Login / Signup
ADCONS
2011
2013
2011
2013
Keyphrases
Publications
2013
S. Stephen Vaithiya
,
S. Mary Saira Bhanu
Ontology Based Resource Discovery Mechanism for Mobile Grid Environment.
ADCONS
(2013)
Ajay Prasad
,
Divya Gupta
,
Prasun Chakrabarti
Monitoring Users in Cloud Computing: Evaluating the Centralized Approach.
ADCONS
(2013)
M. Surendar
,
P. Muthuchidambaranathan
Channel Coded STBC-OFDM Based Transmit Diversity Systems in Multipath Rayleigh-Fading Channels.
ADCONS
(2013)
B. Naresh Kumar Reddy
,
M. Naraimhulu
,
S. V. Sai Prasad
,
K. Khaja Babu
An Efficient Online Mileage Indicator by Using Sensors for New Generation Automobiles.
ADCONS
(2013)
Udaya M. Visweswara
,
Atul Gohad
,
Sachin Kumar Yadav
,
N. V. S. Karthik
,
S. Mahesh Babu
Smarter Commerce: NLP SpokenWeb Based B2B Messaging.
ADCONS
(2013)
K. Srinivas
,
A. Venugopal Reddy
,
A. Nagaraju
Network Coding-Aware Neighbor Based Topology Control in MANETs.
ADCONS
(2013)
Shilpi Bose
,
Chandra Das
,
Tamaghna Gangopadhyay
,
Samiran Chattopadhyay
A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data.
ADCONS
(2013)
Demian Antony D'Mello
,
Mevida S. Crasta
,
Roanne N. Gomes
,
V. Abhishiktha
,
Shareeta J. D'Souzav
A Broker Based E-learning Service Integration and Execution Architecture for the Complex Requirements on Learning Resources.
ADCONS
(2013)
Abhijit Das
,
Shibendu Debbarma
Performance of Jumbo Sized Data on Jumbo Frame and Ethernet Frame Using UDP over IPv4/IPv6.
ADCONS
(2013)
Ramanna Havinal
,
Girish V. Attimarad
,
M. N. Giriprasad
Empirical Power Control Schema Using Physical Layer Optimization in MANET.
ADCONS
(2013)
Jayalakshmi G. Naragund
,
R. M. Banakar
Analysis of HWMP-ETX Routing in Wireless Mesh Networks.
ADCONS
(2013)
Nidhi Grover
,
Amar Kumar Mohapatra
Digital Image Authentication Model Based on Edge Adaptive Steganography.
ADCONS
(2013)
Shrinivas D. Desai
,
Kavita V. Horadi
,
P. Navaneet
,
B. Niriksha
,
V. Siddeshvar
Detection and Removal of Cracks from Digitized Paintings and Images by User Intervention.
ADCONS
(2013)
M. Geetha
,
P. V. Aswathi
,
M. R. Kaimal
A Stroke Based Representation of Indian Sign Language Signs Incorporating Global and Local Motion Information.
ADCONS
(2013)
Sridevi Saralaya
,
Rio G. L. D'Souza
A Review of Monitoring Techniques for Service Based Applications.
ADCONS
(2013)
Debasis Das
,
Rajiv Misra
Improvised k-hop Neighbourhood Knowledge Based Routing in Wireless Sensor Networks.
ADCONS
(2013)
Melwyn D'Souza
,
V. S. Ananthanarayana
Cloud Based Service Registry for Location Based Mobile Web Services System.
ADCONS
(2013)
Prabhjot Singh
,
Beerappa R. Chandavarkar
,
Srishti Arora
,
Neha Agrawal
Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution.
ADCONS
(2013)
A. Sharath Kumar
,
Sanjay Singh
Detection of User Cluster with Suspicious Activity in Online Social Networking Sites.
ADCONS
(2013)
M. Reenu
,
Dayana David
,
S. S. Aneesh Raj
,
Madhu S. Nair
Wavelet Based Sharp Features (WASH): An Image Quality Assessment Metric Based on HVS.
ADCONS
(2013)
Sunil F. Rodd
,
Umakanth P. Kulkarni
Adaptive Self-Tuning Techniques for Performance Tuning of Database Systems: A Fuzzy-Based Approach.
ADCONS
(2013)
Gurpreet Singh
,
Supriya
Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES.
ADCONS
(2013)
Ravitheja Tetali
,
Joy Bose
,
Tasleem Arif
Browser with Clustering of Web Documents.
ADCONS
(2013)
P. Sudheer Reddy
,
Palanisamy Ponnusamy
Multitaper Spectrum Sensing Using Sinusoidal Tapers.
