Abstract is missing.
- Balancing between Utility and Privacy for k-AnonymityKorra Sathya Babu, Sanjay Kumar Jena. 1-8 [doi]
- Evaluation of Approaches for Modeling of Security in Data WarehousesKrishna Khajaria, Manoj Kumar 0002. 9-18 [doi]
- Content Based Compression for Quicx SystemRadha Senthilkumar, C. Lingeshwaraa, A. Kannan. 19-29 [doi]
- NL-Based Automated Software Requirements Elicitation and SpecificationAshfa Umber, Imran Sarwar Bajwa, M. Asif Naeem. 30-39 [doi]
- Automatic Interface Generation between Incompatible Intellectual Properties (IPs) from UML ModelsFateh Boutekkouk, Zakaria Tolba, Mustapha Okab. 40-47 [doi]
- Deadlock Prevention in Distributed Object Oriented SystemsV. Geetha, Niladhuri Sreenath. 48-57 [doi]
- Identification of Error Prone Classes for Fault Prediction Using Object Oriented MetricsPuneet Mittal, Satwinder Singh, K. S. Kahlon. 58-68 [doi]
- An Automated Tool for Computing Object Oriented Metrics Using XMLN. Kayarvizhy, S. Kanmani. 69-79 [doi]
- Traceability Matrix for Regression Testing in Distributed Software DevelopmentB. Athira, Philip Samuel. 80-87 [doi]
- Testing Agent-Oriented Software by Measuring Agent's Property AttributesN. Sivakumar, K. Vivekanandan, S. Sandhya. 88-98 [doi]
- Classifier Feature Extraction Techniques for Face Recognition System under Variable Illumination ConditionsSneha G. Gondane, M. Dhivya, D. Shyam. 99-108 [doi]
- Bispectrum Analysis of EEG in Estimation of Hand MovementAdity Saikia, Shyamanta M. Hazarika. 109-118 [doi]
- Wavelet Selection for EMG Based Grasp Recognition through CWTAdity Saikia, Nayan M. Kakoty, Shyamanta M. Hazarika. 119-129 [doi]
- Information Visualization for Tourist and Travelling in IndonesiaAdityo Ashari Wirjono, Z. S. Ricky Lincoln, William, Dewi Agushinta R.. 130-137 [doi]
- The Smart Goal Monitoring SystemDewi Agushinta R., Bima Shakti Ramadhan Utomo, Denny Satria, Jennifer Sabrina Karla Karamoy, Nuniek Nur Sahaya. 138-145 [doi]
- Web Based Virtual Agent for Tourism Guide in IndonesiaKezia Velda Roberta, Lulu Mawaddah Wisudawati, Muhammad Razi, Dewi Agushinta R.. 146-153 [doi]
- Local Feature or Mel Frequency Cepstral Coefficients - Which One Is Better for MLN-Based Bangla Speech Recognition?Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Md. Mostafizur Rahman, Mohammad Nasiruddin, Md. Abdul Latif, Mohammad Nurul Huda. 154-161 [doi]
- Power Optimization Techniques for Segmented Digital DisplaysRohit Agrawal, C. Sasi Kumar, Darshan Moodgal. 162-171 [doi]
- Language Independent Icon-Based Interface for Accessing InternetSanta Maiti, Debasis Samanta, Satya Ranjan Das, Monalisa Sarma. 172-182 [doi]
- Contribution of Oral Periphery on Visual Speech IntelligibilityPreety Singh, Deepika Gupta, Vijay Laxmi, Manoj Singh Gaur. 183-190 [doi]
- Geo-spatial Pattern Determination for SNAP Eligibility in Iowa Using GISSugam Sharma, U. Sunday Tim, Shashi K. Gadia, Patrick Smith. 191-200 [doi]
- Project Management Model for e-Governance in the Context of Kerala StatePaul Anu, Paul Varghese. 201-209 [doi]
- ICT Its Role in e-Governance and Rural DevelopmentDeka Ganesh Chandra, Dutta Borah Malaya. 210-222 [doi]
- Enhancing Sustainability of Software: A Case-Study with Monitoring Software for MGNREGS in IndiaC. K. Raju, Ashok Mishra. 223-233 [doi]
- Proficient Discovery of Service in Event Driven Service Oriented ArchitectureP. Dharanyadevi, P. Dhavachelvan, S. K. V. Jayakumar, R. Baskaran, V. S. K. Venkatachalapathy. 234-242 [doi]
- Web User Session Clustering Using Modified K-Means AlgorithmG. Poornalatha, Prakash S. Raghavendra. 243-252 [doi]
- FOL-Mine - A More Efficient Method for Mining Web Access PatternA. Rajimol, G. Raju. 253-262 [doi]
- Semantic Association Mining on Spatial Patterns in Medical ImagesS. Saritha, G. Santhosh Kumar. 263-272 [doi]
- FCHC: A Social Semantic Focused CrawlerAnjali Thukral, Varun Mendiratta, Abhishek Behl, Hema Banati, Punam Bedi. 273-283 [doi]
- A Dynamic Seller Selection Model for an Agent Mediated e-MarketVibha Gaur, Neeraj Kumar Sharma. 284-295 [doi]
- A Modified Ontology Based Personalized Search Engine Using Bond Energy AlgorithmBhaskara Rao Boddu, Valli Kumari Vatsavayi. 296-306 [doi]
- A Client Perceived Performance Evaluation of Web ServersAsh Mohammad Abbas, Ravindra Kumar. 307-316 [doi]
- Enhanced Quality of Experience through IVR Mashup to Access Same Service Multiple Operator ServicesImran Ahmed, Sunil Kumar Kopparapu. 317-326 [doi]
- Information Content Based Semantic Similarity Approaches for Multiple Biomedical OntologiesK. Saruladha, G. Aghila, A. Bhuvaneswary. 327-336 [doi]
- Taking Project Tiger to the Classroom: A Virtual Lab Case StudyHarilal Parasuram, Bipin Nair, Krishnashree Achuthan, Shyam Diwakar. 337-348 [doi]
