Abstract is missing.
- A New Small World LatticeAbhishek Parakh, Subhash Kak. 1-8 [doi]
- SLA - Driven Dynamic Resource Allocation on CloudsG. M. Siddesh, K. G. Srinivasa. 9-18 [doi]
- An Intelligent Cloud System Adopting File Pre-fetchingJagadeesh Balasubramaniyan, Sumalatha Ramachandran. 19-27 [doi]
- Replication Infrastructure for RESTful Web ServicesMarcin Bazydlo, Szymon Francuzik, Cezary Sobaniec, Dariusz Wawrzyniak. 28-37 [doi]
- Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor NetworkJoon-Mo Yang, Jun-Yong Park, Ryum-Duck Oh. 38-47 [doi]
- Content Based Service Discovery in Semantic Web Services Using WordNetD. Paulraj, S. Swamynathan. 48-56 [doi]
- Optimal Selection of Web Services for Efficient QoS Driven Web Service CompositionsDemian Antony D'Mello, Manasa Shetty, Akshatha Prabhu, Akshaya, Adithi Shenoy. 57-66 [doi]
- Reconfigurable Web Service Composition Using Belief RevisionDeivamani Mallayya, Baskaran Ramachandran. 67-76 [doi]
- Semantic Web Service Discovery with Structural Level Matching of OperationsPon Harshavardhanan, J. Akilandeswari, K. A. Anjali Krishna. 77-84 [doi]
- A Novel Way of Tracking People in an Indoor AreaAditya Narang, Sagar Prakash Joglekar, Karthikeyan Balaji Dhanapal, Arun Agrahara Somasundara. 85-94 [doi]
- Image Reconstruction in Electrical Impedance Tomography (EIT) with Projection Error Propagation-based Regularization (PEPR): A Practical Phantom StudyTushar Kanti Bera, Samir Kumar Biswas, K. Rajan, Jampana Nagaraju. 95-105 [doi]
- Improved Hand Tracking and Isolation from Face by ICondensation Multi Clue Algorithm for Continuous Indian Sign Language RecognitionJ. Rekha, J. Bhattacharya, S. Majumder. 106-116 [doi]
- An Approach for Color Edge Detection with Automatic Threshold DetectionArpitha M. D., Megha P. Arakeri, G. Ram Mohan Reddy. 117-124 [doi]
- Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) MethodAnand T. V., Madhu S. Nair, Rao Tatavarti. 125-134 [doi]
- Performance Analysis of Pedestrian Detection at Night Time with Different ClassifiersPraveen Cyriac, Philomina Simon. 135-145 [doi]
- Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based InterpolationA. Benjamin Joseph, Baskaran Ramachandran. 146-153 [doi]
- Multilayer Feedforward Neural Network Models for Pattern Recognition Tasks in Earthquake EngineeringT. Ashwini Reddy, K. Renuka Devi, Suryakanth V. Gangashetty. 154-162 [doi]
- A Sensitive Attribute Based Clustering Method for k-AnonymizationPawan Bhaladhare, Devesh Jinwala. 163-170 [doi]
- Generalization Capability of Artificial Neural Network Incorporated with Pruning MethodSiddhaling Urolagin, K. V. Prema, N. V. Subba Reddy. 171-178 [doi]
- Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge DiscoverySudha Subramani, Sathiyabhama Balasubramaniam. 179-187 [doi]
- Clustering Biological Data Using Voronoi DiagramDamodar Reddy Edla, Prasanta K. Jana. 188-197 [doi]
- Knowledge Management Techniques for Analysis of Clinical DatabasesT. Deepa, Sathiyabhama Balasubramaniam, J. Akilandeswari, N. P. Gopalan. 198-206 [doi]
- Digital Microscopic Bacterial Cell Growth Analysis and Cell Division Time Determination for Escherichia coli Using Fuzzy Inference SystemP. S. Hiremath, Parashuram Bannigidad. 207-215 [doi]
