default search action
9th ICIT 2006: Orissa, India
- Saraju P. Mohanty, Anirudha Sahoo:
9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006. IEEE Computer Society 2006, ISBN 0-7695-2635-7
Bioinformatics and Computational Biology
- (Withdrawn) Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian scope. 3-6
- T. Sobha Rani, S. Durga Bhavani, Raju S. Bapi:
Promoter Recognition using dinucleotide Features : A Case Study for E.Coli. 7-10 - Anirban Mukhopadhyay, Ujjwal Maulik, Sanghamitra Bandyopadhyay:
Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data. 11-14 - Rudra N. Hota, Vijendran G. Venkoparao, Saad Bedros:
Face Detection by using Skin Color Model based on One Class Classifier. 15-16 - Anshu Bhardwaj, Shrish Tiwari:
Evaluating the Association of Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico Tool E-MIDAS. 17-20 - Laxmi Shankar Rath:
Ayurinformatics- the application of bioinformatics in the ayurvedic system of medicine. 21-25 - S. T. Patil, D. S. Bormane:
Electroencephalograph Signal Analysis During Bramari. 26-32
Communication Networks and Protocols
- Nejla Ghaboosi, Abolfazl Toroghi Haghighat:
A Tabu Search Based Algorithm for Multicast Routing with QoS Constraints. 33-39 - Vinod Kone, Sukumar Nandi:
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. 40-45 - Naval Bhandari, Anirudha Sahoo, Sridhar Iyer:
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency. 46-51 - Punit Rathod, Srinath Perur, Raghuraman Rangarajan:
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study. 52-55 - P. Sukendar Reddy, Nityananda Sarma, Rajib Kumar Das:
Enhancing Fault-Tolerance in a Distributed Mutual Exclusion Algorithm. 56-59 - R. Manoharan, P. Thambidurai:
Hypercube based Team Multicast Routing Protocol for Mobile Ad hoc Networks. 60-63 - Ash Mohammad Abbas:
Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks. 64-67 - Bhagi Sri Karthik, Manish Jaiswal, Vasant Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, Asoke K. Talukder, Debabrata Das:
Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks. 68-71 - Mayank Mishra, Anirudha Sahoo:
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs. 72-76 - Upinder Kaur, R. B. Patel:
Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach. 77-80 - Pabitra Mohan Khilar, Sudipta Mahapatra:
Design and Evaluation of a Distributed Diagnosis Algorithm in Dynamic Fault Environments For Not-Completely Connected Network. 81-82 - Minghui Zheng, Jianhua Zhu, Guohua Cui:
A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc Networks. 83-84 - Manju Sarvagya:
Uplink Shared Channel in 3rd Generation (UMTS) Cellular System: Performance Analysis and Enhancement. 85-86 - Muthu Tamilarasi, T. G. Palanivelu:
A Strategy to Reduce Control Packet Load of MANETs with Bidirectional Links using DSR. 87-88 - R. Anitha, N. Rajkumar:
Compensation Based Grid Scheduling. 89-93 - A. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty:
A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication Systems. 94-95 - N. Sreenath, Balaji Palanisamy:
Distributed Reconfiguration for Traffic Changes in IP-Over-WDM Networks. 96-97 - Rakesh Chandra Gangwar, Anil K. Sarje:
Complexity Analysis of Group Key Agreement Protocols for Ad Hoc Networks. 98-99 - Aditya Dhananjay, Debabrata Das:
Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs. 100-104
Language Processing
- Tapan Kumar Bhowmik, Swapan K. Parui, Ujjwal Bhattacharya, Bikash Shaw:
An HMM Based Recognition Scheme for Handwritten Oriya Numerals. 105-110 - K. Sreenivasa Rao, B. Yegnanarayana:
Voice Conversion by Prosody and Vocal Tract Modification. 111-116 - M. Ezhilarasan, P. Thambidurai:
A Hybrid Transform Coding for Video Codec. 117-120 - Sriparna Saha, Sanghamitra Bandyopadhyay, Ujjwal Maulik:
A New Symmetry Based Cluster Validity Index: Application to Satellite Image Segmentation. 121-124 - Chitta Baral, Luis Tari:
Using AnsProlog with Link Grammar and WordNet for QA with deep reasoning. 125-128 - Deepa P. Gopinath, J. Divya Sree, Reshmi Mathew, S. J. Rekhila, Achuthsankar S. Nair:
Duration Analysis for Malayalam Text-To-Speech Systems. 129-132 - Nabin Sharma, U. Pal, Fumitaka Kimura:
Recognition of Handwritten Kannada Numerals. 133-136 - Ujjwal Bhattacharya, Bikash Shaw, Swapan K. Parui:
Analysis of Error Sources Towards Improved Form Processing. 137-138 - Deepak Mishra, Naripeddy Subhash Chandra Bose, Arvind Tolambiya, Ashutosh Dwivedi, Prabhanjan Kandula, Ashiwani Kumar, Prem Kumar Kalra:
Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance Measures. 139-140 - Swarnajyoti Patra, Susmita Ghosh, Ashish Ghosh:
Unsupervised Change Detection in Remote-Sensing Images using One-dimensional Self-Organizing Feature Map Neural Network. 141-142 - Rajeswari Sridhar, T. V. Geetha:
Swara Indentification for South Indian Classical Music. 143-144 - Nagappa U. Bhajantri, P. Nagabhushan:
Camouflage Defect Identification: A Novel Approach. 145-148
Security, Content Protection, and Digital Rights Management
- Barzan Mozafari, Mohammad Hasan Savoji:
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. 149-154 - Rajdeep Chakraborty, J. K. Mandal:
A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT). 155-159 - Yunfang Feng, Zhiyuan Liu, Jun Li:
