Abstract is missing.
- Security and trust- new challenges to computing today in cyberspaceTirumale Ramesh. 1-6 [doi]
- Energy-aware resource management for computing systemsHoward Jay Siegel, Bhavesh Khemka, Ryan Friese, Sudeep Pasricha, Anthony A. Maciejewski, Gregory A. Koenig, Sarah Powers, Marcia Hilton, Rajendra Rambharos, Gene Okonski, Steve Poole. 7-12 [doi]
- From specification languages to wide-spectrum logicsMartin Henson. 13-18 [doi]
- Enhancing JFLAP with automata construction problems and automated feedbackVinay S. Shekhar, Anant Agarwalla, Akshay Agarwal, Nitish B., Viraj Kumar. 19-23 [doi]
- PoGest: A vision based tool for facilitating Kathak learningSonal Gupta, Sanjay Goel. 24-29 [doi]
- CoSDEES: A framework for developing CSD environments for educational settingsRitu Arora, Sanjay Goel, R. K. Mittal. 30-36 [doi]
- LectureKhoj: Automatic tagging and semantic segmentation of online lecture videosEsha Baidya, Sanjay Goel. 37-43 [doi]
- Crowdlearning: An incentive-based learning platform for crowdNilesh Padhariya, Kshama Dinesh Bhai Raichura. 44-49 [doi]
- Using WebGL to implement a glass lens in Online LabsRaghu Raman, Unnikrishnan K. V., V. Smrithi Rekha, Prema Nedungadi. 50-55 [doi]
- A free and open source framework for rural educationV. Smrithi Rekha, V. Adinarayanan. 56-61 [doi]
- A wireless dynamic gesture user interface for HCI using hand data gloveShitala Prasad, Piyush Kumar, Kumari Priyanka Sinha. 62-67 [doi]
- A novel hybrid memetic search in Artificial Bee Colony algorithmSandeep Kumar, Ashutosh Kumar, Vivek Kumar Sharma, Harish Sharma. 68-73 [doi]
- Fat time optimization protocol in cellular networksShiven Chawla, Sakshi Agarwal. 74-79 [doi]
- Information metrics for low-rate DDoS attack detection: A comparative evaluationMonowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. 80-84 [doi]
- A heuristic for two bin partition problemAllahbaksh M. Asadullah, K. V. Dinesha, P. C. P. Bhatt. 85-88 [doi]
- Earned Value Analysis for real time wireless sensor networkNeetika Jain, Krishna Kant. 89-93 [doi]
- EmoXract: Domain independent emotion mining model for unstructured dataAkriti Saini, Nishank Bhatia, Bhavya Suri, Shikha Jain. 94-98 [doi]
- Static hand gesture recognition using stacked Denoising Sparse AutoencodersVarun Kumar, G. C. Nandi, Rahul Kala. 99-104 [doi]
- An integrated spoken language recognition system using support vector machinesGarima Vyas, Malay Kishore Dutta. 105-108 [doi]
- Classification of glaucoma based on texture features using neural networksDeepti Yadav, M. Partha Sarathi, Malay Kishore Dutta. 109-112 [doi]
- Dynamic thresholding technique for detection of hemorrhages in retinal imagesAkhilesh Sharma, Malay Kishore Dutta, Anushikha Singh, M. Partha Sarathi, Carlos M. Travieso. 113-116 [doi]
- Automatic mood detection of indian music using mfccs and k-means algorithmGarima Vyas, Malay Kishore Dutta. 117-122 [doi]
- Leveraging frequency and diversity based ensemble selection to consensus clusteringArko Banerjee. 123-129 [doi]
- Computing multiplicative order and primitive root in finite cyclic groupShri Prakash Dwivedi. 130-134 [doi]
- Author name disambiguation using vector space model and hybrid similarity measuresTasleem Arif, Rashid Ali, M. Asger. 135-140 [doi]
- A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristicSangeeta Mittal, Krishna Gopal, S. L. Maskara. 141-147 [doi]
- Consensus clustering for dimensionality reductionD. Sandhya Rani, T. Sobha Rani, S. Durga Bhavani. 148-153 [doi]
- A novel algorithm for list accessing problemSanjaya Kumar Panda. 154-159 [doi]
- Proposed algorithm for frequent item set generationArchana Singh, Jyoti Agarwal. 160-165 [doi]
