Advanced computing [electronic resource] : first International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January 2-4, 2011, proceedings. Part III / Natarajan Meghanathan, Brajesh Kumar Kaushik, Dhinaharan Nagamalai (Eds.)

Topics covered by the papers presented: Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.), Distributed and Parallel Systems and Algorithms, Security and Information Assurance, Ad Hoc and Ubiquitous Computing, and Wireless Ad Hoc Networks and Sensor Networks.

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: International Conference on Computer Science and Information Technology Bangalore, India
Other Authors: Meghanathan, Natarajan, 1977-, Kaushik, Brajesh Kumar, Nagamalai, Dhinaharan
Other title:CCSIT 2011.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; Heidelberg ; New York : Springer, ©2011.
Series:Communications in computer and information science ; 133.
Subjects:
Table of Contents:
  • Machine generated contents note: Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy Logic / Vigneswaran Narayanamurthy
  • Intelligent Network for Offline Signature Verification Using Chain Code / Pratibha Singh
  • Improved and Adaptive Face Recognition Method Using Simplified Fuzzy ARTMAP / M. Wilscy
  • Automatic Evolution of Rules to Identify Students' Multiple Intelligence / Rajendra Akerkar
  • Survey on Hand Gesture Recognition in Context of Soft Computing / Sonia Raheja
  • Handwritten Numeral Recognition Using Modified BP ANN Structure / Savita Ahlawat
  • Expert System for Sentence Recognition / Ritu Tiwari
  • RODD: An Effective Reference-Based Outlier Detection Technique for Large Datasets / J.K. Kalita
  • Distributed and Parallel Systems and Algorithms
  • Review of Dynamic Web Service Composition Techniques / Supriya Salian
  • Output Regulation of Arneodo-Coullet Chaotic System / Sundarapandian Vaidyanathan
  • High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFS / Indrajit Chakrabarti
  • Mathematical Modeling of Exceptions in Healthcare Workflow / Sumagna Patnaik
  • Functional Based Testing in Web Services Integrated Software Applications / Haritha Rayudu
  • Design and Implementation of a Novel Distributed Memory File System / B.S. Jagadeesh
  • Decentralized Dynamic Load Balancing for Multi Cluster Grid Environment / V. Rhymend Uthariaraj
  • Adoption of Cloud Computing in e-Governance / Ajita Kumar Misro
  • Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of Caching / Bhupendra Verma
  • Semantic Approach to Design an Intelligent Self Organized Search Engine for Extracting Information Relating to Educational Resources / M. Chenthil Kumar
  • Cluster Bit Collision Identification for Recognizing Passive Tags in RFID System / Munir Ahamed Rabbani.
  • Note continued: Integration Testing of Multiple Embedded Processing Components / Ibrahim Khan
  • Security and Information Assurance
  • New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks / Y. Venkatamani
  • Model for Delegation Based on Authentication and Authorization / William R. Simpson
  • Identification of Encryption Algorithm Using Decision Tree / R. Anitha
  • Novel Mechanism for Detection of Distributed Denial of Service Attacks / Jaydip Sen
  • Authenticating and Securing Mobile Applications Using Microlog / Sunil Kumar Singh
  • Assisting Programmers Resolving Vulnerabilities in Java Web Applications / Marc-Andre Laverdiere
  • Estimating Strength of a DDoS Attack Using Multiple Regression Analysis / Manoj Misra
  • Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application / R. Vignesh
  • Chest X-Ray Analysis for Computer-Aided Diagnostic / Kim Le
  • Overcoming Social Issues in Requirements Engineering / Lavanya Santapoor
  • Ad Hoc and Ubiquitous Computing
  • Range-Free Localization for Air-Dropped WSNs by Filtering Neighborhood Estimation Improvements / Rafael Casado
  • Evolution of Various Controlled Replication Routing Schemes for Opportunistic Networks / Yogeshwar P. Kosta
  • Collaborative Context Management and Selection in Context Aware Computing / V. Rhymend Uthariaraj
  • Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket Analysis / Durga Toshniwal
  • Wireless Ad Hoc Networks and Sensor Networks
  • Application of Euclidean Distance Power Graphs in Localization of Sensor Networks / Usha Sharma
  • New Protocol to Secure AODV in Mobile AdHoc Networks / Geetha J. Reddy
  • Spelling Corrector for Indian Languages / A. Sharada
  • Voltage Collapse Based Critical Bus Ranking / T. Ananthapadmanabha.
  • Note continued: Multiplexer Based Circuit Synthesis with Area-Power Trade-Off / Santanu Chattopadhyay
  • Exergaming
  • New Age Gaming for Health, Rehabilitation and Education / Ankit Kamal
  • Inclusion/Exclusion Protocol for RFID Tags / Selwyn Piramuthu
  • Min Max Threshold Range (MMTR) Approach in Palmprint Recognition / Ratna Dahiya
  • Power and Buffer Overflow Optimization in Wireless Sensor Nodes / Prabhat Ranjan
  • Web Log Data Analysis and Mining / Dhinaharan Nagamalai
  • Steganography Using Version Control System / Sopan A. Talekar.