# |
Authors and Titles |
13 |
Lavanya A. Watermarking Medical Images Using Chaotic Map Lattices |
19 |
Anushua Dutta, Kunjal Thakkar, Sunirmal Khatua and Rajib Das. Power Efficient Data Gathering for Wireless Sensor Network |
56 |
Suneet K. Gupta, Pratyay Kuila and Prasanta K. Jana. GAR: An Energy Efficient GA-based Routing forWireless Sensor Networks |
62 |
Abhijit Datta Banik and Sujit Samanta. Controlling packet loss of bursty and correlated traffics in a variant of multiple vacation policy |
83 |
Sandeep Vasani, Mohit Pandey, Minal Bhise and Trupti Padiya. Faster Query Execution for PartitionedRDF Data |
86 |
Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota and Muttukrishnan Rajarajan. Adaptive TaskScheduling in Service Oriented Crowd using SLURM |
115 |
Deveeshree Nayak, M Venkata Swamy and Dr Srini Ramaswamy. "Supporting Location InformationPrivacy in Mobile Devices " |
165 |
Hrushikesha Mohanty. Computational Social Science: A bird's eye view |
173 |
Bhawani Panda and Pushparaj Shetty D.. A Local Search based Approximation Algorithm for StrongMinimum Energy Topology Problem in Wireless Sensor Networks |
108 |
Supriya Vaddi and Hrushikesha Mohanty. Querying SMap based Web Services : An RDBMS Approach |
8 |
Agostino Cortesi and Raju Halder. Abstract Interpretation of Recursive Queries |
21 |
Saurabh Wadwekar and Debajyoti Mukhopadhyay. A Selection Algorithm for Focused CrawlersIncorporating Semantic Metadata |
33 |
Suddhasil De, Diganta Goswami and Sukumar Nandi. Consistent Coordination Decoupling in Tuple Space based Mobile Middleware: Design and Formal Specifications |
87 |
Suparno Datta, Ayan Dutta, Sruti Gan Chaudhuri and Krishnendu Mukhopadhyaya. Circle Formation byAsynchronous Transparent Fat Robots |
94 |
Günter Fahrnberger. Computing on Encrypted Character Strings in Clouds 12 |
112 |
Sankita Patel, Viren Patel and Devesh Jinwala. Privacy Preserving Distributed K-Means Clustering inMalicious Model using Zero Knowledge Proof |
131 |
Asrar Ahmed and Khaleel Ur Rahman Khan. Trust Based Secure Gateway Discovery Mechanism forIntegrated Integrated and MANET |
134 |
Ammlan Ghosh and Nabendu Chaki. Design of a New OFTM Algorithm towards Abort-free Execution |
28 |
Henryk Krawczyk, Jerzy Proficz and Bartlomiej Daca. Prediction of Processor Utilization for Real-TimeMultimedia Stream Processing Tasks |
64 |
Ruman Sarkar, Smita Das and Sharmistha Roy. SPARSHA: A LOW-COST REFRESHABLE BRAILLE FOR DEAF-BLIND PEOPLE FOR COMMUNICATION WITH DEAF-BLIND AND NON-DISABLED PERSONS |
120 |
A. Santhanavijayan and S.R. Balasundaram. Effective Web Service Discovery using K-means Clustering |
7 |
Kumar Padmanabh, Amit Gupta and Purnendu Sinha. An Efficient Method for Synchronizing Clocks ofNetworked ECUs in Automotive Systems |
23 |
Sanjaya Kumar Panda and Pabitra Mohan Khilar. MSSA: A M-Level Sufferage-based SchedulingAlgorithm in Grid Environment |
32 |
Pragya Agrawal and Gautam K. Das. Improved Interference in Wireless Sensor Networks |
76 |
S. Moses Dian and B. Ramadoss. Trading of Grade Based Incetives to Avoid Free Riding and Starvation inP2P Network |
95 |
Ch. Sanjeev Kumar Dash, Ajit Kumar Behera, Manoj Kumar Pandia and Satchidananda Dehuri. Neural Networks Training Based on Differential Evolution in Radial Basis Function Networks for Classification of Web Logs |
116 |
Kaushik Mondal, Arjun Talwar, Partha Sarathi Mandal and Bhabani Sinha. Localization Based on Two-bound Reflected Signals in Wireless Sensor Networks |
132 |
Ravi Tandon and Gautam Barua. Recovery Protocols For Flash File Systems |
133 |
Meenakshi D'Souza and Teodor Knapik. Verification of Message Sequence Structures |
160 |
Himangshu Ranjan Borah and Himkalyan Bordoloi. An efficient Localization of Nodes in a Sensor Network using Conflict Minimization with Controlled Initialization |
177 |
Julian Szymanski. Wikipedia articles representation with Matrix’u |
184 |
Xinghua Yao. A Model Language for Describing Spatio-Temporal Changes in Train Control System |
27 |
Geetha V. and Sreenath N.. Semantic Concurrency Control on Continuously Evolving OODBMS usingAccess Control Lists |
65 |
Bijaya Kishor Bhatta and Pushparaj Shetty D.. A Parallel 2-approximation NC-algorithm for RangeAssignment Problem in Packet Radio Networks |
67 |
Adusumalli Sri Krishna and Valli Kumari V.. An Efficient and Dynamic Concept Hierarchy Generation forData Anonymization |
100 |
Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay. A New Approach to Design a DomainSpecific Web Search Crawler using Multilevel Domain Classifier |
102 |
Alladi Sangameshwar and Ak Sarje. Routing Misbehavior based Intrusion Detection and Response System for Wireless Ad hoc Networks |
141 |
Krishna S, Gabriel Ciobanu and Bogdan Aman. Solving the 4QBF Problem in Polynomial Time by Using the Biological-Inspired Mobility |
180 |
Madhusmita Sahu and Durga Prasad Mohapatra. Slicing XML Documents Using Dependence Graph |
15 |
Hrushikesha Mohanty. Network of Social Listeners |
167 |
Rajashekhar Arasanal and Daanish Rumani. Improving MapReduce Performance through Complexity andPerformance based Data Placement in Heterogeneous Hadoop Clusters |
183 |
Prasenjit Basu, Suman Bhattacharya and Samir Roy. Online Recommendation of Learning Path for an e- learner Under Virtual University. |
71 |
Itishree Behera, Chita Ranjan Tripathy and Satya Prakash Sahoo. An Efficient Method of Load Balancing With Fault Tolerance for Mobile Grid |
103 |
Sujoy Mistry, Dibyanshu Jaiswal, Sagar Virani, Arijit Mukherjee and Nandini Mukherjee. An Architecture for Dynamic Web Service Provisioning using Peer-to-Peer Networks |