Abstract is missing.
- Projection and Interaction with Ad-hoc Interfaces on Non-planar SurfacesS. Dere Kundan, G. Ram Mohana Reddy. 1-6 [doi]
- Performance Evaluation of Multi-core Processors with Varied Interconnect NetworksRam Prasad Mohanty, Ashok Kumar Turuk, Bibhudatta Sahoo. 7-11 [doi]
- Smarter Commerce: NLP SpokenWeb Based B2B MessagingUdaya M. Visweswara, Atul Gohad, Sachin Kumar Yadav, N. V. S. Karthik, S. Mahesh Babu. 12-17 [doi]
- A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression DataShilpi Bose, Chandra Das, Tamaghna Gangopadhyay, Samiran Chattopadhyay. 18-23 [doi]
- An Empirical Study of Two MIS AlgorithmsTushar Bisht, Kishore Kothapalli. 24-28 [doi]
- Anomaly Detection and Similarity Search in Neutron Monitor Data for Predictive Maintenance of Nuclear Power PlantsKapil Agarwal, Durga Toshniwal, Pramod K. Gupta, Vikas Khurana, Pushp Upadhyay. 29-34 [doi]
- A Broker Based E-learning Service Integration and Execution Architecture for the Complex Requirements on Learning ResourcesDemian Antony D'Mello, Mevida S. Crasta, Roanne N. Gomes, V. Abhishiktha, Shareeta J. D'Souzav. 35-40 [doi]
- Rivers and Coastlines Detection in Multispectral Satellite Images Using Level Set Method and Modified Chan Vese AlgorithmY. H. Dandawate, Sneha Kinlekar. 41-46 [doi]
- Multitaper Spectrum Sensing Using Sinusoidal TapersP. Sudheer Reddy, P. Palanisamy. 47-50 [doi]
- Detection and Removal of Cracks from Digitized Paintings and Images by User InterventionShrinivas D. Desai, Kavita V. Horadi, P. Navaneet, B. Niriksha, V. Siddeshvar. 51-55 [doi]
- A Hybrid Model for Rician Noise Reduction in MRIP. V. Sudeep, P. Palanisamy, Jeny Rajan. 56-61 [doi]
- A Stroke Based Representation of Indian Sign Language Signs Incorporating Global and Local Motion InformationM. Geetha, P. V. Aswathi, M. R. Kaimal. 62-67 [doi]
- Image Denoising Based on Undecimated Double Density Dual Tree Wavelet Transform and Modified Firm ShrinkageVarun P. Gopi, M. Pavithran, T. Nishanth, S. Balaji, V. Rajavelu, P. Palanisamy. 68-73 [doi]
- Age Approximation from Speech Using Gaussian Mixture ModelsTanushri Mittal, Anurag Barthwal, Shashidhar G. Koolagudi. 74-78 [doi]
- Wavelet Based Sharp Features (WASH): An Image Quality Assessment Metric Based on HVSM. Reenu, Dayana David, S. S. Aneesh Raj, Madhu S. Nair. 79-83 [doi]
- Robust Face Recognition in the Presence of Noises and Blurring Effects by Fusing Appearance Based Techniques and Sparse RepresentationSteven L. Fernandes, G. Josemin Bala, P. Nagabhushan, S. K. Mandal. 84-89 [doi]
- Automatic Cloud Detection Using Spectral Rationing and Fuzzy ClusteringS. R. Surya, Philomina Simon. 90-95 [doi]
- A Review of Monitoring Techniques for Service Based ApplicationsSridevi Saralaya, Rio D'Souza. 96-101 [doi]
- Selection of Services for Data-Centric Cloud Applications: A QoS Based ApproachAmit Kr Mandal, Suvamoy Changder, Anirban Sarkar. 102-107 [doi]
- Cloud Based Service Registry for Location Based Mobile Web Services SystemMelwyn D'Souza, V. S. Ananthanarayana. 108-111 [doi]
- Monitoring Users in Cloud Computing: Evaluating the Centralized ApproachAjay Prasad, Divya Gupta, Prasun Chakrabarti. 112-116 [doi]
- A Scalable Matching Approach Based Density Function for Heterogeneous Database IntegrationDharavath Ramesh, Chiranjeev Kumar. 117-123 [doi]
