default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 129 matches
- 2011
- Anuja Kumar Acharya:
Image encryption using a new chaos based encryption algorithm. ICCCS 2011: 577-581 - Bibhudendra Acharya
, S. Sachin Sunder, M. Thiruvenkatam, Aneesh K. Sajan:
Image encryption using index based chaotic sequence, M sequence and gold sequence. ICCCS 2011: 541-544 - Bibhudendra Acharya
, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad:
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. ICCCS 2011: 606-609 - J. Vijay Anand
, G. D. Dharaneetharan:
New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance security. ICCCS 2011: 474-476 - V. N. Manjunath Aradhya:
Document skew estimation: an approach based on wavelets. ICCCS 2011: 359-364 - V. N. Manjunath Aradhya, C. Naveena:
Text line segmentation of unconstrained handwritten Kannada script. ICCCS 2011: 231-234 - Harshal A. Arolkar
, Shraddha P. Sheth, Vaidehi P. Tamhane:
Ant colony based approach for intrusion detection on cluster heads in WSN. ICCCS 2011: 523-526 - Sambit Bakshi
, Hunny Mehrotra, Banshidhar Majhi:
Real-time iris segmentation based on image morphology. ICCCS 2011: 335-338 - S. R. Balasundaram:
Securing tests in E-learning environment. ICCCS 2011: 624-627 - Sulagna Bandopadhyay, Anirban Sengupta
, Chandan Mazumdar:
A quantitative methodology for information security control gap analysis. ICCCS 2011: 537-540 - Pradosh Bandyopadhyay, Soumik Das, Monalisa Banerjee, Atal Chaudhuri:
A fragile color image watermarking framework focusing a new invisible domain. ICCCS 2011: 172-177 - Pradipta K. Banerjee
, Jayanta K. Chandra, Asit K. Datta:
Feature based optimal trade-off parameter selection of frequency domain correlation filter for real time face authentication. ICCCS 2011: 295-300 - Joydeep Banerjee, Souvik Kumar Mitra, Pradipta Ghosh, Mrinal K. Naskar:
Memory based message efficient clustering (MMEC) for enhancement of lifetime in wireless sensor networks using a node deployment protocol. ICCCS 2011: 71-76 - Sulieman Bani-Ahmad
:
On improved processor allocation in 2D mesh-based multicomputers: controlled splitting of parallel requests. ICCCS 2011: 204-209 - Lalbihari Barik
, Bankim Patel, Ankita Barik
:
You are watching system (YAW system): an agent based secure real-time monitoring, capturing and analysis system for client activities on the expert agent's screen. ICCCS 2011: 507-510 - Raju Barskar
, Gulfishan Firdose Ahmed:
CBIR using fuzzy edge detection mask. ICCCS 2011: 277-280 - Amol P. Bhagat
, Mohammad Atique
:
Medical image retrieval, indexing and enhancement techniques: a survey. ICCCS 2011: 387-390 - Nabanita Bhattacharjee, Ranjan Parekh:
Skin texture analysis for medical diagnosis. ICCCS 2011: 301-306 - Suman Sankar Bhunia
, Sarbani Roy
, Nandini Mukherjee:
IEMS: indoor environment monitoring system using ZigBee wireless sensor network. ICCCS 2011: 142-145 - Monowar H. Bhuyan, D. K. Bhattacharyya
, Jugal K. Kalita:
NADO: network anomaly detection using outlier approach. ICCCS 2011: 531-536 - N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs. ICCCS 2011: 489-492 - Naveen Chauhan
, Lalit Kumar Awasthi
, Narottam Chand
, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. ICCCS 2011: 17-20 - Asish Kumar Dalai, Sanjay Kumar Jena:
Evaluation of web application security risks and secure design patterns. ICCCS 2011: 565-568 - Soumik Das, Pradosh Bandyopadhyay, Monalisa Banerjee, Atal Chaudhuri:
A chip-based watermarking framework for color image authentication. ICCCS 2011: 178-183 - Abhijit Das, Atiqur Rahman, Soumya Sankar Basu, Atal Chaudhuri:
Energy aware topology security scheme for mobile ad hoc network. ICCCS 2011: 114-118 - Debasish Das, Utpal Sharma, D. K. Bhattacharyya
:
Detection of HTTP flooding attacks in multiple scenarios. ICCCS 2011: 517-522 - Ratnakar Dash, Pankaj Kumar Sa, Banshidhar Majhi:
Restoration of images corrupted with blur and impulse noise. ICCCS 2011: 377-382 - L. David, Meenakshi Sood
, Mahesh Kumar Kajla:
Router based approach to mitigate DOS attacks on the wireless networks. ICCCS 2011: 569-572 - Brij Bihari Dubey, Naveen Chauhan
, Lalit Kumar Awasthi
:
NILDD: nearest intersection location dependent dissemination of traffic information in VANETs. ICCCS 2011: 96-99 - Dipankar Dutta
, Paramartha Dutta
:
A real coded MOGA for mining classification rules with missing attribute values. ICCCS 2011: 355-358
skipping 99 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2026-05-01 06:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint