researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2012
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
A. B. Sagar
A. J. Dinusha Rathnayaka
Akshat Jain
Ali Alatabbi
Anirban Sengupta
Ankur Choudhary
Ashish Tanwer
Chandan Mazumdar
Costas S. Iliopoulos
Debahuti Mishra
Debajyoti Mukhopadhyay
Farida Ridzuan
Hrushikesha Mohanty
K. Manikantan
Kandarpa Kumar Sarma
Milind Pande
S. Ramachandran
Ugrasen Suman
Vidyasagar Potdar
Vikrant Bhateja
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
approach
classification
data
design
detection
feature
information
model
network
networks
recognition
sensor
service
study
system
using
web
wireless
CUBE (cube)
Editions
Publications
Viewing Publication 1 - 100 from 149
2012
Automated user interface testing for web applications and TestComplete
Samer Al-Zain
,
Derar Eleyan
,
Joy Garfield
.
cube 2012
:
350-354
[doi]
Alternative methodologies for automated grouping in education and research
Lenuta Alboaie
,
Mircea-Florin Vaida
,
Diana Pojar
.
cube 2012
:
508-513
[doi]
Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: a survey
Abhineet Anand
,
Vikas Kumar Sihag
,
S. N. Gupta
.
cube 2012
:
155-159
[doi]
Collaboration in software development: a spotlight
Ritu Arora
,
Sanjay Goel
.
cube 2012
:
391-396
[doi]
Dental patient records maintenance on cloud computing using data protection model
Gauri S. Bhange
,
Swapnaja R. Hiray
.
cube 2012
:
526-531
[doi]
A two-phase quantitative methodology for enterprise information security risk analysis
Jaya Bhattacharjee
,
Anirban Sengupta
,
Chandan Mazumdar
,
Mridul Sankar Barik
.
cube 2012
:
809-815
[doi]
Emotion detection state of the art
Haji Binali
,
Vidyasagar Potdar
.
cube 2012
:
501-507
[doi]
Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequences
Yuri L. Borissov
,
Moon Ho Lee
.
cube 2012
:
11-16
[doi]
Classifying voice quality via pitch and spectral analysis
James Carmichael
.
cube 2012
:
429-434
[doi]
Implementation of execution history in non-relational databases for feedback-guided job modeling
Sushan Chakraborty
,
Madhulina Sarkar
,
Nandini Mukherjee
.
cube 2012
:
476-482
[doi]
LDC-MAC: low latency DC-MAC protocol for wireless sensor network
Sansar Singh Chauhan
,
M. M. Gore
.
cube 2012
:
133-137
[doi]
Iris recognition based security system using RFID
Pankaj P. Chitte
,
J. G. Rana
,
Sachin Taware
.
cube 2012
:
124-127
[doi]
Phase wise effort estimation for software maintenance: an extended SMEEM model
Jitender Choudhari
,
Ugrasen Suman
.
cube 2012
:
397-402
[doi]
Schur decomposition and dither modulation: an efficient and robust audio watermarking technique
Ankur Choudhary
,
S. P. S. Chauhan
,
M. Afshar Alam
,
Safdar Tanveer
.
cube 2012
:
744-748
[doi]
Texture based decision tree classification for Arecanut
Ajit Danti
,
M. Suresha
.
cube 2012
:
113-117
[doi]
Removal of random-valued impulse noise using overcomplete DCT dictionary
Bhabesh Deka
,
Dipranjan Baishnab
.
cube 2012
:
42-46
[doi]
HENRI: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internet
Saurabh Deochake
,
Suresh Sarode
,
Shashank Kanth
,
Vidyasagar Potdar
,
Subhadip Chakraborty
,
Debajyoti Mukhopadhyay
.
cube 2012
:
647-652
[doi]
Astroid shaped DCT feature extraction for enhanced face recognition
R. Divya
,
Anwesha Rath
,
S. Ramachandran
,
K. Manikantan
.
cube 2012
:
95-101
[doi]
A survey of data mining applications in water quality management
Prasun Dutta
,
Rituparna Chaki
.
cube 2012
:
470-475
[doi]
e-learning recommender system for learners in online social networks through association retrieval
Pragya Dwivedi
,
Kamal K. Bharadwaj
.
cube 2012
:
676-681
[doi]
Circular sector DCT based feature extraction for enhanced face recognition using histogram based dynamic gamma intensity correction
R. Gagan
,
Hardik Sanghavi
,
S. Ramachandran
,
K. Manikantan
.
cube 2012
:
74-81
[doi]
Song/instrumental classification using spectrogram based contextual features
Arijit Ghosal
,
Rudrasis Chakraborty
,
Bibhas Chandra Dhara
,
Sanjoy Kumar Saha
.
