Abstract is missing.
- Approximation of the Node-Pair Reliability of Data Communication NetworksMou Dasgupta, G. P. Biswas. 5-9 [doi]
- Biotechnology Virtual Labs - Integrating Wet-lab Techniques and Theoretical Learning for Enhanced Learning at UniversitiesShyam Diwakar, Krishnashree Achuthan, Prema Nedungadi. 10-14 [doi]
- Random Access OFDMA Network with Dynamic Resource AllocationSunil Jacob, R. Dhanasekaran. 15-19 [doi]
- Comparison of Load Balancing Algorithms in a GridJanhavi Arvind Baikerikar, Sunil K. Surve, Sapna U. Prabhu. 20-23 [doi]
- Implementation of Relational Algebra Interpreter Using Another Query LanguageRatnesh Litoriya, Anshu Ranjan. 24-28 [doi]
- A Survey of Algorithms in FCIMMaryam Shekofteh. 29-33 [doi]
- TC-GXML - A Transcoder for HTML to XML GrammarRaghuraj Singh, Prabhat Verma, Avinash Kumar Singh. 34-38 [doi]
- A DWT Based Approach for Steganography Using BiometricsAnjali A. Shejul, Umesh L. Kulkarni. 39-43 [doi]
- Optimization of Detected Deadlock Views of Distributed DatabaseB. M. Monjurul Alom, Frans A. Henskens, Michael Richard Hannaford. 44-48 [doi]
- Preserving Location Privacy in Peer-to-Peer EnvironmentsRupam Deb, Sumaya Kazary, Kazi Rafiqul Islam, Reaz Ahmed. 49-53 [doi]
- Binary Classification Using Linear SVM Pyramidal TreeM. Arun Kumar, Madan Gopal. 54-58 [doi]
- A Novel Structural Similarity with High DistinguishabilityShaojun Chen, Lianfen Huang, Jianan Lin, Zhiyuan Shi. 59-62 [doi]
- Application of Data Mining in Predicting Cell Phones Subscribers Behavior Employing the Contact PatternRahman Mansouri, Mohamad Saraee, Rasoul Amirfattahi. 63-68 [doi]
- Enterprise Storage Architecture for Optimal Business ContinuityRekha Singhal, Shreya Bokare, Prasad Pawar. 73-77 [doi]
- Active Learning Algorithm for Threshold of Decision Probability on Imbalanced Text Classification Based on Protein-Protein Interaction DocumentsGuixian Xu, Zhendong Niu, Xu Gao, Yunjuan Cao, Yumin Zhao. 78-82 [doi]
- A Comparative Study of View Update ProblemHaitao Chen, Husheng Liao. 83-89 [doi]
- Purpose Based Access Control for Privacy Protection in Object Relational Database SystemsC. Emilin Shyni, S. Swamynathan. 90-94 [doi]
- Clustering of Evolving Data Stream with Multiple Adaptive Sliding WindowHongbo Zhu, Yaqiang Wang, Zhonghua Yu. 95-100 [doi]
- Multimedia Distribution over IPTV and its Integration with IMSMohammed Abdul Qadeer, Afaq Hasan Khan. 101-105 [doi]
- Implementation of an IMS Testbed for Wired and Wireless ClientsAfaq Hasan Khan, Mohammed Abdul Qadeer. 106-110 [doi]
- Design of Data Replication System on FreeBSDKun Ren, Zhanhuai Li, Chao Wang, Nan Jiang. 111-115 [doi]
- Optimization and Implementation of LBM Benchmark on Multithreaded GPUXiaoguang Ren, Yuhua Tang, Guibin Wang, Tao Tang, Xudong Fang. 116-122 [doi]
- Research on Evaluation of Digital LibraryYumin Zhao, Zhendong Niu, Yujuan Cao, Lin Dai. 123-126 [doi]
- IT Service Support Process Meta-Modeling Based on ITILXin Huang, Beijun Shen, Delai Chen. 127-131 [doi]
- Design and Implementation of Inference Engine in Safety Risk Assessment Expert System in Petrochemical Industry Based on Fault TreeHuifang Shi, Wenhua Song, Qinggong Li. 132-136 [doi]
- A Personalized Search Engine Using Ontology-Based Fuzzy Concept NetworksFardin Akhlaghian, Batool Arzanian, Parham Moradi. 137-141 [doi]
- A New Requirement Prioritization Model for Market Driven Products Using Analytical Hierarchical ProcessMuhammad Atif Iqbal, Athar Mohsin Zaidi, Saeed Murtaza. 142-149 [doi]
- Automated CAD for Lung Nodule Detection using CT ScansM. Gomathi, P. Thangaraj. 150-153 [doi]
- SpreadStore: A LDPC Erasure Code Scheme for Distributed Storage SystemSubramanyam G. Harihara, Balaji Janakiram, M. Girish Chandra, Aravind Kota Gopalakrishna, Swanand Kadhe, P. Balamuralidhar, B. S. Adiga. 154-158 [doi]
