241 | -- | 250 | Yong Yang, Yu-Song Yan, Zuo-An Hu, Pan Xie. Algorithm research for capacity-constrained stochastic traffic assignment model |
251 | -- | 259 | A. Ruhan Bevi, S. Malarvizhi, Shubhra Saxena. RC5 implementation in ARM platform for cryptographic applications |
260 | -- | 271 | Anbazhagan Rajesh, Rangaswamy Nakkeeran. Investigation on cooperative contention-based bandwidth request mechanism for heterogeneous networks |
272 | -- | 291 | Tarachand Amgoth, Prasanta K. Jana. Energy efficient and load balanced clustering algorithms for wireless sensor networks |
292 | -- | 308 | M. Esther Hannah, Saswati Mukherjee. A classification-based summarisation model for summarising text documents |
309 | -- | 325 | Asutosh Kar, Mahesh Chandra. A novel variable tap-length learning algorithm for low complexity, fast converging stereophonic acoustic echo cancellation |
326 | -- | 338 | Sivaranjan Goswami, Bijeet Bardoloi, Pinky Deka, Darathi Dutta, Dipjyoti Sarma. A novel approach for design of a speech enhancement system using auto-trained NLMS adaptive filter |
339 | -- | 354 | Parismita A. Kashyap, Kandarpa Kumar Sarma. Adaptive gain and variable effective aperture aided multi antenna set-ups for faded Rayleigh channels |
355 | -- | 368 | Mounira Zerari. Business process artefact adaptability approach based on artificial immune systems |
369 | -- | 380 | V. Neelaya Dhatchayani, V. S. Shankar Sriram. Trust aware identity management for cloud computing |
381 | -- | 402 | Pirita Ihamäki. User experiences in the Official WikiLeaks Forum |
403 | -- | 421 | J. Sengathir, R. Manoharan. Reliability factor-based mathematical model for isolating selfish nodes in MANETs |
422 | -- | 430 | Wen-Yu Chiang. A new procedure of market segmentation for dynamic CRM systems: a case study of airlines in Taiwan |