


default search action
11th ICDCIT 2015: Bhubaneswar, India
- Raja Natarajan, Gautam Barua, Manas Ranjan Patra:

Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings. Lecture Notes in Computer Science 8956, Springer 2015, ISBN 978-3-319-14976-9
Invited Papers
- Massimo Bartoletti, Tiziana Cimoli, G. Michele Pinna, Roberto Zunino

:
Models of Circular Causality. 1-20 - Nikolaj S. Bjørner, Karthick Jayaraman:

Checking Cloud Contracts in Microsoft Azure. 21-32 - Manik Lal Das:

Privacy and Security Challenges in Internet of Things. 33-48 - Konstantinos Chatzikokolakis, Catuscia Palamidessi

, Marco Stronati:
Geo-indistinguishability: A Principled Approach to Location Privacy. 49-72 - Nabeel Nasir, Kartik Palani, Amandeep Chugh, Vivek Chil Prakash, Uddhav Arote, Anand P. Krishnan

, Krithi Ramamritham:
Fusing Sensors for Occupancy Sensing in Smart Buildings. 73-92 - Xin An, Gwenaël Delaval, Jean-Philippe Diguet, Abdoulaye Gamatié, Soguy Mak Karé Gueye, Hervé Marchand, Noël De Palma, Éric Rutten:

Discrete Control-Based Design of Adaptive and Autonomic Computing Systems. 93-113 - Sanjiva Prasad:

Designing for Scalability and Trustworthiness in mHealth Systems. 114-133 - Laxmi Parida, Niina Haiminen

, David Haws, Jan Suchodolski:
Host Trait Prediction of Metagenomic Data for Topology-Based Visualization. 134-149 - Bud Mishra:

Gappy Total Recaller: Efficient Algorithms and Data Structures for Accurate Transcriptomics. 150-161
Distributed Computing and Algorithms
- Pankaj Sahu, Prachi Agrawal, Vikram Goyal, Debajyoti Bera:

Finding RkNN Set in Directed Graphs. 162-173 - Avik Chatterjee, Sruti Gan Chaudhuri, Krishnendu Mukhopadhyaya:

Gathering Asynchronous Swarm Robots under Nonuniform Limited Visibility. 174-180 - Manish Gaur

, Simon J. Gay, Ian Mackie:
A Routing Calculus with Flooding Updates. 181-186 - Bhawani Sankar Panda, D. Pushparaj Shetty

, Arti Pandey:
k-Distinct Strong Minimum Energy Topology Problem in Wireless Sensor Networks. 187-192 - Kaushik Mondal, Arindam Karmakar, Partha Sarathi Mandal:

Path Planning Algorithm for Mobile Anchor in Connected Sensor Networks. 193-198 - Sangharatna Godboley, Subhrakanta Panda

, Durga Prasad Mohapatra:
SMCDCT: A Framework for Automated MC/DC Test Case Generation Using Distributed Concolic Testing. 199-202 - Reema Patel

, Kevin Patel
, Dhiren R. Patel:
On-the-Fly Symmetry Reduction of Explicitly Represented Probabilistic Models. 203-206
Internet Technologies and Web Services
- A. Vani Vathsala

, Hrushikesha Mohanty:
Time and Cost Aware Checkpointing of Choreographed Web Services. 207-219 - Lakshmi H. N.

, Hrushikesha Mohanty:
A Preprocessing of Service Registry: Based on I/O Parameter Similarity. 220-232 - Ramkumar Iyer, Sanjeevi Moorthy:

Financial Risk Management in e-commerce Using Executable Business Process Modeling Notation. 233-238 - Kanchana Rajaram

, Chitra Babu
, Akshaya Ganesan:
DILT: A Hybrid Model for Dynamic Composition and Execution of Heterogeneous Web Services. 239-244 - Debendra Kumar Naik, Smita Kumari, Santanu Kumar Rath:

Application of Soft Computing Technique for Web Service Selection. 245-248 - Rafi U. Zaman