- An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented ParadigmVibha Gaur, Anuja Soni, Punam Bedi. 164-168 [doi]
- An Efficient Feature Extraction Method for Classification of Image Spam Using Artificial Neural NetworksM. Soranamageswari, C. Meena. 169-172 [doi]
- Generating Distributed Query Processing Plans Using Genetic AlgorithmT. V. Vijay Kumar, Vikram Singh, Ajay Kumar Verma. 173-177 [doi]
- Increasing Packet Delivery Ratio in GPSR Using Buffer Zone Based Greedy Forwarding StrategyWen Wei, Zhang Heng Yang. 178-182 [doi]
- E GovernanceTejas R. Marawar, Swapnil P. Kale, Ketan I. Araspure. 183-186 [doi]
- Web Mining: Key Accomplishments, Applications and Future DirectionsMahesh Thylore Ramakrishna, Latha Kolal Gowdar, Malatesh Somashekar Havanur, Banur Puttappa Mallikarjuna Swamy. 187-191 [doi]
- Study of Medical Image RetrievalSonali Bhadoria, Chandrashekhar G. Dethe. 192-196 [doi]
- Noise Load Adaptive Filter Using Neural NetworkM. V. Jagannatha Reddy, Saroj Kumar Gupta, B. Kavitha. 197-200 [doi]
- Implementation of Embedded Mobile Database Based on Mobile AgentYu Zhang, Tengfei Yin. 201-203 [doi]
- A Residential District Building Environment Information System Based on WebGISWang Jing, Zhou Hengtao. 204-207 [doi]
- Investigation and Research on Physical Education Informationization in Higher InstitutionsTao Zhang. 212-215 [doi]
- A Fast Timing Data Mining Technique Based on Grey SystemXiaomin Yu. 216-219 [doi]
- Web Usage Data Clustering Using Dbscan Algorithm and Set SimilaritiesK. Santhisree, A. Damodaram, S. Appaji, D. NagarjunaDevi. 220-224 [doi]
- More on Elicitation of Software Requirements and Prioritization Using AHPMohd. Sadiq, Jawed Ahmed, Mohammad Asim, Aslam Qureshi, R. Suman. 230-234 [doi]
- Aligning Raw Image to Real-time Coordinate SystemGresha Bhatia, Hitesh Rohira, Daishik Mehta, Aniket Phatak, Ameya Gawde. 235-239 [doi]
- DDCSP: Constraint Satisfaction Problem Used for Rule-Based SystemBelaid Saad, Francine Herrmann, Yann Lanuel, Thomas Tamisier. 240-244 [doi]
- Web Data Visualization Based on the Function and Implementaion DimensionJiaxin Wu. 245-249 [doi]
- An Effective Clustering Algorithm for Data MiningSingh Vijendra, Laxman Sahoo, Kelkar Ashwini. 250-253 [doi]
- XLight, An Efficient Relational Schema to Store and Query XML DataHasan Zafari, Keramat Hasani, M. Ebrahim Shiri. 254-257 [doi]
- Design and Implementation on System Model of Government Knowledge Management Based on Multi-AgentLingxia Liu, Song Qiang. 258-260 [doi]
- Distributed Data Mining Algorithm in Electronic Commerce EnvironmentLingxia Liu, Song Qiang. 261-264 [doi]
- A New Replica Creation and Placement Algorithm for Data Grid EnvironmentK. Sashi, Antony Selvadoss Thanamani. 265-269 [doi]
- A Layered Architecture for Checking Rewriting Attacks in Resource Constrained NetworksP. P. Abdul Haleem, M. P. Sebastian. 270-274 [doi]
- Determining Robust Solutions in Supply Chain Using Genetic AlgorithmNiju P. Joseph, G. Radhamani. 275-277 [doi]
- Raid 5 for Secured Storage VirtualisationShubhalaxmi Joshi, Umesh Patwardhan, Pallavi Deshpande. 278-282 [doi]
- On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with BiometricsM. Daris Femila, A. Anthony Irudhayaraj. 283-286 [doi]
- Agile Disk Replacement Strategy for Data Cloud Environment Using Evolutionary AlgorithmsSandeep Patil, Abhinay Nagpal. 287-291 [doi]
- A Coplanar Waveguide Power Divider and It's Neural Network ModelBingyi Gao, Yuxia Xin. 292-295 [doi]
- Autonomicity in Oracle Database Management SystemBasit Raza, Abdul Mateen, Muhammad Sher, Mian M. Awais, Tauqeer Hussain. 296-300 [doi]
- Correction and Interpolation of Noise Corrupted Voice Using Markov Chain Detection TechniqueNaseeb Ahmed Adnan, Md. Sajedul Islam. 305-309 [doi]