Abstract is missing.
- A Hybrid Grouping Genetic Algorithm for Multiprocessor SchedulingAlok Singh, Marc Sevaux, André Rossi. 1-7 [doi]
- PDE Based Unsharp Masking, Crispening and High Boost Filtering of Digital ImagesRajeev Srivastava, J. R. P. Gupta, Harish Parthasarthy, Subodh Srivastava. 8-13 [doi]
- A New Position-Based Fast Radix-2 Algorithm for Computing the DHTGautam A. Shah, Tejmal S. Rathore. 14-25 [doi]
- Study of Bit-Parallel Approximate Parameterized String Matching AlgorithmsRajesh Prasad, Suneeta Agarwal. 26-36 [doi]
- Optimization of Finite Difference Method with Multiwavelet BasesEratt P. Sumesh, Elizabeth Elias. 37-48 [doi]
- A Novel Genetic Algorithm Approach to Mobility Prediction in Wireless NetworksMala Chelliah, Mohanraj Loganathan, N. P. Gopalan, B. SivaSelvan. 49-57 [doi]
- A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad Hoc NetworksNatarajan Meghanathan, Meena Sugumar. 58-69 [doi]
- An Optimal, Distributed Deadlock Detection and Resolution Algorithm for Generalized Model in Distributed SystemsS. Srinivasan, Rajan Vidya, Ramasamy Rajaram. 70-80 [doi]
- Throughput Considerations of Fault-Tolerant Routing in Network-on-ChipArshin Rezazadeh, Mahmood Fathy. 81-92 [doi]
- A New Approach towards Bibliographic Reference Identification, Parsing and Inline Citation MatchingDeepank Gupta, Bob Morris, Terry Catapano, Guido Sautter. 93-102 [doi]
- Optimized Graph Search Using Multi-Level Graph ClusteringRahul Kala, Anupam Shukla, Ritu Tiwari. 103-114 [doi]
- An Integrated Framework for Relational and Hierarchical Mining of Frequent Closed PatternsB. Pravin Kumar, V. Divakar, E. Vinoth, Radha Senthilkumar. 115-126 [doi]
- A Modified Differential Evolution Algorithm with Cauchy Mutation for Global OptimizationMusrrat Ali, Millie Pant, Ved Pal Singh. 127-137 [doi]
- Zone Based Hybrid Feature Extraction Algorithm for Handwritten Numeral Recognition of South Indian ScriptsS. V. Rajashekararadhya, P. Vanaja Ranjan. 138-148 [doi]
- Local Subspace Based Outlier DetectionAnkur Agrawal. 149-157 [doi]
- New Robust Fuzzy C-Means Based Gaussian Function in Classifying Brain Tissue RegionsS. R. Kannan, A. Sathya, S. Ramathilagam, R. Pandiyarajan. 158-169 [doi]
- On the Connectivity, Lifetime and Hop Count of Routes Determined Using the City Section and Manhattan Mobility Models for Vehicular Ad Hoc NetworksNatarajan Meghanathan. 170-181 [doi]
- On the Privacy Protection of Biometric Traits: Palmprint, Face, and SignatureSaroj Kumar Panigrahy, Debasish Jena, Sathya Babu Korra, Sanjay Kumar Jena. 182-193 [doi]
- Indexing Iris Biometric Database Using Energy Histogram of DCT SubbandsHunny Mehrotra, Badrinath G. Srinivas, Banshidhar Majhi, Phalguni Gupta. 194-204 [doi]
- Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual PartiesRohit Pathak, Satyadhar Joshi. 205-215 [doi]
- Timing Analysis of Passive UHF RFID - EPC C1G2 System in Dynamic FrameChandan Maity, Ashutosh Gupta, Mahua Maity. 216-227 [doi]
- Secure Receipt-Free Sealed-Bid Electronic AuctionJaydeep Howlader, Anushma Ghosh, Tandra DebRoy Pal. 228-239 [doi]
- An Architecture for Handling Fuzzy Queries in Data WarehousesManu Pratap Singh, Rajdev Tiwari, Manish Mahajan, Diksha Dani. 240-249 [doi]
- Palmprint Based Verification System Using SURF FeaturesBadrinath G. Srinivas, Phalguni Gupta. 250-262 [doi]
- A Personnel Centric Knowledge Management SystemBaisakhi Chakraborty, Meghbartma Gautam. 263-272 [doi]
- Swarm Intelligence Inspired Classifiers in Comparison with Fuzzy and Rough Classifiers: A Remote Sensing ApproachShelly Bansal, Daya Gupta, V. K. Panchal, Shashi Kumar. 284-294 [doi]
- CDIS: Circle Density Based Iris SegmentationAnand Gupta, Anita Kumari, Boris Kundu, Isha Agarwal. 295-306 [doi]
- Text and Language-Independent Speaker Recognition Using Suprasegmental Features and Support Vector MachinesAnvita Bajpai, Vinod Pathangay. 307-317 [doi]
- Face Recognition Using Fisher Linear Discriminant Analysis and Support Vector MachineSweta Thakur, Jamuna Kanta Sing, Dipak Kumar Basu, Mita Nasipuri. 318-326 [doi]
- Threshold Signature Cryptography Scheme in Wireless Ad-Hoc ComputingSandip Vijay, Subhash C. Sharma. 327-335 [doi]