- Performance comparison for data storage - Db4o and MySQL databasesSudhanshu Kulshrestha, Shelly Sachdeva. 166-170 [doi]
- A novel architecture for identity management system using virtual appliance technologyParth Srivastava, Sachin S. Pande. 171-175 [doi]
- Door negotiation of a omni robot platform using depth map based navigation in dynamic environmentAnanda Sankar Kundu, Oishee Mazumder, Ritwik Chattaraj, Subhasis Bhaumik. 176-181 [doi]
- GPU based geometric hashing for space partioningBhavin Patel, Vibha Patel. 182-188 [doi]
- Energy and carbon efficient VM placement and migration technique for green cloud datacentersBharti Wadhwa, Amandeep Verma. 189-193 [doi]
- Impact of topological properties over link prediction based on node neighbourhood: A studyAnand Kumar Gupta, Neetu Sardana. 194-198 [doi]
- Hierarchical map-based location service for VANETs in urban environmentsAmita Garg, Kavita Pandey, Buddha Singh. 199-205 [doi]
- An empirical study of the sensitivity of quality indicator for software module clusteringAmarjeet Prajapati, Jitender Kumar Chhabra. 206-211 [doi]
- Dynamic scaling of web services for xen based virtual cloud environmentMallika Malhotra, Sanya Kapoor, Prakash Kumar. 212-217 [doi]
- Image realization steganography with LCS based mappingRatnakirti Roy, Suvamoy Changder. 218-223 [doi]
- Quantification of non-functional requirementsKiran Khatter, Arvind Kalia. 224-229 [doi]
- Trajectory generation for myoelectrically controlled lower limb active knee exoskeletonAnanda Sankar Kundu, Oishee Mazumder, Ritwik Chattaraj, Subhasis Bhaumik, Prasanna Kumar Lenka. 230-235 [doi]
- Audio de-noising by spectral subtraction technique implemented on reconfigurable hardwareTanmay Biswas, Chandrajit Pal, Sudhindu Bikash Mandal, Amlan Chakrabarti. 236-241 [doi]
- Grasp mapping for Dexterous Robot Hand: A hybrid approachRitwik Chattaraj, Bikash Bepari, Subhasis Bhaumik. 242-247 [doi]
- Performance analysis of S-Random interleaver for IDMA system using MRRC diversity schemeSonam Sharma, Paresh Chandra Sau, Aasheesh Shukla. 248-253 [doi]
- LSMRP: Link stability based multicast routing protocol in MANETsGaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Chhagan Lal. 254-259 [doi]
- Path tracking of Automated Guided VehicleNeerja Gupta, Abhishek Singhal, J. K. Rai, Rohit Kumar. 260-264 [doi]
- Design and development of a real time scheduling algorithm for mixed task set on multi-core processorsMayuri Digalwar, Pravin Gahukar, Sudeept Mohan. 265-269 [doi]
- Reference broadcast synchronization-based prevention to DoS attacks in VANETKaran Verma, Halabi Hasbullah, Hemant Kumar Saini. 270-275 [doi]
- LevelSync: A hierarchical time synchronization mechanism for wireless sensor networksDhyanendra S. Rathore, Dibyahash Bordoloi, Emmanuel S. Pilli, M. C. Govil. 276-282 [doi]
- Performance evaluation of long integer multiplication using OpenMP and MPI on shared memory architectureJitendra V. Tembhurne, Shailesh R. Sathe. 283-288 [doi]
- Fuzzy rule based checkpointing arrangement for fault tolerance in Mobile GridsParmeet Kaur, Pritee Parwekar. 289-293 [doi]
- Cluster growth technique for combinatorial evolvable digital circuitsAtul K. Srivastava, Hariom Gupta. 294-298 [doi]
- Towards program execution summarization: Deriving state diagrams from sequence diagramsSwaminathan Jayaraman, Kishor Kamath D., Bharat Jayaraman. 299-305 [doi]
- Performance analysis of RED for stabilized queueSanjeev Patel. 306-311 [doi]
- Cryptanalysis of "a biometric-based user authentication scheme for heterogeneous wireless sensor networks"Mrudula Sarvabhatla, M. Giri, Chandra Sekhar Vorugunti. 312-317 [doi]
