default search action
Search dblp for Publications
export results for "toc:db/conf/acity/acity2012-1.bht:"
@inproceedings{DBLP:conf/acity/AtiqIM12, author = {Shaikh Mohammed Atiq and Dayanand Ingle and B. B. Meshram}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Web Mining and Security in E-commerce}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {477--487}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_49}, doi = {10.1007/978-3-642-31513-8\_49}, timestamp = {Sat, 05 Sep 2020 18:05:32 +0200}, biburl = {https://dblp.org/rec/conf/acity/AtiqIM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BajpaiVGKK12, author = {Durgesh Bajpai and Manu Vardhan and Sachin Gupta and Ravinder Kumar and Dharmender Singh Kushwaha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {719--728}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_73}, doi = {10.1007/978-3-642-31513-8\_73}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BajpaiVGKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BandyopadhyayB12, author = {Soma Bandyopadhyay and Abhijan Bhattacharyya}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {395--404}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_41}, doi = {10.1007/978-3-642-31513-8\_41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BandyopadhyayB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BarnwalT12, author = {Rajesh P. Barnwal and Arnab Thakur}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Performance Analysis of {AODV} and {DSDV} Protocols Using {RPGM} Model for Application in Co-operative Ad-Hoc Mobile Robots}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {641--649}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_65}, doi = {10.1007/978-3-642-31513-8\_65}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BarnwalT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BhumireddyTM12, author = {Swathi Bhumireddy and Somanath Tripathy and Rakesh Matam}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Secure Peer-Link Establishment in Wireless Mesh Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {189--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_19}, doi = {10.1007/978-3-642-31513-8\_19}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BhumireddyTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BiswasN12, author = {Suparna Biswas and Sarmistha Neogy}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {447--456}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_46}, doi = {10.1007/978-3-642-31513-8\_46}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BiswasN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/BoseBBSBB12, author = {Dipayan Bose and Arnab Banerjee and Aniruddha Bhattacharyya and Himadri Nath Saha and Debika Bhattacharyya and Pranab Kumar Banerjee}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {An Efficient Approach to Secure Routing in {MANET}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {765--776}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_78}, doi = {10.1007/978-3-642-31513-8\_78}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/BoseBBSBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ChandramohanVBD12, author = {D. Chandramohan and T. Vengattaraman and M. S. Saleem Basha and P. Dhavachelvan}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{MSRCC} - Mitigation of Security Risks in Cloud Computing}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {525--532}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_54}, doi = {10.1007/978-3-642-31513-8\_54}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ChandramohanVBD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ChandramohanVSBSK12, author = {D. Chandramohan and Duggineni Veeraiah and M. Shanmugam and N. Balaji and G. Sambasivam and Shailesh Khapre}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {SVIP-Enhanced Security Mechanism for {SIP} Based VoIP Systems and Its Issues}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {81--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_9}, doi = {10.1007/978-3-642-31513-8\_9}, timestamp = {Fri, 24 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/ChandramohanVSBSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ChaudhariD12, author = {Payal Chaudhari and Hiteishi M. Diwanji}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Enhanced {SAFER+} Algorithm for Bluetooth to Withstand Against Key Pairing Attack}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {651--660}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_66}, doi = {10.1007/978-3-642-31513-8\_66}, timestamp = {Fri, 15 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ChaudhariD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ChoukseySS12, author = {Ramanuj Chouksey and R. Sivashankari and Piyush Singhai}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{ECDLP} Based Proxy Multi-signature Scheme}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {71--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_8}, doi = {10.1007/978-3-642-31513-8\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ChoukseySS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/DasC12, author = {Ayan Kumar Das and Rituparna Chaki}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{MERCC:} Multiple Events Routing with Congestion Control for {WSN}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {691--698}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_70}, doi = {10.1007/978-3-642-31513-8\_70}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/DasC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/DeyB12, author = {Priyanka Dey and Suparna Biswas}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {103--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_12}, doi = {10.1007/978-3-642-31513-8\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/DeyB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/DhwajGMP12, author = {Kirti Dhwaj and Rachit Garg and Gaurav Mishra and Neetesh Purohit}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Design and Analysis of Dual Capacitively Loaded {C-PIFA}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {543--550}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_56}, doi = {10.1007/978-3-642-31513-8\_56}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/DhwajGMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/DuttaB12, author = {Chaitali Biswas Dutta and Utpal Biswas}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Specification Based {IDS} for Power Enhancement Related Vulnerabilities in {AODV}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {209--218}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_21}, doi = {10.1007/978-3-642-31513-8\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/DuttaB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/DuttaMRN12, author = {Subrata Dutta and Nandini Mukherjee and Monideepa Roy and Sarmistha Neogy}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in {WSN}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {671--683}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_68}, doi = {10.1007/978-3-642-31513-8\_68}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/DuttaMRN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GnanaPrakasiV12, author = {O. S. GnanaPrakasi and P. Varalakshmi}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Improving {TCP} Performance in Hybrid Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {405--415}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_42}, doi = {10.1007/978-3-642-31513-8\_42}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/GnanaPrakasiV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GoswamiCD12, author = {Nishant Goswami and Tarulata Chauhan and Nishant Doshi}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Efficient Cryptography Technique on Perturbed Data in Distributed Environment}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {239--244}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_24}, doi = {10.1007/978-3-642-31513-8\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/GoswamiCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GoyalA12, author = {Mayank Kumar Goyal and Alok Aggarwal}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {151--157}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_16}, doi = {10.1007/978-3-642-31513-8\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/GoyalA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GoyalVBM12, author = {Mayank Kumar Goyal and Yatendra Kumar Verma and Paras Bassi and Paurush Kumar Misra}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Performance Analysis of {TCP} {\&} {UDP} in Co-located Variable Bandwidth Environment Sharing Same Transmission Links}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {299--306}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_31}, doi = {10.1007/978-3-642-31513-8\_31}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/GoyalVBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GraceMN12, author = {L. K. Joshila Grace and V. Maheswari and Dhinaharan Nagamalai}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Personalised High Quality Search with in a Web Site: No User Profiling}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {307--316}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_32}, doi = {10.1007/978-3-642-31513-8\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/GraceMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/GuptaVGVK12, author = {Paras Gupta and Manu Vardhan and Akhil Goel and Abhinav Verma and Dharmender Singh Kushwaha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {On the Fly File Dereplication Mechanism}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {709--718}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_72}, doi = {10.1007/978-3-642-31513-8\_72}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/GuptaVGVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/HaldarAP12, author = {Nur Al Hasan Haldar and Muhammad Abulaish and Syed Asim Pasha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {131--140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_14}, doi = {10.1007/978-3-642-31513-8\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/HaldarAP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/HalderMCB12, author = {Srimanta Halder and Monomita Mazumdar and Prasenjit Chanak and Indrajit Banerjee}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{FTLBS:} Fault Tolerant Load Balancing Scheme in Wireless Sensor Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {621--631}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_63}, doi = {10.1007/978-3-642-31513-8\_63}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/HalderMCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/HariyaleVPMK12, author = {Hemant Hariyale and Manu Vardhan and Ankit Pandey and Ankit Mishra and Dharmender Singh Kushwaha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Load Balancing in Cluster Using {BLCR} Checkpoint/Restart}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {729--737}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_74}, doi = {10.1007/978-3-642-31513-8\_74}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/HariyaleVPMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/HazraS12, author = {Swarnali Hazra and S. K. Setua}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Trust Oriented Secured {AODV} Routing Protocol against Rushing Attack}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {777--788}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_79}, doi = {10.1007/978-3-642-31513-8\_79}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/HazraS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/JoyJ12, author = {Preetha Theresa Joy and K. Poulose Jacob}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {609--619}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_62}, doi = {10.1007/978-3-642-31513-8\_62}, timestamp = {Mon, 18 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/JoyJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/JuliaM12, author = {J. Julia and Meenakshi Murugappan}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Performance Improvement in {MIMO} Systems Using Rotating Codebooks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {489--496}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_50}, doi = {10.1007/978-3-642-31513-8\_50}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/JuliaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KakarlaS12, author = {Jagadeesh Kakarla and S. Siva Sathya}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {289--298}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_30}, doi = {10.1007/978-3-642-31513-8\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/KakarlaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KarkhanisD12, author = {Manjusha Karkhanis and Achala Deshmukh}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Analysis of {MIMO} Channel Characteristics in Indoor Environment Using Ray Tracing Simulator}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {375--383}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_39}, doi = {10.1007/978-3-642-31513-8\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/KarkhanisD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KaurRS12, author = {Manpreet Kaur and Rajni and Parminder Singh}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Performance Evaluation of V2VCommunication by Implementing Security Algorithm in {VANET}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {757--763}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_77}, doi = {10.1007/978-3-642-31513-8\_77}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/KaurRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KumarT12, author = {Amish Kumar and Namita Tiwari}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Effective Implementation and Evaluation of {AES} in Matlab}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {95--101}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_11}, doi = {10.1007/978-3-642-31513-8\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/KumarT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/KumariSCR12, author = {K. Anitha Kumari and G. Sudha Sadasivam and Bhandari Chetna and S. Rubika}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Novel Triangle Centroid Authentication Protocol for Cloud Environment}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {245--254}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_25}, doi = {10.1007/978-3-642-31513-8\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/KumariSCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/LeeKP12, author = {Moon Ho Lee and Md. Hashem Ali Khan and Daechul Park}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Jong Nang 3-Input {NOR} Channel,}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {551--562}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_57}, doi = {10.1007/978-3-642-31513-8\_57}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/LeeKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MahajanS12, author = {Premraj Mahajan and Anjali Sardana}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {43--53}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_5}, doi = {10.1007/978-3-642-31513-8\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MahajanS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/Mahalingam12, author = {P. R. Mahalingam}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Intelligent Network-Based Intrusion Detection System (iNIDS)}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {1--9}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_1}, doi = {10.1007/978-3-642-31513-8\_1}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/Mahalingam12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MajumderRS12, author = {Koushik Majumder and Sudhabindu Ray and Subir Kumar Sarkar}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of {DSDV} and {DSR}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {797--806}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_81}, doi = {10.1007/978-3-642-31513-8\_81}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/MajumderRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MandalC12, author = {Shanta Mandal and Rituparna Chaki}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {263--271}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_27}, doi = {10.1007/978-3-642-31513-8\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MandalC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MatamT12, author = {Rakesh Matam and Somanath Tripathy}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Reliability Enhanced Routing Protocol for Wireless Mesh Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {587--596}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_60}, doi = {10.1007/978-3-642-31513-8\_60}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MatamT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MazumdarHCB12, author = {Monomita Mazumdar and Srimanta Halder and Prasenjit Chanak and Indrajit Banerjee}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{DARIH:} Distributed Adaptive Routing via Information Highway in Sensor Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {597--607}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_61}, doi = {10.1007/978-3-642-31513-8\_61}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MazumdarHCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MishraKY12, author = {Shivani Mishra and Krishna Kant and R. S. Yadav}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Multi Tree View of Complex Attack - Stuxnet}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {171--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_18}, doi = {10.1007/978-3-642-31513-8\_18}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/MishraKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MishraTP12, author = {Madhumita Mishra and Somanath Tripathy and Sathya Peri}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {SEPastry: Security Enhanced Pastry}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {789--795}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_80}, doi = {10.1007/978-3-642-31513-8\_80}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MishraTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MondalM12, author = {Uttam Kr. Mondal and Jyotsna Kumar Mandal}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Secret Image Embedded Authentication of Song Signal through Wavelet Transform {(IAWT)}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {199--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_20}, doi = {10.1007/978-3-642-31513-8\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MondalM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MukhopadhyayVT12, author = {Debajyoti Mukhopadhyay and Sheetal Vij and Suyog Tasare}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{NAAS:} Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {425--434}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_44}, doi = {10.1007/978-3-642-31513-8\_44}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/MukhopadhyayVT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/Nagaraj12, author = {S. V. Nagaraj}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Securing Multi-agent Systems: {A} Survey}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {23--30}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_3}, doi = {10.1007/978-3-642-31513-8\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/Nagaraj12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/NageshaM12, author = {Nagesha and Sunilkumar S. Manvi}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Performance Analysis of {SCTP} Compared to {TCP} and {UDP}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {515--524}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_53}, doi = {10.1007/978-3-642-31513-8\_53}, timestamp = {Fri, 20 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/NageshaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/NaikBSD12, author = {Bukke Devendra Naik and Sarath Chandra Boddukolu and Pothula Sujatha and P. Dhavachelvan}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {279--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_29}, doi = {10.1007/978-3-642-31513-8\_29}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/NaikBSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/NandiM12, author = {Utpal Nandi and Jyotsna Kumar Mandal}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {739--748}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_75}, doi = {10.1007/978-3-642-31513-8\_75}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/NandiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/NezakatolhoseiniJP12, author = {Majid Nezakatolhoseini and Sam Jabbehdari and Mohammad Ali Pourmina}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {61--70}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_7}, doi = {10.1007/978-3-642-31513-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/NezakatolhoseiniJP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PandeyK12, author = {Aakanksha Pandey and Nilay Khare}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {String Matching Technique Based on Hardware: {A} Comparative Analysis}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {339--347}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_35}, doi = {10.1007/978-3-642-31513-8\_35}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PandeyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PatelNB12, author = {Ahtesham Akhtar Patel and S. Jaya Nirmala and S. Mary Saira Bhanu}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Security and Availability of Data in the Cloud}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {255--261}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_26}, doi = {10.1007/978-3-642-31513-8\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/PatelNB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PatelW12, author = {Helly Patel and Mahesh P. Wankhade}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Human Tracking in Video Surveillance}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {749--756}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_76}, doi = {10.1007/978-3-642-31513-8\_76}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PatelW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PatilBT12, author = {Tulsidas Patil and Ganesh Dattatray Bhutkar and Noshir Tarapore}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {317--328}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_33}, doi = {10.1007/978-3-642-31513-8\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PatilBT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PatilGZ12, author = {Shailaja C. Patil and Ashish Gupta and Mukesh A. Zaveri}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Efficient Target Recovery in Wireless Sensor Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {385--394}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_40}, doi = {10.1007/978-3-642-31513-8\_40}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PatilGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PatilZ12, author = {Shailaja C. Patil and Mukesh A. Zaveri}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Localization in Wireless Sensor Network: {A} Distributed Approach}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {467--476}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_48}, doi = {10.1007/978-3-642-31513-8\_48}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PatilZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/PriyaMG12, author = {Lakshmi Priya and Meenakshi Murugappan and G. Geetha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Design of Broadband Optical Sources for {OCDMA/WDMA} Applications}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {457--466}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_47}, doi = {10.1007/978-3-642-31513-8\_47}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/PriyaMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/RahimunnisaZKJ12, author = {K. Rahimunnisa and M. Priya Zach and S. Suresh Kumar and J. Jayakumar}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Efficient Techniques for the Implementation of {AES} SubByte and MixColumn Transformations}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {497--506}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_51}, doi = {10.1007/978-3-642-31513-8\_51}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/RahimunnisaZKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ReddyGK12, author = {B. Siva Kumar Reddy and M. Sakthi Ganesh and P. Venkata Krishna}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Temporary Parallel Route Recovery for Frequent Link Failure in {VANET}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {369--374}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_38}, doi = {10.1007/978-3-642-31513-8\_38}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ReddyGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/RoyM12, author = {Sarbani Roy and Nandini Mukherjee}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Topology Construction of 3D Wireless Sensor Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {533--542}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_55}, doi = {10.1007/978-3-642-31513-8\_55}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/RoyM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/RoySUD12, author = {Tumpa Roy and Poonam Sisodia and Divye Upadhyay and Kamlesh Dutta}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {11--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_2}, doi = {10.1007/978-3-642-31513-8\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/RoySUD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SahaVSMN12, author = {Sujoy Saha and Rohit Verma and Satadal Sengupta and Vineet Mishra and Subrata Nandi}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {SRSnF: {A} Strategy for Secured Routing in Spray and Focus Routing Protocol for {DTN}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {159--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_17}, doi = {10.1007/978-3-642-31513-8\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SahaVSMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SampathT12, author = {Amritha Sampath and C. Tripti}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Synchronization in Distributed Systems}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {417--424}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_43}, doi = {10.1007/978-3-642-31513-8\_43}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SampathT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SandhyaBSK12, author = {C. H. Sandhya and Deepali R. Borade and Rinki Sharma and Govind R. Kadambi}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {575--585}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_59}, doi = {10.1007/978-3-642-31513-8\_59}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SandhyaBSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SarkarC12, author = {Pratima Sarkar and Rituparna Chaki}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {A Cryptographic Approach towards Black Hole Attack Detection}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {273--278}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_28}, doi = {10.1007/978-3-642-31513-8\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SarkarC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SasirekhaTB12, author = {M. Sasirekha and I. Sumaiya Thaseen and J. Saira Banu}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {An Integrated Intrusion Detection System for Credit Card Fraud Detection}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {55--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_6}, doi = {10.1007/978-3-642-31513-8\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SasirekhaTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SenD12, author = {Sevil Sen and Zeynep