Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Proceedings of the Second International Conference on Computer Science, Engineering and Applications

    Posted By: exLib
    Proceedings of the Second International Conference on Computer Science, Engineering and Applications

    "Proceedings of the Second International Conference on Computer Science, Engineering and Applications" ed. by David C. Wyld, Jan Zizka, Dhinaharan Nagamalai
    Advances in Intelligent and Soft Computing, volume 167. ICCSEA 2012
    Sрringеr | 2012 | ISBN: 364230110X 9783642301117 9783642301100 | 1073 pages | PDF | 34 MB

    This book describes cutting-edge developments and advances in theory, methodology and applications of computer science and engineering. Written by leading experts in the field

    The best submissions were selected leading to an exciting, rich and a high quality technical conference program, which featured high-impact presentations in the latest developments of various areas of computer science, engineering and applications research.
    The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas.

    Contents
    Organization
    Partitioning and Internetworking Wireless Mesh Network with Wired Network for Delivery Maximization and QoS Provisioning
    A New Secret Key Cipher: C128
    Optimal Bandwidth Allocation Technique in IEEE 802. lie Mobile Ad Hoc Networks (MANET)
    Trusted AODV for Trustworthy Routing in MANET
    Dynamic Fuzzy Based Reputation Model for the Assurance of Node Security in AODV for Mobile Ad-Hoc Network
    Policy Based Traffic in Video on Demand System
    Distance Aware Zone Routing Protocol for Less Delay Transmission and Efficient Bandwidth Utilization
    Mobile Data Offloading: Benefits, Issues, and Technological Solutions
    Performance Analysis of Gigabit Ethernet Standard for Various Physical Media Using Triple Speed Ethernet IP Core on FPGA
    Assortment of Information from Mobile Phone Subscribers Using Chronological Model [IGCM]: Application and Management Perspective
    Modeling Soft Handoffe' Performance in a Realistic CDMA Network
    A Security Approach for Mobile Agent Based Crawler
    Prospects and Limitations of Organic Thin Film Transistors (OTFTs)
    Active Learning with Bagging for NLP Tasks
    Mining Queries for Constructing Materialized Views in a Data Warehouse
    Similarity Based Cluster Analysis on Engineering Materials Data Sets
    A Chaotic Encryption Algorithm: Robustness against Brute-Force Attack
    Introducing Session Relevancy Inspection in Web Page
    Way Directing Node Routing Protocol for Mobile Ad Hoc Networks
    Web-Page Prediction for Domain Specific Web-Search Using Boolean Bit Mask
    Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation
    Impact of Bandwidth on Multiple Connections in AODV Routing Protocol for Mobile Ad-Hoc Network
    Conceptualizing an Adaptive Framework for Pervasive Computing Environment
    Dynamic DCF Backoff A Igor ithm(DDB A) for Enhancing TCP Performance in Wireless Ad Hoc Networks
    Hybrid Cluster Validation Techniques
    Energy Efficient and Minimal Path Selection of Nodes to Cluster Head in Homogeneous Wireless Sensor Networks
    Texel Identification Using K-Means Clustering Method
    Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol
    Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory
    A Secured Transport System by Authenticating Vehicles and Drivers Using RFID
    Virtualization of Large-Scale Data Storage System to Achieve Dynamicity and Scalability in Grid Computing
    Behavioral Profile Generation for 9/11 Terrorist Network Using Efficient Selection Strategies
    A Quantitative Model of Operating System Security Evaluation
    Energy Management in Zone Routing Protocol (ZRP)
    A New Approach for Vertical Handoff in Wireless 4G Network
    An Analysis on Critical Information Security Systems
    Emergency Based Remote Collateral Tracking System Using Google's Android Mobile Platform
    Performance Analysis of (AIMM-I46) Addressing, Inter-mobility and Interoperability Management Architecture between IPv4 and IPv6 Networks
    Strong Neighborhood Based Stable Connected Dominating Sets for Mobile Ad Hoc Networks
    OERD - On Demand and Efficient Replication Dereplication
    A Mathematical Model for Performance Evaluation and Comparison of MAP Selection Schemes in n Layer HMIPv6 Networks
    Utilizing Genetic Algorithm in a Sink Driven, Energy Aware Routing Protocol for Wireless Sensor Networks
    Load Balancing with Reduced Unnecessary Handoff in Hierarchical Macro/Femto-cell WiMAX Networks
    A Study on Transmission-Control Middleware on an Android Terminal in a WLAN Environment
    Study of Location-Based Data Replication Techniques and Location Services for MANETs