- Learning domain-specific and domain-independent opinion oriented lexicons using multiple domain knowledgeK. Sai Vishnu, T. Apoorva, Deepa Gupta. 318-323 [doi]
- Privacy breach of social relation from location based mobile applicationsVartika Srivastava, Vinayak Naik, Anuradha Gupta. 324-328 [doi]
- Towards software engineering paradigm for software as a serviceNiyati Baliyan, Sandeep Kumar. 329-333 [doi]
- Collaborating trust and item-prediction with ant colony for recommendationAbhishek Kaleroun, Shalini Batra. 334-339 [doi]
- SemIndex: Efficient indexing mechanism for ontologiesVandana Dhingra, Komal Kumar Bhatia. 340-345 [doi]
- An enhanced marking target statement strategy of E-PIE for testability estimationMegha Joshi, Neetu Sardana. 346-350 [doi]
- Hopeful hearts: A mobile health care applicationNeha Nirwal, Neetu Sardana, Arpita Jadhav Bhatt. 351-356 [doi]
- Spotting the phenomenon of bad smells in MobileMedia product line architectureManjinder Kaur, Parveen Kumar. 357-363 [doi]
- Selecting and formalizing an architectural style: A comparative studyAshish Kumar Dwivedi, Santanu Kumar Rath. 364-369 [doi]
- Integrated features of haar-like wavelet filtersMegha Agarwal. 370-375 [doi]
- Automatic bug labeling using semantic information from LSIIndu Chawla, Sandeep K. Singh. 376-381 [doi]
- Correlation based Word Sense DisambiguationMadhavi Agarwal, Jyoti Bajpai. 382-386 [doi]
- A lightweight Sybil attack detection framework for Wireless Sensor NetworksRaghu Vamsi P., Krishna Kant. 387-393 [doi]
- Adaptive Trust Model for secure geographic routing in Wireless Sensor NetworksRaghu Vamsi P., Krishna Kant. 394-399 [doi]
- Spatio-Temporal extraction, visualization and investigation of worldwide disease alertsChirag Bhalla, Priyanka Sadana, Anuj Manocha, Manish K. Thakur. 400-405 [doi]
- Discriminant features for metamorphic malware detectionJikku Kuriakose, Vinod P.. 406-411 [doi]
- Anti-forensics techniques: An analytical reviewAnu Jain, Gurpal Singh Chhabra. 412-418 [doi]
- Automatic construction of process template from business ruleDeepak Kumar Sharma, Naveen Prakash, Himani Sharma, Dheerendra Singh. 419-424 [doi]
- ICSECV: An efficient approach of video encryptionSaumya Batham, Virendra Kumar Yadav, Amit Kumar Mallik. 425-430 [doi]
- A two warehouse inventory model with non- instantaneous deterioration and partial backloggingS. R. Singh, Himanshu Rathore. 431-436 [doi]
- Sentiment analysis of twitter data using machine learning approaches and semantic analysisGeetika Gautam, Divakar Yadav. 437-442 [doi]
- Explicit TenseClassifierRahul Pradhan, Dilip Kumar Sharma. 443-448 [doi]
- An Analytical approach based on self organized maps (SOM) in Indian classical music raga clusteringAkhilesh K. Sharma, Kamaljit I. Lakhtaria, Avinash Panwar, Santosh Vishwakarma. 449-453 [doi]
- Leveraging hadoop framework to develop duplication detector and analysis using Mapreduce, Hive and PigPriyanka Sethi, Prakash Kumar. 454-460 [doi]
- Email recipient prediction using reverse chronologically arranged implicit groupsAkash Desai, Subrat Kumar Dash. 461-466 [doi]
- A system for identification of idioms in HindiPriyanka, R. M. K. Sinha. 467-472 [doi]
- Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and TeluguParakrant Sarkar, Arijul Haque, Arup Kumar Dutta, Gurunath Reddy M., Harikrishna D. M., Prasenjit Dhara, Rashmi Verma, N. P. Narendra, Sunil Kr. S. B., Jainath Yadav, K. Sreenivasa Rao. 473-477 [doi]
- Local weather interpolation using remote AWS data with error corrections using sparse WSN for automated irrigation for Indian farmingN. Hema, Krishna Kant. 478-483 [doi]
- Selecting a set of appropriate metrics for detecting code clonesGeetika Bansal, Rajkumar Tekchandani. 484-488 [doi]
