default search action
11th ICDCIT 2015: Bhubaneswar, India
- Raja Natarajan, Gautam Barua, Manas Ranjan Patra:
Distributed Computing and Internet Technology - 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings. Lecture Notes in Computer Science 8956, Springer 2015, ISBN 978-3-319-14976-9
Invited Papers
- Massimo Bartoletti, Tiziana Cimoli, G. Michele Pinna, Roberto Zunino:
Models of Circular Causality. 1-20 - Nikolaj S. Bjørner, Karthick Jayaraman:
Checking Cloud Contracts in Microsoft Azure. 21-32 - Manik Lal Das:
Privacy and Security Challenges in Internet of Things. 33-48 - Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati:
Geo-indistinguishability: A Principled Approach to Location Privacy. 49-72 - Nabeel Nasir, Kartik Palani, Amandeep Chugh, Vivek Chil Prakash, Uddhav Arote, Anand P. Krishnan, Krithi Ramamritham:
Fusing Sensors for Occupancy Sensing in Smart Buildings. 73-92 - Xin An, Gwenaël Delaval, Jean-Philippe Diguet, Abdoulaye Gamatié, Soguy Mak Karé Gueye, Hervé Marchand, Noël De Palma, Éric Rutten:
Discrete Control-Based Design of Adaptive and Autonomic Computing Systems. 93-113 - Sanjiva Prasad:
Designing for Scalability and Trustworthiness in mHealth Systems. 114-133 - Laxmi Parida, Niina Haiminen, David Haws, Jan Suchodolski:
Host Trait Prediction of Metagenomic Data for Topology-Based Visualization. 134-149 - Bud Mishra:
Gappy Total Recaller: Efficient Algorithms and Data Structures for Accurate Transcriptomics. 150-161
Distributed Computing and Algorithms
- Pankaj Sahu, Prachi Agrawal, Vikram Goyal, Debajyoti Bera:
Finding RkNN Set in Directed Graphs. 162-173 - Avik Chatterjee, Sruti Gan Chaudhuri, Krishnendu Mukhopadhyaya:
Gathering Asynchronous Swarm Robots under Nonuniform Limited Visibility. 174-180 - Manish Gaur, Simon J. Gay, Ian Mackie:
A Routing Calculus with Flooding Updates. 181-186 - Bhawani Sankar Panda, D. Pushparaj Shetty, Arti Pandey:
k-Distinct Strong Minimum Energy Topology Problem in Wireless Sensor Networks. 187-192 - Kaushik Mondal, Arindam Karmakar, Partha Sarathi Mandal:
Path Planning Algorithm for Mobile Anchor in Connected Sensor Networks. 193-198 - Sangharatna Godboley, Subhrakanta Panda, Durga Prasad Mohapatra:
SMCDCT: A Framework for Automated MC/DC Test Case Generation Using Distributed Concolic Testing. 199-202 - Reema Patel, Kevin Patel, Dhiren R. Patel:
On-the-Fly Symmetry Reduction of Explicitly Represented Probabilistic Models. 203-206
Internet Technologies and Web Services
- A. Vani Vathsala, Hrushikesha Mohanty:
Time and Cost Aware Checkpointing of Choreographed Web Services. 207-219 - Lakshmi H. N., Hrushikesha Mohanty:
A Preprocessing of Service Registry: Based on I/O Parameter Similarity. 220-232 - Ramkumar Iyer, Sanjeevi Moorthy:
Financial Risk Management in e-commerce Using Executable Business Process Modeling Notation. 233-238 - Kanchana Rajaram, Chitra Babu, Akshaya Ganesan:
DILT: A Hybrid Model for Dynamic Composition and Execution of Heterogeneous Web Services. 239-244 - Debendra Kumar Naik, Smita Kumari, Santanu Kumar Rath:
Application of Soft Computing Technique for Web Service Selection. 245-248 - Rafi U. Zaman, Khaleel Ur Rahman Khan, A. Venugopal Reddy:
Weighted Load Balanced Adaptive Gateway Discovery in Integrated Internet MANET. 249-252 - Madhusmita Sahu, Durga Prasad Mohapatra:
Slice Based Testing of CGI Based Web Applications. 253-256 - Akashdeep Sharma:
A Fuzzy Computationally Intelligent System for Resource Allocation in WiMAX. 257-260 - Koteswara Rao Vemu:
Improving Activity Prediction and Activity Scheduling in Smart Home Networks for Enhanced QoS. 261-264
Secure Computing and Communication
- Günter Fahrnberger:
Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects. 265-277 - Partha Sarathi Roy, Angsuman Das, Avishek Adhikari:
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure. 278-287 - Sumit Kumar Tetarave, Somanath Tripathy, Sathya Peri:
S-Gossip: Security Enhanced Gossip Protocol for Unstructured P2P Networks. 288-298 - Debasis Mohapatra, Manas Ranjan Patra:
k-degree Closeness Anonymity: A Centrality Measure Based Approach for Network Anonymization. 299-310 - Pranave Kumar Bhaskar, Alwyn R. Pais:
A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network. 311-317 - Ashalata Panigrahi, Manas Ranjan Patra:
An Evolutionary Computation Based Classification Model for Network Intrusion Detection. 318-324 - Amrita Ghosal, Subir Halder:
Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks. 325-330 - Günter Fahrnberger, Kathrin Heneis:
SecureString 3.0 - A Cryptosystem for Blind Computing on Encrypted Character Strings. 331-334 - Tanmoy Kanti Das, Piyush Kanti Bhunre:
A Secure Image Hashing Technique for Forgery Detection. 335-338
Cloud Computing
- R. S. Ponmagal, N. Dinesh, Uma Rajaram:
Design and Development of Secure Cloud Architecture for Sensor Services. 339-344 - Benay Kumar Ray, Sunirmal Khatua, Sarbani Roy:
Cloud Federation Formation Using Coalitional Game Theory. 345-350 - Sanjaya Kumar Panda, Prasanta K. Jana:
An Efficient Resource Allocation Algorithm for IaaS Cloud. 351-355 - A. S. Ajeena Beegom, M. S. Rajasree:
Genetic Algorithm Framework for Bi-objective Task Scheduling in Cloud Computing Systems. 356-359 - (Withdrawn) Optimal Cloud Resource Provisioning: A Two-Criteria Formulation. 360-364
Information Retrieval and Recommender Systems
- Deepa Anand, Febin A. Vahab:
Predicting Post Importance in Question Answer Forums Based on Topic-Wise User Expertise. 365-376 - Debabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan:
SQLiDDS: SQL Injection Detection Using Query Transformation and Document Similarity. 377-390 - Julian Szymanski:
Information Retrieval in Wikipedia with Conceptual Directions. 391-402 - Trupti Padiya, Minal Bhise, Sandeep Vasani, Mohit Pandey:
Query Execution for RDF Data on Row and Column Store. 403-408 - Rohit Gupta, Anil Kumar Singh:
A Concept for Co-existence of Heterogeneous Recommender Systems Based on Blackboard Architecture. 409-414 - Jagendra Singh, Aditi Sharan:
Co-occurrence and Semantic Similarity Based Hybrid Approach for Improving Automatic Query Expansion in Information Retrieval. 415-418
Societal Applications
- Nemi Chandra Rathore, Somanath Tripathy, Joydeep Chandra:
Predicting User Visibility in Online Social Networks Using Local Connectivity Properties. 419-430 - Swati Agarwal, Ashish Sureka:
Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter. 431-442 - Ajay Auddy, Sripati Mukhopadhyay:
Data Mining on ICT Usage in an Academic Campus: A Case Study. 443-447 - Hrushikesha Mohanty:
A Theory on Genesis and Spread of Corruption. 448-451 - Paramita Dey, Aniket Sinha, Sarbani Roy:
Social Network Analysis of Different Parameters Derived from Realtime Profile. 452-455 - Anil Kumar Singh, Surinder Kaur:
Analysis of Emergency Evacuation of Building Using PEPA. 456-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.