- Combining Load Balancing with Shared Storage and Primary Backup ReplicatonMarcin Bazydlo. 216 [doi]
- Smart Playlist Generation Using Data Mining TechniquesPrafulla Kalapatapu, Aruna Malapati. 217 [doi]
- Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore ProcessorsDurgaprasad Gangodkar, Sachin Gupta, Gurbinder Singh Gill, Padam Kumar, Ankush Mittal. 218-227 [doi]
- EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown EnvironmentK. R. Guruprasad. 228-236 [doi]
- PEAL - Packed Executable AnaLysisVijay Laxmi, Manoj Singh Gaur, Parvez Faruki, Smita Naval. 237-243 [doi]
- Qualitative and Quantitative Evaluation of Correlation Based Stereo Matching AlgorithmsRaghavendra U., Krishnamoorthi Makkithaya, Karunakar A. K.. 244-252 [doi]
- Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load DispatchJ. Jasper, T. Aruldoss Albert Victoire. 253-262 [doi]
- Optimal Path Selection for Mobile Robot Navigation Using Genetic Algorithm in an Indoor EnvironmentD. Tamilselvi, S. Mercy Shalinie, A. Fathima Thasneem, S. Gomathi Sundari. 263-269 [doi]
- Recent Advancements in Parallel Algorithms for String Matching on Computing Models - A Survey and Experimental ResultsChinta Someswararao, K. Butchi Raju, S. V. Appaji, S. Viswanadha Raju, K. K. V. V. V. S. Reddy. 270-278 [doi]
- Electronic Governance in Rural Areas: A Performance Case Study with WiMAX TechnologyRakesh Kumar Jha, Upena D. Dalal. 279-288 [doi]
- Scalable Video Delivery over Peer-to-Peer NetworkA. K. Karunakar, Younsong Qio, Brian Lee. 289 [doi]
- K-Resilient Server Synchronization Protocol for Session Guarantees in MANET EnvironmentsLukasz Piatkowski. 290-296 [doi]
- Performance Analysis of AODV and DSR Routing Protocols for Ad-Hoc NetworksAnshuman Biswas, Banani Saha, Saswati Guha. 297-305 [doi]
- Data Distribution Service on Top of FlexRay Vehicle NetworksHouda Jaouani, Rim Bouhouch, Wafa Najjar, Salem Hasnaoui. 306-317 [doi]
- CAMP: Congestion Adaptive Multipath Routing Protocol for VANETsRaviteja B. L., Annappa B., Mohit P. Tahiliani. 318-327 [doi]
- Bit-Based Fairness in IEEE802.11p MAC for Vehicle-to-Infrastructure NetworksV. P. Harigovindan, A. V. Babu, Lillykutty Jacob. 328-337 [doi]
- CBRM - Cluster Based Replica Management in Mobile Adhoc NetworksRajeev Kumar, Prashant Kumar, Naveen Chauhan. 338-347 [doi]
- A Linear Model of Call Intercepting Probability of Integrated WLANs in a 3G CellS. Nandakumar, Sibaram Khara. 348-356 [doi]
- An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX NetworkRakesh Kumar Jha, A. Vishal Wankhade, Upena D. Dalal. 357-365 [doi]
- Strong Minimum Interference Topology for Wireless Sensor NetworksB. S. Panda, D. Pushparaj Shetty. 366-374 [doi]
- Distributed Localization for Anisotropic Sensor Networks Using Spatial ClusteringLakshmi Priya M., Lalit K. Awasthi. 375-380 [doi]
- CAs-based QoS Scheme for Remote Health Monitoring over WMSNBhargavi K., Sathish Babu B.. 381-388 [doi]
- Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNsN. Chandrakant, A. P. Bijil, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 389-398 [doi]
- Improved Load Balanced Clustering Algorithm for Wireless Sensor NetworksPratyay Kuila, Prasanta K. Jana. 399-404 [doi]
