Abstract is missing.
- Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian scopeAnup Bhatkar, J. L. Rana. 3-6 [doi]
- Promoter Recognition using dinucleotide Features : A Case Study for E.ColiT. Sobha Rani, S. Durga Bhavani, Raju S. Bapi. 7-10 [doi]
- Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression DataAnirban Mukhopadhyay, Ujjwal Maulik, Sanghamitra Bandyopadhyay. 11-14 [doi]
- Face Detection by using Skin Color Model based on One Class ClassifierRudra N. Hota, Vijendran Venkoparao, Saad Bedros. 15-16 [doi]
- Evaluating the Association of Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico Tool E-MIDASAnshu Bhardwaj, Shrish Tiwari. 17-20 [doi]
- Ayurinformatics- the application of bioinformatics in the ayurvedic system of medicineL. S. Rath. 21-25 [doi]
- Electroencephalograph Signal Analysis During BramariS. T. Patil, D. S. Bormane. 26-32 [doi]
- A Tabu Search Based Algorithm for Multicast Routing with QoS ConstraintsNejla Ghaboosi, Abolfazl Toroghi Haghighat. 33-39 [doi]
- QoS Constrained Adaptive Routing Protocol For Mobile Adhoc NetworksVinod Kone, Sukumar Nandi. 40-45 [doi]
- Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read EfficiencyNaval Bhandari, Anirudha Sahoo, Sridhar Iyer. 46-51 [doi]
- Bridging the Gap Between Reality and Simulations: An Ethernet Case StudyPunit Rathod, Srinath Perur, Raghuraman Rangarajan. 52-55 [doi]
- Enhancing Fault-Tolerance in a Distributed Mutual Exclusion AlgorithmP. Sukendar Reddy, Nityananda Sarma, Rajib Kumar Das. 56-59 [doi]
- Hypercube based Team Multicast Routing Protocol for Mobile Ad hoc NetworksR. Manoharan, P. Thambidurai. 60-63 [doi]
- Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc NetworksAsh Mohammad Abbas. 64-67 [doi]
- Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation NetworksBhagi Sri Karthik, Manish Jaiswal, Vasant Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, Asoke K. Talukder, Debabrata Das. 68-71 [doi]
- A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANsMayank Mishra, Anirudha Sahoo. 72-76 [doi]
- Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent ApproachUpinder Kaur, R. B. Patel. 77-80 [doi]
- Design and Evaluation of a Distributed Diagnosis Algorithm in Dynamic Fault Environments For Not-Completely Connected NetworkPabitra Mohan Khilar, S. Mahapatra. 81-82 [doi]
- A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc NetworksMinghui Zheng, Jianhua Zhu, Guohua Cui. 83-84 [doi]
- Uplink Shared Channel in 3rd Generation (UMTS) Cellular System: Performance Analysis and EnhancementManju Sarvagya. 85-86 [doi]
- A Strategy to Reduce Control Packet Load of MANETs with Bidirectional Links using DSRMuthu Tamilarasi, T. G. Palanivelu. 87-88 [doi]
- Compensation Based Grid SchedulingR. Anitha, N. Rajkumar. 89-93 [doi]
- A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication SystemsA. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty. 94-95 [doi]
- Distributed Reconfiguration for Traffic Changes in IP-Over-WDM NetworksN. Sreenath, Balaji Palanisamy. 96-97 [doi]
- Complexity Analysis of Group Key Agreement Protocols for Ad Hoc NetworksRakesh Chandra Gangwar, Anil K. Sarje. 98-99 [doi]
- Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANsAditya Dhananjay, Debabrata Das. 100-104 [doi]
- An HMM Based Recognition Scheme for Handwritten Oriya NumeralsTapan Kumar Bhowmik, Swapan K. Parui, Ujjwal Bhattacharya, Bikash Shaw. 105-110 [doi]
- Voice Conversion by Prosody and Vocal Tract ModificationK. Sreenivasa Rao, B. Yegnanarayana. 111-116 [doi]
