Abstract is missing.
- Non-functional Property Aware Brokerage Approach for Cloud Service DiscoveryAdrija Bhattacharya, Sankhayan Choudhury. 3-15 [doi]
- A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and RestorationSukalyan Som, Sarbani Palit, Kashinath Dey, Dipabali Sarkar, Jayeeta Sarkar, Kheyali Sarkar. 17-37 [doi]
- Service Insurance: A New Approach in Cloud BrokerageAdrija Bhattacharya, Sankhayan Choudhury. 39-52 [doi]
- Using Semiformal and Formal Methods in Software Design: An Integrated Approach for Intelligent Learning Management SystemSouvik Sengupta, Ranjan Dasgupta. 53-65 [doi]
- A Lightweight Implementation of Obstruction-Free Software Transactional MemoryAnkita Saha, Atrayee Chatterjee, Nabanita Pal, Ammlan Ghosh, Nabendu Chaki. 67-84 [doi]
- 3): Crisis of EEA and Its SolutionJ. K. M. Sadique Uz Zaman, Ranjan Ghosh. 87-107 [doi]
- A Novel Biometric Template Encryption Scheme Using Sudoku PuzzleArnab Kumar Maji, Rajat Kumar Pal. 109-128 [doi]
- An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated AnnealingKamalika Datta, Alhaad Gokhale, Indranil Sengupta 0001, Hafizur Rahaman. 131-144 [doi]
- An Efficient Algorithm for Reducing Wire Length in Three-Layer Channel RoutingSwagata Saha Sau, Rajat Kumar Pal. 145-156 [doi]
- A New Move Toward Parallel Assay Operations in a Restricted Sized Chip in Digital MicrofluidicsDebasis Dhal, Arpan Chakrabarty, Piyali Datta, Rajat Kumar Pal. 157-182 [doi]
- A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip AreaRanjan Mehera, Arpan Chakrabarty, Piyali Datta, Rajat Kumar Pal. 183-209 [doi]