Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : ADCONS Conference (2011 ; Surathkal, India)
Titre(s) : Advanced computing, networking and security [Texte électronique] : International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised selected papers / edited by P. Santhi Thilagam [and others]
Publication : Berlin ; New York : Springer, cop. 2012
Description matérielle : 1 online resource (xvii, 641 pages)
Collection : Lecture notes in computer science ; 7135
LNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and
HCI
Note(s) : Includes bibliographical references and author index
Annotation ; This book constitutes revised selected papers from the International
Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal,
India, in December 2011. The 73 papers included in this book were carefully reviewed
and selected from 289 submissions. The papers are organized in topical sections on
distributed computing, image processing, pattern recognition, applied algorithms,
wireless networking, sensor networks, network infrastructure, cryptography, Web security,
and application security
Autre(s) auteur(s) : Thilagam, P. Santhi. Fonction indéterminée
Autre(s) forme(s) du titre :
- Autre forme du titre : ADCONS 2011
Sujet(s) : Architecture des réseaux d'ordinateurs
Réseaux d'ordinateurs
Informatique
Indice(s) Dewey :
004 (23e éd.) = Informatique ; 004.6 (23e éd.) = Interfaçages et communications (informatique)
Identifiants, prix et caractéristiques : ISBN 9783642292804
Identifiant de la notice : ark:/12148/cb44704304d
Notice n° :
FRBNF44704304
(notice reprise d'un réservoir extérieur)
Table des matières : A New Small World Lattice /Abhishek Parakh and Subhash Kak ; SLA ; Driven Dynamic
Resource Allocation on Clouds /Siddesh G.M. and Srinivasa K.G. ; An Intelligent Cloud
System Adopting File Pre-fetching /Jagadeesh Balasubramaniyan and Sumalatha Ramachandran
; Replication Infrastructure for RESTful Web Services /Marcin Bazydło, Szymon Francuzik,
Cezary Sobaniec and Dariusz Wawrzyniak ; Context Awareness Acquisition for Safety
Sensor Data Processing on Industrial Sensor Network /Joon-Mo Yang, Jun-Yong Park and
Ryum-Duck Oh ; Content Based Service Discovery in Semantic Web Services Using WordNet
/D. Paulraj and S. Swamynathan ; Optimal Selection of Web Services for Efficient QoS
Driven Web Service Compositions /Demian Antony D'Mello, Manasa Shetty, Akshatha Prabhu,
Akshaya and Adithi Shenoy ; Reconfigurable Web Service Composition Using Belief Revision
/Deivamani Mallayya and Baskaran Ramachandran ; Semantic Web Service Discovery with
Structural Level Matching of Operations /PonHarshavardh
Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error
Propagation-based Regularization (PEPR): A Practical Phantom Study /Tushar Kanti Bera,
Samir Kumar Biswas, K. Rajan and J. Nagaraju ; Improved Hand Tracking and Isolation
from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language
Recognition /J. Rekha, J. Bhattacharya and S. Majumder ; An Approach for Color Edge
Detection with Automatic Threshold Detection /Arpitha M.D., Megha P. Arakeri and G.
Ram Mohan Reddy ; Detection of Straight Lines Using Rule Directed Pixel Comparison
(RDPC) Method /Anand T.V., Madhu S. Nair and Rao Tatavarti ; Performance Analysis
of Pedestrian Detection at Night Time with Different Classifiers /Praveen Cyriac and
Philomina Simon ; Enhanced Quality Preserved Image Compression Technique Using Edge
Assisted Wavelet Based Interpolation /A. Benjamin Joseph and Baskaran Ramachandran
; Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks i
Generalization Capability of Artificial Neural Network Incorporated with Pruning Method
/Siddhaling Urolagin, Prema K.V. and N.V. Subba Reddy ; Post Mining of Diversified
Multiple Decision Trees for Actionable Knowledge Discovery /Sudha Subramani and Sathiyabhama
Balasubramaniam ; Clustering Biological Data Using Voronoi Diagram /Damodar Reddy
Edla and Prasanta K. Jana ; Knowledge Management Techniques for Analysis of Clinical
Databases /T. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari and N.P. Gopalan
; Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination
for Escherichia coli Using Fuzzy Inference System /P.S. Hiremath and Parashuram Bannigidad
; Combining Load Balancing with Shared Storage and Primary Backup Replicaton /Marcin
Bazydło ; Smart Playlist Generation Using Data Mining Techniques /Prafulla Kalapatapu
and Aruna Malapati ; Efficient Variable Size Template Matching Using Fast Normalized
Cross Correlation on Multicore Processors /Dur
Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching Algorithms
/Raghavendra U., Krishnamoorthi Makkithaya and Karunakar A.K. ; Variable Neighborhood
Search Guided Differential Evolution for Non Convex Economic Load Dispatch /J. Jasper
and T Aruldoss Albert Victoire ; Optimal Path Selection for Mobile Robot Navigation
Using Genetic Algorithm in an Indoor Environment /D. Tamilselvi, S. Mercy Shalinie,
A. Fathima Thasneem and S. Gomathi Sundari ; Recent Advancements in Parallel Algorithms
for String Matching on Computing Models ; A Survey and Experimental Results /Chinta
Someswararao, K. Butchi Raju, S.V. Appaji, S. Viswanadha Raju and K.K.V.V.V.S. Reddy
; Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology
/Rakesh Kumar Jha and Upena D. Dalal ; Scalable Video Delivery over Peer-to-Peer Network
/Karunakar A.K., Younsong Qio and Brian Lee ; K-Resilient Server Synchronization Protocol
for Session Guarantees in MANET Environments /Ł
Data Distribution Service on Top of FlexRay Vehicle Networks /Houda Jaouani, Rim Bouhouch,
Wafa Najjar and Salem Hasnaoui ; CAMP: Congestion Adaptive Multipath Routing Protocol
for VANETs /Raviteja B.L., Annappa B. and Mohit P. Tahiliani ; Bit-Based Fairness
in IEEE802.11p MAC for Vehicle-to-Infrastructure Networks /Harigovindan V.P., A.V.