, Khaleel Ur Rahman Khan
, A. Venugopal Reddy:
Weighted Load Balanced Adaptive Gateway Discovery in Integrated Internet MANET. 249-252 - Madhusmita Sahu, Durga Prasad Mohapatra

:
Slice Based Testing of CGI Based Web Applications. 253-256 - Akashdeep Sharma:

A Fuzzy Computationally Intelligent System for Resource Allocation in WiMAX. 257-260 - Koteswara Rao Vemu:

Improving Activity Prediction and Activity Scheduling in Smart Home Networks for Enhanced QoS. 261-264
Secure Computing and Communication
- Günter Fahrnberger:

Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects. 265-277 - Partha Sarathi Roy

, Angsuman Das, Avishek Adhikari:
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure. 278-287 - Sumit Kumar Tetarave

, Somanath Tripathy, Sathya Peri:
S-Gossip: Security Enhanced Gossip Protocol for Unstructured P2P Networks. 288-298 - Debasis Mohapatra, Manas Ranjan Patra:

k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. 299-310 - Pranave Kumar Bhaskar, Alwyn R. Pais

:
A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network. 311-317 - Ashalata Panigrahi, Manas Ranjan Patra:

An Evolutionary Computation Based Classification Model for Network Intrusion Detection. 318-324 - Amrita Ghosal, Subir Halder:

Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks. 325-330 - Günter Fahrnberger, Kathrin Heneis:

SecureString 3.0 - A Cryptosystem for Blind Computing on Encrypted Character Strings. 331-334 - Tanmoy Kanti Das, Piyush Kanti Bhunre:

A Secure Image Hashing Technique for Forgery Detection. 335-338
Cloud Computing
- R. S. Ponmagal, N. Dinesh, Uma Rajaram:

Design and Development of Secure Cloud Architecture for Sensor Services. 339-344 - Benay Kumar Ray, Sunirmal Khatua, Sarbani Roy:

Cloud Federation Formation Using Coalitional Game Theory. 345-350 - Sanjaya Kumar Panda, Prasanta K. Jana:

An Efficient Resource Allocation Algorithm for IaaS Cloud. 351-355 - A. S. Ajeena Beegom

, M. S. Rajasree:
Genetic Algorithm Framework for Bi-objective Task Scheduling in Cloud Computing Systems. 356-359 - (Withdrawn) Optimal Cloud Resource Provisioning: A Two-Criteria Formulation. 360-364

Information Retrieval and Recommender Systems
- Deepa Anand, Febin A. Vahab:

Predicting Post Importance in Question Answer Forums Based on Topic-Wise User Expertise. 365-376 - Debabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan:

SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity. 377-390 - Julian Szymanski:

Information Retrieval in Wikipedia with Conceptual Directions. 391-402 - Trupti Padiya, Minal Bhise, Sandeep Vasani, Mohit Pandey:

Query Execution for RDF Data on Row and Column Store. 403-408 - Rohit Gupta, Anil Kumar Singh:

A Concept for Co-existence of Heterogeneous Recommender Systems Based on Blackboard Architecture. 409-414 - Jagendra Singh

, Aditi Sharan:
Co-occurrence and Semantic Similarity Based Hybrid Approach for Improving Automatic Query Expansion in Information Retrieval. 415-418
Societal Applications
- Nemi Chandra Rathore

, Somanath Tripathy, Joydeep Chandra:
Predicting User Visibility in Online Social Networks Using Local Connectivity Properties. 419-430 - Swati Agarwal, Ashish Sureka:

Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter. 431-442 - Ajay Auddy, Sripati Mukhopadhyay:

Data Mining on ICT Usage in an Academic Campus: A Case Study. 443-447 - Hrushikesha Mohanty:

A Theory on Genesis and Spread of Corruption. 448-451 - Paramita Dey

, Aniket Sinha, Sarbani Roy:
Social Network Analysis of Different Parameters Derived from Realtime Profile. 452-455 - Anil Kumar Singh, Surinder Kaur:

Analysis of Emergency Evacuation of Building Using PEPA. 456-459

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














