinder Singh
, R. B. Patel:
UIVH-algorithm for seamless mobility in heterogeneous wireless network. 210-215 - Ashish Tanwer

, Rishika Mehta, Tauqir Azam:
Scaling service provider backbone using BGP confederations for next generation networks. 216-221 - Sankirti Sandeep Shiravale

, Sumedha Sirsikar
, Debajyoti Mukhopadhyay
:
IP v6 secure tunneling mechanism. 222-225
Artificial intelligence track
- Seema Purohit, Krantee Jamdaade

:
Rule based system to facilitate the immunity of HIV/AIDS patients using Ayurveda therapy. 226-234 - Sarfaraz Masood

, Pravin Chandra
:
Training neural network with zero weight initialization. 235-239 - Santosh Kumar Bharti

, Shashidhar G. Koolagudi, K. Sreenivasa Rao, Ankur Choudhary, Binod Kumar:
Voice conversion using linear prediction coefficients and artificial neural network. 240-245 - Meeta Kumar, Jayshree Ghorpade, Vrushali Y. Kulkarni

, Rajni Bedi:
Neural network based smart vision system for driver assistance in extracting traffic signposts. 246-251 - Madhumita Kedlaya, Harsha Bhatia, S. Ramachandran, K. Manikantan:

Novel KNN-motivation-PSO and its application to image segmentation. 252-258 - Sanyukta Chetia, Kandarpa Kumar Sarma

:
SOM based dimension reduction techniques for quaternary protein structure prediction. 259-262 - Hari Mohan Pandey

, Anurag Dixit, Deepti Mehrotra
:
Genetic algorithms: concepts, issues and a case study of grammar induction. 263-271 - Kishorjit Nongmeikapam

, Sivaji Bandyopadhyay:
SVM based Manipuri POS tagging using SVM based identified reduplicated MWE (RMWE). 272-277 - Aniruddha M. Ujlambkar, Vahida Z. Attar

:
Mood classification of Indian popular music. 278-283 - Abhijeet Godase, Vahida Attar

:
Classifier Ensemble for Imbalanced Data Stream Classification. 284-289 - M. S. Shirdhonkar, Manesh Kokare:

Off-line handwritten signature retrieval. 290-293 - Parismita Gogoi

, Kandarpa Kumar Sarma
:
Recurrent neural network based channel estimation technique for STBC coded MIMO system over Rayleigh fading channel. 294-298 - Mousmita Sarma, Kandarpa Kumar Sarma:

Recognition of Assamese phonemes using three different ANN structures. 299-302 - B. Saleena

, S. K. Srivatsa:
ConSim: an enhanced semantic similarity measure to find the relationship between concepts in cross ontology. 303-307 - Yashodhara V. Haribhakta, Santosh Kalamkar, Parag A. Kulkarni

:
Feature annotation for text categorization. 308-313 - Yashodhara V. Haribhakta, Arti Malgaonkar, Parag A. Kulkarni

:
Unsupervised topic detection model and its application in text categorization. 314-319 - Sangeeta Jadhav, Manish R. Joshi

, Jyoti Pawar:
Modeling BharataNatyam dance steps: art to SMart. 320-325 - Sonia Sunny, S. David Peter, K. Poulose Jacob:

A comparative study of parametric coding and wavelet coding based feature extraction techniques in recognizing spoken words. 326-331 - Arnab Mitra

, Anirban Kundu
:
CA based cost optimized PRNG for Monte-Carlo simulation of distributed computation. 332-337 - Pornpit Wongthongtham, K. Siripun, P. Jitsangiam:

Visualization of road segment for road analysis and design. 338-343 - Preety Sharma, Sansar Singh Chauhan, Sandeep Saxena

:
Multihop/direct forwarding for 3D wireless sensor networks. 344-349
Software engineering track
- Samer Al-Zain, Derar Eleyan

, Joy Garfield
:
Automated user interface testing for web applications and TestComplete. 350-354 - Preeti Kaur, Priti Bansal

, Ritu Sibal:
Prioritization of test scenarios derived from UML activity diagram using path complexity. 355-359 - Sushama Nagpal, Anjana Gosain, Sangeeta Sabharwal:

