Limit search to available items
784 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author ACITY 2012 (2012 : Chennai, India)

Title Advances in computing and information technology : proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India. Volume 1 / Natarajan Meghanathan, Dhinaharan Nagamalai, and Nabendu Chaki (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Advances in intelligent systems and computing, 2194-5357 ; 176
Advances in intelligent systems and computing ; 176.
Contents Intelligent Network-Based Intrusion Detection System (iNIDS) / P.R. Mahalingam -- Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password / Tumpa Roy, Poonam Sisodia, Divye Upadhyay and Kamlesh Dutta -- Securing Multi-agent Systems: A Survey / S.V. Nagaraj -- Personal Secret Information Based Authentication towards Preventing Phishing Attacks / Gaurav Varshney, Ramesh Chandra Joshi and Anjali Sardana -- Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis / Premraj Mahajan and Anjali Sardana -- An Integrated Intrusion Detection System for Credit Card Fraud Detection / M. Sasirekha, I. Sumaiya Thaseen and J. Saira Banu -- Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems / Majid Nezakatolhoseini, Sam Jabbehdari and Mohammad Ali Pourmina -- ECDLP Based Proxy Multi-signature Scheme / Ramanuj Chouksey, R. Sivashankari and Piyush Singhai -- SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues / D. Chandramohan, D. Veeraiah, M. Shanmugam, N. Balaji and G. Sambasivam, et al. -- Host-Based Bot Detection Using Destination White-Lists for User's Profile / B. Soniya and M. Wilscy -- Effective Implementation and Evaluation of AES in Matlab / Amish Kumar and Namita Tiwari -- Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts / Priyanka Dey and Suparna Biswas -- An Obfuscated Implementation of RC4 / Roger Zahno and Amr M. Youssef -- A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders / Nur Al Hasan Haldar, Muhammad Abulaish and Syed Asim Pasha -- SLA for a Pervasive Healthcare Environment / J. Valarmathi, K. Lakshmi, R.S. Menaga, K.V. Abirami and V. Rhymend Uthariaraj -- Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment / Mayank Kumar Goyal and Alok Aggarwal
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN / Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra and Subrata Nandi -- Multi Tree View of Complex Attack -- Stuxnet / Shivani Mishra, Krishna Kant and R.S. Yadav -- Secure Peer-Link Establishment in Wireless Mesh Networks / Swathi Bhumireddy, Somanath Tripathy and Rakesh Matam -- Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT) / Uttam Kr. Mondal and Jyotsna Kumar Mandal -- Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV / Chaitali Biswas Dutta and Utpal Biswas -- English to Hindi Machine Translator Using GMT and RBMT Approach / Ambrish Srivastav and Nitin Hambir -- Plugging DHCP Security Holes Using S-DHCP / Amit Kumar Srivastava and Arun Kumar Misra -- Efficient Cryptography Technique on Perturbed Data in Distributed Environment / Nishant Goswami, Tarulata Chauhan and Nishant Doshi -- A Novel Triangle Centroid Authentication Protocol for Cloud Environment / K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna and S. Rubika -- Security and Availability of Data in the Cloud / Ahtesham Akhtar Patel, S. Jaya Nirmala and S. Mary Saira Bhanu -- A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks / Shanta Mandal and Rituparna Chaki -- A Cryptographic Approach towards Black Hole Attack Detection / Pratima Sarkar and Rituparna Chaki -- Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels / Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha and P. Dhavachelvan -- Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks / Jagadeesh Kakarla and S. Siva Sathya -- Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links / Mayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi and Paurush Kumar Misra
Personalised High Quality Search with in a Web Site: No User Profiling / L.K. Joshila Grace, V. Maheswari and Dhinaharan Nagamalai -- Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System / Tulsidas Patil, Ganesh Bhutkar and Noshir Tarapore -- Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control / Sundarapandian Vaidyanathan -- String Matching Technique Based on Hardware: A Comparative Analysis / Aakanksha Pandey and Nilay Khare -- Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks / R. Shyamala and S. Valli -- Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network / Chandra Thapa and C. Chandrasekhar -- Temporary Parallel Route Recovery for Frequent Link Failure in VANET / B. Siva Kumar Reddy, M. Sakthi Ganesh and P. Venkata Krishna -- Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator / Manjusha Karkhanis and Achala Deshmukh -- Efficient Target Recovery in Wireless Sensor Network / Shailaja Patil, Ashish Gupta and Mukesh Zaveri -- Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System / Soma Bandyopadhyay and Abhijan Bhattacharyya -- Improving TCP Performance in Hybrid Networks / O.S. GnanaPrakasi and P. Varalakshmi -- Synchronization in Distributed Systems / Amritha Sampath and C. Tripti -- NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component / Debajyoti Mukhopadhyay, Sheetal Vij and Suyog Tasare -- Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor / S. Indu Vadhani, G. Vithya and B. Vinayagasundaram -- Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network / Suparna Biswas and Sarmistha Neogy -- Design of Broadband Optical Sources for OCDMA/WDMA Applications / Lakshmi Priya, M. Meenakshi and G. Geetha