Dogmus}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Feature Selection for Detection of Ad Hoc Flooding Attacks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {507--513}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_52}, doi = {10.1007/978-3-642-31513-8\_52}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/SenD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ShyamalaV12, author = {R. Shyamala and S. Valli}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {349--359}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_36}, doi = {10.1007/978-3-642-31513-8\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ShyamalaV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SikriR12, author = {Gaurav Sikri and Rajni}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Peak to Average Power Ratio Reduction in {OFDM} System over PAM, {QAM} and {QPSK} Modulation}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {685--690}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_69}, doi = {10.1007/978-3-642-31513-8\_69}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SikriR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SoniyaW12, author = {B. Soniya and M. Wilscy}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Host-Based Bot Detection Using Destination White-Lists for User's Profile}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {87--93}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_10}, doi = {10.1007/978-3-642-31513-8\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SoniyaW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SreenivasBPR12, author = {Banda Sreenivas and S. Ramesh Babu and S. Prabhakar and D. Karunakar Reddy}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Effective Resource Allocation Technique for Wireless Cellular System}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {633--640}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_64}, doi = {10.1007/978-3-642-31513-8\_64}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SreenivasBPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SrinivasanRRN12, author = {Nithin Srinivasan and Sriram Ravichandran and Shruthi Ravichandran and Prabagarane Nagaradjane}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {563--573}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_58}, doi = {10.1007/978-3-642-31513-8\_58}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SrinivasanRRN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SrivastavH12, author = {Ambrish Srivastav and Nitin Hambir}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {English to Hindi Machine Translator Using {GMT} and {RBMT} Approach}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {219--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_22}, doi = {10.1007/978-3-642-31513-8\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SrivastavH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/SrivastavaM12, author = {Amit Kumar Srivastava and Arun Kumar Misra}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Plugging {DHCP} Security Holes Using {S-DHCP}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {227--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_23}, doi = {10.1007/978-3-642-31513-8\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/SrivastavaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/TakO12, author = {Gaurav Kumar Tak and Gaurav Ojha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Awareness Based Approach against E-Mail Attacks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {699--708}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_71}, doi = {10.1007/978-3-642-31513-8\_71}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/TakO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ThapaC12, author = {Chandra Thapa and C. Chandrasekhar}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Analysis of Fractional Frequency Reuse {(FFR)} over Classical Reuse Scheme in 4G {(LTE)} Cellular Network}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {361--367}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_37}, doi = {10.1007/978-3-642-31513-8\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ThapaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/VadhaniVV12, author = {S. Indu Vadhani and G. Vithya and B. Vinayagasundaram}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Quantum {DOT} Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {435--445}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_45}, doi = {10.1007/978-3-642-31513-8\_45}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/VadhaniVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/Vaidyanathan12, author = {Sundarapandian Vaidyanathan}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {329--337}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_34}, doi = {10.1007/978-3-642-31513-8\_34}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/Vaidyanathan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ValarmathiLMAU12, author = {J. Valarmathi and K. Lakshmi and R. S. Menaga and K. V. Abirami and V. Rhymend Uthariaraj}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {{SLA} for a Pervasive Healthcare Environment}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {141--149}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_15}, doi = {10.1007/978-3-642-31513-8\_15}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acity/ValarmathiLMAU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/VarshneyJS12, author = {Gaurav Varshney and Ramesh Chandra Joshi and Anjali Sardana}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Personal Secret Information Based Authentication towards Preventing Phishing Attacks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {31--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_4}, doi = {10.1007/978-3-642-31513-8\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/VarshneyJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/VenkadeshanJ12, author = {R. Venkadeshan and M. Jegatha}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Super Peer Deployment in Unstructured Peer-to-Peer Networks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {661--669}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_67}, doi = {10.1007/978-3-642-31513-8\_67}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/VenkadeshanJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/ZahnoY12, author = {Roger Zahno and Amr M. Youssef}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {An Obfuscated Implementation of {RC4}}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {113--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_13}, doi = {10.1007/978-3-642-31513-8\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/ZahnoY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acity/2012-1, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8}, doi = {10.1007/978-3-642-31513-8}, isbn = {978-3-642-31512-1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/2012-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.