


default search action
5th ICADIWT 2014: Chennai, India
- The Fifth International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2014, Chennai, India, February 17-19, 2014. IEEE 2014, ISBN 978-1-4799-2258-1
- Dev Gaurav, Dishant Mittal, Bhavya Vaidya, Jimmy Mathew
:
A GSM based low cost weather monitoring system for solar and wind energy generation. 1-7 - Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:
AccAuth: Accounting system for OAuth protocol. 8-13 - G. Mary Valantina
, S. Jayashri:
A novel approach to efficient and reliable routing in Vanets. 14-17 - Mamatha Vemula, P. Hari Krishna Prasad:
A novel receiver window function for ICI reduction in OFDM system. 18-21 - Dhanaraj Maruthachalam, Taranisen Mohanta, Amulya Ratna Swain
, Hemendra Kumar Sethi:
A distributed system design for next generation storage and remote replication. 22-27 - A. Ricardo Contreras, Khaled Mahbub:
MORPED: Monitor rules for proactive error detection based on run-time and historical data. 28-35 - K. G. Srinivasa
, S. Srinidhi, K. Sharath Kumar, Vignesh Shenvi, U. Shashank Kaushik, Kushagra Mishra
:
Game theoretic resource allocation in cloud computing. 36-42 - Zongwei Zhu, Beilei Sun, Xi Li, Xuehai Zhou:
Application-aware group scheduler for Android. 43-49 - Le Tian, Jianbo Wang:
An algorithm for carrier frequency offset estimation in BPSK burst transmission. 50-53 - Amit Kr Mandal
, Anirban Sarkar:
Formal representation of service interactions for SaaS based applications. 54-59 - George E. Violettas
, Kyriakos Papadopoulos:
Passwords to absolutely avoid. 60-68 - T. Ramya, S. Malathi, G. R. Pratheeksha, Visvam Devadoss Ambeth Kumar:
Personalized authentication procedure for restricted web service access in mobile phones. 69-74 - S. Kuzhalvaimozhi
, G. Raghavendra Rao:
Privacy protection in cloud using identity based group signature. 75-80 - A. M. Aswini, P. Vinod:
Droid permission miner: Mining prominent permissions for Android malware analysis. 81-86 - A. Anasuya Threse Innocent
, K. Sangeeta
:
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach. 87-91 - K. Ravi Kishore, M. Mallesh, G. Jyostna, P. R. Lakshmi Eswari, Samavedam Satyanadha Sarma:
Browser JS Guard: Detects and defends against Malicious JavaScript injection based drive by download attacks. 92-100 - K. Nimmy
, M. Sethumadhavan
:
Novel mutual authentication protocol for cloud computing using secret sharing and steganography. 101-106 - Tanmay Sinha
:
Together we stand, Together we fall, Together we win: Dynamic team formation in massive open online courses. 107-112 - Xuejin Li, Zhendong Niu
, Chongyang Shi:
An agent-based linked data integration system. 113-117 - Prema Nedungadi
, Haripriya Harikumar
, Maneesha V. Ramesh
:
A high performance hybrid algorithm for text classification. 118-123 - Soumya Varma
, M. Sreeraj
:
Hybrid Background Subtraction in video using Bi-level CodeBook model. 124-130 - V. Krishna Sree, P. Sudhakar Rao:
Diagnosis of ophthalmologic disordersin retinal fundus images. 131-136 - V. R. Bindu
, K. N. Ramachandran Nair:
A fast narrow band level set formulation for shape extraction. 137-142 - Parthiban K, Amitabh Wahi, Sundaramurthy S, Palanisamy C:
Finger vein extraction and authentication based on gradient feature selection algorithm. 143-147 - Ansa Saju, I. Thusnavis Bella Mary
, A. Vasuki
, P. S. Lakshmi:
Reduction of semantic gap using relevance feedback technique in image retrieval system. 148-153 - M. L. Chayadevi
, G. T. Raju:
Automated colour segmentation of Tuberculosis bacteria thru region growing: A novel approach. 154-159 - Zameer Ahmed Adhoni, Husam Ahmed Al Hamad, Zaheer Ahmed Adhoni:
An API for Quran portal using Drupal technology. 160-164 - Varsha Bhoir, M. A. Potey:
Question answering system: A heuristic approach. 165-170 - Deepshikha Goutam, Ashok Verma, Neha Agrawal:
The performance evaluation of proactive fault tolerant scheme over cloud using CloudSim simulator. 171-176 - Animesh Ramesh, K. G. Srinivasa
, N. Pramod:
SentenceRank - A graph based approach to summarize text. 177-182 - Jolanta Mizera-Pietraszko
:
Post-search query modeling in federated web scenario. 183-188 - S. Nithyanandam, S. Amaresan, N. Mohamed Haris:
An innovative normalization process by phase correlation method of Iris images for the block size of 32∗32. 189-194 - Hathairat Ketmaneechairat, Phanuwat Yoksiri, Thitisak Jaisiri:
Searching application for Southern Thailand Travel Guide on iPhone. 195-200 - K. S. Lakshmi
, G. Santhosh Kumar
:
Association rule extraction from medical transcripts of diabetic patients. 201-206 - V. U. Panchami
, N. Radhika:
A novel approach for predicting the length of hospital stay with DBSCAN and supervised classification algorithms. 207-212 - Mingming Sun, Xuehai Zhou, Feng Yang, Kun Lu, Dong Dai:
Bwasw-Cloud: Efficient sequence alignment algorithm for two big data with MapReduce. 213-218 - Dimple Valayil Paul, Jyoti D. Pawar:
A multi-objective differential evolution approach for the question selection problem. 219-225 - C. Kishor Kumar Reddy
, P. R. Anisha
, L. V. Narasimha Prasad
:
Detection of thunderstorms using data mining and image processing. 226-231 - Kamran Khan, Saif ur Rehman, Kamran Aziz, Simon Fong, Sababady Sarasvady, Amrita Vishwa:
DBSCAN: Past, present and future. 232-238 - Simon Fong, Suash Deb, Io-Weng Chan, P. Vijayakumar:
An event driven neural network system for evaluating public moods from online users' comments. 239-243 - Shilpa Shashikant Chaudhari
, Rajashekhar C. Biradar
:
Collision probability based Available Bandwidth estimation in Mobile Ad Hoc Networks. 244-249 - Ashok Kumar Pradhan, Tanmay De:
Survivable of multicast traffic grooming against single link failures in WDM mesh networks. 250-255 - Deepa Kumari, Mohit P. Tahiliani, Udaya Kumar K. Shenoy
:
Experimental analysis of CUBIC TCP in error prone MANETs. 256-261 - V. Preethi Rao, Mohit P. Tahiliani, Udaya Kumar K. Shenoy
:
Analysis of sfqCoDel for Active Queue Management. 262-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.