Login / Signup
ACC (2)
2011
2011
2011
Keyphrases
Publications
2011
Vikram Saralaya
,
J. K. Kishore
,
Sateesh Reddy
,
Radhika M. Pai
,
Sanjay Singh
Modeling and Verification of Chess Game Using NuSMV.
ACC (2)
(2011)
Justy Jameson
,
K. K. Sherly
SQL Injection Disclosure Using BLAH Algorithm.
ACC (2)
(2011)
Korra Sathya Babu
,
Sanjay Kumar Jena
Balancing between Utility and Privacy for k-Anonymity.
ACC (2)
(2011)
Puneet Mittal
,
Satwinder Singh
,
Karanjeet Singh Kahlon
Identification of Error Prone Classes for Fault Prediction Using Object Oriented Metrics.
ACC (2)
(2011)
N. Sathisha
,
K. Suresh Babu
,
K. B. Raja
,
K. R. Venugopal
,
Lalit M. Patnaik
Covariance Based Steganography Using DCT.
ACC (2)
(2011)
Suchetana Chakraborty
,
Sushanta Karmakar
A Novel Approach for Adaptive Data Gathering in Sensor Networks by Dynamic Spanning Tree Switching.
ACC (2)
(2011)
Muhammad Awais
,
Ashwani Singh
,
Guido Masera
Scalable, High Throughput LDPC Decoder for WiMAX (802.16e) Applications.
ACC (2)
(2011)
Peter Joseph Basil Morris
,
Saikat Roy Chowdhury
,
Debasish Deb
An Efficent Methodology for Realization of Parallel FFT for Large Data Set.
ACC (2)
(2011)
Muhammad Tahir
,
Dominique Gaïti
,
Majid Iqbal Khan
SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents.
ACC (2)
(2011)
Abhishek Varshney
,
Mohammed Abdul Qadeer
Mobile Peer to Peer Spontaneous and Real-Time Social Networking.
ACC (2)
(2011)
Anjani Kumar Rai
,
Shivendu Mishra
,
Pramod Narayan Tripathi
An Improved Secure Authentication Protocol for WiMAX with Formal Verification.
ACC (2)
(2011)
Sneha G. Gondane
,
M. Dhivya
,
D. Shyam
Classifier Feature Extraction Techniques for Face Recognition System under Variable Illumination Conditions.
ACC (2)
(2011)
Sami J. Habib
,
Paulvanna Nayaki Marimuthu
,
Naser Zaeri
Green Communications through Network Redesign.
ACC (2)
(2011)
Ashfa Umber
,
Imran Sarwar Bajwa
,
M. Asif Naeem
NL-Based Automated Software Requirements Elicitation and Specification.
ACC (2)
(2011)
K. Saruladha
,
Gnanasekaran Aghila
,
A. Bhuvaneswary
Information Content Based Semantic Similarity Approaches for Multiple Biomedical Ontologies.
ACC (2)
(2011)
Aishwarya Nandakumar
,
P. Harmya
,
Noopa Jagadeesh
,
S. S. Anju
A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods.
ACC (2)
(2011)
Mukhtar Azeem
,
Majid Iqbal Khan
,
Arfan Nazir
File System Level Circularity Requirement.
ACC (2)
(2011)
Adity Saikia
,
Nayan M. Kakoty
,
Shyamanta M. Hazarika
Wavelet Selection for EMG Based Grasp Recognition through CWT.
ACC (2)
(2011)
Adity Saikia
,
Shyamanta M. Hazarika
Bispectrum Analysis of EEG in Estimation of Hand Movement.
ACC (2)
(2011)
Usha Banerjee
,
A. Swaminathan
An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures.
ACC (2)
(2011)
R. Jayaprakash
,
V. Uma
Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM.
ACC (2)
(2011)
Sharmishta Desai
,
R. K. Bedi
,
B. N. Jagdale
,
V. M. Wadhai
Elliptic Curve Cryptography for Smart Phone OS.
ACC (2)
(2011)
Tanusha S. Nadkarni
,
Radhesh Mohandas
,
Alwyn R. Pais
A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers.
ACC (2)
(2011)
P. Dharanyadevi
,
P. Dhavachelvan
,
S. K. V. Jayakumar
,
Ramachandran Baskaran
,
V. S. K. Venkatachalapathy
Proficient Discovery of Service in Event Driven Service Oriented Architecture.
ACC (2)
(2011)
Anand Singh Jalal
,
Vrijendra Singh
A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet Transform.