Complexity metric for multidimensional models for data warehouse. 360-365 - Shiv Nath Kumar, Sagun Baijal, Leena Chourey, Aparna Ramamurthy, M. Sasikumar:

Conceptualizing a desktop environment for cognitively challenged people. 366-370 - Carlos Huertas, Reyes Juárez-Ramírez:

NLARE, a natural language processing tool for automatic requirements evaluation. 371-378 - Radha Vedala, Simhadri Anil Kumar:

Automatic detection of printf format string vulnerabilities in software applications using static analysis. 379-384 - Nitin Uikey, Ugrasen Suman:

An empirical study to design an effective agile project management framework. 385-390 - Ritu Arora

, Sanjay Goel:
Collaboration in software development: a spotlight. 391-396 - Jitender Choudhari, Ugrasen Suman:

Phase wise effort estimation for software maintenance: an extended SMEEM model. 397-402 - Aparup Khatua, Nabendu Chaki

:
Sustainable peer-based structure for content delivery networks. 403-408 - R. Kamatchi:

A service oriented life cycle model for educational information system. 409-412 - M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran:

A collaborative framework for evaluation of run-time changes in enterprise web services. 413-418
Bioinformatics track
- Ramamani Tripathy

, Debahuti Mishra
, Rudra Kalyan Nayak
:
Endogenous rice (Oryza Sativa) miRNAs and their potential targets against Rice Tungro Virus using various string matching algorithms. 419-423 - Anurag Pal, Debahuti Mishra

, Shruti Mishra
, Sandeep Kumar Satapathy
:
A comparative study on homology modeling of P-glycoprotein (P-gp) structure using computational approach. 424-428 - James Carmichael

:
Classifying voice quality via pitch and spectral analysis. 429-434 - Ali Alatabbi, Maxime Crochemore, Costas S. Iliopoulos, Tewogboye A. Okanlawon:

Overlapping repetitions in weighted sequence. 435-440 - Ali Alatabbi, Maxime Crochemore, Jacqueline W. Daykin

, Laurent Mouchard:
Lyndon fountains and the Burrows-Wheeler transform. 441-446
Databases track
- Supriya Chakraborty

, Nabendu Chaki
:
DFRS: a domain-based framework for representing semi-structured data. 447-452 - Rashmi Rekha Sahoo, Smita Prava Mishra, Debahuti Mishra

:
Rough-FS: a feature selection method for classification of gene expression data set using rough set. 453-458 - Dipalee Shah, Rajesh Ingle

:
Privacy-preserving deletion to generalization-based anonymous database. 459-463 - Sangeeta Viswanadham

, Vatsavayi Valli Kumari
:
An efficient approach to identify n-wMVD for eliminating data redundancy. 464-469 - Prasun Dutta

, Rituparna Chaki:
A survey of data mining applications in water quality management. 470-475 - Sushan Chakraborty, Madhulina Sarkar, Nandini Mukherjee:

Implementation of execution history in non-relational databases for feedback-guided job modeling. 476-482
Smart grid track
- A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar

, Monica H. Ou:
Prosumer management in socio-technical smart grid. 483-489 - (Withdrawn) Turnaround time based job scheduling algorithm in dynamic grid computing environment. 490-493

- Monica H. Ou, Jérôme Maillot:

Association rule variation with respect to time. 494-500
e-learning track
- Haji Binali, Vidyasagar M. Potdar

:
Emotion detection state of the art. 501-507 - Lenuta Alboaie, Mircea-Florin Vaida, Diana Pojar:

Alternative methodologies for automated grouping in education and research. 508-513 - Manish R. Joshi

, Lall Manoj, O. Olugbara Oludayo, Michael M. Modiba, Virendrakumar C. Bhavsar:
Automated matchmaking of student skills and academic course requisites. 514-519
Cloud computing track
- A. Vani Vathsala

, Hrushikesha Mohanty:
Using HMM for predicting response time of web services. 520-525 - Gauri S. Bhange, Swapnaja R. Hiray:

