![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
2. ACSS 2015: Kolkata, India - Volume 2
- Rituparna Chaki, Agostino Cortesi
, Khalid Saeed, Nabendu Chaki
:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2. Advances in Intelligent Systems and Computing 396, Springer 2016, ISBN 978-81-322-2651-2
Signal Processing
- Santosh Gaikwad
, Bharti Gawali
, Suresh Mehrotra
:
Design and Development of Marathi Speech Interface System. 3-20 - Mateusz Buczkowski, Khalid Saeed:
Fusion-Based Noisy Image Segmentation Method. 21-35 - Sk Md Obaidullah
, Chayan Halder
, Nibaran Das, Kaushik Roy:
An Approach for Automatic Indic Script Identification from Handwritten Document Images. 37-51 - Chayan Halder
, Sk Md Obaidullah
, Jaya Paul, Kaushik Roy:
Writer Verification on Bangla Handwritten Characters. 53-68 - V. Mohanraj, Vaidehi V.
, Ranajith Kumar, R. Nakkeeran:
Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT). 69-80 - Parama Bagchi, Debotosh Bhattacharjee
, Mita Nasipuri:
Registration of Range Images Using a Novel Technique of Centroid Alignment. 81-89
Software Engineering
- Debashis Mukherjee
, Rajib Mall:
An Investigation into Effective Test Coverage. 93-106 - Nachiketa Chatterjee, Saurabh Singh Thakur
, Partha Pratim Das:
Resource Management in Native Languages Using Dynamic Binary Instrumentation (PIN). 107-119 - Bibhash Roy, Ranjan Dasgupta, Nabendu Chaki
:
A Study on Software Risk Management Strategies and Mapping with SDLC. 121-138 - Adrija Bhattacharya, Smita Ghosh, Debarun Das, Sankhayan Choudhury:
A New Service Discovery Approach for Community-Based Web. 139-151 - Sapana Rani, Preeti Kachhap, Raju Halder
:
Data-Flow Analysis-Based Approach of Database Watermarking. 153-171 - Manali Chakraborty, Nabendu Chaki
:
A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development. 173-188 - Ayan Majumder, Moumita Chakraborty, Krishnendu Guha
, Amlan Chakrabarti
:
CAD-Based Analysis of Power Distribution Network for SOC Design. 189-198
Algorithms
- Sukhendu Kanrar, Samiran Chattopadhyay
, Nabendu Chaki
:
A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus. 201-214 - Arnab Kumar Maji
, Sunanda Jana
, Rajat Kumar Pal:
A Comprehensive Sudoku Instance Generator. 215-233 - Ammlan Ghosh
, Rituparna Chaki:
Implementing Software Transactional Memory Using STM Haskell. 235-248 - Debasish Roy, Surjya Sikha Das, Swarup Ghosh:
Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming. 249-270 - Ranjan Mehera, Piyali Datta, Arpan Chakraborty, Rajat Kumar Pal:
An Algorithm to Solve 3D Guard Zone Computation Problem. 271-288 - N. Sujay Raghavendra
, Paresh Chandra Deka
:
Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and ANFIS. 289-302 - Arpan Chakraborty, Joydeb Ghosh, Piyali Datta, Ankita Nandy, Rajat Kumar Pal:
Anomaly Detection and Three Anomalous Coins Problem. 303-320
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.