default search action
Search dblp for Publications
export results for "toc:db/conf/wir/wir2016.bht:"
@inproceedings{DBLP:conf/wir/AhujaMJ16, author = {Kamlesh Ahuja and Durgesh Kumar Mishra and Sarika Jain}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {139--141}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909093}, doi = {10.1145/2909067.2909093}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/AhujaMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/AmbekariS16, author = {Jaheda S. Ambekari and Sumedha Sirsikar}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Comparative Study of Optimal Clustering Techniques in Wireless Sensor Network: {A} Survey}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {38--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909074}, doi = {10.1145/2909067.2909074}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/AmbekariS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/BharambeK16, author = {Asha A. Bharambe and Dhananjay R. Kalbande}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Techniques and Approaches for Disease Outbreak Prediction: {A} Survey}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {100--102}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909085}, doi = {10.1145/2909067.2909085}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/BharambeK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/BishnoiC16, author = {Anjali Bishnoi and H. M. Chawla}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Extending Storage Life of Pears Using a Formulation Developed from a Terpenoidal Oligomer from Lac}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {103--108}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909086}, doi = {10.1145/2909067.2909086}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/BishnoiC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/ChowdhuryKSDDD16, author = {Rajdeep Chowdhury and Jenifar Khan and Subham Sengupta and Saswata Dasgupta and Soupayan Datta and Mallika De}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Dynamic Referencing Data Warehouse Employing Proposed Time Integrated Seed Based Element Engendered Cryptographic Algorithm}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {142--149}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909094}, doi = {10.1145/2909067.2909094}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/ChowdhuryKSDDD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/Christa016, author = {Sharon Christa and V. Suma}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Significance of Ticket Analytics in Effective Software Maintenance: Awareness}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {126--130}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909091}, doi = {10.1145/2909067.2909091}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/Christa016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/DhagatJ16, author = {Rashi Dhagat and Pankaj Jagtap}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {An Approach Used In Wireless Network to Detect Denial of Service Attack}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {4--6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909069}, doi = {10.1145/2909067.2909069}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/DhagatJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/DharraoCR16, author = {Shital M. Dharrao and Vijay D. Choudhary and Kantilal Pitambar Rane}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Intelligent Bus stand Monitoring and Control}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {15--19}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909072}, doi = {10.1145/2909067.2909072}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/DharraoCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/DubeyG16, author = {Anil Kumar Dubey and Khushbu Gulabani}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Gesture Recognition for {VW} {\&} {VO:} Virtual Writing and Virtual Operation}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {112--117}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909088}, doi = {10.1145/2909067.2909088}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/DubeyG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/GandhiP16, author = {Ankita Gandhi and Amarjeet Poonia}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Image Visualization as per the User Appeal through Deep Learning}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {81--86}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909081}, doi = {10.1145/2909067.2909081}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/GandhiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/HarbajankaS16, author = {Shimpy Harbajanka and Preeti Saxena}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Security Issues and Trust Management in Cloud Computing}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {1--3}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909068}, doi = {10.1145/2909067.2909068}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/HarbajankaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/JainKS16, author = {Nilakshi Jain and Dhananjay R. Kalbande and Priyanka Sharma}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Empirical relationship between Victim's occupation and their knowledge of Digital Forensic}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {61--65}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909077}, doi = {10.1145/2909067.2909077}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/JainKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/JainSABAK16, author = {Nilakshi Jain and Priyanka Sharma and Rashmi Anchan and Apoorva Bhosale and Pooja Anchan and Dhananjay R. Kalbande}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Computerized Forensic Approach Using Data Mining Techniques}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {55--60}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909076}, doi = {10.1145/2909067.2909076}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/JainSABAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/JindalS16, author = {Shikha Jindal and Manmohan Sharma}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Design and Implementation of Kerberos using {DES} Algorithm}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {92--95}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909083}, doi = {10.1145/2909067.2909083}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/JindalS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/KaurS16, author = {Jasleen Kaur and Jatinderkumar R. Saini}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Punjabi Stop Words: {A} Gurmukhi, Shahmukhi and Roman Scripted Chronicle}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {32--37}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909073}, doi = {10.1145/2909067.2909073}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/KaurS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/KolkurK16, author = {Seema Kolkur and Dhananjay R. Kalbande}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Review of Machine Learning Algorithms in {R} software for Diagnosis of {ESD} Diseases}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {20--25}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909101}, doi = {10.1145/2909067.2909101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/KolkurK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/KumarRSSP16, author = {Praveen Kumar and M. Ruthwik and Manisha K. Sree and Misba Saad and Annapurna P. Patil}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Implementation of an Emergency Evacuation System Using Intelligent Routing Using QualNet Simulator}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {131--138}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909092}, doi = {10.1145/2909067.2909092}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/KumarRSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/LatambaleS16, author = {Suwarna Latambale and Sumedha Sirsikar}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {A Survey of various Sink Mobility based Techniques in Wireless Sensor Network}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {45--50}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909075}, doi = {10.1145/2909067.2909075}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/LatambaleS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/MahnotMM16, author = {Neha Mahnot and Rekha Mehra and Shikha Maheshwary}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Double Layer Anti-Reflective Coating of SiO2/ZnO for Photovoltaic Cell}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {109--111}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909087}, doi = {10.1145/2909067.2909087}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/MahnotMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/MalathiSJ16, author = {B. Malathi and K. Chandra Sekharaiah and H. Jayasree}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Analytical Trends and Practices of Web Intelligence}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {121--125}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909090}, doi = {10.1145/2909067.2909090}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/MalathiSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/MeghaniG16, author = {Dolly Meghani and S. Geetha}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {{ECG} Steganography to secure patient data in an E-Healthcare System}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {66--70}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909078}, doi = {10.1145/2909067.2909078}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/MeghaniG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/MehrotraK16, author = {Shashi Mehrotra and Shruti Kohli}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {The Study of the Usage of Data Analytic and Clustering Techniques for Web Elements}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {118--120}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909089}, doi = {10.1145/2909067.2909089}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/MehrotraK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/NemaTT16, author = {Aditi Nema and Basant Tiwari and Vivek Tiwari}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {26--31}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909100}, doi = {10.1145/2909067.2909100}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/NemaTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/PansareB16, author = {Jayshree R. Pansare and V. D. Bajad}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Errors Detection in Big Sensor Data on Cloud using Time Efficient Technique}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {12--14}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909071}, doi = {10.1145/2909067.2909071}, timestamp = {Sun, 22 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/PansareB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/PawarJD16, author = {Shwetambari Pawar and Nilakshi Jain and Swati Deshpande}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {System Attribute Measures of Network Security Analyzer}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {51--54}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909099}, doi = {10.1145/2909067.2909099}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/PawarJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/PhadeSR16, author = {Gayatri M. Phade and Sandhya Save and Vivek Ratnapakhari}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Narrow Band {LNA} Design Using {OGMOSFET} for Noise and Gain Analysis}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {96--99}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909084}, doi = {10.1145/2909067.2909084}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/PhadeSR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/ShejawalP16, author = {Pooja Shejawal and Jayshree R. Pansare}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Nearest Neighbor Search Technique Using Keywords and Threshold}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {7--11}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909070}, doi = {10.1145/2909067.2909070}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/ShejawalP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/SinghSKK16, author = {Neha Singh and Saurabh Singh and Naveen Kumar and Rakesh Kumar}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Key Management Techniques for Securing {MANET}}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {77--80}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909080}, doi = {10.1145/2909067.2909080}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/SinghSKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/SrishtiY16, author = {Srishti and Sapna Yadav}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Execution and Analysis of Topology Based Routing Protocols in {VANET}}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {87--91}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909082}, doi = {10.1145/2909067.2909082}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/SrishtiY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wir/YeoleK16, author = {Anjali S. Yeole and Dhananjay R. Kalbande}, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {Use of Internet of Things (IoT) in Healthcare: {A} Survey}, booktitle = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, pages = {71--76}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067.2909079}, doi = {10.1145/2909067.2909079}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wir/YeoleK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wir/2016, editor = {Durgesh Kumar Mishra and Rashid Sheikh and Sarika Jain}, title = {{WIR} '16: Women in Research 2016, Indore India, March, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909067}, doi = {10.1145/2909067}, isbn = {978-1-4503-4278-0}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wir/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.