    A Comparative Analysis of Modern Day Network Simulators
    Design and Implementation of a RFID Based Prototype SmArt LibrARY (SALARY) System Using Wireless Sensor Networks
    Optimal Route Life Time Prediction of Dynamic Mobile Nodes in Manets
    Reachability Analysis of Mobility Models under Idealistic and Realistic Environments
    Chaotic Cipher Using Arnolds and Duffings Map
    Effect of Sound Speed on Localization Algorithm for Underwater Sensor Networks
    An Analytical Model for Power Control B-MAC Protocol in WSN
    Enterprise Mobility - A Future Transformation Strategy for Organizations
    Allocation of Guard Channels for QoS in Hierarchical Cellular Network
    Application Development and Cost Analysis for Content Based Publish Subscribe Model in Mobile Environment
    Energy Aware AODV (EA-AODV) Using Variable Range Transmission
    Automatic Speech Recognizer Using Digital Signal Processor
    Pre Decision Based Handoff in Multi Network Environment
    A Swarm Inspired Probabilistic Path Selection with Congestion Control in MANETs
    A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET
    Sensor Deployment for Mobile Object Tracking in Wireless Sensor Networks
    ELRM: A Generic Framework for Location Privacy in LBS
    Energy Efficient Administrator Based Secure Routing in MANET
    Effect of Mobility on Trust in Mobile Ad-Hoc Network
    Securing Systems after Deployment
    On the Security of Two Certificate less Signature Schemes
    Information Security Using Chains Matrix Multiplication
    Formal Security Verification of Secured ECC Based Signeryption Scheme
    Universal Steganalysis Using Contour let Transform
    Algorithm for Clustering with Intrusion Detection Using Modified and Hashed K - Means Algorithms
    Z Transform Based Digital Image Authentication Using Quantization Index Modulation (Z-DIAQIM)
    Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)
    A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)
    A Real Time Detection of Distributed Denial-of-Service Attacks Using Cumulative Sum Algorithm and Adaptive Neuro-Fuzzy Inference System
    Encryption of Images Based on Genetic Algorithm - A New Approach
    Content Based Image Retrieval Using Normalization of Vector Approach to SVM
    Modified Grjztetl: An Efficient Hash Function
    Iris Recognition Systems with Reduced Storage and High Accuracy Using Majority Voting and Haar Transform
    Recovery of Live Evidence from Internet Applications
    Face Detection Using HMM -SVM Method
    High Capacity Lossless Semi-fragile Audio Watermarking in the Time Domain
    Key Management Protocol in WIMAX Revisited
    Image Authentication Technique Based on DCT (IATDCT)
    Survey on a Co-operative Multi-agent Based Wireless Intrusion Detection Systems Using MIBs
    A Binary Vote Based Comparison of Simple Majority and Hierarchical Decision for Survivable Networks
    A Novel Way of Protecting the Shared Key by Using Secret Sharing and Embedding Using Pseudo Random Numbers
    Security Assurance by Efficient Non-repudiation Requirements
    Poor Quality Watermark Barcodes Image Enhancement
    Hiding Data in FLV Video File
    Taxonomy of Network Layer Attacks in Wireless Mesh Network
    Implementing Availability State Transition Model to Quantify Risk Factor
    Performance Analysis of Fast DOA Estimation Using Wavelet Denoising over Rayleigh Fading Channel on MIMO System
    DAGITIZER - A Tool to Generate Directed Acyclic Graph through Randomizer to Model Scheduling in Grid Computing
    A New Fault Tolerant Routing Algorithm for Advance Irregular Alpha Multistage Interconnection Network
    Comparing and Analyzing the Energy Efficiency of Cloud Database and Parallel Database
    A Grid Fabrication of Traffic Maintenance System
    Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment
    Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning
    An Enhancement to AODV Protocol for Efficient Routing in VANET - A Cluster Based Approach
    Human Emotion Recognition and Classification from Digital Colour Images Using Fuzzy and PC A Approach
    A New Process Placement Algorithm in Multi-core Clusters Aimed to Reducing Network Interface Contention
    Resource Based Optimized Decentralized Grid Scheduling Algorithm
    Web-Based GIS and Desktop Open Source GIS Software: An Emerging Innovative Approach for Water Resources Management
    A Design Pattern for Service Injection and Composition of Web Services for Unstructured Peer-to-Peer Computing Systems with SOA
    A Policy Driven Business Logic Change Management for Enterprise Web Services
    Author Index
    with TOC BookMarkLinks

    NitroF • | • UpCh
    RGator • | • UlNet • | • DepositF

    HiFi • | • SiBi • | • TuBi




    More Volume 1 (166): DepositF • | • UlNet • | • SiBi • | • TuBi