


default search action
8th ICDCIT 2012: Bhubaneswar, India
- Ramaswamy Ramanujam, Srini Ramaswamy:

Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings. Lecture Notes in Computer Science 7154, Springer 2012, ISBN 978-3-642-28072-6 - N. Asokan

, Cynthia Kuo:
Usable Mobile Security. 1-6 - Dusko Pavlovic

, Catherine Meadows:
Actor-Network Procedures - (Extended Abstract). 7-26 - Yoram Moses:

Knowledge as a Window into Distributed Coordination. 27-34 - Lynne E. Parker

:
Decision Making as Optimization in Multi-robot Teams. 35-49 - Nibedita Adhikari

, Chitta Ranjan Tripathy:
Mstar: A New Two Level Interconnection Network. 50-61 - C. Anudeep, Manik Lal Das:

An Improved Scheme for False Data Filtering in Wireless Sensor Networks. 62-70 - Jhansi Vazram Bolla, Valli Kumari Vatsavayi

, J. V. R. Murthy:
Anonymity and Security in Mobile Ad Hoc Networks. 71-82 - Ayan Dutta, Sruti Gan Chaudhuri, Suparno Datta, Krishnendu Mukhopadhyaya:

Circle Formation by Asynchronous Fat Robots with Limited Visibility. 83-93 - Vaithianathan Geetha

, Niladhuri Sreenath
:
High Concurrency for Continuously Evolving OODBMS. 94-105 - J. Hanumanthappa, D. H. Manjaiah:

A New Scheme for IPv6 BD-TTCS Translator. 106-116 - Shankara Narayanan Krishna, Lakshmi Manasa, Ashish Chiplunkar:

Nash Equilibrium in Weighted Concurrent Timed Games with Reachability Objectives. 117-128 - Tarun Kumar, Parikshit Sondhi, Ankush Mittal:

Parallelization of PageRank on Multicore Processors. 129-140 - Chunguang Ma, Ding Wang

, Qi-Ming Zhang:
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. 141-152 - Hrushikesha Mohanty:

An Algebra of Social Distance. 153-165 - Anil Mundra, Anish Mathuria, Manik Lal Das:

Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation. 166-176 - Bhawani Sankar Panda, D. Pushparaj Shetty

, Bijaya Kishor Bhatta:
Strong Minimum Energy Minimum Interference Topology in Wireless Sensor Networks. 177-187 - Arun Pande, Sanjay Kimbahune, Nandini Bondale, Ratnendra Shinde, Sunita Shanbhag:

Distributed Processing and Internet Technology to Solve Challenges of Primary Healthcare in India. 188-199 - Nidhi Patel, Sanjay Srivastava:

Packet Forwarding Strategies for Cooperation Enforcement in Mobile Ad Hoc Wireless Networks. 200-211 - R. S. M. Lakshmi Patibandla, Santhi Sri Kurra

, Nirupama Bhat Mundukur
:
A Study on Scalability of Services and Privacy Issues in Cloud Computing. 212-230 - Chhavi Rana

, Sanjay Kumar Jain:
A Recommendation Model for Handling Dynamics in User Profile. 231-241 - Dhairya Vora, Sanjay Chaudhary

, Minal Bhise
, Vikas Kumar, Gaurav Somani:
Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud. 242-252 - Manik Lal Das:

Grids Security without Public Key Settings. 253-254 - Mustafa Kaiiali, Chillarige Raghavendra Rao, Rajeev Wankar

, Arun Agarwal
:
Concurrent HCM for Authorizing Grid Resources. 255-256 - Snehal Masne, Rajeev Wankar

, Chillarige Raghavendra Rao, Arun Agarwal
:
Seamless Provision of Cloud Services Using Peer-to-Peer (P2P) Architecture. 257-258 - Meenakshi Panda, Pabitra Mohan Khilar

:
Distributed Fault Tolerant Estimation in Wireless Sensor Network Using Robust Diffusion Adaptation. 259-260 - Trilochan Panigrahi, Ganapati Panda

, Bernard Mulgrew:
Robust Distributed Block LMS over WSN in Impulsive Noise. 261-262 - Ji Su Park, Heon-Chang Yu

, EunYoung Lee:
Resource Allocation Techniques Based on Availability and Movement Reliability for Mobile Cloud Computing. 263-264 - A. B. Sagar:

Transparency Computation for Work Groups. 265-266 - Wei Shi, Feng Luo, Pradip K. Srimani:

A New Hierarchical Structure of Star Graphs and Applications. 267-268 - Ramesh Thakur, Suresh Jain

, Narendra S. Chaudhari:
Incremental Discovery of Sequential Pattern from Semi-structured Document Using Grammatical Inference. 269 - K. Thirusangu

, D. Gnanaraj Thomas, B. J. Balamurugan
:
Group Associated Petri Nets in Bio Computing. 270-271 - Supriya Vaddi

:
Concept Map Based Service Specification and Discovery. 272-273 - Sandeep Vasani, Mohit Pandey, Minal Bhise

:
Semantic Search Using Constrained Spread Activation for Semantic Digital Library. 274-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