Localization in Wireless Sensor Network: A Distributed Approach / Shailaja Patil and Mukesh Zaveri -- Web Mining and Security in E-commerce / Shaikh Mohammed Atiq, Dayanand Ingle and B.B. Meshram -- Performance Improvement in MIMO Systems Using Rotating Codebooks / J. Julia and M. Meenakshi -- Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations / K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar and J. Jayakumar -- Feature Selection for Detection of Ad Hoc Flooding Attacks / Sevil Sen and Zeynep Dogmus -- Performance Analysis of SCTP Compared to TCP and UDP / Nagesha and S.S. Manvi -- MSRCC -- Mitigation of Security Risks in Cloud Computing / D. Chandramohan, T. Vengattaraman, M.S.S. Basha and P. Dhavachelvan -- Topology Construction of 3D Wireless Sensor Network / Sarbani Roy and Nandini Mukherjee -- Design and Analysis of Dual Capacitively Loaded C-PIFA / Kirti Dhwaj, Rachit Garg, Gaurav Mishra and Neetesh Purohit -- Jong Nang 3-Input NOR Channel, / Moon Ho Lee, Md. Hashem Ali Khan and Daechul Park -- Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels / Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran and Prabagarane Nagaradjane -- Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network / C.H. Sandhya, Deepali R. Borade, Rinki Sharma and Govind R. Kadambi -- Reliability Enhanced Routing Protocol for Wireless Mesh Networks / Rakesh Matam and Somanath Tripathy -- DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network / Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak and Indrajit Banerjee -- A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks / Preetha Theresa Joy and K. Polouse Jacob -- FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network / Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak and Indrajit Banerjee
Effective Resource Allocation Technique for Wireless Cellular System / Banda Sreenivas, S. Ramesh Babu, S. Prabhakar and D. Karunakar Reddy -- Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots / Rajesh P. Barnwal and Arnab Thakur -- Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack / Payal Chaudhari and Hiteishi Diwanji -- Super Peer Deployment in Unstructured Peer-to-Peer Networks / R. Venkadeshan and M. Jegatha -- Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN / Subrata Dutta, Nandini Mukherjee, Monideepa Roy and Sarmistha Neogy -- Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK Modulation / Gaurav Sikri and Rajni -- MERCC: Multiple Events Routing with Congestion Control for WSN / Ayan Kumar Das and Rituparna Chaki -- Awareness Based Approach against E-Mail Attacks / Gaurav Kumar Tak and Gaurav Ojha -- On the Fly File Dereplication Mechanism / Paras Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma and Dharmender Singh Kushwaha -- Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services / Durgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar and Dharmender Singh Kushwaha -- Load Balancing in Cluster Using BLCR Checkpoint/Restart / Hemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra and Dharmender Singh Kushwaha -- Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging / Utpal Nandi and Jyotsna Kumar Mandal -- Human Tracking in Video Surveillance / Helly Patel and Mahesh P. Wankhade -- Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET / Manpreet Kaur, Rajni and Parminder Singh -- An Efficient Approach to Secure Routing in MANET / Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha and Debika Bhattacharyya, et al. -- Trust Oriented Secured AODV Routing Protocol against Rushing Attack / Swarnali Hazra and S.K. Setua -- SEPastry: Security Enhanced Pastry / Madhumita Mishra, Somanath Tripathy and Sathya Peri -- Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR / Koushik Majumder, Sudhabindu Ray and Subir Kumar Sarkar
Summary The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes
Analysis Engineering
Computer vision
Computer science
Computer engineering
Computational Intelligence
Electrical Engineering
Notes English
Subject Computer networks -- Security measures -- Congresses
Computer science -- Congresses
Information technology -- Congresses
COMPUTERS -- Data Transmission Systems -- General.
COMPUTERS -- Networking -- Vendor Specific.
Ingénierie.
Computer networks -- Security measures
Computer science
Information technology
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Meghanathan, Natarajan, 1977-
Nagamalai, Dhinaharan.
Chaki, Nabendu.
ISBN 9783642315138
3642315135
9783642315121
3642315127
Other Titles ACITY