Babu and Lillykutty Jacob ; CBRM ; Cluster Based Replica Management in Mobile Adhoc
Networks /Rajeev Kumar, Prashant Kumar and Naveen Chauhan ; A Linear Model of Call
Intercepting Probability of Integrated WLANs in a 3G Cell /S. Nandakumar and Sibaram
Khara ; An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network
/Rakesh Kumar Jha, Wankhade Visal A. and Upena D. Dalal ; Strong Minimum Interference
Topology for Wireless Sensor Networks /B.S. Panda and D. Pushparaj Shetty ; Distributed
Localization for Anisotropic Sensor Networks Using Spatial Clustering /Lakshmi Priya
M. and Lalit K. Awasthi ; CAs-based QoS Scheme for Remote Health
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous
Fixed Nodes in WSNs /N. Chandrakant, A.P. Bijil, P. Deepa Shenoy, K.R. Venugopal and
L.M. Patnaik ; Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks
/Pratyay Kuila and Prasanta K. Jana ; Node ; Link Disjoint Multipath Routing Protocols
for Wireless Sensor Networks ; A Survey and Conceptual Modeling /Muni Venkateswarlu
K., K. Chandra Sekaran and A. Kandasamy ; Self Healing Wireless Sensor Network /Sumathi
S. and Chandrasekaran M. ; Contention Detection and Minimization in All Optical Routers
/Surinder Singh and Meenakshi Garg ; FARED: Fast Adapting RED Gateways for TCP/IP
Networks /Mohit P. Tahiliani, K.C. Shet and T.G. Basavaraju ; An Efficient and Reliable
Centralized Connection Management Scheme for Computer Networks /Shreesha Kashyap,
Shravan I.V., Anuraj Suman, Ramesh T.K. and Vaya P.R. ; Obstacle Aware Routing in
3D Integrated Circuits /Prasun Ghosal, Hafizur Rahaman, S
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation
/P. Vijayakumar, S. Bose and A. Kannan ; Reputation-Based Trust for Mobile Agents
/Priyanka Dadhich, Kamlesh Dutta and M.C. Govil ; Anonymity in Attribute-Based Group
Signatures /Bhumika K. Patel and Devesh Jinwala ; Cost Effective Region-Based Group
Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography /K. Kumar,
J. Nafeesa Begum and V. Sumathy ; Hidden Access Structure Ciphertext Policy Attribute
Based Encryption with Constant Length Ciphertext /Nishant Doshi and Devesh Jinwala
; SQL Injection Attack Mechanisms and Prevention Techniques /Roshni Chandrashekhar,
Manoj Mardithaya, Santhi Thilagam and Dipankar Saha ; Queuing Algorithms Performance
against Buffer Size and Attack Intensities in DDOS Attacks /Abhinav Bhandari, A.L.
Sangal and Krishan Kumar Saluja ; Characterizing DDoS Attack Distributions from Emulation
Based Experiments on DETER Testbed /Ketki Arora, Krishan Kumar and M
Correlation in Distributed Intrusion Detection System Using Mobile Agent /Zakiya Malek,
Asha Koshti, Chintan Bhatt, Hemant Agrwal and Bhushan Trivedi ; A Novel Architecture
for the Generation of Picture Based CAPTCHA /S. Benson Edwin Raj, V.S. Jayanthi and
V. Muthulakshmi ; Tampering Resistant Dual Watermarking Method for Copyright Protection
of Still Images /Sachin Mehta, Vijayaraghavan Varadharajan and Rajarathnam Nallusamy
; Covertness Analysis of Subliminal Channels in Legitimate Communication /H.S. Gururaja,
M. Seetha and Anjan K. Koundinya ; Dynamic Substitution and Diffusion Based Image
Encryption Using Modified Logistic Map /P. Devaraj ; Misbehavior Detection Based on
Ensemble Learning in VANET /Jyoti Grover, Vijay Laxmi and Manoj Singh Gaur ; An Agreement
Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration
/Poonam Saini and Awadhesh Kumar Singh ; Application of IP Traceback Mechanism to
OnlineVoting System /V.K. Soundar Rajam, B. Sundaresa Pandian, S