cube 2012
:
21-25
[doi]
Classifier Ensemble for Imbalanced Data Stream Classification
Abhijeet Godase
,
Vahida Attar
.
cube 2012
:
284-289
[doi]
A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits
Madhavi Gudavalli
,
S. Viswanadha Raju
,
K. S. M. V. Kumar
.
cube 2012
:
102-107
[doi]
Item recommender system by incorporating metadata information into ternary semantic analysis
Abhinav Kumar Gupta
,
Glitto Mathew
.
cube 2012
:
670-675
[doi]
Unsupervised topic detection model and its application in text categorization
Yashodhara V. Haribhakta
,
Arti Malgaonkar
,
Parag Kulkarni
.
cube 2012
:
314-319
[doi]
Feature annotation for text categorization
Yashodhara V. Haribhakta
,
Santosh Kalamkar
,
Parag Kulkarni
.
cube 2012
:
308-313
[doi]
Image retrieval system based on feature extraction and relevance feedback
D. N. D. Harini
,
Dhavala Lalitha Bhaskari
.
cube 2012
:
69-73
[doi]
Design and verification of flexray to CAN protocol converter node
R. Harish
,
L. Swarna Jyothi
.
cube 2012
:
192-197
[doi]
Watermarking technique for wireless multimedia sensor networks: a state of the art
Bambang Harjito
,
Vidyasagar Potdar
,
Jaipal Singh
.
cube 2012
:
832-840
[doi]
How much money do spammers make from your website?
Pedram Hayati
,
Nazanin Firoozeh
,
Vidyasagar Potdar
,
Kevin Chai
.
cube 2012
:
732-739
[doi]
Defending against internet worms using honeyfarm
Pragya Jain
,
Anjali Sardana
.
cube 2012
:
795-800
[doi]
A versatile denoising method for images contaminated with Gaussian noise
Akshat Jain
,
Vikrant Bhateja
.
cube 2012
:
65-68
[doi]
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer
Heasuk Jo
,
Seungjoo Kim
,
Dongho Won
.
cube 2012
:
816-819
[doi]
Automated matchmaking of student skills and academic course requisites
Manish Joshi
,
Lall Manoj
,
O. Olugbara Oludayo
,
Michael M. Modiba
,
Virendrakumar C. Bhavsar
.
cube 2012
:
514-519
[doi]
Investigation on tracking system for real time video surveillance applications
C. Kalaiselvan
,
A. SivananthaRaja
.
cube 2012
:
108-112
[doi]
A service oriented life cycle model for educational information system
R. Kamatchi
.
cube 2012
:
409-412
[doi]
Software industry in Okinawa: the critical success factors for the Japanese Bangalore
Atsushi Kato
.
cube 2012
:
593-597
[doi]
Novel KNN-motivation-PSO and its application to image segmentation
Madhumita Kedlaya
,
Harsha Bhatia
,
S. Ramachandran
,
K. Manikantan
.
cube 2012
:
252-258
[doi]
TrustGK monitor: 'customer trust as a service' for the cloud
Gaurangkumar Khalasi
,
Minubhai Chaudhari
.
cube 2012
:
537-543
[doi]
Trust evaluation in wireless ad hoc networks using fuzzy system
Pallavi Khatri
,
S. Tapaswi
,
U. P. Verma
.
cube 2012
:
779-783
[doi]
An improved anonymous authentication and key exchange scheme
Kyung-kug Kim
,
Myung-Hwan Kim
.
cube 2012
:
740-743
[doi]
Neural network based smart vision system for driver assistance in extracting traffic signposts
Meeta Kumar
,
Jayshree Ghorpade
,
V. Y. Kulkarni
,
Rajni Bedi
.
cube 2012
:
246-251
[doi]
Optimized private information retrieval using graphics processing unit with reduced accessibility
Sunil B. Mane
,
Sandip B. Bansode
,
Pradeep K. Sinha
.
cube 2012
:
128-132
[doi]
Using private information retrieval protocol for an e-commerce application
Sunil B. Mane
,
Suraj T. Sawant
,
Pradeep K. Sinha
.
cube 2012
:
659-663
[doi]
Development and performance analysis of HPC based framework for cryptanalytic attacks
Deepika Dutta Mishra
,
C. S. R. C. Murthy
,
Kislay Bhatt
,
A. K. Bhattacharjee
,
R. S. Mundada
.
cube 2012
:
789-794
[doi]
A review of fault management system in wireless sensor network
Siba Mitra
,
Ajanta De Sarkar
,
Sarbani Roy
.
cube 2012
:
144-148
[doi]
CA based cost optimized PRNG for Monte-Carlo simulation of distributed computation
Arnab Mitra
,
Anirban Kundu
.
cube 2012
:
332-337
[doi]
Situation recognition in sensor based environments using concept lattices
Sangeeta Mittal
,
Alok Aggarwal
,
S. L. Maskara
.
cube 2012
:
579-584
[doi]
Load balancing and resource monitoring in cloud
Nitin S. More
,
Swapnaja R. Hiray
.
cube 2012
:
552-556
[doi]
Visualizing semantic web
Meera Mudholkar
,
Jagannath Aghav
,
Saloni Peswani
,
Härish Jädhäø
,
Seema Kela
,
S. K. Hiremath
.
cube 2012
:
682-687
[doi]
An approach to manage ontology dynamically based on web service composition requests
Debajyoti Mukhopadhyay
,
Archana Chougule
.
cube 2012
:
653-658
[doi]
An approach of beacon placement and beacon based routing towards mobile sink in WSN
Avishek Mukhopadhyay
,
Sarbani Roy
,
Nandini Mukherjee
.
cube 2012
:
149-154
[doi]
A hybrid graph based framework for integrating information from RDF and topic map: a proposal
Shiladitya Munshi
,
Ayan Chakraborty
,
Debajyoti Mukhopadhyay
.
cube 2012
:
641-646
[doi]
Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing technique
Naveen N. Murthy
,
R. Raghunandana
,
K. Manikantan
,
S. Ramachandran
.
cube 2012
:
82-89
[doi]
Association rule variation with respect to time
Monica H. Ou
,
Jérôme Maillot
.
cube 2012
:
494-500
[doi]
A novel energy efficient routing approach using multipath ring routing and clustering for WSN
Anand Pandya
,
Mrudang Mehta
.
cube 2012
:
138-143
[doi]
An optimal approach of load balancing for grid computing
Jagdish C. Patni
,
Nitin Trivedi
,
Om Prakash Pal
,
Pradeep Chauhan
,
Anubhav Sharma
.
cube 2012
:
567-571
[doi]
Spam 2.0
Vidyasagar Potdar
,
Farida Ridzuan
,
Jaipal Singh
.
cube 2012
:
724-731
[doi]
The changing nature of Spam 2.0
Vidyasagar Potdar
,
Yan Like
,
Nazanin Firoozeh
,
Debajyoti Mukhopadhyay
,
Farida Ridzuan
,
Dhiren Tejani
.
cube 2012
:
826-831
[doi]
CUBE International IT Conference & Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012
Vidyasagar Potdar
,
Debajyoti Mukhopadhyay
, editors,
ACM,
2012.
[doi]
Rule based system to facilitate the immunity of HIV/AIDS patients using Ayurveda therapy
Seema Purohit
,
Krantee Jamdaade
.
cube 2012
:
226-234
[doi]
Identifying spam e-mail based-on statistical header features and sender behavior
Aziz Qaroush
,
Ismail M. Khater
,
Mahdi Washaha
.
cube 2012
:
771-778
[doi]
Prosumer management in socio-technical smart grid
A. J. Dinusha Rathnayaka
,
Vidyasagar Potdar
,
Monica H. Ou
.
cube 2012
:
483-489
[doi]
Design and simulation of adaptive PID controller powered by PWM signals to actuate DC motor drive system used in climbing robot
Sheetal Devidas Rathod
,
Kota Solomon Raju
,
S. A. Akbar
.
cube 2012
:
841-846
[doi]
SEReleC# - C# implementation of SEReleC: a meta search engine based on combinatorial search and search keyword based link classification
Vishwas Raval
,
Padam Kumar
,
Yogesh Kosta
.
cube 2012
:
688-693
[doi]
Modeling collaborative task execution in social networks
A. B. Sagar
.
cube 2012
:
664-669
[doi]
Modeling transparency and collaborativeness in distributed work groups
A. B. Sagar
.
cube 2012
:
712-717
[doi]
Dependability of social network groups
A. B. Sagar
.
cube 2012
:
694-700
[doi]
Comparison of policy specification languages for access control
Sarnali Saha
,
Asmita Nag
.
cube 2012
:
764-770
[doi]
ConSim: an enhanced semantic similarity measure to find the relationship between concepts in cross ontology
B. Saleena
,
S. K. Srivatsa
.
cube 2012
:
303-307
[doi]
An attempt to ensure security of payload by targeting non-linear seed pixel positions in carrier image
Sabyasachi Samanta
,
Saurabh Dutta
,
Gautam Sanyal
.
cube 2012
:
17-20
[doi]
A secure approach for SMS in GSM network
Neetesh Saxena
,
Narendra S. Chaudhari
.