- Adaptive Self-Tuning Techniques for Performance Tuning of Database Systems: A Fuzzy-Based ApproachS. F. Rodd, Umakanth P. Kulkarni. 124-129 [doi]
- Empirical Power Control Schema Using Physical Layer Optimization in MANETRamanna Havinal, Girish V. Attimarad, M. N. Giriprasad. 130-135 [doi]
- Improvised k-hop Neighbourhood Knowledge Based Routing in Wireless Sensor NetworksDebasis Das, Rajiv Misra. 136-141 [doi]
- Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility ResultsDharmeet Singh Hora, Piyush Bansal, Kishore Kothapalli, Kannan Srinathan. 142-147 [doi]
- Peer-to-Peer and Cellular Connection ManagementDipin Kollencheri Puthenveettil, Ankur Chauhan. 148-153 [doi]
- Ontology Based Resource Discovery Mechanism for Mobile Grid EnvironmentS. Stephen Vaithiya, S. Mary Saira Bhanu. 154-159 [doi]
- Channel Coded STBC-OFDM Based Transmit Diversity Systems in Multipath Rayleigh-Fading ChannelsM. Surendar, P. Muthuchidambaranathan. 160-163 [doi]
- Browser with Clustering of Web DocumentsRavitheja Tetali, Joy Bose, Tasleem Arif. 164-168 [doi]
- Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSMKavitha Ammayappan. 169-174 [doi]
- Network Coding-Aware Neighbor Based Topology Control in MANETsK. Srinivas, A. Venugopal Reddy, A. Nagaraju. 175-180 [doi]
- CL-ILD: A Cross Layer Interference-Load and Delay Aware Routing Metric for Multi-radio Wireless Mesh NetworkD. G. Narayan, M. Uma, G. Pavan, S. Suraj. 181-186 [doi]
- Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP NetworkGanesh Dadaji Sonwane, B. R. Chandavarkar. 187-192 [doi]
- Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code ExecutionPrabhjot Singh, B. R. Chandavarkar, Srishti Arora, Neha Agrawal. 193-198 [doi]
- An Efficient Online Mileage Indicator by Using Sensors for New Generation AutomobilesB. Naresh Kumar Reddy, M. Naraimhulu, S. V. Sai Prasad, K. Khaja Babu. 199-203 [doi]
- Performance of Jumbo Sized Data on Jumbo Frame and Ethernet Frame Using UDP over IPv4/IPv6Abhijit Das, Shibendu Debbarma. 204-207 [doi]
- Analysis of HWMP-ETX Routing in Wireless Mesh NetworksJayalakshmi G. Naragund, R. M. Banakar. 208-213 [doi]
- An Efficient Distributed Verification Protocol for Data Storage Security in Cloud ComputingP. Syam Kumar, R. Subramanian, D. Thamizh Selvam. 214-219 [doi]
- Detection of User Cluster with Suspicious Activity in Online Social Networking SitesA. Sharath Kumar, Sanjay Singh. 220-225 [doi]
- An Access Control Model for Cloud Computing EnvironmentsManoj V. Thomas, K. Chandra Sekaran. 226-231 [doi]
- Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AESGurpreet Singh, Supriya. 232-237 [doi]
- Digital Image Authentication Model Based on Edge Adaptive SteganographyNidhi Grover, A. K. Mohapatra. 238-242 [doi]
- Trust Based Privacy Preserving Access Control in Web Services ParadigmRekha Bhatia, Manpreet Singh. 243-246 [doi]
- DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android MarketsParvez Faruki, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Ammar Bharmal. 247-252 [doi]
- Key Update Mechanism in PKI: Study and a New ApproachV. Spoorthi, Balaji Rajendran, K. Chandrasekaran. 253-258 [doi]
- (2, 3) RIVC Scheme in Visual Cryptography without Pixel ExpansionAnila Thankappan, M. Wilscy. 259-263 [doi]