Securing Membership Control in Mobile Ad Hoc Networks. 160-163 - Dasari Shailaja, Phalguni Gupta:
A Simple Geometric Approach for Ear Recognition. 164-167 - G. Shailaja, K. Phani Kumar, Ashutosh Saxena:
Universal Designated Multi Verifier Signature without Random Oracles. 168-171 - A. Murali M. Rao:
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. 172-175 - Pawan Kumar Jha, Jyotsna Kumar Mandal:
Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key. 176-177 - Sarbjeet Singh, Seema Bawa:
Design of a Framework for Handling Security Issues in Grids. 178-179 - Atul Negi, B. Panigrahi, Munaga V. N. K. Prasad, Madhabananda Das:
A Palmprint Classification Scheme using Heart Line Feature Extraction. 180-181 - N. Nalini, G. Raghavendra Rao:
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. 182-185 - G. Geethakumari, Atul Negi, V. N. Sastry:
Indirect Authorization Topologies for Grid Access Control. 186-187 - Anirban Chakraborty, Arnab Chatterjee, S. K. Basu:
Performance of Various Cost Functions in the Search for Strong S-Boxes. 188-189 - Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury:
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. 190-191 - K. Ganesan, R. Anandan:
Version Control using Cryptographic Access Control. 192-196
Databases, Information Warehousing, and Data Mining
- R. Pradeep Kumar, P. Nagabhushan, Ahlame Douzal Chouakria:
WaveSim and Adaptive WaveSim Transform for Subsequence Time-Series Clustering. 197-202 - Li Junkui, Wang Yuanzhen, Li Xinping:
LB HUST: A Symmetrical Boundary Distance for Clustering Time Series. 203-208 - Saroj K. Meher, Ashish Ghosh, B. Uma Shankar, Lorenzo Bruzzone:
Neuro-Fuzzy Fusion: A New Approach to Multiple Classifier System. 209-212 - Navneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma:
Improved Bitmap Indexing Strategy for Data Warehouses. 213-216 - Ananta Charan Ojha, Sateesh Kumar Pradhan:
Fuzzy Linguistic Approach to Matchmaking in E-Commerce. 217-220 - Satchidananda Dehuri, Ashish Ghosh, Rajib Mall:
Particles with Age for Data Clustering. 221-224 - Shirish S. Sane, Ashok A. Ghatol:
Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers. 225-228 - R. Gururaj, P. Sreenivasa Kumar:
Cumulative Path Summary for Structurally Dynamic XML Documents. 229-230 - Rashid Ali, Mirza Mohd. Sufyan Beg:
Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique. 231-234 - Ranjit Abraham, Jay B. Simha, S. S. Iyengar:
A comparative analysis of discretization methods for Medical Datamining with Naïve Bayesian classifier. 235-236 - Prasanna H. Bammigatti, P. R. Rao:
GenericWA-RBAC: Role Based Access Control Model for Web Applications. 237-240 - M. V. Sudhamani, C. R. Venugopal:
Segmentation of Color Images using Mean Shift Algorithm for Feature Extraction. 241-242 - Ranjan Parekh:
Towards an Architecture of an Image Database. 243-244 - Jay B. Simha, S. S. Iyengar:
Fuzzy data mining for customer loyalty analysis. 245-246 - Saeed Hassan Hisbani:
A generic prototype for storing and querying XML documents in RDBMS using model mapping methods. 247-248 - Rajesh C. Dash, Chris Hubbard, Stanley J. Robboy, Alan D. Proia:
Designing the "Next Generation" of Medical Information Systems. 249-252
Application Specific Software and Hardware Systems
- Himanshu Thapliyal, Sumedha K. Gupta:
Design of Novel Reversible Carry Look-Ahead BCD Subtractor. 253-258 - Megha Kothari, Susmita Ghosh, Ashish Ghosh:
Aggregation Pheromone Density Based Clustering. 259-264 - Ash Mohammad Abbas, Vibhu Saujanya Sharma, Anoop Jain:
A Domain Based Prioritized Model forWeb Servers. 265-268 - Bikash Kanti Sarkar, Shahid Jamal, Bhagirath Kumar:
An efficient parallel algorithm for finding the largest and the second largest elements from a list of elements. 269-272 - Amir Kaivani, Ali Zakerolhosseini, Saeid Gorgin, Mahmood Fazlali:
Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R. 273-276 - Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Programmable Parallel Structure to perform Galois Field Exponentiation. 277-280 - Sriparna Saha, Susmita Sur-Kolay, Sanghamitra Bandyopadhyay, Parthasarathi Dasgupta:
Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI. 281-284 - Ravinder Thirumala, N. Usha Rani, Timothy A. Gonsalves:
An Event Notification Service based on XML Messaging on Different Transport Technologies. 285-288 - Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mikler, Elias Kougianos, Brandon Parker:
A High Performance ASIC for Cellular Automata (CA) Applications. 289-290 - Vandana Bhattacherjee:
The Soft Computing Approach to Program Development Time Estimation. 291-292 - Shang-Fang Tsai, Shanq-Jang Ruan:
DS2IS: Dictionary-based Segmented Signal Inversion Scheme for Low Power Dynamic Bus Design. 293-296 - Anirban Kundu, Ruma Dutta, Debajyoti Mukhopadhyay:
An Alternate Way to Rank Hyper-linked Web-Pages. 297-298 - Sumagna Patnaik:
Primitives for StructuredWorkflow Design: A Mathematical Specification and Analysis. 299-300 - Anita Das, B. S. Panda, Rajendra P. Lal:
A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphs. 301-304 - Swatee Rekha Mohanty, Durga Prasad Mohapatra, Himansu Sekhar Behara:
A Novel Approach for Static Slicing of Inter-Procedural Programs. 305-306
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.