Login / Signup
ISI (2)
2015
2015
2015
Keyphrases
Publications
volume 321, 2015
Intelligent Distributed Computing - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India
ISI (2)
321 (2015)
2014
Puneet Gour
,
Anil Sarje
Localization in Wireless Sensor Networks with Ranging Error.
ISI (2)
(2014)
Oshin Anand
,
Abhineet Mittal
,
Kanta Moolchandani
,
Munezasultana M. Kagzi
,
Arpan Kumar Kar
Evaluating Travel Websites Using WebQual: A Group Decision Support Approach.
ISI (2)
(2014)
Rathnakar Achary
,
V. Vityanathan
,
Pethuru Raj Chelliah
,
S. Nagarajan
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing.
ISI (2)
(2014)
Dharavath Ramesh
,
Harshit Gupta
,
Kuljeet Singh
,
Chiranjeev Kumar
Hash Based Incremental Optimistic Concurrency Control Algorithm in Distributed Databases.
ISI (2)
(2014)
Simon Fong
,
Renfei Luo
,
Suash Deb
,
Sabu M. Thampi
Location-Based Mutual and Mobile Information Navigation System: Lemmings.
ISI (2)
(2014)
Thangavel Senthil Kumar
,
Swati Pandey
Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout.
ISI (2)
(2014)
Kriti Chadha
,
Sushma Jain
Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks.
ISI (2)
(2014)
Vandana Dhingra
,
Komal Kumar Bhatia
SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retrieval.
ISI (2)
(2014)
Kanubhai K. Patel
,
Bharat Buddhadev
Predictive Rule Discovery for Network Intrusion Detection.
ISI (2)
(2014)
Rajender Nath
,
Naresh Kumar
,
Sneha Tuteja
A Survey on Reduction of Load on the Network.
ISI (2)
(2014)
Ajeet Pal Singh Panwar
,
Rajdeep Niyogi
A Heuristic for Link Prediction in Online Social Network.
ISI (2)
(2014)
Hind Lamharhar
,
Laila Benhlima
,
Dalila Chiadmi
OWLSGOV: An Owl-S Based Framework for E-Government Services.
ISI (2)
(2014)
Agrima Srivastava
,
K. P. Krishna Kumar
,
G. Geethakumari
Quantifying Direct Trust for Private Information Sharing in an Online Social Network.
ISI (2)
(2014)
Amrinderpreet Singh
,
Shalini Batra
P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network.
ISI (2)
(2014)
Archana B. Khedkar
,
Vinayak L. Patil
Computer Network Optimization Using Topology Modification.
ISI (2)
(2014)
Kanupriya Dhawan
,
Meenakshi Sharma
Data Owner Centric Approach to Ensure Data Protection in Cloud Environment.
ISI (2)
(2014)
Gaurav Pareek
,
Ratna Kumari
,
Aitha Nagaraju
Mobile Sensor Localization Under Wormhole Attacks: An Analysis.
ISI (2)
(2014)
V. J. Jincy
,
Sudharsan Sundararajan
Classification Mechanism for IoT Devices towards Creating a Security Framework.
ISI (2)
(2014)
Gaurav Pareek
,
Chetanya Goyal
,
Mukesh Nayal
A Result Verification Scheme for MapReduce Having Untrusted Participants.
ISI (2)
(2014)
Savitri Devi
,
Anil Sarje
Dir-DREAM: Geographical Routing Protocol for FSO MANET.
ISI (2)
(2014)
Vivek Kumar Sehgal
,
Anubhav Patrick
,
Ashutosh Soni
,
Lucky Rajput
Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing.
ISI (2)
(2014)
Shiju Sathyadevan
,
Nandini Muraleedharan
,
Sreeranga P. Rajan
Enhancement of Data Level Security in MongoDB.
ISI (2)
(2014)
Deepika Kukreja
,
Sanjay Kumar Dhurandher
,
B. V. Ramana Reddy
Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs.
ISI (2)
(2014)
Manisha Sunil Bhende
,
Sanjeev Wagh
Extending Lifetime of Wireless Sensor Network Using Cellular Automata.
ISI (2)
(2014)
Sudha Gupta
,
Faruk Kazi
,
Sushama Wagh
,
Ruta Kambli
Neural Network Based Early Warning System for an Emerging Blackout in Smart Grid Power Networks.
ISI (2)
(2014)