- Green Communications through Network RedesignSami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri. 349-357 [doi]
- Unsupervised Modified Adaptive Floating Search Feature SelectionD. Devakumari, K. Thangavel. 358-365 [doi]
- Fast and Efficient Mining of Web Access Sequences Using Prefix Based Minimized TreesM. Thilagu, R. Nadarajan. 366-373 [doi]
- Scalable, High Throughput LDPC Decoder for WiMAX (802.16e) ApplicationsMuhammad Awais, Ashwani Singh, Guido Masera. 374-385 [doi]
- Unique Mechanism of Selection of Traffic Flow Templates for Mobility IP Protocols Using Multihoming and IP Flow Mobility on the NGMNGustavo Jiménez, Yezid Donoso. 386-396 [doi]
- Elliptic Curve Cryptography for Smart Phone OSSharmishta Desai, R. K. Bedi, B. N. Jagdale, V. M. Wadhai. 397-406 [doi]
- An Improved Secure Authentication Protocol for WiMAX with Formal VerificationAnjani Kumar Rai, Shivendu Mishra, Pramod Narayan Tripathi. 407-416 [doi]
- Secured Fault Tolerant Mobile ComputingSuparna Biswas, Sarmistha Neogy. 417-429 [doi]
- A Survey of Virtualization on MobilesSuneeta Chawla, Apurv Nigam, Pankaj Doke, Sanjay Kimbahune. 430-441 [doi]
- Mobile Peer to Peer Spontaneous and Real-Time Social NetworkingAbhishek Varshney, Mohammed Abdul Qadeer. 442-451 [doi]
- Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETsChhagan Lal, Vijay Laxmi, Manoj Singh Gaur. 452-459 [doi]
- Modeling and Verification of Chess Game Using NuSMVVikram Saralaya, J. K. Kishore, Sateesh Reddy, Radhika M. Pai, Sanjay Singh. 460-470 [doi]
- SMMAG: SNMP-Based MPLS-TE Management Using Mobile AgentsMuhammad Tahir, Dominique Gaïti, Majid Iqbal Khan. 471-479 [doi]
- Face Detection and Eye Localization in Video by 3D Unconstrained Filter and Neural NetworkPradipta K. Banerjee, Jayanta K. Chandra, Asit K. Datta. 480-489 [doi]
- Secret Image Sharing Using Steganography with Different Cover ImagesNoopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, S. S. Anju. 490-497 [doi]
- A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography MethodsAishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, S. S. Anju. 498-505 [doi]
- Cognitive Environment for Pervasive LearnersSattvik Sharma, R. Sreevathsan, M. V. V. N. S. Srikanth, C. Harshith, T. Gireesh Kumar. 506-515 [doi]
- A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet TransformAnand Singh Jalal, Vrijendra Singh. 516-524 [doi]
- File System Level Circularity RequirementMukhtar Azeem, Majid Iqbal Khan, Arfan Nazir. 525-534 [doi]
- An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value DifferencingAzzat A. Al-Sadi, El-Sayed M. El-Alfy. 535-544 [doi]
- Communication Aware Co-Scheduling For Parallel Job Scheduling In Cluster ComputingA. Neela Madheswari, R. S. D. Wahida Banu. 545-554 [doi]
- Shared Resource Allocation Using Token Based Control Strategy in Augmented Ring NetworksRajendra Prasath. 555-567 [doi]
- An Algorithmic Approach to Minimize the Conflicts in an Optical Multistage Interconnection NetworkVed Prakash Bhardwaj, Nitin, Vipin Tyagi. 568-576 [doi]
- An Efficent Methodology for Realization of Parallel FFT for Large Data SetPeter Joseph Basil Morris, Saikat Roy Chowdhury, Debasish Deb. 577-584 [doi]
- A Novel Approach for Adaptive Data Gathering in Sensor Networks by Dynamic Spanning Tree Switching Suchetana Chakraborty, Sushanta Karmakar. 585-594 [doi]
- Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter for DVB-S2 ReceiversVikas Agarwal, Pansoo Kim, Deock-Gil Oh, Do-Seob Ahn. 595-603 [doi]
- Security Analysis of Multimodal Biometric Systems against Spoof AttacksZahid Akhtar, Sandeep Kale. 604-611 [doi]
- A Novel Copyright Protection Scheme Using Visual CryptographyAmitava Nag, Jyoti Prakash Singh, Sushanta Biswas, Dipankar Sarkar, Partha Pratim Sarkar. 612-619 [doi]
- A Weighted Location Based LSB Image Steganography TechniqueAmitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. 620-627 [doi]
- Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server EnvironmentS. K. Hafizul Islam, G. P. Biswas. 628-635 [doi]
- Covariance Based Steganography Using DCTN. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik. 636-647 [doi]
- An Efficient Algorithm to Enable Login into Secure Systems Using Mouse GesturesUsha Banerjee, A. Swaminathan. 648-655 [doi]
- Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVMR. Jayaprakash, V. Uma. 656-665 [doi]
- A Flow-Level Taxonomy and Prevalence of Brute Force AttacksJan Vykopal. 666-675 [doi]
- Multi Application User Profiling for Masquerade Attack DetectionHamed Saljooghinejad, Wilson Naik Rathore. 676-684 [doi]
- A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern BrowsersTanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais. 685-692 [doi]
- SQL Injection Disclosure Using BLAH AlgorithmJusty Jameson, K. K. Sherly. 693-702 [doi]