default search action
7th CIT 2004: Hyderabad, India
- Gautam Das, Ved Prakash Gulati:
Intelligent Information Technology, 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, December 20-23, 2004, Proceedings. Lecture Notes in Computer Science 3356, Springer 2004, ISBN 3-540-24126-4
Computational Intelligence
- Rajkumar Kannan, Balakrishnan Ramadoss, Krishnamurthi Ilango:
An Approach for Conceptual Modeling and Extracting Expressive Semantics from Dance Videos. 1-10 - Jae-Hong Eom, Byoung-Tak Zhang:
BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis Platform. 11-20 - B. S. Panda, Anita Das:
A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees. 21-30 - E. Ilavarasan, P. Thambidurai, N. Punithavathi:
Task Scheduling Algorithm for Interconnection Constrained Network of Heterogeneous Processors. 31-39
Neural Networks
- Arijit Laha:
Detecting Topology Preserving Feature Subset with SOM. 40-48 - Jae-Hong Eom, Byoung-Tak Zhang:
Adaptive Neural Network-Based Clustering of Yeast Protein-Protein Interactions. 49-57 - A. H. Abdul Hafez, Ahmed Alrabie, Arun Agarwal:
Design of Neuro-fuzzy Controller Based on Dynamic Weights Updating. 58-67 - Raquel E. Patiño-Escarcina, Benjamín René Callejas Bedregal, Aarão Lyra:
Interval Computing in Neural Networks: One Layer Interval Neural Networks. 68-75
Communication Networks
- Chittaranjan Hota, G. Raghurama:
Design and Deployment of IP Virtual Private Networks: A Case Study. 76-86 - R. Manoharan, P. Thambidurai, S. Pradhiba:
QoS Driven Online Multicast Routing Algorithm. 87-96 - Kerem Küçük, Mustafa Karakoç, Adnan Kavak:
Software Radio Implementation of a Smart Antenna System on Digital Signal Processors for cdma2000. 97-106 - Subrata Nandi, Manish K. Raushan:
An Efficient Cost Effective Location Management Scheme Based on Velocity Vector Information of Mobile Unit. 107-116 - Feng Xia, Zhi Wang, Youxian Sun:
Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology. 117-125
Mobile and Adhoc Networks
- Susmit Bagchi:
Designing Mobile Distributed Virtual Memory System. 126-136 - Khaled Ahmed Abood Omer, D. K. Lobiyal:
Efficient Grid Location Update Scheme for Mobile Ad Hoc Networks. 137-146 - Ahmed H. Salem, Anup Kumar:
Power Optimization in Mobile Networks Using Genetic Algorithm to Guarantee QoS. 147-159 - Chinnappan Jayakumar, Chenniappan Chellappan:
Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks. 160-168 - Panneer Pandi Gnana Durai, Ranjani Parthasarathy:
Self-organized Security Architecture for MANET. 169-179 - S. S. Thakur, Subrata Nandi, Diganta Goswami, R. Bhattacharjee:
Clock Synchronization in IEEE 802.11 Ad Hoc Networks. 180-189
Security
- Durga Prasad Dube, S. Ramanarayanan:
Internet Banking - A Layered Approach to Security. 190-197 - Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi:
On Reduction of Bootstrapping Information Using Digital Multisignature. 198-204 - Abhimanyu Lad:
SpamNet - Spam Detection Using PCA and Neural Networks. 205-213 - V. Anil Kumar, Dorgham Sisalem:
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. 214-223 - Sanjay Rawat, Challa S. Sastry:
Network Intrusion Detection Using Wavelet Analysis. 224-232 - Shivakant Mishra:
Building a Secure and Highly Scalable Data Distribution System. 233-242
Database
- Jan Lindström:
Performance of Distributed Optimistic Concurrency Control in Real-Time Databases. 243-252 - S. K. Jain, M. M. Gore, Gulab Singh:
An Extension to ER Model for Top-Down Semantic Modeling of Databases of Applications. 253-262 - Ravindranath Jampani, Risivardhan Thonangi, Prosenjit Gupta:
Overlaying Multiple Maps Efficiently. 263-272
Software Engineering
- Young-Gook Ra:
Relational Schema Evolution for Program Independency. 273-281 - P. Dhavachelvan, G. V. Uma:
Reliability Enhancement in Software Testing - An Agent-Based Approach for Complex Systems. 282-291 - Rami Rifaieh, Ahmed Arara, Aïcha-Nabila Benharkat:
MurO: A Multi-representation Ontology as a Foundation of Enterprise Information Systems. 292-301 - S. Sarala, S. Valli:
A Tool to Automatically Detect Defects in C++ Programs. 302-314 - Mansour H. Assaf, Rami S. Abielmona, Payam Abolghasem, Sunil R. Das, Emil M. Petriu, Voicu Groza, Mehmet Sahinoglu:
Implementation of Embedded Cores-Based Digital Devices in JBits Java Simulation Environment. 315-325 - Artur Boronat, Isidro Ramos, José A. Carsí:
Automatic Model Generation in Model Management. 326-335
Signal and Image Processing
- B. S. Raghavendra, P. Subbanna Bhat:
Contourlet Based Multiresolution Texture Segmentation Using Contextual Hidden Markov Models. 336-343 - Saraju P. Mohanty, Renuka Kumara C., Sridhara Nayak:
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder. 344-353 - R. Ponnusamy, T. V. Gopal:
Multi-agent Based User Access Patterned Optimal Content Allocation Method for Federated Video Digital Libraries. 354-365 - Shiyan Hu, Han Huang:
Optimizing Surplus Harmonics Distribution in PWM. 366-375 - Priyatam Kumar, R. M. Banakar, B. Shankaranand:
M-BCJR Based Turbo Equalizer. 376-386
Internet and WWW-Based Computing
- R. V. R. P. Kumar, V. Radha:
YALXP: Yet Another Lightweight XPath Processor. 387-399 - D. Evangelin Geetha, T. V. Suresh Kumar, K. Rajani Kanth:
Early Performance Modeling for Web Based Applications. 400-409 - Sukunesan Sinnappan, Jamie Carlson:
An Examination of Website Quality Dimensions in Australian e-Retailing: A Confirmatory Factor Analysis Approach. 410-418 - Balakrishnan Ramadoss, S. R. Balasundaram:
Aspects of Pervasive Computing for Web Based Learning. 419-425
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.