​
Login / Signup
IC3 (2)
2010
2010
2010
Keyphrases
Publications
2010
Bharat Singh
,
Akash Bansal
,
Sunil Kumar
,
Anshu Garg
Analysis for Power Control and Security Architecture for Wireless Ad-Hoc Network.
IC3 (2)
(2010)
Gaurav Bansal
,
Deepak Vijayvargiya
,
Siddhant Garg
,
Sandeep Kumar Singh
An Approach to Identify and Manage Interoperability of Class Diagrams in Visual Paradigm and MagicDraw Tools.
IC3 (2)
(2010)
Balwinder Singh
,
Sukhleen Bindra Narang
,
Arun Khosla
Modeling and Simulation of Efficient March Algorithm for Memory Testing.
IC3 (2)
(2010)
Amit Prakash Singh
,
Pravin Chandra
,
Chandra Shekhar Rai
Sensitivity Measurement of Neural Hardware: A Simulation Based Study.
IC3 (2)
(2010)
Arun Prakash
,
Sarsij Tripathi
,
Rajesh Verma
,
Neeraj Tyagi
,
Rajeev Tripathi
,
Kshirasagar Naik
A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks.
IC3 (2)
(2010)
Hemant Kumar Mehta
,
Priyesh Kanungo
,
Manohar Chandwani
Maximum Utility Meta-Scheduling Algorithm for Economy Based Scheduling under Grid Computing.
IC3 (2)
(2010)
Narmada Nayak
,
Durga Prasad Mohapatra
Automatic Test Data Generation for Data Flow Testing Using Particle Swarm Optimization.
IC3 (2)
(2010)
Sandeep K. Singh
,
Sangeeta Sabharwal
,
J. P. Gupta
Event-Based Metric for Computing System Complexity.
IC3 (2)
(2010)
Sanchit Bansal
Multiple Polymorphic Arguments in Single Dispatch Object Oriented Languages.
IC3 (2)
(2010)
Shireesh Asthana
,
Saurabh Tripathi
,
Sandeep Kumar Singh
A Novel Approach to Generate Test Cases Using Class and Sequence Diagrams.
IC3 (2)
(2010)
Sanketh Datla
,
Rajdeep Niyogi
An Accelerated MJPEG 2000 Encoder Using Compute Unified Device Architecture.
IC3 (2)
(2010)
Akshara Pande
,
Manjari Gupta
,
Anil Kumar Tripathi
A New Approach for Detecting Design Patterns by Graph Decomposition and Graph Isomorphism.
IC3 (2)
(2010)
Gaurav Somani
,
Sanjay Chaudhary
Load Balancing in Xen Virtual Machine Monitor.
IC3 (2)
(2010)
Abhiram Kasina
,
Amit Suthar
,
Rajeev Kumar
Detection of Polymorphic Viruses in Windows Executables.
IC3 (2)
(2010)
Ashutosh Gupta
,
Vinay Rishiwal
,
Suneeta Agarwal
Efficient Storage of Massive Biological Sequences in Compact Form.
IC3 (2)
(2010)
Ashish Tanwer
,
Muzahid Hussain
,
Parminder Singh Reel
Aerial Vehicle Based Sensing Framework for Structural Health Monitoring.
IC3 (2)
(2010)
Dheerendra Singh Gangwar
,
Davinder Singh Saini
Arrogyam: Arrhythmia Detection for Ambulatory Patient Monitoring.
IC3 (2)
(2010)
Praveen Ranjan Srivastava
Test Process Model with Enhanced Approach of State Variable.
IC3 (2)
(2010)
Urmila Meshram
,
R. R. Harkare
,
Devendra Meshram
Hardware and Software Co-Design for Robot Arm.
IC3 (2)
(2010)
Pawan Kumar
,
Rashid Ahmad
,
Arun Kumar Rathaur
,
Mukul K. Sinha
,
Rajeev Sangal
Re-engineering Machine Translation Systems through Symbiotic Approach.
IC3 (2)
(2010)
Manoj Kumar
,
Aayushi Balyan
Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.
IC3 (2)
(2010)
Sweta Verma
,
Ranjit Biswas
,
J. B. Singh
Extension of Superblock Technique to Hyperblock Using Predicate Hierarchy Graph.
IC3 (2)
(2010)
Shrirang Ambaji Kulkarni
,
G. Raghavendra Rao
Vehicular Ad Hoc Network Mobility Models Applied for Reinforcement Learning Routing Algorithm.
IC3 (2)
(2010)
volume 95, 2010
Contemporary Computing - Third International Conference, IC3 2010, Noida, India, August 9-11, 2010, Proceedings, Part II
IC3 (2)
95 (2010)