- Performance evaluation of various resampling techniques on IRS imageryShardha Porwal, Sunil Kumar Katiyar. 489-494 [doi]
- Web service selection on the basis of QoS parameterNeerja Negi, Satish Chandra. 495-500 [doi]
- Focused crawling with ontology using semi-automatic tagging for relevancyRisha Gaur, Dilip Kumar Sharma. 501-506 [doi]
- New approaches for service composition based on graph modelsPavankumar Guluru, Rajdeep Niyogi. 507-512 [doi]
- Significance of CV transition and steady vowel regions for language identificationDipanjan Nandi, Arup Kumar Dutta, K. Sreenivasa Rao. 513-517 [doi]
- A weight based energy-aware hierarchical clustering scheme for mobile ad hoc networksAnubhuti Roda, Charu. 518-524 [doi]
- User feedback scoring and evaluation of a product recommendation systemShahab Saquib Sohail, Jamshed Siddiqui, Rashid Ali. 525-530 [doi]
- A high payload audio watermarking algorithm robust against Mp3 compressionArashdeep Kaur, Malay Kishore Dutta, Krishan Mohan Soni, Nidhi Taneja. 531-535 [doi]
- Solar radiation modelling for the estimation of the solar energy generationJosé G. Hernández-Travieso, Carlos M. Travieso, Jesús B. Alonso, Malay Kishore Dutta. 536-541 [doi]
- A lexicon pool augmented Naive Bayes Classifier for Nepali TextS. K. Thakur, V. K. Singh. 542-546 [doi]
- A prolific approach towards automating component repository searchRam Chatterjee, Himani Rathi. 547-552 [doi]
- ROI-based fragile medical image watermarking technique for tamper detection and recovery using varianceR. Eswaraiah, E. Sreenivasa Reddy. 553-558 [doi]
- Application of energy reduction techniques using niched pareto GA of energy analzyer for HPC applicationsShajulin Benedict. 559-564 [doi]
- A cloud based deployment framework for load balancing policiesKomal Mahajan, Deepak Dahiya. 565-570 [doi]
- Inverse study of double-glazed solar collector using hybrid evolutionary algorithmRanjan Das. 571-576 [doi]
- Multi-resolution Local extrema patterns using discrete wavelet transformManisha Verma, Raman Balasubramanian, Murala Subrahmanyam. 577-582 [doi]
- OFDTs: -An optimally fair dynamic task scheduling algorithm in cloud environmentShilpi Saxena, Satyendra Singh Chouhan. 583-588 [doi]
- Document categorization in multi-agent environment with enhanced machine learning classifierSeema Singh, Chandra Prakash. 589-594 [doi]
- Multi-output radial basis function interpolation of saturated steam table for full scope simulator designShweta Khushu, Faruk Kazi. 595-600 [doi]
- NDj - AODV: Node disjoint multipath routing in Mobile Ad Hoc Networks based on AODV protocolVivek Arya, Charu Gandhi. 601-606 [doi]
- Positioning multiple mobile robots for geometric pattern formation: An empirical analysisAvinash Gautam, Apoorv Umang Saxena, Prerak Mall, Sudeept Mohan. 607-612 [doi]
- Automated generation of song lyrics using CFGsSameerchand Pudaruth, Sandiana Amourdon, Joey Anseline. 613-616 [doi]
- A modified BP network using malsburg learning for rotation and location invariant fingerprint recognition and localization with and without occlusionSumana Kundu, Goutam Sarker. 617-623 [doi]
- Using a thesaurus-based approach for the categorisation of web sitesSameerchand Pudaruth, Youven Ankiah, Keshav Sembhoo. 624-628 [doi]
- Integrating greedy based approach with genetic algorithm to generate mixed covering arrays for pair-wise testingPriti Bansal, Nitish Mittal, Aakanksha Sabharwal, Sakshi Koul. 629-634 [doi]
- An efficient computational framework for labeling large scale spatiotemporal remote sensing datasetsManu Sethi, Yupeng Yan, Anand Rangarajan, Ranga Raju Vatsavaiy, Sanjay Ranka. 635-640 [doi]