Abstract is missing.
- Impact of Node Density on Node Connectivity in MANET Routing ProtocolsG. Jisha, Philip Samuel. 1-8 [doi]
- Survey and Comparison of Frameworks in Software ArchitectureS. Roselin Mary, Paul Rodrigues. 9-18 [doi]
- Two Layered Hierarchical Model for Cognitive Wireless Sensor NetworksK. Vinod Kumar, G. Lakshmi Phani, K. Venkat Sayeesh, Aparna Chaganty, Garimella Rama Murthy. 19-24 [doi]
- 3D-CGIN: A 3 Disjoint Paths CGIN with Alternate SourceMeenal A. Borkar, Nitin. 25-36 [doi]
- Architecture for Running Multiple Applications on a Single Wireless Sensor Network: A ProposalSonam Tobgay, Rasmus L. Olsen, Ramjee Prasad. 37-45 [doi]
- Feature Based Image Retrieval AlgorithmP. U. Nimi, C. Tripti. 46-55 [doi]
- Exploiting ILP in a SIMD Type Vector ProcessorAbel Palaty, Mohammad Suaib, Kumar Sambhav Pandey. 56-62 [doi]
- An Extension to Global Value NumberingSaranya D. Krishnan, Shimmi Asokan. 63-69 [doi]
- Data Privacy for Grid SystemsN. Sandeep Chaitanya, S. Ramachandram, B. Padmavathi, S. Shiva Skandha, G. Ravi Kumar. 70-78 [doi]
- Towards Multimodal Capture, Annotation and Semantic Retrieval from Performing ArtsKannan Rajkumar, Frédéric Andrès, Fernando Ferri, Patrizia Grifoni. 79-88 [doi]
- A New Indian Model for Human IntelligenceJai Prakash Singh. 89-97 [doi]
- Stepping Up Internet Banking Security Using Dynamic Pattern Based Image SteganographyP. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan. 98-112 [doi]
- A Combinatorial Multi-objective Particle Swarm Optimization Based Algorithm for Task Allocation in Distributed Computing SystemsRahul Roy, Madhabananda Das, Satchidananda Dehuri. 113-125 [doi]
- Enhancement of BARTERCAST Using Reinforcement Learning to Effectively Manage FreeridersG. Sreenu, P. M. Dhanya, Sabu M. Thampi. 126-136 [doi]
- A Novel Approach to Represent Detected Point MutationDhanya Sudarsan, P. R. Mahalingam, G. Jisha. 137-144 [doi]
- Anonymous and Secured Communication Using OLSR in MANETA. A. Arifa Azeez, Elizabeth Isaac, Sabu M. Thampi. 145-154 [doi]
- Bilingual Translation System for Weather ReportS. Saraswathi, M. Anusiya, P. Kanivadhana, S. Sathiya. 155-164 [doi]
- Design of QRS Detection and Heart Rate Estimation System on FPGASudheer Kurakula, A. S. D. P. Sudhansh, Roy Paily, S. Dandapat. 165-174 [doi]
- Multi-document Text Summarization in E-learning System for Operating System DomainS. Saraswathi, M. Hemamalini, S. Janani, V. Priyadharshini. 175-186 [doi]
- Improving Hadoop Performance in Handling Small FilesNeethu Mohandas, Sabu M. Thampi. 187-194 [doi]
- Studies of Management for Dynamic Circuit NetworksAna Elisa Ferreira, Anilton Salles Garcia, Carlos Alberto Malcher Bastos. 195-204 [doi]
- Game Theoretic Approach to Resolve Energy Conflicts in Ad-Hoc NetworksJuhi Gupta, Ishan Kumar, Anil Kacholiya. 205-210 [doi]
- Software Secureness for Users: Significance in Public ICT ApplicationsC. K. Raju, P. B. S. Bhadoria. 211-222 [doi]
- Vector Space Access Structure and ID Based Distributed DRM Key ManagementRatna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay. 223-232 [doi]
- Multiple Secrets Sharing with Meaningful SharesJaya, Anjali Sardana. 233-243 [doi]
- On Estimating Strength of a DDoS Attack Using Polynomial Regression ModelB. B. Gupta, P. K. Agrawal, Anupama Mishra, M. K. Pattanshetti. 244-249 [doi]
- Finding New Solutions for Services in Federated Open Systems InterconnectionZubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman. 250-259 [doi]
- Duplicate File Names-A Novel Steganographic Data Hiding TechniqueAvinash Srinivasan, Jie Wu 0001. 260-268 [doi]
- A Framework for Securing Web Services by Formulating an Collaborative Security Standard among Prevailing WS-* Security StandardsM. Priyadharshini, R. Baskaran, Madhan Kumar Srinivasan, Paul Rodrigues. 269-283 [doi]
- Improved Web Search Engine by New Similarity MeasuresVijayalaxmi Kakulapati, Ramakrishna Kolikipogu, P. Revathy, D. Karunanithi. 284-292 [doi]
- Recognition of Subsampled Speech Using a Modified Mel Filter BankKiran Kumar Bhuvanagiri, Sunil Kumar Kopparapu. 293-299 [doi]