- Node - Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks - A Survey and Conceptual ModelingMuni Venkateswarlu K., K. Chandra Sekaran, A. Kandasamy. 405-414 [doi]
- Self Healing Wireless Sensor NetworkSumathi S., Chandrasekaran M.. 415-425 [doi]
- Contention Detection and Minimization in All Optical RoutersSurinder Singh, Meenakshi Garg. 426-434 [doi]
- FARED: Fast Adapting RED Gateways for TCP/IP NetworksMohit P. Tahiliani, K. C. Shet, T. G. Basavaraju. 435-443 [doi]
- An Efficient and Reliable Centralized Connection Management Scheme for Computer NetworksShreesha Kashyap, Shravan I. V., Anuraj Suman, Ramesh T. K., Vaya P. R.. 444-450 [doi]
- Obstacle Aware Routing in 3D Integrated CircuitsPrasun Ghosal, Hafizur Rahaman, Satrajit Das, Arindam Das, Parthasarathi Dasgupta. 451-460 [doi]
- A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition MechanismJ. Hanumanthappa, D. H. Manjaiah. 461-471 [doi]
- Consistency Maintenance of Modern Security PoliciesBartosz Brodecki, Jerzy Brzezinski, Piotr Sasak, Michal Szychowiak. 472-477 [doi]
- Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR OperationP. Vijayakumar, S. Bose, Arputharaj Kannan. 478-485 [doi]
- Reputation-Based Trust for Mobile AgentsPriyanka Dadhich, Kamlesh Dutta, M. C. Govil. 486-494 [doi]
- Anonymity in Attribute-Based Group SignaturesBhumika K. Patel, Devesh Jinwala. 495-504 [doi]
- Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve CryptographyKrishnan Kumar, J. Nafeesa Begum, V. Sumathy. 505-514 [doi]
- Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length CiphertextNishant Doshi, Devesh Jinwala. 515-523 [doi]
- SQL Injection Attack Mechanisms and Prevention TechniquesRoshni Chandrashekhar, Manoj Mardithaya, Santhi Thilagam, Dipankar Saha. 524-533 [doi]
- Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS AttacksAbhinav Bhandari, A. L. Sangal, Krishan Kumar Saluja. 534-540 [doi]
- Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER TestbedKetki Arora, Krishan Kumar, Monika Sachdeva. 541-550 [doi]
- A Robust Defense Mechanism to Prevent Phishing Attack Using Parse Tree ValidationV. Shanmughaneethi, Regan Abraham, S. Swamynathan. 551-557 [doi]
- Correlation in Distributed Intrusion Detection System Using Mobile AgentZakiya Malek, Asha Koshti, Chintan Bhatt, Hemant Agrwal, Bhushan Trivedi. 558-567 [doi]
- A Novel Architecture for the Generation of Picture Based CAPTCHAS. Benson Edwin Raj, V. S. Jayanthi, V. Muthulakshmi. 568-574 [doi]
- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still ImagesSachin Mehta, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy. 575-582 [doi]
- Covertness Analysis of Subliminal Channels in Legitimate CommunicationH. S. Gururaja, M. Seetha, Anjan K. Koundinya. 583-592 [doi]
- Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic MapP. Devaraj. 593-601 [doi]
- Misbehavior Detection Based on Ensemble Learning in VANETJyoti Grover, Vijay Laxmi, Manoj Singh Gaur. 602-611 [doi]
- An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical ConfigurationPoonam Saini, Awadhesh Kumar Singh. 612-620 [doi]
- Application of IP Traceback Mechanism to OnlineVoting SystemV. K. Soundar Rajam, B. Sundaresa Pandian, S. Mercy Shalinie, Tulika Pandey. 621-630 [doi]
- Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh NetworkK. Ganesh Reddy, P. Santhi Thilagam. 631-637 [doi]