


default search action
14th ICDCIT 2018: Bhubaneswar, India
- Atul Negi, Raj Bhatnagar, Laxmi Parida:

Distributed Computing and Internet Technology - 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10722, Springer 2018, ISBN 978-3-319-72343-3 
Invited Papers
- André Rossi, Alok Singh

, Shyam Sundar:
Properties and Exact Solution Approaches for the Minimum Cost Dominating Tree Problem. 3-26 - S. Subhashree, Rajeev Irny, P. Sreenivasa Kumar:

Review of Approaches for Linked Data Ontology Enrichment. 27-49 - Yiji Zhang, Lenore D. Zuck:

Formal Verification of Optimizing Compilers. 50-65 
Security and Privacy
- Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:

Security Analysis of EMV Protocol and Approaches for Strengthening It. 69-85 - Shashank Khobragade

, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. 86-104 - Vishal Maral, Nachiket Trivedi

, Manik Lal Das:
Auditing Access to Private Data on Android Platform. 105-111 - Joseph Jisna, A. Salim

:
Privacy Preserving Data Utility Mining Using Perturbation. 112-120 - Kollapalli Ramesh Babu

, Vineet Padmanabhan:
BDI Based Performance Enhancement in DNSSEC. 121-126 - Pinki Prakash Vishwakarma, Amiya Kumar Tripathy

, Srikanth Vemuru
:
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment System. 127-131 
Distributed and Multiprocessing Approaches
- Lalatendu Behera

, Purandar Bhaduri
:
Time-Triggered Scheduling for Multiprocessor Mixed-Criticality Systems. 135-151 - Garima Singh, Anil Kumar Singh:

Effect of Live Migration on Virtual Hadoop Cluster. 152-157 - Santhi Venkatraman

, Rini Jose:
Performance Analysis of Parallel K-Means with Optimization Algorithms for Clustering on Spark. 158-162 - U. Venkata Divya, P. S. V. S. Sai Prasad

:
Hashing Supported Iterative MapReduce Based Scalable SBE Reduct Computation. 163-170 
Networks Protocols and Applications
- Günter Fahrnberger

:
Reliable Condition Monitoring of Telecommunication Services with Time-Varying Load Characteristic. 173-188 - Pranav Kumar Singh

, Subhrendu Chattopadhyay
, Pradeepkumar Bhale
, Sukumar Nandi
:
Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment. 189-204 - Paramita Dey

, Sarbani Roy, Sanjit Roy:
Ego Based Community Detection in Online Social Network. 205-210 - Utkal Sinha, Ratnakar Dash, Nandish Jayaram Kopri:

A Gateway Virtual Network Function for InfiniBand and Ethernet Networks. 211-216 - Sumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh:

GMP2P: Mobile P2P over GSM for Efficient File Sharing. 217-231 - Y. Divya Brahmani, T. Sobha Rani, S. Durga Bhavani:

Simulation of Network Growth Using Community Discovery in Biological Networks. 232-239 - Gollapudi V. R. J. Sai Prasad, Venkatesh Choppella, Sridhar Chimalakonda:

A Style Sheets Based Approach for Semantic Transformation of Web Pages. 240-255 - Palani Kumar, Meenakshi D'Souza, Debabrata Das

:
Efficient Anomaly Detection Methodology for Power Saving in Massive IoT Architecture. 256-262 
Databases, Algorithms, Data Processing and Applications
- Subhrangsu Mandal

, Arobinda Gupta:
Approximation Algorithms for Permanent Dominating Set Problem on Dynamic Networks. 265-279 - Mayank Kumar

, Syam Kumar Pasupuleti:
Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing. 280-287 - Sarvesh Pandey

, Udai Shanker
:
A One Phase Priority Inheritance Commit Protocol. 288-294 - Ripon Patgiri

:
Issues and Challenges in Big Data: A Survey. 295-300 - Ruby Rani

:
Generate Optimal Distributed Query Plans Using Clonal Selection Process. 301-305 - Surender Singh Samant

, N. L. Bhanu Murthy, Aruna Malapati:
CapAct: A Wordnet-Based Summarizer for Real-World Events from Microblogs. 306-314 - Harshpreet Singh, Rajneesh Randhawa:

ARMM: Adaptive Resource Management Model for Workflow Execution in Clouds. 315-329 - Prakash Kumar Singh, Udai Shanker

:
A New Priority Heuristic Suitable in Mobile Distributed Real Time Database System. 330-335 - Ankita Sinha

, Prasanta K. Jana:
Efficient Algorithms for Local Density Based Anomaly Detection. 336-342 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














