Abstract is missing.
- Properties and Exact Solution Approaches for the Minimum Cost Dominating Tree ProblemAndré Rossi, Alok Singh 0001, Shyam Sundar 0001. 3-26 [doi]
- Review of Approaches for Linked Data Ontology EnrichmentS. Subhashree, Rajeev Irny, P. Sreenivasa Kumar. 27-49 [doi]
- Formal Verification of Optimizing CompilersYiji Zhang, Lenore D. Zuck. 50-65 [doi]
- Security Analysis of EMV Protocol and Approaches for Strengthening ItKhedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar. 69-85 [doi]
- Secure Synthesis of IoT via Readers-Writers Flow ModelShashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar. 86-104 [doi]
- Auditing Access to Private Data on Android PlatformVishal Maral, Nachiket Trivedi, Manik Lal Das. 105-111 [doi]
- Privacy Preserving Data Utility Mining Using PerturbationJoseph Jisna, A. Salim. 112-120 [doi]
- BDI Based Performance Enhancement in DNSSECKollapalli Ramesh Babu, Vineet Padmanabhan. 121-126 [doi]
- A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment SystemPinki Prakash Vishwakarma, Amiya Kumar Tripathy, Srikanth Vemuru. 127-131 [doi]
- Time-Triggered Scheduling for Multiprocessor Mixed-Criticality SystemsLalatendu Behera, Purandar Bhaduri. 135-151 [doi]
- Effect of Live Migration on Virtual Hadoop ClusterGarima Singh, Anil Kumar Singh. 152-157 [doi]
- Performance Analysis of Parallel K-Means with Optimization Algorithms for Clustering on SparkV. Santhi, Rini Jose. 158-162 [doi]
- Hashing Supported Iterative MapReduce Based Scalable SBE Reduct ComputationU. Venkata Divya, P. S. V. S. Sai Prasad. 163-170 [doi]
- Reliable Condition Monitoring of Telecommunication Services with Time-Varying Load CharacteristicGünter Fahrnberger. 173-188 [doi]
- Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi DeploymentPranav Kumar Singh, Subhrendu Chattopadhyay, Pradeepkumar Bhale, Sukumar Nandi. 189-204 [doi]
- Ego Based Community Detection in Online Social NetworkParamita Dey, Sarbani Roy, Sanjit Roy. 205-210 [doi]
- A Gateway Virtual Network Function for InfiniBand and Ethernet NetworksUtkal Sinha, Ratnakar Dash, Nandish Jayaram Kopri. 211-216 [doi]
- GMP2P: Mobile P2P over GSM for Efficient File SharingSumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh. 217-231 [doi]
- Simulation of Network Growth Using Community Discovery in Biological NetworksY. Divya Brahmani, T. Sobha Rani, S. Durga Bhavani. 232-239 [doi]
- A Style Sheets Based Approach for Semantic Transformation of Web PagesGollapudi V. R. J. Sai Prasad, Venkatesh Choppella, Sridhar Chimalakonda. 240-255 [doi]
- Efficient Anomaly Detection Methodology for Power Saving in Massive IoT ArchitecturePalani Kumar, Meenakshi D'Souza, Debabrata Das. 256-262 [doi]
- Approximation Algorithms for Permanent Dominating Set Problem on Dynamic NetworksSubhrangsu Mandal, Arobinda Gupta. 265-279 [doi]
- Lightweight Verifiable Auditing for Outsourced Database in Cloud ComputingMayank Kumar, Syam Kumar Pasupuleti. 280-287 [doi]
- A One Phase Priority Inheritance Commit ProtocolSarvesh Pandey, Udai Shanker. 288-294 [doi]
- Issues and Challenges in Big Data: A SurveyRipon Patgiri. 295-300 [doi]
- Generate Optimal Distributed Query Plans Using Clonal Selection ProcessRuby Rani. 301-305 [doi]
- CapAct: A Wordnet-Based Summarizer for Real-World Events from MicroblogsSurender Singh Samant, N. L. Bhanu Murthy, Aruna Malapati. 306-314 [doi]
- ARMM: Adaptive Resource Management Model for Workflow Execution in CloudsHarshpreet Singh, Rajneesh Randhawa. 315-329 [doi]
- A New Priority Heuristic Suitable in Mobile Distributed Real Time Database SystemPrakash Kumar Singh, Udai Shanker. 330-335 [doi]
- Efficient Algorithms for Local Density Based Anomaly DetectionAnkita Sinha, Prasanta K. Jana. 336-342 [doi]