Abstract is missing.
- A Distributed Approach Based on Hierarchical Scalar Leader Selection for Enhanced Event Coverage in Wireless Multimedia Sensor NetworksSushree Bibhuprada B. Priyadarshini, Suvasini Panigrahi. 3-14 [doi]
- Gathering Multiple Robots in a Ring and an Infinite GridDurjoy Dutta, Tandrima Dey, Sruti Gan Chaudhuri. 15-26 [doi]
- WiFi-Related Energy Consumption Analysis of Mobile Devices in a Walkable Area by Abstract InterpretationEnrico Eugenio, Agostino Cortesi. 27-39 [doi]
- A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on TumblrSwati Agarwal 0001, Ashish Sureka. 43-57 [doi]
- Scalable IQRA_IG Algorithm: An Iterative MapReduce Approach for Reduct ComputationP. S. V. S. Sai Prasad, H. Bala Subrahmanyam, Praveen Kumar Singh. 58-69 [doi]
- Simulation of MapReduce Across Geographically Distributed Datacentres Using CloudSimD. S. Jayalakshmi, R. Srinivasan. 70-81 [doi]
- Revamping the Frequency and Computational Time of RTOS Task - Power DissipationSharma Saravanan, Sameera Shaik. 85-93 [doi]
- CO2 Penalty and Disaster Aware Data Center and Service Placement for Cost MinimizationRishi Sharma, Ranu Vikram, Bala Prakasa Rao Killi, Seela Veerabhadreswara Rao. 94-104 [doi]
- PMM: A Novel Prediction Based VM Migration Scheme in Cloud ComputingSrimoyee Bhattacherjee, Uttiya Sarkar, Sunirmal Khatua, Sarbani Roy. 107-117 [doi]
- Bid Selection for Deadline Constrained Jobs over Spot VMs in Computational CloudSharmistha Mandal, Sunirmal Khatua, Rajib K. Das. 118-128 [doi]
- An Efficient Request-Based Virtual Machine Placement Algorithm for Cloud ComputingSanjaya Kumar Panda, Prasanta K. Jana. 129-143 [doi]
- An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public CloudS. Sabitha, M. S. Rajasree. 147-158 [doi]
- Analyzing Protocol Security Through Information-Flow ControlN. V. Narendra Kumar, R. K. Shyamasundar. 159-171 [doi]
- Efficient Image Authentication Scheme Using Genetic AlgorithmsArjun Londhey, Manik Lal Das. 172-180 [doi]
- Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy PoliciesN. V. Narendra Kumar, R. K. Shyamasundar. 183-195 [doi]
- Privacy Preserving Signcryption SchemePayal Chaudhari, Manik Lal Das. 196-209 [doi]
- MalCrawler: A Crawler for Seeking and Crawling Malicious WebsitesA. K. Singh, Navneet Goyal. 210-223 [doi]
- Spying Mobrob - Innovative Mobile Number Tracking SystemSayar Kumar Dey, Prerna Choudhary, Günter Fahrnberger. 227-230 [doi]
- A Domain Specific Language for ClusteringSaiyedul Islam, Sundar Balasubramaniam, Poonam Goyal, Mohit Sati, Navneet Goyal. 231-234 [doi]
- Designing a Secure Data Retrieval Strategy Using NoSQL DatabaseSayantani Saha, Tanusree Parbat, Sarmistha Neogy. 235-238 [doi]