default search action
9. QSHINE 2013: Greader Noida, India
- Karan Singh, Amit K. Awasthi:
Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 115, Springer 2013, ISBN 978-3-642-37948-2
Network
- Rahul Johari, Neelima Gupta, Sandhya Aneja:
DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers. 1-15 - Karan Singh, Rama Shankar Yadav:
Integrated Approach for Multicast Source Authentication and Congestion Control. 16-30 - Rajeev Agrawal, Amit Sehgal:
Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter. 31-41 - Gayatri Sakya, Vidushi Sharma:
Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2). 42-51 - Bahuguna Renu, Hardwari Lal Mandoria, Tayal Pranavi:
Routing Protocols in Mobile Ad-Hoc Network: A Review. 52-60 - Jolly Parikh, Anuradha Basu:
Carrier Aggregation for Enhancement of Bandwidth in 4G Systems. 61-74 - Anubhuti Roda Mohindra, Charu Kumar:
A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks. 75-85 - Chandan Kumar Sonkar, Om Prakash Sangwan, Arun Mani Tripathi:
Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks. 86-103 - Raju Pal, Ritu Sindhu, Ajay K. Sharma:
SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNs. 104-114 - Anil Kumar Sagar, D. K. Lobiyal:
Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network. 115-127 - Tamoghna Ojha, Sudip Misra:
HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks. 128-140 - Puneet Azad, Vidushi Sharma:
Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks. 141-154 - Sarbari Mitra, Sourav Mukhopadhyay:
Key Pre-distribution in a Non-uniform Network Using Combinatorial Design. 155-170 - Seyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala:
FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks. 171-184 - Rajesh Duvvuru, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju:
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. 185-196 - Prabhat Kumar Sharma, Parul Garg:
The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading Channels. 197-206 - Sohan Kumar Yadav, D. K. Lobiyal:
Power Efficient MAC Protocol for Mobile Ad Hoc Networks. 207-217 - Akanksha Bhardwaj, Prachi Badera, K. Rajalakshmi:
Fault Tolerant Range Grouping Routing in Dynamic Networks. 218-227 - Arup Kr. Chattopadhyay, Chandan Kr. Bhattacharyya:
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units. 228-237 - Samayveer Singh, Satish Chand, Bijendra Kumar:
3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs. 238-247 - Manish Kumar, Itika Gupta, Sudarshan Tiwari, Rajeev Tripathi:
A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks. 248-260 - Ratnesh Prasad Srivastava, Hardwari Lal Mandoria, Rajesh Nautiyal:
Mobile Based Attendance System in Distributed LAN Server. 261-272
Robustness
- Shyam Lal, Rahul Kumar, Mahesh Chandra:
An Improved Method for Contrast Enhancement of Real World Hyperspectral Images. 273-282 - Rohtash Dhiman, Priyanka, Jasbir Singh Saini:
Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram. 283-289 - Sanjeev Jain, Indrasen Singh, Vijay Shanker Tripathi, Sudarshan Tiwari:
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application. 290-297 - P. Mahesha, D. S. Vinod:
Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVM. 298-308 - Reema Aswani, N. Hema:
RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers. 309-324 - Amir Khan, Mohd. Hasan, Anwar Sadat, Shamsuz Z. Usmani:
6H-SiC Based Power VJFET and Its Temperature Dependence. 325-332 - Akansha Mehrotra, Krishna Kant Singh, Kirat Pal, M. J. Nigam:
Change Detection from Satellite Images Using PNN. 333-340 - Rajendra P. Payasi, Asheesh Kumar Singh, Devender Singh:
Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load Models. 341-357 - Indrasen Singh, Sanjeev Jain, Vijay Shanker Tripathi, Sudarshan Tiwari:
Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell. 358-364 - Bhavnesh Kumar, Yogesh Kumar Chauhan, Vivek Shrivastava:
Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System. 365-376 - Himani Mittal, Dinesh Chandra, Arvind Tiwari:
Design of Low Power FSM Using Verilog in VLSI. 377-386 - Farid Arfi, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
Pruning Search Spaces of RATA Model for the Job-Shop Scheduling. 387-401 - Goutam Datta, Bushan L. Raina:
Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs. 402-414 - Suddhasil De, Diganta Goswami, Sukumar Nandi:
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks. 415-430 - Ajay Kumar Maurya, Yogesh Kumar Chauhan:
Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter. 431-440 - Manoj Pandey, Dorothi Borgohain, Gargi Baruah, Jagpal Singh Ubhi, Kota Solomon Raju:
Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft Processor. 441-450 - Asutosh Kar, Mahesh Chandra:
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection. 451-460
Security
- Mayank Tiwari, Rajeshwar Kumar, Shaivya Jindal, Pankaj Sharma, Priyanshu:
An Efficient and Secure Micro-payment Transaction Using Shell Cryptography. 461-469 - Navaid Z. Rizvi, Raaziyah Shamim, Rajesh Mishra, Sandeep Sharma:
High Speed Reconfigurable FPGA Based Digital Filter. 470-478 - Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna, N. Saraf, Anant Gupta, Rajesh Mishra:
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System. 479-484 - Kumar Chanchal, D. K. Lobiyal:
NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack. 485-495 - D. Chandramohan, T. Vengattaraman, D. Rajaguru, Ramachandran Baskaran, P. Dhavachelvan:
A Privacy Preserving Representation for Web Service Communicators' in the Cloud. 496-506 - Niranjan Lal, Shamimul Qamar, Mayank Singh:
Detailed Dominant Approach Cloud Computing Integration with WSN. 507-516 - Tapasi Bhattacharjee, Jyoti Prakash Singh:
Secret Image Sharing Scheme Based on Pixel Replacement. 517-526 - Pritom Rajkhowa, Shyamanta M. Hazarika, Guillermo Ricardo Simari:
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. 527-542 - Shalini Bhartiya, Deepti Mehrotra:
Threats and Challenges to Security of Electronic Health Records. 543-559 - Deep Singh, Maheshanand Bhaintwal:
On Second-Order Nonlinearities of Two Classes of Cubic Boolean Functions. 560-567 - Dheerendra Mishra, Sourav Mukhopadhyay:
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System. 568-577 - Narayan Gowraj, Srinivas Avireddy, Sruthi Prabhu:
GAS: A Novel Grid Based Authentication System. 578-590 - Jyotsna Singh, Parul Garg, Alok Nath De:
Multiplicative Watermarking of Audio in Spectral Domain. 591-605 - Karanbir Singh, Navdeep Kaur, Deepa Nehra:
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes. 606-616 - Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. 617-632 - Rohit Ranchal, Bharat K. Bhargava:
Protecting PLM Data Throughout Their Lifecycle. 633-642 - Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. 643-657 - Yashpal Dutta, Varun Sethi:
Performance Analysis of Cryptographic Acceleration in Multicore Environment. 658-667 - Sandeep Sharma, Rajesh Mishra, Karan Singh:
A Review on Wireless Network Security. 668-681 - Sahadeo Padhye, Namita Tiwari:
Improved Proxy Signature Scheme without Bilinear Pairings. 682-688 - Arvind Kumar, Pawan Singh Mehra, Gagan Gupta, Manika Sharma:
Enhanced Block Playfair Cipher. 689-695 - A. Balu, Kuppusamy Krishnamoorthy:
Ciphertext-Policy Attribute-Based Encryption with User Revocation Support. 696-705 - Ashok Kumar Nanda, Lalit Kumar Awasthi:
A Proposal for SMS Security Using NTRU Cryptosystem. 706-718 - Sonam Devgan Kaul, Amit K. Awasthi:
Analysis and Improvement of an Authentication Scheme Using Smart Cards. 719-728 - Keerti Srivastava, Amit K. Awasthi, R. C. Mittal:
A Review on Remote User Authentication Schemes Using Smart Cards. 729-749 - Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks. 750-763 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
Image Secret Sharing in Stego-Images with Authentication. 764-770 - Ankita Chaturvedi, Aditi Kar Gangopadhyay:
On Generalized Nega-Hadamard Transform. 771-777 - Kirat Pal Singh, Shivani Parmar, Dilip Kumar:
Design of High Performance MIPS Cryptography Processor. 778-793 - Arup Kumar Pal, Tarok Pramanik:
Design of an Edge Detection Based Image Steganography with High Embedding Capacity. 794-800 - Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani:
Trust Management Method for Vehicular Ad Hoc Networks. 801-815 - Dhiraj Pandey, Anil Kumar, Yudhvir Singh:
Feature and Future of Visual Cryptography Based Schemes. 816-830 - Gambhir Mohit, M. N. Doja, Moinuddin:
A Novel Framework for Users' Accountability on Online Social Networks. 831-841 - Dindayal Mahto, Dilip Kumar Yadav:
Network Security Using ECC with Biometric. 842-853 - Ravi Kishore Kodali, Sushant Chougule:
Hybrid Key Management Technique for WSN's. 854-865 - Nagaraj Ambika, G. T. Raju:
DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. 866-878 - Manisha Manjul, Rakesh Kumar, Rajesh Mishra:
Security Improvement in Group Key Management. 879-893 - Niranjan Lal, Shamimul Qamar, Mayank Singh:
Detailed Dominant Approach Cloud Computing Integration with WSN. 894-903
Reliability
- Rudra Pratap Ojha, Rama Shankar Yadav, Sarsij Tripathi:
Secure Real Time Scheduling on Cluster with Energy Minimization. 904-914 - Babu Sean Paul, Suvendi Rimer:
Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding Vegetation. 915-927 - Remani Naga Venkata Jagan Mohan, Vegi Srinivas, Kurra Rajasekhara Rao:
Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-Peer. 928-938 - Mohd Ashraf, Rajesh Mishra:
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability. 939-950 - Devpriya Soni:
Evaluation of Understandability of Object-Oriented Design. 951-961 - Ajeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith:
Safety Analysis of Automatic Door Operation for Metro Train: A Case Study. 962-974 - Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:
A Generalized Model for Internet-Based Access Control Systems with Delegation Support. 975-988
Quality of Service
- Pooja Gupta, Brijesh Kumar, Bushan L. Raina:
QoS Support Downlink for WiMAX Network. 989-997 - Akhilendra Pratap Singh, O. P. Vyas, Shirshu Varma:
A Framework of Service Selection and Composition for Flexible Network Architecture. 998-1007
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.