default search action
BAIP 2010: Trivandrum, Kerala, India
- Vinu V. Das, R. Vijayakumar, Narayan C. Debnath, Janahanlal Stephen, Natarajan Meghanathan, Suresh Sankaranarayanan, P. M. Thankachan, Ford Lumban Gaol, Nessy Thankachan:
Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings. Communications in Computer and Information Science 70, Springer 2010, ISBN 978-3-642-12213-2 - Swanirbhar Majumder, Tirtha Shankar Das, Vijay Harishchandra Mankar, Subir Kumar Sarkar:
SVD and Neural Network Based Watermarking Scheme. 1-5 - Akshi Kumar, Mahinder Pal Singh Bhatia:
Improved Web Precision: An Interplay of Proximity Heuristics and Semantic Association of Query-Terms. 6-11 - Navneet Tiwari, Siddarth Jain, Saifuddin Tariwala, Ankit Salgia:
Network Management Initialization for Wired and Wireless Communication: A Real Time Study. 12-16 - J. Gnana Jayanthi, S. Albert Rabara:
IMM-I46: Inter Mobility Management for an Integrated IPv4 and IPv6 Network. 17-21 - Srinivas Sethi, Siba K. Udgata:
An Efficient Multicast Hybrid Routing Protocol for MANETs. 22-27 - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Applications of Graph Theory in Face Biometrics. 28-33 - Anil Kumar, Mrinal Kanti Ghose:
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map. 34-38 - Srinivas Sethi, Ashima Rout, Dipti Mohanta, Aayush Behera, Manmath Narayan Sahoo:
Hybrid Activities of AODV for Wireless Ad hoc Sensor Network. 39-44 - Shatha J. Kadhim, Kasim M. Al-Aubidy:
Design and Evaluation of a Fuzzy-Based CPU Scheduling Algorithm. 45-52 - Prasad Naik Hamsavath, G. V. Singh, Sanjay K. Dhurandher:
Object Location in Cluster Based Mobile Ad Hoc Networks. 53-59 - Alok Joshi, Davinder S. Saini:
Performance Analysis of Coded OFDM for Various Modulation Schemes in 802.11a Based Digital Broadcast Applications. 60-64 - Davinder S. Saini, Vipin Balyan, Kanika Mittal, Mansi Saini, Manika Kishore:
Fast OVSF Code Assignment Scheme for WCDMA Wireless Networks. 65-70 - Rajib Kar, Vikas Maheshwari, Md. Maqbool, Ashish Kumar Mal, A. K. Bhattacharjee:
A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects. 71-75 - K. Srinivasan, M. Ramasubba Reddy:
Wavelet-Domain L ∞ -Constrained Two-Stage Near-Lossless EEG Coder. 76-80 - Jayashree D. Mallapur, Syed Abidhusain, Soumya S. Vastrad, Ajayakumar Katageri:
Fuzzy Based Bandwidth Management for Wireless Multimedia Networks. 81-90 - Jagadish H. Pujar, D. S. Shambhavi:
A Novel Digital Algorithm for Sobel Edge Detection. 91-95 - B. Kavitha, S. Karthikeyan, B. Chitra:
Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison. 96-101 - Anup Nandy, Jay Shankar Prasad, Soumik Mondal, Pavan Chakraborty, Gora Chand Nandi:
Recognition of Isolated Indian Sign Language Gesture in Real Time. 102-107 - Megalingam Rajesh Kannan, M. Arunkumar, V. Arjun Ashok, Krishnan Nived, C. J. Daniel:
Power-Efficient Cache Design Using Dual-Edge Clocking Scheme in Sun OpenSPARC T1 and Alpha AXP Processors. 108-113 - Megalingam Rajesh Kannan, K. B. Deepu, Joseph P. Iype, Ravishankar Parthasarathy, Popuri Gautham:
Power Consumption Analysis of Direct, Set Associative and Phased Set Associative Cache Organizations in Alpha AXP 21064 Processor. 114-119 - Alex Pappachen James, Sima Dimitrijev:
Role of Resolution in Noisy Pattern Matching. 120-124 - V. Ruckmani, G. Sudha Sadasivam:
Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security. 125-129 - Deepak Vidhate, Anita Patil, Supriya Sarkar:
Bandwidth Estimation Scheme for Mobile Adhoc Network. 130-135 - P. Viswanathan, P. Venkata Krishna, S. Hariharan:
Multimodal Biometric Invariant Moment Fusion Authentication System. 136-143 - Anjali Naik, Shubhangi Vinayak Tikhe, S. D. Bhide:
Histogram Equalization for Class-Identification of Dental Disease Using Digital Radiography. 144-151 - Bikesh Kumar Singh, G. R. Sinha, Imroze Khan:
Comparison of Histogram and Spatiograms for Content Based Retrieval of Remote Sensing Images. 152-156 - H. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge:
Vector Quantization for Tumor Demarcation of Mammograms. 157-163 - L. M. Varalakshmi, G. Florence Sudha:
Selective Encryption of Video Using Multiple Chaotic Maps. 164-168 - Neeta S. Bosamiya, Devesh C. Jinwala:
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks. 169-174 - Parma Nand, Sunita Sharma, Rani Astya:
Tracking Based Secure AODV Routing Protocol. 175-180 - V. V. R. Maheswara Rao, V. Valli Kumari, K. V. S. V. N. Raju:
Study of Visitor Behavior by Web Usage Mining. 181-187 - N. Sengottaiyan, R. M. Somasundaram, Balasubramanie:
A Hybrid Routing Protocol for Wireless Sensor Network. 188-193 - D. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju:
Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring. 194-201 - A. K. Dwivedi, V. K. Patle, O. P. Vyas:
Investigation on Effectiveness of Simulation Results for Wireless Sensor Networks. 202-208 - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:
A Novel Multipath Routing Scheme in Mobile Adhoc Networks. 209-216 - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:
A Novel Security Approach for Detecting Black Hole Attack in MANET. 217-223 - Neera Batra, A. K. Kapil:
NEEMON Algorithm Based on Data Locality for Priority Based Dynamic Load Balancing in Distributed Database. 224-232 - Saroj Kumar Panigrahy, Debasish Jena, Sanjay Kumar Jena:
A Secure e-Shopping Using Voice Ordering. 233-237 - Manoj Kr. Dutta, Vinod Kumar Chaubey:
Performance Analysis of All-Optical WDM Network with Wavelength Converter Using Erlang C Traffic Model. 238-244 - Janani Arthanari, Arputharaj Kannan:
A Concurrent Synchronization Model for Distributed Multimedia Systems. 245-249 - Rajneesh Gujral, Anil Kapil:
Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS. 250-257 - Shakti Mishra, Dharmender Singh Kushwaha, Arun Kumar Misra:
A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System. 258-262 - Divya Mohandass, Jude Janet:
An Improved Three Pattern Huffman Compression Algorithm for Medical Images in Telemedicine. 263-268 - Abhishek Ray, Debasis Das:
Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata. 269-275 - Dhaval K. Patel, S. K. Shah, Minesh P. Thaker:
Performance Analysis of Reactive Routing Protocols with OSPF for IEEE 802.11s Wireless Mesh Network. 276-280 - Deepali Virmani, Satbir Jain:
Quality of Service On-demand Power Aware Routing Algorithm for Wireless Sensor Networks. 281-289 - Mangalam Ravi, S. Narasimman, G. K. Arun Kumar, D. Karthikeyan:
A Cryptographic Approach to Defend against IP Spoofing. 290-296 - Valliyammai Chinnaiah, S. Thamarai Selvi, R. Satheesh Kumar, E. Pradeep, K. Naveen:
Multi-agent Based Network Performance Tuning in Grid. 297-304 - Saeed Parsa, Somaye Arabi Naree, Neda Ebrahimi, Mojtaba Vahidi-Asl:
Finding Discriminative Weighted Sub-graphs to Identify Software Bugs. 305-309 - Manoj V. N. Vadakkepalisseri, K. Chandrashekaran:
Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information. 310-319 - Balachandra Muniyal, K. V. Prema:
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures. 320-324 - G. Savithiri, A. Murugan:
Iris Recognition Technique Using Gaussian Pyramid Compression. 325-331 - Leena Arya, Sunita Sharma, Millie Pant:
Coverage of Access Points Using Particle Swarm Optimization in Indoor WLAN. 332-336 - Devaraju Suganya Devi, Ganapathi Padmavathi:
Energy Conservation of Multicast Key Distribution in Mobile Adhoc Networks. 337-341 - P. Varalakshmi, M. Nandini, K. Krithika, R. Aarthi:
An Optimal Trust Based Resource Allocation Mechanism for Cross Domain Grid. 342-348 - P. Varalakshmi, P. Karthik Narayanan, M. Hariharan, P. Nagaraj, K. Amritha:
Reactive Network Monitor for DDoS Attacks. 349-355 - P. J. Antony, V. P. Ajith, K. P. Soman:
Statistical Method for English to Kannada Transliteration. 356-362 - R. B. Patel, Deepika Jain, Bhanu Kaushik:
RIFMAS: River Flow Management System Using Wireless Sensing Agents. 363-368 - Neha Jain:
Finite Element Approach to Radial Heat Flow in Human Dermal Tissues. 369-375 - Sajal Mukhopadhyay, Roshan Kumar Singh, Debidas Ghosh, Jaya Bhattacharjee, Nivedita Mukherjee:
An Efficient Auction Based Ticket Booking Scheme for Indian Cinemas. 376-381 - M. Selvanayaki, M. S. Vijaya, K. S. Jamuna, S. Karpagavalli:
Supervised Learning Approach for Predicting the Quality of Cotton Using WEKA. 382-384 - K. Latha, R. Manivelu:
Music-Inspired Optimization Algorithm: Harmony-Tabu for Document Retrieval Using Relevance Feedback. 385-387 - K. Sharma Rajiv, S. Dhiman Amardeep:
Challenges in Segmentation of Text in Handwritten Gurmukhi Script. 388-392 - Bala Dhandayuthapani Veerasamy:
Exploring the Contrasts of VoIP Phone Services. 393-395 - Shaily Mittal, Prabhjot Kaur:
Performance Comparision of FSR, LAR1 and LANMAR Routing Protocols in MANET'S. 396-400 - Tamanna Siddiqui, Munior Ahmad Wani:
Impact Factor of E - Learning: Using Secondary Education Case Study. 401-404 - Sanchit Gupta, Himanshu Gahlot, Varun Gupta, Banshi Dhar Chaudhary:
Annotating Indian Tribal Medicinal Documents Using Semi Automatically Extracted Ontology. 405-410 - Chandrashekar M. Patil, Sudarshan Patilkulkarni:
A Comparative Study of Feature Extraction Approaches for an Efficient Iris Recognition System. 411-416 - Jagadish H. Pujar, Pallavi S. Gurjal:
Binary Data Compression Using Medial Axis Transform Algorithm. 417-419 - Sandeep A. Thorat, Samadhan R. Manore:
Internet Usage Monitoring for Crime Detection. 420-423 - S. Gunasekaran, K. Revathy:
Spectral Fluctuation Analysis for Audio Compression Using Adaptive Wavelet Decomposition. 424-429 - Sanjeev Rana, Anil Kapil:
Defending against Node Misbehavior to Discover Secure Route in OLSR. 430-436 - J. Bagyamani, K. Thangavel:
SIMBIC: SIMilarity Based BIClustering of Expression Data. 437-441 - Neera Batra, A. K. Kapil:
An Efficient and Cost Effective Multilayer Peer to Peer Distributed Database Model for Mobile E-Polling System. 442-445 - D. S. Guru, B. Vijaya Kumari, S. K. Lathamba:
Automatic Incorporation of Corrections into Reviewed Documents. 446-451 - Maya Mohan, S. Mary Saira Bhanu:
Performance Comparison of Multicast Routing Protocols for MANETs. 452-454 - Ravindra Kumar Singh, Kanak Saxena, Reena Singh:
Traffic Aware LSP Selection Method in MPLS Networks. 455-457 - R. S. Ambili Chandran, S. Mary Saira Bhanu:
Context-Aware Intrusion Detection in Mobile Ad-Hoc Networks. 458-460 - V. R. Sarma Dhulipala, V. Aarthy, R. M. Chandrasekaran:
Energy and Fault Aware Management Framework for Wireless Sensor Network. 461-464 - B. Janet, A. V. Reddy, S. Domnic:
An Image Index Model for Retrieval. 465-467 - N. Bhalaji, Alok V. Kanakeri, Krishna P. Chaitanya, A. Shanmugam:
Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet. 468-474 - S. Selvakumar, M. R. C. Dinesh, C. Dhineshkumar, N. Ramaraj:
Extended Finite State Machine Model-Based Regression Test Suite Reduction Using Dynamic Interaction Patterns. 475-481 - Sahil Seth, Anil Gankotiya, Gurdit Singh, Vishal Kumar, Amit Kumar Jaiswal:
Throughput Analysis of HWMP Routing Protocol in Wireless Mesh Networks. 482-484 - Dharamveer Sharma:
Separation of Machine Printed Roman and Gurmukhi Script Words. 485-490 - Balwinder Singh, Harpreet Kaur, Himanshu Monga:
FPGA Implementation of AES Co-processor in Counter Mode. 491-496 - Shanmugasundaram Hariharan, Sirajudeen Kamal, Abdul Vadud Mohamed Faisal, Sheik Mohamed Azharudheen, Bhaskaran Raman:
Detecting Plagiarism in Text Documents. 497-500 - Madhusmita Das, Mahamaya Mohanty:
Hiding Relevant Information in an Image. 501-504 - G. Shiva Prasad, N. V. Subba Reddy, U. Dinesh Acharya:
Knowledge Discovery from Web Usage Data: A Survey of Web Usage Pre-processing Techniques. 505-507 - Arun Mishra, Bikash Tiwari, J. S. R. Kartik, Arun Kumar Misra:
Context-Aware System Using .NET Approach. 508-513 - Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo:
Genetic Audio Watermarking. 514-517 - Keyur N. Upadhyay, Hemant D. Vasava, Viral V. Kapadia:
Effective BST Approach to Find Underflow Condition in Interval Trees Using Augmented Data Structure. 518-520 - N. Bhalaji, Nandini Sundara Raman:
Natural Disaster Impact Assessment Using Genetic Algorithm. 521-526 - Chandrashekar M. Patil, Sudarshan Patilkulkarni:
An Approach to Enhance Security Environment Based on SIFT Feature Extraction and Matching to Iris Recognition. 527-530 - A. Kumar, R. K. Chauhan, Rajan Vohra:
A Framework for Priority-Based Inter Vehicle Communication for Highway Safety. 531-534 - P. S. Revankar, Vijay B. Patil, W. Z. Gandhare:
Data Compression on Embedded System. 535-537 - Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
A Survey on Preserving Privacy for Sensitive Association Rules in Databases. 538-544 - G. Geetha, V. Ragavi, K. Thamizhchelvy, K. Mariappan, V. Lalitha, S. Shanmuga Priya:
Boon and Bane of Curvelet Transform. 545-551 - Urvashi Chugh, Amit Chugh:
Security in High Performance Computing. 552-556 - V. R. Sarma Dhulipala, B. Vishnu Prabha, R. M. Chandrasekaran:
Trust Worthy Architecture for Mobile Ad Hoc Network Environment. 557-560 - V. R. Sarma Dhulipala, K. Kavitha, R. M. Chandrasekaran:
A Cross Layer Approach for Fault Management Framework in Wireless Sensor Networks. 561-564 - Aruna Kumari Devarakonda, Prasamsa Tummala, Indra Praveen Sandrala:
Security Solutions to the Phishing: Transactions Based on Security Questions and Image. 565-567 - Egambaram Kodhai, Selvadurai Kanmani, A. Kamatchi, R. Radhika, B. Vijaya Saranya:
CloneManager: A Tool for Detection of Type1 and Type2 Code Clones. 568-570 - Dharamveer Sharma, Bibanjot Kaur:
Document Image Segmentation Using Recursive Top-Down Approach and Region Type Identification. 571-576 - Inderjeet Kaur:
An Analysis to BER Performances of Differential OFDM Systems. 577-581 - S. Britto R. Kumar, S. Albert Rabara:
MPCS: An Account-Based Secure Mobile Payment Consortia System for Educational Institutions. 582-585 - Jaisankar Narayanasamy, Sankaradass Veeramalai, Arputharaj Kannan:
Team Automata Based Framework for Spatio-Temporal RBAC Model. 586-591 - Malay Bhatt, Rituraj Jain, C. K. Bhensdadia:
Knowledge Discovery in Feedback System Using Pixel Oriented Technique. 592-594 - Neeraj Kumar Shukla, Shilpi Birla, Rakesh Kumar Singh:
Analysis and Simulation of a Low Leakage Conventional SRAM Memory Cell at Deep Sub-micron Level. 595-597 - Mamatha Balachandra, K. V. Prema:
Enhancing the efficiency of On-demand Routing Protocol for Mobile Ad Hoc Networks. 598-600 - Sukhwant Kaur, H. K. Kaura, Mritunjay Ojha:
Design Issues for Replacing Credit Card on Mobile Phone. 601-604 - R. Padmavathy, Chakravarthy Bhagvati:
Unknown Key Share Attack on STPKE' Protocol. 605-608 - Sasmita Pani, Mahamaya Mohanty:
An Effective SOA Model for Developing Efficient Systems. 609-612 - Santosh Kumar Pani, Priya Arundhati, Mahamaya Mohanty:
Refactoring Interprocedural Dynamic Slicing for Handling Pointers. 613-616 - Mamta Juneja, Parvinder Singh Sandhu:
Image Segmentaion and Steganography for Secured Information Transmission. 617-620 - Surya Prakash Singh:
Ant System Embedded with Local Search for Solving Facility Layout Problem. 621-628 - Asim Gopal Barman, Ranjan Bhattacharya, Sudip Kumar Deb:
Strategic Initiatives and Automated Decision Support with ERP System Environment. 629-635 - Fumihiko Isada:
A Case Study of Strategic Design Management. 636-640 - N. Anitha, C. Selvaraj:
The Effects of Mannequins on Consumers' Perception and Shopping Attitude. 641-647 - Jaya Chitranshi, Shailja Agarwal:
Knowledge Transfer: Do Instructor Characteristics Matter? 648-655 - Priyanka Verma, R. R. K. Sharma:
Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem. 656-659 - Ritu Sinha, Chandrashekhar Kaushik:
CRM in Pharmaceutical Sector: Meeting the Challenges of Changing Healthcare Environment. 660-664 - Shweta Maheshwari:
HR Roadmap: Becoming a Strategic Business Partner. 665-669 - J. S. Kadam, J. J. Nirmal, M. Y. Khire:
Recent Trends in Indian Technical and Management Education W.R.T. Maharashtra. 670-673
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.