


default search action
10th ICDCIT 2014: Bhubaneswar, India
- Raja Natarajan:

Distributed Computing and Internet Technology - 10th International Conference, ICDCIT 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings. Lecture Notes in Computer Science 8337, Springer 2014, ISBN 978-3-319-04482-8
Section 1: Invited Talks
- Gérard Berry, Manuel Serrano:

Hop and HipHop: Multitier Web Orchestration. 1-13 - Vivek S. Borkar, Adwaitvedant S. Mathkar:

Reinforcement Learning for Matrix Computations: PageRank as an Example. 14-24 - Elizabeth Buchanan:

The New Normal? - Revisiting Ethical Issues in Internet Research. 25-33 - William Casey, Jose Andre Morales, Thomson Nguyen, Jonathan M. Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bud Mishra:

Cyber Security via Signaling Games: Toward a Science of Cyber Security. 34-42 - Anupam Datta:

Privacy through Accountability: A Computer Science Perspective. 43-49 - François Fages:

Cells as Machines: Towards Deciphering Biochemical Programs in the Cell. 50-67
Section 2: Distributed Computing
- Sonal Patil, Shrutilipi Bhattacharjee, Soumya K. Ghosh:

A Spatial Web Crawler for Discovering Geo-servers and Semantic Referencing with Spatial Features. 68-78 - Pooja Aggarwal, Smruti R. Sarangi:

Software Transactional Memory Friendly Slot Schedulers. 79-85 - Sohini De, Alok Misra

, Suddhasil De
:
An Improved Approach of Decoupling in Mobile Cloud Computing. 86-91 - Narayanan Vignesh, Rengaraj Shankar, Sundararajan Sathyamoorthy, V. Mary Anita Rajam:

Value Added Services on Stationary Vehicular Cloud. 92-97 - Sanjaya Kumar Panda

, Pabitra Mohan Khilar
, Durga Prasad Mohapatra
:
FTM2: Fault Tolerant Batch Mode Heuristics in Computational Grid. 98-104 - Anupama Potluri, Krishna Vutukuri, Garvit Sharma:

SNAPWebD and SNAPSync: A Web Desktop and Transparent sync of NFS and Standalone System Logical Volumes. 105-110
Section 3: Sensor Networks
- Tarachand Amgoth

, Nabin Ghosh, Prasanta K. Jana:
Energy-Aware Multi-level Routing Algorithm for Two-Tier Wireless Sensor Networks. 111-121 - Bhawani Sankar Panda, D. Pushparaj Shetty

:
Minimum Range Assignment Problem for Two Connectivity in Wireless Sensor Networks. 122-133 - Dibakar Saha, Nabanita Das, Shyamosree Pal:

A Digital-Geometric Approach for Computing Area Coverage in Wireless Sensor Networks. 134-145 - Sangeeta Mittal

, Krishna Gopal, Shankar Lall Maskara:
Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation. 146-151
Section 4: Internet Technologies and Applications
- Chiranjib Sur

, Anupam Shukla
:
Discrete Krill Herd Algorithm - A Bio-Inspired Meta-Heuristics for Graph Based Network Route Optimization. 152-163 - Koushik Sinha

, Rabindranath Ghosh, Bhabani P. Sinha:
A New Number System Using Alternate Fibonacci Numbers as the Positional Weights with Some Engineering Applications. 164-175 - Deepa Anand, Bonson Sebastian Mampilli

:
User Profiling Based on Keyword Clusters for Improved Recommendations. 176-187 - Dibyajyoti Guha

, Abhijit Datta Banik
, Veena Goswami
, Souvik Ghosh
:
Equilibrium Balking Strategy in an Unobservable GI/M/c Queue with Customers' Impatience. 188-199 - Arani Bhattacharya

, Ansuman Banerjee, Susmita Sur-Kolay:
Energy-Aware H.264 Decoding. 200-211 - Ganesh Khandu Narwane, Shankara Narayanan Krishna, Anup Kumar Bhattacharjee:

A Cost Effective Approach for Analyzing Software Product Lines. 212-223 - Yogesh Gupta

, Ashish Saini
, A. K. Saxena, Aditi Sharan:
Fuzzy Logic Based Similarity Measure for Information Retrieval System Performance Improvement. 224-232 - Mohamed Mustafa Faisan, S. Durga Bhavani

:
Maximizing Information or Influence Spread Using Flow Authority Model in Social Networks. 233-238
Section 5: Security
- Günter Fahrnberger

:
A Second View on SecureString 2.0. 239-250 - Arjun Datt Sharma, Ansuya Ahluwalia, Shaleen Deep, Divya Bansal:

Friend or Foe: Twitter Users under Magnification. 251-262 - Arkadeep Kundu, Soumya K. Ghosh:

Game Theoretic Attack Response Framework for Enterprise Networks. 263-274 - Y. Sreenivasa Rao

, Ratna Dutta:
Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy. 275-286 - Dwijen Rudrapal

, Smita Das
, Swapan Debbarma
:
Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis. 287-292 - Venkata Swamy Martha, Nitin Agarwal, Srini Ramaswamy:

Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks? 293-298
Section 6: Multimedia
- Debashis Mishra, Isita Bose, Madhabananda Das

, Bhabani Shankar Prasad Mishra
:
Detection and Reduction of Impulse Noise in RGB Color Image Using Fuzzy Technique. 299-310 - Suganya Ramamoorthy, Rajaram Siva Subramanian, Deebika Gandhi:

An Efficient Method for Speckle Reduction in Ultrasound Liver Images for e-Health Applications. 311-321 - Suman Deb

, Subarna Sinha:
Comparative Improvement of Image Segmentation Performance with Graph Based Method over Watershed Transform Image Segmentation. 322-332 - Raghu Raman

, Prema Nedungadi
, Maneesha Vinodini Ramesh
:
Modeling Diffusion of Tabletop for Collaborative Learning Using Interactive Science Lab Simulations. 333-340 - Amit Choudhary

, Savita Ahlawat
, Rahul Rishi:
A Binarization Feature Extraction Approach to OCR: MLP vs. RBF. 341-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














