default search action
13th ICDCIT 2017: Bhubaneswar, India
- Padmanabhan Krishnan, P. Radha Krishna, Laxmi Parida:
Distributed Computing and Internet Technology - 13th International Conference, ICDCIT 2017, Bhubaneswar, India, January 13-16, 2017, Proceedings. Lecture Notes in Computer Science 10109, Springer 2017, ISBN 978-3-319-50471-1
Mobile Computing
- Sushree Bibhuprada B. Priyadarshini, Suvasini Panigrahi:
A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor Networks. 3-14 - Durjoy Dutta, Tandrima Dey, Sruti Gan Chaudhuri:
Gathering Multiple Robots in a Ring and an Infinite Grid. 15-26 - Enrico Eugenio, Agostino Cortesi:
WiFi-Related Energy Consumption Analysis of Mobile Devices in a Walkable Area by Abstract Interpretation. 27-39
Analytics
- Swati Agarwal, Ashish Sureka:
A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on Tumblr. 43-57 - P. S. V. S. Sai Prasad, H. Bala Subrahmanyam, Praveen Kumar Singh:
Scalable IQRA_IG Algorithm: An Iterative MapReduce Approach for Reduct Computation. 58-69 - D. S. Jayalakshmi, R. Srinivasan:
Simulation of MapReduce Across Geographically Distributed Datacentres Using CloudSim. 70-81
Distributed Computing
- Sharma Saravanan, Sameera Shaik:
Revamping the Frequency and Computational Time of RTOS Task - Power Dissipation. 85-93 - Rishi Sharma, Ranu Vikram, Bala Prakasa Rao Killi, Seela Veerabhadreswara Rao:
CO2 Penalty and Disaster Aware Data Center and Service Placement for Cost Minimization. 94-104
Virtual Machines
- Srimoyee Bhattacherjee, Uttiya Sarkar, Sunirmal Khatua, Sarbani Roy:
PMM: A Novel Prediction Based VM Migration Scheme in Cloud Computing. 107-117 - Sharmistha Mandal, Sunirmal Khatua, Rajib Kumar Das:
Bid Selection for Deadline Constrained Jobs over Spot VMs in Computational Cloud. 118-128 - Sanjaya Kumar Panda, Prasanta K. Jana:
An Efficient Request-Based Virtual Machine Placement Algorithm for Cloud Computing. 129-143
Access Control
- Sabitha S, M. S. Rajasree:
An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public Cloud. 147-158 - N. V. Narendra Kumar, R. K. Shyamasundar:
Analyzing Protocol Security Through Information-Flow Control. 159-171 - Arjun Londhey, Manik Lal Das:
Efficient Image Authentication Scheme Using Genetic Algorithms. 172-180
Security and Privacy
- N. V. Narendra Kumar, R. K. Shyamasundar:
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. 183-195 - Payal Chaudhari, Manik Lal Das:
Privacy Preserving Signcryption Scheme. 196-209 - A. K. Singh, Navneet Goyal:
MalCrawler: A Crawler for Seeking and Crawling Malicious Websites. 210-223
Poster Papers
- Sayar Kumar Dey, Prerna Choudhary, Günter Fahrnberger:
Spying Mobrob - Innovative Mobile Number Tracking System. 227-230 - Saiyedul Islam, Sundar Balasubramaniam, Poonam Goyal, Mohit Sati, Navneet Goyal:
A Domain Specific Language for Clustering. 231-234 - Sayantani Saha, Tanusree Parbat, Sarmistha Neogy:
Designing a Secure Data Retrieval Strategy Using NoSQL Database. 235-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.