- Vehicular Traffic Control: A Ubiquitous Computing ApproachNaishadh K. Dave, Vanaraj B. Vaghela. 336-348 [doi]
- Application of Particle Swarm Optimization Algorithm for Better Nano-DevicesNameirakpam Basanta Singh, Sanjoy Deb, Guru P. Mishra, Samir Kumar Sarkar, Subir Kumar Sarkar. 349-357 [doi]
- Measuring the Storage and Retrieval of Knowledge Units: An Empirical Study Using MESSelwyn Justus, K. Iyakutti. 358-369 [doi]
- Implementation of QoS Aware Q-Routing Algorithm for Network-on-ChipKrishan Kumar Paliwal, Jinesh Shaji George, Navaneeth Rameshan, Vijay Laxmi, Manoj Singh Gaur, Vijay Janyani, Raghavendra Narasimhan. 370-380 [doi]
- Color Image Restoration Using Morphological Detectors and Adaptive FilterAnita Sahoo, Rohal Suchi, Neha Khan, Pooja Pandey, Mudita Srivastava. 381-388 [doi]
- Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual CryptographyRohit Pathak, Satyadhar Joshi. 389-399 [doi]
- An Angle QIM Watermarking in STDM Framework Robust against Amplitude Scaling DistortionsVijay Harishchandra Mankar, Tirtha Sankar Das, Subir Kumar Sarkar. 400-410 [doi]
- Parallelization Issues of Domain Specific Question Answering System on Cell B.E. ProcessorsTarun Kumar, Ankush Mittal, Parikshit Sondhi. 411-421 [doi]
- Security Issues in Cross-Organizational Peer-to-Peer Applications and Some SolutionsAnkur Gupta, Lalit K. Awasthi. 422-433 [doi]
- Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor NetworksA. S. Poornima, B. B. Amberker. 434-444 [doi]
- Significant Deregulated Pathways in Diabetes Type II Complications Identified through Expression Based Network BiologySanchaita Ukil, Meenakshee Sinha, Lavneesh Varshney, Shipra Agrawal. 445-453 [doi]
- IDChase: Mitigating Identifier Migration Trap in Biological DatabasesAnupam Bhattacharjee, Aminul Islam, Hasan M. Jamil, Derek E. Wildman. 461-472 [doi]
- Multi-domain Protein Family Classification Using Isomorphic Inter-property RelationshipsHarpreet Singh, Pradeep Chowriappa, Sumeet Dua. 473-484 [doi]
- IITKGP-SESC: Speech Database for Emotion AnalysisShashidhar G. Koolagudi, Sudhamay Maity, Anil Kumar Vuppala, Saswat Chakrabarti, K. Sreenivasa Rao. 485-492 [doi]
- Detection of Splice Sites Using Support Vector MachinePritish Varadwaj, Neetesh Purohit, Bhumika Arora. 493-502 [doi]
- Gibbs Motif Sampler, Weight Matrix and Artificial Neural Network for the Prediction of MHC Class-II Binding PeptidesSatarudra Prakash Singh, Bhartendu Nath Mishra. 503-509 [doi]
- Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM ApproachAppala Raju Kotaru, Ramesh C. Joshi. 510-520 [doi]
- FCM for Gene Expression Bioinformatics DataKumar Dhiraj, Santanu Kumar Rath, Korra Sathya Babu. 521-532 [doi]
- Enhancing the Performance of LibSVM Classifier by Kernel F-Score Feature SelectionBalakrishnan Sarojini, Narayanasamy Ramaraj, Nickolas Savarimuthu. 533-543 [doi]
- An Electronically Tunable SIMO Biquad Filter Using CCCCTASajai Vir Singh, Sudhanshu Maheshwari, Jitendra Mohan, Durg Singh Chauhan. 544-555 [doi]
- An Architecture for Cross-Cloud System ManagementRavi Teja Dodda, Chris Smith, Aad P. A. van Moorsel. 556-567 [doi]
- Energy Efficiency of Thermal-Aware Job Scheduling Algorithms under Various Cooling ModelsGeorgios Varsamopoulos, Ayan Banerjee, Sandeep K. S. Gupta. 568-580 [doi]
- Predicting Maintainability of Component-Based Systems by Using Fuzzy LogicArun Sharma, P. S. Grover, Rajesh Kumar. 581-591 [doi]
- Energy-Constrained Scheduling of DAGs on Multi-core ProcessorsIshfaq Ahmad, Roman Arora, Derek White, Vangelis Metsis, Rebecca Ingram. 592-603 [doi]
- Evaluation of Code and Data Spatial Complexity MeasuresJitender Kumar Chhabra, Varun Gupta. 604-614 [doi]
- Pitcherpot: Avoiding Honeypot DetectionVinod K. Panchal, Pramod K. Bhatnagar, Mitul Bhatnagar. 615-624 [doi]
- Verification of Liveness Properties in Distributed SystemsDivakar Yadav, Michael Butler. 625-636 [doi]
- InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing DevicesAnand Gupta, Deepank Gupta, Nidhi Gupta. 637-648 [doi]
- Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC SetupRohit Pathak, Satyadhar Joshi. 649-659 [doi]