ACC (2)
(2011)
D. Devakumari
,
K. Thangavel
Unsupervised Modified Adaptive Floating Search Feature Selection.
ACC (2)
(2011)
Anjali Thukral
,
Varun Mendiratta
,
Abhishek Behl
,
Hema Banati
,
Punam Bedi
FCHC: A Social Semantic Focused Crawler.
ACC (2)
(2011)
Bhaskara Rao Boddu
,
Valli Kumari Vatsavayi
A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm.
ACC (2)
(2011)
Gustavo Jiménez
,
Yezid Donoso
Unique Mechanism of Selection of Traffic Flow Templates for Mobility IP Protocols Using Multihoming and IP Flow Mobility on the NGMN.
ACC (2)
(2011)
Ash Mohammad Abbas
,
Ravindra Kumar
A Client Perceived Performance Evaluation of Web Servers.
ACC (2)
(2011)
N. Kayarvizhy
,
S. Kanmani
An Automated Tool for Computing Object Oriented Metrics Using XML.
ACC (2)
(2011)
Imran Ahmed
,
Sunil Kumar Kopparapu
Enhanced Quality of Experience through IVR Mashup to Access Same Service Multiple Operator Services.
ACC (2)
(2011)
Foyzul Hassan
,
Mohammed Rokibul Alam Kotwal
,
Md. Mostafizur Rahman
,
Mohammad Nasiruddin
,
Md. Abdul Latif
,
Mohammad Nurul Huda
Local Feature or Mel Frequency Cepstral Coefficients - Which One Is Better for MLN-Based Bangla Speech Recognition?
ACC (2)
(2011)
Dewi Agushinta R.
,
Bima Shakti Ramadhan Utomo
,
Denny Satria
,
Jennifer Sabrina Karla Karamoy
,
Nuniek Nur Sahaya
The Smart Goal Monitoring System.
ACC (2)
(2011)
Deka Ganesh Chandra
,
Dutta Borah Malaya
ICT Its Role in e-Governance and Rural Development.
ACC (2)
(2011)
Suparna Biswas
,
Sarmistha Neogy
Secured Fault Tolerant Mobile Computing.
ACC (2)
(2011)
Paul Anu
,
Paul Varghese
Project Management Model for e-Governance in the Context of Kerala State.
ACC (2)
(2011)
Azzat A. Al-Sadi
,
El-Sayed M. El-Alfy
An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing.
ACC (2)
(2011)
Sugam Sharma
,
U. Sunday Tim
,
Shashi K. Gadia
,
Patrick Smith
Geo-spatial Pattern Determination for SNAP Eligibility in Iowa Using GIS.
ACC (2)
(2011)
Amitava Nag
,
Jyoti Prakash Singh
,
Srabani Khan
,
Saswati Ghosh
,
Sushanta Biswas
,
Debasree Sarkar
,
Partha Pratim Sarkar
A Weighted Location Based LSB Image Steganography Technique.
ACC (2)
(2011)
Pradipta K. Banerjee
,
Jayanta K. Chandra
,
Asit K. Datta
Face Detection and Eye Localization in Video by 3D Unconstrained Filter and Neural Network.
ACC (2)
(2011)
Zahid Akhtar
,
Sandeep Kale
Security Analysis of Multimodal Biometric Systems against Spoof Attacks.
ACC (2)
(2011)
Jan Vykopal
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks.
ACC (2)
(2011)
Harilal Parasuram
,
Bipin Nair
,
Krishnashree Achuthan
,
Shyam Diwakar
Taking Project Tiger to the Classroom: A Virtual Lab Case Study.
ACC (2)
(2011)
Vaithianathan Geetha
,
Niladhuri Sreenath
Deadlock Prevention in Distributed Object Oriented Systems.
ACC (2)
(2011)
Vikas Agarwal
,
Pansoo Kim
,
Deock-Gil Oh
,
Do-Seob Ahn
Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter for DVB-S2 Receivers.
ACC (2)
(2011)
C. K. Raju
,
Ashok Mishra
Enhancing Sustainability of Software: A Case-Study with Monitoring Software for MGNREGS in India.
ACC (2)
(2011)
Chhagan Lal
,
Vijay Laxmi
,
Manoj Singh Gaur
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs.
ACC (2)
(2011)
N. Sivakumar
,
K. Vivekanandan
,
S. Sandhya
Testing Agent-Oriented Software by Measuring Agent's Property Attributes.
ACC (2)
(2011)
volume 191, 2011
Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings
ACC (2)
191 (2011)