- Tumor Detection in Brain Magnetic Resonance Images Using Modified Thresholding TechniquesC. L. Biji, D. Selvathi, Asha Panicker. 300-308 [doi]
- Generate Vision in Blind People Using Suitable Neuroprosthesis Implant of BIOMEMS in BrainB. Vivekavardhana Reddy, Y. S. Kumara Swamy, N. Usha. 309-317 [doi]
- Undecimated Wavelet Packet for Blind Speech Separation Using Independent Component AnalysisIbrahim Missaoui, Zied Lachiri. 318-328 [doi]
- A Robust Framework for Multi-object TrackingAnand Singh Jalal, Vrijendra Singh. 329-338 [doi]
- SVM Based Classification of Traffic Signs for Realtime Embedded PlatformRajeev Kumaraswamy, Lekhesh V. Prabhu, K. Suchithra, P. S. Sreejith Pai. 339-348 [doi]
- A Real Time Video Stabilization AlgorithmTarun Kancharla, Sanjyot Gindi. 349-357 [doi]
- Object Classification Using Encoded Edge Based Structural InformationAditya R. Kanitkar, Brijendra K. Bharti, Umesh N. Hivarkar. 358-367 [doi]
- Real Time Vehicle Detection for Rear and Forward Collision Warning SystemsGaurav Kumar Yadav, Tarun Kancharla, Smita Nair. 368-377 [doi]
- PIN Generation Using Single Channel EEG BiometricRamaswamy Palaniappan, Jenish Gosalia, Kenneth Revett, Andrews Samraj. 378-385 [doi]
- A Framework for Intrusion Tolerance in Cloud ComputingVishal M. Karande, Alwyn R. Pais. 386-395 [doi]
- Application of Parallel K-Means Clustering Algorithm for Prediction of Optimal Path in Self Aware Mobile Ad-Hoc Networks with Link StabilityLikewin Thomas, B. Annappa. 396-405 [doi]
- Clouds' Infrastructure Taxonomy, Properties, and Management ServicesImad M. Abbadi. 406-420 [doi]
- A Deduced SaaS Lifecycle Model Based on Roles and ActivitiesJie Song, Tiantian Li, Lulu Jia, Zhiliang Zhu. 421-431 [doi]
- Towards Achieving Accountability, Auditability and Trust in Cloud ComputingRyan K. L. Ko, Bu-Sung Lee, Siani Pearson. 432-444 [doi]
- Cloud Computing Security Issues and Challenges: A SurveyAmandeep Verma, Sakshi Kaushal. 445-454 [doi]
- A Deadline and Budget Constrained Cost and Time Optimization Algorithm for Cloud ComputingVenkatarami Reddy Chintapalli. 455-462 [doi]
- A Bit Modification Technique for Watermarking Images and Streaming VideoKaliappan Gopalan. 463-472 [doi]
- Efficient Video Copy Detection Using Simple and Effective Extraction of Color FeaturesR. Roopalakshmi, G. Ram Mohana Reddy. 473-480 [doi]
- Mobile Video Service Disruptions Control in Android Using JADETatiana Gualotuña, Diego Marcillo, Elsa María Macías López, Álvaro Suárez Sarmiento. 481-490 [doi]
- Performance Analysis of Video Protocols over IP Transition MechanismsHira Sathu, Mohib A. Shah. 491-500 [doi]
- Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling MechanismsHira Sathu, Mohib A. Shah, Kathiravelu Ganeshan. 501-511 [doi]
- IPTV End-to-End Performance MonitoringPriya Gupta, Priyadarshini Londhe, Arvind Bhosale. 512-523 [doi]
- A Color Image Encryption Technique Based on a Substitution-Permutation NetworkJ. Mohamedmoideen Kader Mastan, G. A. Sathish Kumar, K. Bhoopathy Bagan. 524-533 [doi]
- Comment on the Improvement of an Efficient ID-Based RSA MutlisignatureChenglian Liu, Marjan Kuchaki Rafsanjani, Liyun Zheng. 534-540 [doi]
- A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETsJayashree Padmanabhan, Tamil Selvan Raman Subramaniam, Kumaresh Prakasam, Vigneswaran Ponpandiyan. 541-548 [doi]
- A Convertible Designated Verifible Blind Multi-signcryption SchemeSubhalaxmi Das, Sujata Mohanty, Banshidhar Majhi. 549-556 [doi]
- Middleware Services at Cloud Application LayerImad M. Abbadi. 557-571 [doi]
- Attribute Based Anonymity for Preserving PrivacySri Krishna Adusumalli, V. Valli Kumari. 572-579 [doi]
- An Anonymous Authentication and Communication Protocol for Wireless Mesh NetworksJaydip Sen. 580-592 [doi]
- Data Dissemination and Power Management in Wireless Sensor NetworksMohamed Guerroumi, Nadjib Badache, Samira Moussaoui. 593-607 [doi]
- Performance Evaluation of ID Assignment Schemes for Wireless Sensor NetworksRama Krishna Challa, Rakesh Sambyal. 608-615 [doi]