


default search action
3. ISI 2014: Greater Noida, Delhi, India
- Rajkumar Buyya, Sabu M. Thampi

:
Intelligent Distributed Computing - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India. Advances in Intelligent Systems and Computing 321, Springer 2015, ISBN 978-3-319-11226-8 - Senthil Kumar Thangavel

, Swati Pandey:
Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout. 1-10 - Gaurav Pareek, Chetanya Goyal, Mukesh Nayal:

A Result Verification Scheme for MapReduce Having Untrusted Participants. 11-19 - Agrima Srivastava, K. P. Krishna Kumar, G. Geethakumari:

Quantifying Direct Trust for Private Information Sharing in an Online Social Network. 21-30 - Ajeet Pal Singh Panwar, Rajdeep Niyogi:

A Heuristic for Link Prediction in Online Social Network. 31-41 - Amrinderpreet Singh, Shalini Batra:

P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network. 43-54 - Puneet Gour, Anil Sarje:

Localization in Wireless Sensor Networks with Ranging Error. 55-69 - Rathnakar Achary

, V. Vityanathan, Pethuru Raj Chelliah
, S. Nagarajan:
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing. 71-82 - Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:

Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs. 83-94 - Savitri Devi, Anil Sarje:

Dir-DREAM: Geographical Routing Protocol for FSO MANET. 95-106 - Manisha Sunil Bhende, Sanjeev Wagh

:
Extending Lifetime of Wireless Sensor Network Using Cellular Automata. 107-115 - Archana B. Khedkar, Vinayak L. Patil

:
Computer Network Optimization Using Topology Modification. 117-127 - Gaurav Pareek, Ratna Kumari, Aitha Nagaraju

:
Mobile Sensor Localization Under Wormhole Attacks: An Analysis. 129-137 - Dharavath Ramesh

, Harshit Gupta, Kuljeet Singh, Chiranjeev Kumar
:
Hash Based Incremental Optimistic Concurrency Control Algorithm in Distributed Databases. 139-150 - Oshin Anand, Abhineet Mittal, Kanta Moolchandani, Munezasultana M. Kagzi, Arpan Kumar Kar

:
Evaluating Travel Websites Using WebQual: A Group Decision Support Approach. 151-160 - Simon Fong, Renfei Luo, Suash Deb, Sabu M. Thampi

:
Location-Based Mutual and Mobile Information Navigation System: Lemmings. 161-171 - Sudha Gupta, Faruk Kazi, Sushama Wagh

, Ruta Kambli:
Neural Network Based Early Warning System for an Emerging Blackout in Smart Grid Power Networks. 173-183 - Kriti Chadha, Sushma Jain:

Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks. 185-198 - Shiju Sathyadevan, Nandini Muraleedharan, Sreeranga P. Rajan:

Enhancement of Data Level Security in MongoDB. 199-212 - Vandana Dhingra, Komal Kumar Bhatia

:
SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retrieval. 213-223 - Hind Lamharhar, Laila Benhlima, Dalila Chiadmi:

OWLSGOV: An Owl-S Based Framework for E-Government Services. 225-238 - Rajender Nath, Naresh Kumar

, Sneha Tuteja:
A Survey on Reduction of Load on the Network. 239-249 - Vivek Kumar Sehgal

, Anubhav Patrick, Ashutosh Soni, Lucky Rajput
:
Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing. 251-263 - V. J. Jincy, Sudharsan Sundararajan:

Classification Mechanism for IoT Devices towards Creating a Security Framework. 265-277 - Kanupriya Dhawan, Meenakshi Sharma:

Data Owner Centric Approach to Ensure Data Protection in Cloud Environment. 279-286 - Kanubhai K. Patel

, Bharat Buddhadev:
Predictive Rule Discovery for Network Intrusion Detection. 287-298

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














