default search action
ICCCS 2011: Orissa, India
- Sanjay Kumar Jena, Rajeev Kumar, Ashok Kumar Turuk, Manoranjan Dash:
Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011. ACM 2011, ISBN 978-1-4503-0464-1
Communication
- Vivek Katiyar, Narottam Chand, Surender Kumar Soni:
Efficient multilevel clustering for large-scale heterogeneous wireless sensor networks. 1-6 - Debabrata Sarddar, Tapas Jana, Utpal Biswas, Joydeep Banerjee, Souvik Kumar Saha, Mrinal K. Naskar:
Reducing handoff call blocking probability by hybrid channel allocation. 7-10 - Hemali B. Kotak, Hiteishi M. Diwanji, Paresh P. Kotak:
A new approach to efficient Bluetooth Scatternet formation in adhoc wireless network. 11-16 - Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. 17-20 - Ashima Rout, Srinivas Sethi, Debajyoti Mishra:
Optimized ant based routing protocol for MANET. 21-25 - Srinivas Sethi, Ashima Rout, Debajyoti Mishra, Shatabdinalini:
A robust cluster based routing protocol for MANET. 26-31 - P. K. Guha Thakurta, Nilesh Mallick, Gargi Dutta, Subhansu Bandyopadhyay:
A new approach on caching based routing for mobile networks. 32-35 - Ved Prakash, Brajesh Kumar, Anup Kumar Srivastava:
Energy efficiency comparison of some topology-based and location-based mobile ad hoc routing protocols. 36-39 - Rakesh Matam, Somanath Tripathy:
THWMP: trust based secure routing for wireless mesh networks. 40-45 - (Withdrawn) Multiple antenna techniques in WiMax. 46-49
- Poonam Gera, Kumkum Garg, Manoj Misra:
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs. 50-55 - Mangala R. Gajbhiye, J. K. Satapathy:
Performance comparison of adaptive MMSE-MRC MUD for DS-CDMA system in different multipath channels. 56-61 - Bijayananda Patnaik, Prasant Kumar Sahu:
Long-haul 64-channel 10-Gbps DWDM system design and simulation in presence of optical Kerr's effect. 62-66 - Muktikanta Sa, Amiya Kumar Rath:
A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networks. 67-70 - Joydeep Banerjee, Souvik Kumar Mitra, Pradipta Ghosh, Mrinal K. Naskar:
Memory based message efficient clustering (MMEC) for enhancement of lifetime in wireless sensor networks using a node deployment protocol. 71-76 - Deepak Kedia, Manoj Duhan, Sandeep Arya:
Peak to average power ratio of orthogonal spreading codes for multicarrier CDMA system. 77-81 - A. Wankhede Vishal, Rakesh Kumar Jha, Upena D. Dalal:
Resource allocation for downlink OFDMA in WiMAX systems. 82-85 - Rahul Mishra, Shivam Nayak, Kapil Verma, Dayashankar Singh:
Survey on techniques to resolve problems associated with RTS/CTS mechanism. 86-91 - Jyotsana Jaiswal, Pabitra Mohan Khilar:
Fault tolerant greedy perimeter stateless routing in wireless network. 92-95 - Brij Bihari Dubey, Naveen Chauhan, Lalit Kumar Awasthi:
NILDD: nearest intersection location dependent dissemination of traffic information in VANETs. 96-99 - Arunanshu Mahapatro, Pabitra Mohan Khilar:
On distributed self fault diagnosis for wireless multimedia sensor networks. 100-105 - P. Kishore, Prasad Gandikota, P. V. Sridevi:
Design of high speed routers using RED algorithm. 106-109 - Virendra Singh Shekhawat, K. Ohmkar, Vinod Kumar Chaubey:
A wavelength intersection cardinality based routing and wavelength assignment algorithm in optical WDM networks. 110-113 - Abhijit Das, Atiqur Rahman, Soumya Sankar Basu, Atal Chaudhuri:
Energy aware topology security scheme for mobile ad hoc network. 114-118 - Asutosh Kar, Ravinder Nath, Alaka Barik:
A VLMS based pseudo-fractional optimum order estimation algorithm. 119-123 - Swarup Kumar Mitra, Joydeep Banerjee, Arpita Chakraborty, Mrinal K. Naskar:
Data gathering in wireless sensor network using realistic power control. 124-127 - Kadha Vijaya Kumar, V. Sumalatha:
Passive duplicate address detection in DYMO routing protocol for MANETS. 128-133 - Trilochan Panigrahi, A. D. Hanumantharao, Ganapati Panda, Babita Majhi, Bernard Mulgrew:
Maximum likelihood DOA estimation in distributed wireless sensor network using adaptive particle swarm optimization. 134-137 - Niranjan Kumar Ray, Ashok Kumar Turuk:
A framework for disaster management using wireless ad hoc networks. 138-141 - Suman Sankar Bhunia, Sarbani Roy, Nandini Mukherjee:
IEMS: indoor environment monitoring system using ZigBee wireless sensor network. 142-145 - Suraj Sharma, Sanjay Kumar Jena:
A survey on secure hierarchical routing protocols in wireless sensor networks. 146-151 - Likewin Thomas, Kiran Manjappa, B. Annappa, G. Ram Mohana Reddy:
Parallelized K-Means clustering algorithm for self aware mobile ad-hoc networks. 152-155 - Khushboo Tripathi, Manjusha Pandey, Shekhar Verma:
Comparison of reactive and proactive routing protocols for different mobility conditions in WSN. 156-161 - Abhishek Mairh, Hemanta Kumar Pati:
Quality-of-service at data link layer in wireless cellular networks. 162-165 - Manas Kumar Mishra, M. M. Gore:
An improved forwarder selection approach for energy aware geographic routing in three dimensional wireless sensor networks. 166-171
Computing
- Pradosh Bandyopadhyay, Soumik Das, Monalisa Banerjee, Atal Chaudhuri:
A fragile color image watermarking framework focusing a new invisible domain. 172-177 - Soumik Das, Pradosh Bandyopadhyay, Monalisa Banerjee, Atal Chaudhuri:
A chip-based watermarking framework for color image authentication. 178-183 - Subrajeet Mohapatra, Dipti Patra, Sanghamitra Satpathy:
Automated leukemia detection in blood microscopic images using statistical texture analysis. 184-187 - Gutha Jaya Krishna, C. Raghavendra Rao, Rajeev Wankar:
Finding minimal resource allocation in grid with reliability and trust computations using 2-way split backward search. 188-193 - R. Krishnamoorthy, R. Punidha:
Fast requantization using self organizing feature map with orthogonal polynomials transform. 194-199 - Shailesh R. Sathe, Deepti D. Shrimankar:
Parallelization of DNA sequence alignment using OpenMP. 200-203 - Sulieman Bani-Ahmad:
On improved processor allocation in 2D mesh-based multicomputers: controlled splitting of parallel requests. 204-209 - S. D. Pable, Mohd. Hasan:
Performance analysis of FPGA interconnect fabric for ultra-low power applications. 210-214 - S. D. Pable, Mohd. Hasan:
Performance optimization of CNFET for ultra-low power reconfigurable architecture. 215-220 - Shivendra Shivani, Anoop Kumar Patel, Sushila Kamble, Suneeta Agarwal:
An effective pixel-wise fragile watermarking scheme based on ARA bits. 221-226 - Jyothisha J. Nair, V. K. Govindan:
Automatic segmentation of MR brain images. 227-230 - V. N. Manjunath Aradhya, C. Naveena:
Text line segmentation of unconstrained handwritten Kannada script. 231-234 - Bulusu Rama, Jibitesh Mishra:
Generation of 3D fractal images for Mandelbrot set. 235-238 - Gyanendra K. Verma, Shitala Prasad, Gohel Bakul:
Robust face recognition using curvelet transform. 239-242 - Yogita A. Sadawarte, Mahendra A. Gaikwad, Rajendra M. Patrikar:
Comparative study of switching techniques for network-on-chip architecture. 243-246 - S. Saravanakumar, A. Vadivel, C. G. Saneem Ahmed:
Multiple object tracking using HSV color space. 247-252 - Aditi Roy, Shamik Sural, Jayanta Mukherjee, Arun K. Majumdar:
A hierarchical approach for content-based echocardiogram video indexing and retrieval. 253-258 - Rajeev Srivastava:
A complex diffusion based nonlinear filter for speckle reduction from optical coherence tomography (OCT) images. 259-264 - Shijo M. Joseph, Reena Sebastian, P. Babu Anto:
The effect of different wavelets on speech compression. 265-268 - M. R. Pimple, Shailesh R. Sathe:
Computing on multi-core platform: performance issues. 269-272 - Anukul Chandra Panda, Pankaj Kumar Sa, Banshidhar Majhi:
Bitonic sort in shared SIMD array processor. 273-276 - Raju Barskar, Gulfishan Firdose Ahmed:
CBIR using fuzzy edge detection mask. 277-280 - Aarti M. Karande, V. N. Chunekar, B. B. Meshram:
Intelligent database for the SOA using BPEL. 281-284 - Punit Pandey, Deepshikha Pandey:
Reduct based Q-learning: an introduction. 285-288 - G. R. Talmale, A. V. Talhan, Rajiv V. Dharaskar:
Analysis of multimedia forensic technique. 289-294 - Pradipta K. Banerjee, Jayanta K. Chandra, Asit K. Datta:
Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authentication. 295-300 - Nabanita Bhattacharjee, Ranjan Parekh:
Skin texture analysis for medical diagnosis. 301-306 - Debahuti Mishra, Kailash Shaw, Sashikala Mishra, Amiya Kumar Rath, Milu Acharya:
Gene expression network discovery: a pattern based biclustering approach. 307-312 - Bithin Kanti Shee, Swati Vipsita, Santanu Ku. Rath:
Protein feature classification using particle swarm optimization and artificial neural networks. 313-318 - Pawan Kumar, Nitika Jakhanwal, Anirban Bhowmick, Mahesh Chandra:
Gender classification using pitch and formants. 319-324 - R. Krishnamoorthy, D. Indradevi:
Fast and iterative algorithm for iris detection with orthogonal polynomials transform. 325-330 - Anand Kunwar Singh, Prasanna Kumar Acharya, Basant Kumar:
High capacity digital image watermarking with increased number of blocks. 331-334 - Sambit Bakshi, Hunny Mehrotra, Banshidhar Majhi:
Real-time iris segmentation based on image morphology. 335-338 - Sunita Kumari, Pankaj Kumar Sa, Banshidhar Majhi:
Gender classification by principal component analysis and support vector machine. 339-342 - Shitala Prasad, Krishna Mohan Kudiri, R. C. Tripathi:
Relative sub-image based features for leaf recognition using support vector machine. 343-346 - Mohammad Imroze Khan, Bibhudendra Acharya, Shrish Verma:
Comparison between different illumination independent change detection techniques. 347-350 - R. Krishnamoorthy, K. Rajavijayalakshmi, R. Punidha:
Low-bit-rate lossless image coding using classified vector quantization with orthogonal polynomials transform. 351-354 - Dipankar Dutta, Paramartha Dutta:
A real coded MOGA for mining classification rules with missing attribute values. 355-358 - V. N. Manjunath Aradhya:
Document skew estimation: an approach based on wavelets. 359-364 - Bikesh Kumar Singh, Jitendra Singh Parihar, Pritish Pal:
Wavelet based information for retrieval and classification of mammographic images. 365-370 - Mohammad Imroze Khan, Bikesh Kumar Singh:
Retrieval of changes in moving objects in multiple and color images. 371-376 - Ratnakar Dash, Pankaj Kumar Sa, Banshidhar Majhi:
Restoration of images corrupted with blur and impulse noise. 377-382 - Sumit R. Vaidya, Deepak R. Dandekar:
A hierarchical design of high performance 8x8 bit multiplier based on Vedic mathematics. 383-386 - Amol P. Bhagat, Mohammad Atique:
Medical image retrieval, indexing and enhancement techniques: a survey. 387-390 - Suman Sau, Chandrajit Pal, Amlan Chakrabarti:
Design and implementation of real time secured RS232 link for multiple FPGA communication. 391-396 - B. Janet, A. V. Reddy:
Cube index for unstructured text analysis and mining. 397-402 - M. C. Hanumantharaju, M. Ravishankar, D. R. Ramesh Babu, S. Ramachandran:
Adaptive color image enhancement based geometric mean filter. 403-408 - Bhabani Shankar Prasad Mishra, A. K. Addy, Rahul Roy, Satchidananda Dehuri:
Parallel multi-objective genetic algorithms for associative classification rule mining. 409-414 - Likewin Thomas, B. Annappa:
Utilization of map-reduce for parallelization of resource scheduling using MPI: PRS. 415-420 - J. Mridula, Dipti Patra:
Utilization of grey level co-occurrence matrix and Markov random field model for segmentation of colour textured images. 421-426 - D. Doreen Hephzibah Miriam, K. S. Easwarakumar:
HPGRID: a novel architectural model for resource management systems. 427-432 - Neha Sharma:
Comparing the performance of data mining techniques for oral cancer prediction. 433-438 - Anjali Mohapatra, P. M. Mishra, S. Padhy:
Planted (l, d) motif finding with allowable mismatches using kernel based approach. 439-442 - R. Krishnamoorthy, J. Kalpana:
Minimum distortion clustering technique for orthogonal polynomials transform vector quantizer. 443-448 - P. C. Sherimon, P. V. Vinu, Reshmy Krishnan:
Enhancing the learning experience in blended learning systems: a semantic approach. 449-452 - Bibhudendu Panda, Pabitra Mohan Khilar:
FPGA based implementation of parallel ECC processor. 453-456 - R. Muthu Selvi, R. Rajaram:
Multiobjective optimization to provide service guarantees for window-constrained scheduling using micro-genetic algorithm. 457-461 - Punyaban Patel, Abhishek Tripathi, Banshidhar Majhi, Chita Ranjan Tripathy:
A new adaptive median filtering technique for removal of impulse noise from images. 462-467 - Soma Saha, Rajeev Kumar:
Improvement of bounded-diameter MST instances with hybridization of multi-objective EA. 468-473
Security
- J. Vijay Anand, G. D. Dharaneetharan:
New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. 474-476 - Arun Kumar Singh, Pooja Tewari, Shefalika Ghosh Samaddar, Arun K. Misra:
Communication based vulnerabilities and script based solvabilities. 477-482 - Abhijit Sanyal, Soume Sanyal, Sankhayan Choudhury:
Physical level implementation of a web data model. 483-488 - N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs. 489-492 - Jayaprakash Kar, Banshidhar Majhi:
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique. 493-498 - Heman Pathak:
Hybrid security architecture (HSA) for secure execution of mobile agents. 499-502 - Amol G. Muley:
Steganography by using attributes of magic number 9. 503-506 - Lalbihari Barik, Bankim Patel, Ankita Barik:
You are watching system (YAW system): an agent based secure real-time monitoring, capturing and analysis system for client activities on the expert agent's screen. 507-510 - Sangita Roy, Manini Manasmita:
A novel approach to format based text steganography. 511-516 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya:
Detection of HTTP flooding attacks in multiple scenarios. 517-522 - Harshal A. Arolkar, Shraddha P. Sheth, Vaidehi P. Tamhane:
Ant colony based approach for intrusion detection on cluster heads in WSN. 523-526 - Pravin Soni, Shamal Firake, B. B. Meshram:
A phishing analysis of web based systems. 527-530 - Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita:
NADO: network anomaly detection using outlier approach. 531-536 - Sulagna Bandopadhyay, Anirban Sengupta, Chandan Mazumdar:
A quantitative methodology for information security control gap analysis. 537-540 - Bibhudendra Acharya, S. Sachin Sunder, M. Thiruvenkatam, Aneesh K. Sajan:
Image encryption using index based chaotic sequence, M sequence and gold sequence. 541-544 - K. C. S. Murti, Venkat R. Tadimeti:
A simplified GeoDRM model for SDI services. 545-548 - Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indrani:
Password based remote authentication scheme using ECC for smart card. 549-554 - Darshan Mhapasekar:
Accomplishing anonymity in peer to peer network. 555-558 - Divya Prakash Nigam, Aparajita Ojha:
An aspect oriented model of efficient and secure card-based payment system. 559-564 - Asish Kumar Dalai, Sanjay Kumar Jena:
Evaluation of web application security risks and secure design patterns. 565-568 - L. David, Meenakshi Sood, Mahesh Kumar Kajla:
Router based approach to mitigate DOS attacks on the wireless networks. 569-572 - Sankar Roy, Ranjan Parekh:
A secure keyless image steganography approach for lossless RGB images. 573-576 - Anuja Kumar Acharya:
Image encryption using a new chaos based encryption algorithm. 577-581 - Badugu Suresh, Girija Shankar Rath:
Image encryption and authentication by orthonormal transform with CRC. 582-585 - Deepak Kumar, Rishikesh Sahay, Ganesh R. Hegde, Debasish Jena:
A novel simple secure internet voting protocol. 586-589 - Bharati Mishra, Priyadarshini Nayak, Subhashree Behera, Debasish Jena:
Security in vehicular adhoc networks: a survey. 590-595 - D. R. L. Prasanna, L. Jani Anbarasi, M. Jenila Vincent:
A novel approach for secret data transfer using image steganography and visual cryptography. 596-599 - Abhishek Mairh, Debabrat Barik, Kanchan Verma, Debasish Jena:
Honeypot in network security: a survey. 600-605 - Bibhudendra Acharya, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad:
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. 606-609 - Chinnanadar Ramachandran Rene Robin, G. V. Uma:
Development of educational ontology for software risk analysis. 610-615 - Raj Gaurang Tiwari, Mohd. Husain, Vishal Srivastava, Kuldeep Singh:
A hypercube novelty model for comparing E-commerce and M-commerce. 616-619 - S. Phani Kumar, P. Seetha Ramaiah, V. Khanaa:
Architectural patterns to design software safety based safety-critical systems. 620-623 - S. R. Balasundaram:
Securing tests in E-learning environment. 624-627 - Saroj Kumar Panigrahy, Sanjay Kumar Jena, Ashok Kumar Turuk:
Security in Bluetooth, RFID and wireless sensor networks. 628-633
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.