cube 2012
:
59-64
[doi]
Model of knowledge management in an intelligent individual public transport to taxi
Diego Edixon Rodriguez Segura
,
Victor Hugo Medina GarcĂa
.
cube 2012
:
605-610
[doi]
Specification and validation of enterprise information security policies
Anirban Sengupta
,
Chandan Mazumdar
,
Aditya Bagchi
.
cube 2012
:
801-808
[doi]
Privacy-preserving deletion to generalization-based anonymous database
Dipalee Shah
,
Rajesh Ingle
.
cube 2012
:
459-463
[doi]
Comparative study and analysis of web personalization frameworks of recommender systems for e-commerce
Sanjeev Kumar Sharma
,
Ugrasen Suman
.
cube 2012
:
629-634
[doi]
IP v6 secure tunneling mechanism
Sandeep Shiravale
,
Sumedha Sirsikar
,
Debajyoti Mukhopadhyay
.
cube 2012
:
222-225
[doi]
Off-line handwritten signature retrieval
M. S. Shirdhonkar
,
Manesh Kokare
.
cube 2012
:
290-293
[doi]
A clustering approach for structural k-anonymity in social networks using genetic algorithm
Vikas Kumar Sihag
.
cube 2012
:
701-706
[doi]
A comparative evaluation of various de-speckling algorithms for medical images
Sonam Singh
,
Akshat Jain
,
Vikrant Bhateja
.
cube 2012
:
32-37
[doi]
Designing an ontology based domain specific web search engine for commonly used products using RDF
Sukanta Sinha
,
Rana Dattagupta
,
Debajyoti Mukhopadhyay
.
cube 2012
:
612-617
[doi]
Chirp Parameter Estimation - A New View Through Filters
Pooja Soman
,
Shishir B. Sahay
.
cube 2012
:
177-179
[doi]
DDoS detection and defense: client termination approach
Kumar Sourav
,
Debi Prasad Mishra
.
cube 2012
:
749-752
[doi]
A comparative study of parametric coding and wavelet coding based feature extraction techniques in recognizing spoken words
Sonia Sunny
,
S. David Peter
,
K. Poulose Jacob
.
cube 2012
:
326-331
[doi]
Estimating makespan using double trust thresholds for workflow applications
V. Santhosh Kumar Tangudu
,
Manoj Mishra
.
cube 2012
:
532-536
[doi]
Scaling service provider backbone using BGP confederations for next generation networks
Ashish Tanwer
,
Rishika Mehta
,
Tauqir Azam
.
cube 2012
:
216-221
[doi]
High capacity service provider design using GPMLS for IP next generation networks
Ashish Tanwer
,
Rishika Mehta
,
Tauqir Azam
.
cube 2012
:
186-191
[doi]
A collaborative framework for evaluation of run-time changes in enterprise web services
M. Thirumaran
,
P. Dhavachelvan
,
G. Naga Venkata Kiran
.
cube 2012
:
413-418
[doi]
An analytical approach for column generation for one-dimensional cutting stock problem
Jaya Thomas
,
Narendra S. Chaudhari
.
cube 2012
:
90-94
[doi]
An empirical study to design an effective agile project management framework
Nitin Uikey
,
Ugrasen Suman
.
cube 2012
:
385-390
[doi]
Mood classification of Indian popular music
Aniruddha M. Ujlambkar
,
Vahida Z. Attar
.
cube 2012
:
278-283
[doi]
Service maps in XML
Supriya Vaddi
,
Hrushikesha Mohanty
,
R. K. Shyamasundar
.
cube 2012
:
635-640
[doi]
Using HMM for predicting response time of web services
A. Vani Vathsala
,
Hrushikesha Mohanty
.
cube 2012
:
520-525
[doi]
Automatic detection of printf format string vulnerabilities in software applications using static analysis
Radha Vedala
,
Simhadri Anil Kumar
.
cube 2012
:
379-384
[doi]
GPU
P. L. V. Vihari
,
Manoj Mishra
.
cube 2012
:
753-758
[doi]
An efficient approach to identify n-wMVD for eliminating data redundancy
Sangeeta Viswanadham
,
Vatsavayi Valli Kumari
.
cube 2012
:
464-469
[doi]
A ranking algorithm integrating vector space model with semantic metadata
Saurabh Wadwekar
,
Debajyoti Mukhopadhyay
.
cube 2012
:
623-628
[doi]
Visualization of road segment for road analysis and design
P. Wongthongtham
,
K. Siripun
,
P. Jitsangiam
.
cube 2012
:
338-343
[doi]
Enhancing performance of AODV against Black hole Attack
Rajesh Yerneni
,
Anil K. Sarje
.
cube 2012
:
857-862
[doi]
Sign in
or
sign up
to see more results.