- A Hybrid Transform Coding for Video CodecM. Ezhilarasan, P. Thambidurai. 117-120 [doi]
- A New Symmetry Based Cluster Validity Index: Application to Satellite Image SegmentationSriparna Saha, Sanghamitra Bandyopadhyay, Ujjwal Maulik. 121-124 [doi]
- Using AnsProlog with Link Grammar and WordNet for QA with deep reasoningChitta Baral, Luis Tari. 125-128 [doi]
- Duration Analysis for Malayalam Text-To-Speech SystemsDeepa P. Gopinath, J. Divya Sree, Reshmi Mathew, S. J. Rekhila, Achuthsankar S. Nair. 129-132 [doi]
- Recognition of Handwritten Kannada NumeralsN. Sharma, U. Pal, Fumitaka Kimura. 133-136 [doi]
- Analysis of Error Sources Towards Improved Form ProcessingUjjwal Bhattacharya, Bikash Shaw, Swapan K. Parui. 137-138 [doi]
- Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance MeasuresDeepak Mishra, Naripeddy Subhash Chandra Bose, Arvind Tolambiya, Ashutosh Dwivedi, Prabhanjan Kandula, Ashiwani Kumar, Prem Kumar Kalra. 139-140 [doi]
- Unsupervised Change Detection in Remote-Sensing Images using One-dimensional Self-Organizing Feature Map Neural NetworkSwarnajyoti Patra, Susmita Ghosh, Ashish Ghosh. 141-142 [doi]
- Swara Indentification for South Indian Classical MusicRajeswari Sridhar, T. V. Geetha. 143-144 [doi]
- Camouflage Defect Identification: A Novel ApproachNagappa U. Bhajantri, P. Nagabhushan. 145-148 [doi]
- A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transformBarzan Mozafari, Mohammad Hasan Savoji. 149-154 [doi]
- A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT)Rajdeep Chakraborty, J. K. Mandal. 155-159 [doi]
- Securing Membership Control in Mobile Ad Hoc NetworksYunfang Feng, Zhiyuan Liu, Jun Li. 160-163 [doi]
- A Simple Geometric Approach for Ear RecognitionDasari Shailaja, Phalguni Gupta. 164-167 [doi]
- Universal Designated Multi Verifier Signature without Random OraclesG. Shailaja, K. Phani Kumar, Ashutosh Saxena. 168-171 [doi]
- Policy Specification and Enforcement for Detection of Security Violations in a Mail ServiceA. Murali M. Rao. 172-175 [doi]
- Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session KeyP. K. Jha, J. K. Mandal. 176-177 [doi]
- Design of a Framework for Handling Security Issues in GridsSarbjeet Singh, Seema Bawa. 178-179 [doi]
- A Palmprint Classification Scheme using Heart Line Feature ExtractionAtul Negi, B. Panigrahi, M. V. N. K. Prasad, Madhabananda Das. 180-181 [doi]
- Cryptanalysis of Block Ciphers via Improved Simulated Annealing TechniqueNalini N, Raghavendra Rao G. 182-185 [doi]
- Indirect Authorization Topologies for Grid Access ControlG. Geethakumari, Atul Negi, V. N. Sastry. 186-187 [doi]
- Performance of Various Cost Functions in the Search for Strong S-BoxesAnirban Chakraborty, Arnab Chatterjee, S. K. Basu. 188-189 [doi]
- CARMA: Cellular Automata Based Remote Mutual Authentication SchemeSomanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury. 190-191 [doi]
- Version Control using Cryptographic Access ControlK. Ganesan, R. Anandan. 192-196 [doi]
- WaveSim and Adaptive WaveSim Transform for Subsequence Time-Series ClusteringR. Pradeep Kumar, P. Nagabhushan, Ahlame Douzal Chouakria. 197-202 [doi]
- LB HUST: A Symmetrical Boundary Distance for Clustering Time SeriesLi Junkui, Wang Yuanzhen, Li Xinping. 203-208 [doi]
- Neuro-Fuzzy Fusion: A New Approach to Multiple Classifier SystemK. Saroj, Ashish Ghosh, B. Uma Shankar, Lorenzo Bruzzone. 209-212 [doi]
- Improved Bitmap Indexing Strategy for Data WarehousesNavneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma. 213-216 [doi]
