


default search action
3. ISI 2014: Greater Noida, Delhi, India
- Rajkumar Buyya, Sabu M. Thampi
:
Intelligent Distributed Computing - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India. Advances in Intelligent Systems and Computing 321, Springer 2015, ISBN 978-3-319-11226-8 - Senthil Kumar Thangavel
, Swati Pandey:
Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout. 1-10 - Gaurav Pareek, Chetanya Goyal, Mukesh Nayal:
A Result Verification Scheme for MapReduce Having Untrusted Participants. 11-19 - Agrima Srivastava, K. P. Krishna Kumar, G. Geethakumari:
Quantifying Direct Trust for Private Information Sharing in an Online Social Network. 21-30 - Ajeet Pal Singh Panwar, Rajdeep Niyogi:
A Heuristic for Link Prediction in Online Social Network. 31-41 - Amrinderpreet Singh, Shalini Batra:
P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network. 43-54 - Puneet Gour, Anil Sarje:
Localization in Wireless Sensor Networks with Ranging Error. 55-69 - Rathnakar Achary
, V. Vityanathan, Pethuru Raj Chelliah
, S. Nagarajan:
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing. 71-82 - Deepika Kukreja, Sanjay Kumar Dhurandher, B. V. Ramana Reddy:
Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs. 83-94 - Savitri Devi, Anil Sarje:
Dir-DREAM: Geographical Routing Protocol for FSO MANET. 95-106 - Manisha Sunil Bhende, Sanjeev Wagh
:
Extending Lifetime of Wireless Sensor Network Using Cellular Automata. 107-115 - Archana B. Khedkar, Vinayak L. Patil
:
Computer Network Optimization Using Topology Modification. 117-127 - Gaurav Pareek, Ratna Kumari, Aitha Nagaraju
:
Mobile Sensor Localization Under Wormhole Attacks: An Analysis. 129-137 - Dharavath Ramesh
, Harshit Gupta, Kuljeet Singh, Chiranjeev Kumar
:
Hash Based Incremental Optimistic Concurrency Control Algorithm in Distributed Databases. 139-150 - Oshin Anand, Abhineet Mittal, Kanta Moolchandani, Munezasultana M. Kagzi, Arpan Kumar Kar
:
Evaluating Travel Websites Using WebQual: A Group Decision Support Approach. 151-160 - Simon Fong, Renfei Luo, Suash Deb, Sabu M. Thampi
:
Location-Based Mutual and Mobile Information Navigation System: Lemmings. 161-171 - Sudha Gupta, Faruk Kazi, Sushama Wagh, Ruta Kambli:
Neural Network Based Early Warning System for an Emerging Blackout in Smart Grid Power Networks. 173-183 - Kriti Chadha, Sushma Jain:
Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks. 185-198 - Shiju Sathyadevan, Nandini Muraleedharan, Sreeranga P. Rajan:
Enhancement of Data Level Security in MongoDB. 199-212 - Vandana Dhingra, Komal Kumar Bhatia
:
SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retrieval. 213-223 - Hind Lamharhar, Laila Benhlima, Dalila Chiadmi:
OWLSGOV: An Owl-S Based Framework for E-Government Services. 225-238 - Rajender Nath, Naresh Kumar
, Sneha Tuteja:
A Survey on Reduction of Load on the Network. 239-249 - Vivek Kumar Sehgal
, Anubhav Patrick, Ashutosh Soni, Lucky Rajput:
Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing. 251-263 - V. J. Jincy, Sudharsan Sundararajan:
Classification Mechanism for IoT Devices towards Creating a Security Framework. 265-277 - Kanupriya Dhawan, Meenakshi Sharma:
Data Owner Centric Approach to Ensure Data Protection in Cloud Environment. 279-286 - Kanubhai K. Patel
, Bharat Buddhadev:
Predictive Rule Discovery for Network Intrusion Detection. 287-298

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.