Dental patient records maintenance on cloud computing using data protection model. 526-531 - V. Santhosh Kumar Tangudu, Manoj Mishra:

Estimating makespan using double trust thresholds for workflow applications. 532-536 - Gaurangkumar Khalasi, Minubhai Chaudhari:

TrustGK monitor: 'customer trust as a service' for the cloud. 537-543 - Khalid Mohiuddin

, Asharul Islam
, Aftab Alam, Awais Ali:
24X7X365: mobile cloud access. 544-551 - Nitin S. More

, Swapnaja R. Hiray:
Load balancing and resource monitoring in cloud. 552-556 - Hiren B. Patel, Dhiren R. Patel, Jagdish Chaudhari, Sachin Patel, Kaushik Prajapati:

Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing. 557-560 - Manu Vardhan

, Nidhi Jain, Shakti Mishra
, Dharmender Singh Kushwaha:
A demand based fault tolerant file replication model for clouds. 561-566 - Jagdish Chandra Patni

, Nitin Trivedi, Om Prakash Pal, Pradeep Chauhan, Anubhav Sharma
:
An optimal approach of load balancing for grid computing. 567-571 - T. Bharat Kumar, C. Rajendra, A. Srilakshmi, Venu Madhav Kuthadi:

A catholic and enhanced study of temporal visual backchannel for dynamically changing events in SNs present in clouds. 572-578
Mobile computing track
- Sangeeta Mittal

, Alok Aggarwal
, S. L. Maskara:
Situation recognition in sensor based environments using concept lattices. 579-584 - Suman Bala, Gaurav Sharma, Anil K. Verma

:
A survey and taxonomy of symmetric key management schemes for wireless sensor networks. 585-592
Management information systems track
- Atsushi Kato:

Software industry in Okinawa: the critical success factors for the Japanese Bangalore. 593-597 - Andrés Mejía-Figueroa, Reyes Juárez-Ramírez, Sergio Inzunza, Rocio Valenzuela:

Implementing adaptive interfaces: a user model for the development of usability in interactive systems. 598-604 - Diego Edixon Rodriguez Segura, Victor Hugo Medina García

:
Model of knowledge management in an intelligent individual public transport to taxi. 605-610
e-commerce track
- Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay

:
Designing an ontology based domain specific web search engine for commonly used products using RDF. 612-617 - Jie Liu:

The key cornerstones to successful B2C: a case study of an online grocer in China. 618-622 - Saurabh Wadwekar, Debajyoti Mukhopadhyay

:
A ranking algorithm integrating vector space model with semantic metadata. 623-628 - Sanjeev Kumar Sharma

, Ugrasen Suman:
Comparative study and analysis of web personalization frameworks of recommender systems for e-commerce. 629-634 - Supriya Vaddi

, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. 635-640 - Shiladitya Munshi, Ayan Chakraborty, Debajyoti Mukhopadhyay

:
A hybrid graph based framework for integrating information from RDF and topic map: a proposal. 641-646 - Saurabh Deochake

, Suresh Sarode, Shashank Kanth, Vidyasagar M. Potdar
, Subhadip Chakraborty, Debajyoti Mukhopadhyay
:
HENRI: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internet. 647-652 - Debajyoti Mukhopadhyay

, Archana Chougule
:
An approach to manage ontology dynamically based on web service composition requests. 653-658 - Sunil B. Mane

, Suraj T. Sawant
, Pradeep K. Sinha:
Using private information retrieval protocol for an e-commerce application. 659-663
WWW track
- A. B. Sagar:

Modeling collaborative task execution in social networks. 664-669 - Abhinav Kumar Gupta, Glitto Mathew:

Item recommender system by incorporating metadata information into ternary semantic analysis. 670-675 - Pragya Dwivedi

, Kamal Kant Bharadwaj:
e-learning recommender system for learners in online social networks through association retrieval. 676-681 - Meera Mudholkar, Jagannath Aghav, Saloni Peswani, Härish Jädhäø, Seema Kela, S. K. Hiremath:

Visualizing semantic web. 682-687 - Vishwas Raval, Padam Kumar, Yogeshwar Prasad Kosta