- Fuzzy Linguistic Approach to Matchmaking in E-CommerceAnanta Charan Ojha, Sateesh Kumar Pradhan. 217-220 [doi]
- Particles with Age for Data ClusteringSatchidananda Dehuri, Ashish Ghosh, Rajib Mall. 221-224 [doi]
- Use of Instance Typicality for Efficient Detection of Outliers with Neural Network ClassifiersShirish S. Sane, Ashok A. Ghatol. 225-228 [doi]
- Cumulative Path Summary for Structurally Dynamic XML DocumentsR. Gururaj, P. Sreenivasa Kumar. 229-230 [doi]
- Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura TechniqueRashid Ali, Mirza Mohd. Sufyan Beg. 231-234 [doi]
- A comparative analysis of discretization methods for Medical Datamining with Naïve Bayesian classifierRanjit Abraham, Jay B. Simha, S. S. Iyengar. 235-236 [doi]
- GenericWA-RBAC: Role Based Access Control Model for Web ApplicationsPrasanna H. Bammigatti, P. R. Rao. 237-240 [doi]
- Segmentation of Color Images using Mean Shift Algorithm for Feature ExtractionM. V. Sudhamani, C. R. Venugopal. 241-242 [doi]
- Towards an Architecture of an Image DatabaseRanjan Parekh. 243-244 [doi]
- Fuzzy data mining for customer loyalty analysisJay B. Simha, S. S. Iyengar. 245-246 [doi]
- A generic prototype for storing and querying XML documents in RDBMS using model mapping methodsSaeed Hassan Hisbani. 247-248 [doi]
- Designing the Next Generation of Medical Information SystemsRajesh C. Dash, Chris Hubbard, Stanley J. Robboy, Alan D. Proia. 249-252 [doi]
- Design of Novel Reversible Carry Look-Ahead BCD SubtractorHimanshu Thapliyal, Sumedha K. Gupta. 253-258 [doi]
- Aggregation Pheromone Density Based ClusteringMegha Kothari, Susmita Ghosh, Ashish Ghosh. 259-264 [doi]
- A Domain Based Prioritized Model forWeb ServersAsh Mohammad Abbas, Vibhu Saujanya Sharma, Anoop Jain. 265-268 [doi]
- An efficient parallel algorithm for finding the largest and the second largest elements from a list of elementsB. K. Sarkar, Shahid Jamal, Bhagirath Kumar. 269-272 [doi]
- Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754RAmir Kaivani, A. Zaker Alhosseini, Saeid Gorgin, M. Fazlali. 273-276 [doi]
- A Programmable Parallel Structure to perform Galois Field ExponentiationKundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 277-280 [doi]
- Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSISriparna Saha, Susmita Sur-Kolay, Sanghamitra Bandyopadhyay, Parthasarathi Dasgupta. 281-284 [doi]
- An Event Notification Service based on XML Messaging on Different Transport TechnologiesRavinder Thirumala, N. Usha Rani, Timothy A. Gonsalves. 285-288 [doi]
- A High Performance ASIC for Cellular Automata (CA) ApplicationsCheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mikler, Elias Kougianos, Brandon Parker. 289-290 [doi]
- The Soft Computing Approach to Program Development Time EstimationVandana Bhattacherjee. 291-292 [doi]
- DS2IS: Dictionary-based Segmented Signal Inversion Scheme for Low Power Dynamic Bus DesignShang-Fang Tsai, Shanq-Jang Ruan. 293-296 [doi]
- An Alternate Way to Rank Hyper-linked Web-PagesAnirban Kundu, Ruma Dutta, Debajyoti Mukhopadhyay. 297-298 [doi]
- Primitives for StructuredWorkflow Design: A Mathematical Specification and AnalysisSumagna Patnaik. 299-300 [doi]
- A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphsAnita Das, B. S. Panda, Rajendra P. Lal. 301-304 [doi]
- A Novel Approach for Static Slicing of Inter-Procedural ProgramsSwatee Rekha Mohanty, Durga Prasad Mohapatra, Himansu Sekhar Behara. 305-306 [doi]