![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ICCCT 2017: Allahabad, India
- Proceedings of the 7th International Conference on Computer and Communication Technology, ICCCT-2017, Allahabad, India, November 24-26, 2017. ACM 2017, ISBN 978-1-4503-5324-3
- Chamundeswari Arumugam, Sriraghav Kameswaran, Baskaran Kaliamourthy:
Global Software Development: A Design Framework to Measure the Risk of the Global Practitioners. 1-8 - Anuja Bawaskar, Kasturi Adep, Adarsh Jaju, Yashodhara Haribhakta, Krishnanjan Bhattacharjee, Swati Mehta, Ajai Kumar:
A Discourse Linking Tool for English Language Texts comprising Lexicon building and Ontology Creation. 9-14 - Arup Ratan Bhowmik, Bhaskar Bhattacharya, Ajoy Kumar Chakraborty
:
Three-Dimensional SVPWM using α-β-γ Frame for Solving 4-leg Active Shunt Filter. 15-21 - Akanksha Kumari, Ashish Kumar Singh, Nagamma Patil:
Travel Recommendation System Using Geotagged Photos. 22-26 - Harman Singh, Neeti Dhanak, Haroon Ansari, Krishan Kumar:
HDML: Habit Detection with Machine Learning. 29-33 - Arpit, Divya Kumar
:
Calculus of Concurrent Probabilistic Reversible Processes. 34-40 - Jyoti Kashniyal, Shekhar Verma
, Krishna Pratap Singh
:
Flip Error Elimination and Core Map Selection in Patch and Stitch Algorithms for Localization in Wireless Sensor Network. 41-46 - Pronaya Bhattacharya
, Arunendra Singh
, Akhilesh Kumar, Amod Kumar Tiwari, Rajiv Srivastava:
Comparative Study for Proposed Algorithm for All-Optical Network with Negative Acknowledgement (AO-NACK). 47-51 - Ketki Pitke, Prabhat Kumar, Sunil Kumar Singh
:
A Load Balancing Cross Clustering Approach in Wireless Sensor Network. 52-57 - Beneyaz A. Begum
, Satyanarayana V. Nandury
:
Component-based Self-Healing Algorithm with Dynamic Range Allocation for Fault-Tolerance in WSN. 58-65 - Naween Kumar
, Dinesh Dash
, Prabhat Kumar:
Optimal Sub-Path Selection for Maximum Data Gathering Using Mobile Sink in WSN. 66-71 - Prabhat Kumar, Dinesh Dash
, Naween Kumar
:
An Improved Tour Length Minimization for Single Hop Data Gathering in Wireless Sensor Network. 72-77 - Badal Soni
, Pradip K. Das, Dalton Meitei Thounaojam
:
Copy-Move Tampering Detection based on Local Binary Pattern Histogram Fourier Feature. 78-83 - Gyanendra K. Verma, Anamika Dhillon:
A Handheld Gun Detection using Faster R-CNN Deep Learning. 84-88 - Ramakant Kumar
, Kakali Chatterjee, Ashish Singh:
Secure Group Communication in Wireless Network Using Bilinear Pairing. 89-94 - Siddhartha Banerjee, Subhas Bhunia, Pravash Chandra Chakraborti, Sanjoy Kumar Saha:
An Automated Approach for Volume Fraction Measurement of Titanium Alloy using Digital Image Processing. 95-99 - Krishan Kumar, Anurag Kumar, Ayush Bahuguna:
D-CAD: Deep and Crowded Anomaly Detection. 100-105 - Shikhar Sharma, Piyush Kumar, Krishan Kumar:
A-PNR: Automatic Plate Number Recognition. 106-110 - Arti V. Bang, Priti P. Rege
:
Recognition of Bird Species from their Sounds using Data Reduction Techniques. 111-116 - Rakesh Ranjan Kumar
, Chiranjeev Kumar:
Designing an efficient methodology based on Entropy-TOPSIS for evaluating efficiency of cloud services. 117-122 - Indrajeet Gupta
, Anubhav Choudhary, Prasanta K. Jana:
Generation and Proliferation of Random Directed Acyclic Graphs for Workflow Scheduling Problem. 123-127 - Ashish Kumar Maurya
, Anil Kumar Tripathi:
Performance Comparison of HEFT, Lookahead, CEFT and PEFT Scheduling Algorithms for Heterogeneous Computing Systems. 128-132 - Mitodru Niyogi, Asim Kumar Pal:
Business: Do you wanna sell more? Discovering Topics, Sentiments and Prediction of Ratings. 133-138 - Pankaj Kumar Keserwani, Shefalika Ghosh Samaddar:
Customization of Service Level Agreement for Digital Forensics as a Service. 139-150 - S. R. Shishira, A. Kandasamy, K. Chandrasekaran:
Workload Characterization: Survey of Current Approaches and Research Challenges. 151-156
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.