:
SEReleC# - C# implementation of SEReleC: a meta search engine based on combinatorial search and search keyword based link classification. 688-693 - A. B. Sagar:

Dependability of social network groups. 694-700 - Vikas Kumar Sihag:

A clustering approach for structural k-anonymity in social networks using genetic algorithm. 701-706 - Meera Narvekar

, Rashmi Ravikumar, S. S. Mantha:
Personalization of mobile value added services. 707-711 - A. B. Sagar:

Modeling transparency and collaborativeness in distributed work groups. 712-717 - Rahul Moriwal, Vijay Prakash

:
An efficient info-gain algorithm for finding frequent sequential traversal patterns from web logs based on dynamic weight constraint. 718-723
Information security track
- Vidyasagar M. Potdar

, Farida Ridzuan
, Jaipal Singh:
Spam 2.0. 724-731 - Pedram Hayati, Nazanin Firoozeh, Vidyasagar M. Potdar

, Kevin Chai
:
How much money do spammers make from your website? 732-739 - Kyung-kug Kim, Myung-Hwan Kim:

An improved anonymous authentication and key exchange scheme. 740-743 - Ankur Choudhary

, Sanjay Pratap Singh Chauhan
, Mohd. Afshar Alam, Safdar Tanveer:
Schur decomposition and dither modulation: an efficient and robust audio watermarking technique. 744-748 - Kumar Sourav, Debi Prasad Mishra

:
DDoS detection and defense: client termination approach. 749-752 - P. L. V. Vihari, Manoj Mishra:

Chaotic image encryption on GPU. 753-758 - Sandeep Singh, Priyanka Ahlawat

:
Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem. 759-763 - Sarnali Saha, Asmita Nag

:
Comparison of policy specification languages for access control. 764-770 - Aziz Qaroush, Ismail M. Khater, Mahdi Washaha:

Identifying spam e-mail based-on statistical header features and sender behavior. 771-778 - Pallavi Khatri

, Shashikala Tapaswi, Udai P. Verma:
Trust evaluation in wireless ad hoc networks using fuzzy system. 779-783 - P. Rajesh

, G. Narasimha, Ch. Rupa
:
Fuzzy based privacy preserving classification of data streams. 784-788 - Deepika Dutta Mishra, C. S. R. C. Murthy, Kislay Bhatt, A. K. Bhattacharjee, R. S. Mundada:

Development and performance analysis of HPC based framework for cryptanalytic attacks. 789-794 - Pragya Jain, Anjali Sardana:

Defending against internet worms using honeyfarm. 795-800 - Anirban Sengupta

, Chandan Mazumdar, Aditya Bagchi:
Specification and validation of enterprise information security policies. 801-808 - Jaya Bhattacharjee, Anirban Sengupta

, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. 809-815 - Heasuk Jo, Seungjoo Kim

, Dongho Won:
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer. 816-819 - Mourad Elloumi, Pedram Hayati, Costas S. Iliopoulos, Solon P. Pissis

, Arfaat Shah:
Detection of fixed length web spambot using REAL (read aligner). 820-825 - Vidyasagar M. Potdar

, Yan Like, Nazanin Firoozeh, Debajyoti Mukhopadhyay
, Farida Ridzuan
, Dhiren Tejani:
The changing nature of Spam 2.0. 826-831 - Bambang Harjito

, Vidyasagar M. Potdar
, Jaipal Singh:
Watermarking technique for wireless multimedia sensor networks: a state of the art. 832-840 - Sheetal Devidas Rathod, Kota Solomon Raju

, S. A. Akbar:
Design and simulation of adaptive PID controller powered by PWM signals to actuate DC motor drive system used in climbing robot. 841-846 - Ritu Tiwari

, Abhishek Jain:
Improving network security and design using honeypots. 847-852 - Vivek S. Deshpande, Jagdish B. Helonde, Vijay Wadhai, Vidyasagar M. Potdar, A. J. Dinusha Rathnayaka:

Handling the Quality of Service for the data dissemination in Wireless Sensor Networks. 853-856 - Rajesh Yerneni, Anil K. Sarje:

Enhancing performance of AODV against Black hole Attack. 857-862

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