ADCONS
(2013)
Amit Kr Mandal
,
Suvamoy Changder
,
Anirban Sarkar
Selection of Services for Data-Centric Cloud Applications: A QoS Based Approach.
ADCONS
(2013)
P. V. Sudeep
,
Palanisamy Ponnusamy
,
Jeny Rajan
A Hybrid Model for Rician Noise Reduction in MRI.
ADCONS
(2013)
Kapil Agarwal
,
Durga Toshniwal
,
Pramod K. Gupta
,
Vikas Khurana
,
Pushp Upadhyay
Anomaly Detection and Similarity Search in Neutron Monitor Data for Predictive Maintenance of Nuclear Power Plants.
ADCONS
(2013)
Varun P. Gopi
,
M. Pavithran
,
T. Nishanth
,
S. Balaji
,
V. Rajavelu
,
Ponnusamy Palanisamy
Image Denoising Based on Undecimated Double Density Dual Tree Wavelet Transform and Modified Firm Shrinkage.
ADCONS
(2013)
S. Dere Kundan
,
G. Ram Mohana Reddy
Projection and Interaction with Ad-hoc Interfaces on Non-planar Surfaces.
ADCONS
(2013)
Rekha Bhatia
,
Manpreet Singh
Trust Based Privacy Preserving Access Control in Web Services Paradigm.
ADCONS
(2013)
Dipin Kollencheri Puthenveettil
,
Ankur Chauhan
Peer-to-Peer and Cellular Connection Management.
ADCONS
(2013)
Kavitha Ammayappan
Seamless Interoperation of LTE-UMTS-GSM requires Flawless UMTS and GSM.
ADCONS
(2013)
Yogesh H. Dandawate
,
Sneha Kinlekar
Rivers and Coastlines Detection in Multispectral Satellite Images Using Level Set Method and Modified Chan Vese Algorithm.
ADCONS
(2013)
V. Spoorthi
,
Balaji Rajendran
,
K. Chandrasekaran
Key Update Mechanism in PKI: Study and a New Approach.
ADCONS
(2013)
S. R. Surya
,
Philomina Simon
Automatic Cloud Detection Using Spectral Rationing and Fuzzy Clustering.
ADCONS
(2013)
Dharavath Ramesh
,
Chiranjeev Kumar
A Scalable Matching Approach Based Density Function for Heterogeneous Database Integration.
ADCONS
(2013)
2013 2nd International Conference on Advanced Computing, Networking and Security, Mangalore, India, December 15-17, 2013
ADCONS
(2013)
D. G. Narayan
,
Uma Mudengudi
,
G. Pavan
,
S. Suraj
CL-ILD: A Cross Layer Interference-Load and Delay Aware Routing Metric for Multi-radio Wireless Mesh Network.
ADCONS
(2013)
Ram Prasad Mohanty
,
Ashok Kumar Turuk
,
Bibhudatta Sahoo
Performance Evaluation of Multi-core Processors with Varied Interconnect Networks.
ADCONS
(2013)
Dharmeet Singh Hora
,
Piyush Bansal
,
Kishore Kothapalli
,
Kannan Srinathan
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results.
ADCONS
(2013)
Anila Thankappan
,
M. Wilscy
(2, 3) RIVC Scheme in Visual Cryptography without Pixel Expansion.
ADCONS
(2013)
Ganesh Dadaji Sonwane
,
Beerappa R. Chandavarkar
Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network.
ADCONS
(2013)
Manoj V. Thomas
,
K. Chandra Sekaran
An Access Control Model for Cloud Computing Environments.
ADCONS
(2013)
Parvez Faruki
,
Vijay Laxmi
,
Vijay Ganmoor
,
Manoj Singh Gaur
,
Ammar Bharmal
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
ADCONS
(2013)
Tanushri Mittal
,
Anurag Barthwal
,
Shashidhar G. Koolagudi
Age Approximation from Speech Using Gaussian Mixture Models.
ADCONS
(2013)
Steven Lawrence Fernandes
,
G. Josemin Bala
,
P. Nagabhushan
,
S. K. Mandal
Robust Face Recognition in the Presence of Noises and Blurring Effects by Fusing Appearance Based Techniques and Sparse Representation.
ADCONS
(2013)
Tushar Bisht
,
Kishore Kothapalli
An Empirical Study of Two MIS Algorithms.
ADCONS
(2013)
P. Syam Kumar
,
R. Subramanian
,
D. Thamizh Selvam
An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing.
ADCONS
(2013)
volume 7135, 2012
Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers
ADCONS
7135 (2012)
2011
S. Benson Edwin Raj
,
V. S. Jayanthi
,
V. Muthulakshmi
A Novel Architecture for the Generation of Picture Based CAPTCHA.
ADCONS
(2011)