


default search action
15th ICDCIT 2019: Bhubaneswar, India
- Günter Fahrnberger, Sapna Gopinathan, Laxmi Parida:

Distributed Computing and Internet Technology - 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10-13, 2019, Proceedings. Lecture Notes in Computer Science 11319, Springer 2019, ISBN 978-3-030-05365-9
Invited Papers
- Meenakshi D'Souza, Rajanikanth Nagaraj Kashi

:
Avionics Self-adaptive Software: Towards Formal Verification and Validation. 3-23 - Christian Erfurth

:
The Digital Turn: On the Quest for Holistic Approaches. 24-30 - Hacène Fouchal

, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
Secured Communications on Vehicular Networks over Cellular Networks. 31-41 - Ulrike Lechner:

IT-Security in Critical Infrastructures Experiences, Results and Research Directions. 42-59 - Hrushikesha Mohanty:

Digital Society: A Computing Science Prospective. 60-70
Distributed Computing
- Indrajeet Gupta, Shivangi Gupta, Anubhav Choudhary, Prasanta K. Jana:

A Hybrid Meta-heuristic Approach for Load Balanced Workflow Scheduling in IaaS Cloud. 73-89 - Madhu Sudan Kumar, Indrajeet Gupta, Prasanta K. Jana:

Duplication Based Budget Effective Workflow Scheduling for Cloud Computing. 90-98 - Sabuzima Nayak

, Ripon Patgiri
:
Dr. Hadoop: In Search of a Needle in a Haystack. 99-107 - Krishan Kumar Sethi

, Dharavath Ramesh
, M. Sreenu
:
Parallel High Average-Utility Itemset Mining Using Better Search Space Division Approach. 108-124 - Pratik Shrivastava, Udai Shanker

:
Supporting Transaction Predictability in Replicated DRTDBS. 125-140 - Wei Wang, Guanyu Wu, Zhe Guo, Liang Qian, Lianghui Ding, Feng Yang:

Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT. 141-149 - Yuting Zhu, Liang Qian, Chuyan Wang, Lianghui Ding, Feng Yang, Hao Wang:

Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming Architecture. 150-158
Emerging Areas
- Sandeep Bavkar, Brijesh Iyer

, Shankar B. Deosarkar:
Detection of Alcoholism: An EEG Hybrid Features and Ensemble Subspace K-NN Based Approach. 161-168 - Ajay D. Kshemkalyani

, Bhargav Voleti:
On the Growth of the Prime Numbers Based Encoded Vector Clock. 169-184 - Gaurav Kumar

, N. Parimala:
A Sensitivity Analysis on Weight Sum Method MCDM Approach for Product Recommendation. 185-193 - Abhaya Kumar Pradhan

, Hrushikesha Mohanty, Rajendra Prasad Lal:
Event Detection and Aspects in Twitter: A BoW Approach. 194-211 - Rajendra Kumar Roul, Samarth Mehrotra, Yash Pungaliya, Jajati Keshari Sahoo

:
A New Automatic Multi-document Text Summarization using Topic Modeling. 212-221 - Ishrath Unissa, Syed Jalal Ahmad, P. Radha Krishna:

Improved Visible Light Communication Using Code Shift Keying Modulation. 222-232
Networks
- Aditi, Rasita Pai, S. Mini:

Optimization of Transmission Range for a Fault Tolerant Wireless Sensor Network. 235-242 - Laxmi Chaudhary, Buddha Singh:

Community Detection Using an Enhanced Louvain Method in Complex Networks. 243-250 - Debasis Das

:
A Fast Handoff Technique for Wireless Mobile Networks. 251-259 - Bhumika Kalavadia, Tarushi Bhatia, Trupti Padiya, Ami Pandat

, Minal Bhise:
Adaptive Partitioning Using Partial Replication for Sensor Data. 260-269 - Mariappan Ramasamy, Rama Subramanian M.:

Design and Implementation of Cognitive Radio Sensor Network for Emergency Communication Using Discrete Wavelet Packet Transform Technique. 270-278 - Ankur Sharma

, S. Durga Bhavani
:
A Network Formation Model for Collaboration Networks. 279-294 - Jerzy Dembski, Julian Szymanski

:
Bees Detection on Images: Study of Different Color Models for Neural Networks. 295-308 - Abhinav Tomar

, Prasanta K. Jana:
Mobile Charging of Wireless Sensor Networks for Internet of Things: A Multi-Attribute Decision Making Approach. 309-324
Security
- Varad Deshpande, Debasis Das

:
Efficient Searching Over Encrypted Database: Methodology and Algorithms. 327-338 - Ruchi Kachhia, Prachi Agrawal, Manik Lal Das:

Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding. 339-348 - Shravani Mahesh Patil

, B. R. Purushothama
:
RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication. 349-363 - Srilekha Mukherjee, Goutam Sanyal:

Extended Power Modulus Scrambling (PMS) Based Image Steganography with Bit Mapping Insertion. 364-379 - Ripon Patgiri

, Hemanth Katari, Ronit Kumar, Dheeraj Sharma:
Empirical Study on Malicious URL Detection Using Machine Learning. 380-388 - Luke Owens, Benoît Razet, W. Bryan Smith, Theodore C. Tanner Jr.:

Inter-family Communication in Hyperledger Sawtooth and Its Application to a Crypto-Asset Framework. 389-401 - Rajesh Kumar Shrivastava

, Bazila Bashir, Chittaranjan Hota
:
Attack Detection and Forensics Using Honeypot in IoT Environment. 402-409 - Pranav Kumar Singh

, Anish V. Monsy, Rajan Garg, Sukanta Dey
, Sukumar Nandi
:
JSpongeGen: A Pseudo Random Generator for Low Resource Devices. 410-421 - Pranav Kumar Singh

, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi
:
Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity. 422-439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














