default search action
10. CISIM 2011: Kolkata, India
- Nabendu Chaki, Agostino Cortesi:
Computer Information Systems - Analysis and Technologies - 10th International Conference, CISIM 2011, Kolkata, India, December 14-16, 2011. Proceedings. Communications in Computer and Information Science 245, Springer 2011, ISBN 978-3-642-27244-8
Keynote and Plenary Lectures
- Young Im Cho:
The Future of Intelligent Ubiquitous Computing Systems. 1-3 - Dipankar Dasgupta:
Who Is Responsible for Security and Privacy in the Cloud? 4 - Aditya Ghose:
The Optimizing Web: Leveraging Agent Technology for Sustainability. 5-8 - Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Detection of Cyber Attacks. 9-18 - Dong Hwa Kim, Khalid Saeed, Cha Geun Jung:
An Effective Research of Emotion. 19-21 - Heinrich Voss, Jörg Lampe:
Regularization of Large Scale Total Least Squares Problems. 22-37
Networking and Its Applications
- Chandreyee Chowdhury, Sarmistha Neogy:
Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET. 38-47 - Michal Choras, Rafal Kozik:
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. 48-54 - Anupam Saha, Rituparna Chaki:
VAMI - A Novel Architecture for Vehicular Ambient Intelligent System. 55-64 - Subhendu Barat, Ashok Kumar Pradhan, Tanmay De:
A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network. 65-73
Agent-Based Systems
- Mohamed Achraf Dhouib, Lamine Bougueroua, Katarzyna Wegrzyn-Wolska:
Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent Approach. 74-84 - Debdutta Barman Roy, Rituparna Chaki:
MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. 85-94 - Rakesh Kumar Mishra, Suparna Saha, Sankhayan Choudhury, Nabendu Chaki:
Agent Based Approach for Radio Resource Optimization for Cellular Networks. 95-104
Biometric Applications
- Piotr Panasiuk, Khalid Saeed:
Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. 105-112 - Jakub Karwan, Khalid Saeed:
A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech. 113-120 - Michal Choras, Rafal Kozik:
Fast Feature Extractors for Palmprint Biometrics. 121-127
Pattern Recognition and Image Processing
- Rafal Doroz, Piotr Porwik:
Handwritten Signature Recognition with Adaptive Selection of Behavioral Features. 128-136 - Kamil Surmacz, Khalid Saeed:
Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor. 137-144 - Arijit Sinharay, Syed Mohd Bilal, Tanushyam Chattopadhyay:
A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence Plot. 145-151 - Tomás Kocyan, Jan Martinovic, Jiri Dvorský, Václav Snásel:
Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann law. 152-160 - Soharab Hossain Shaikh, Asis Kumar Maiti, Nabendu Chaki:
On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method. 161-169 - Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu:
Medical Aid for Automatic Detection of Malaria. 170-178
Industrial Applications
- Pouyeh Rezazadeh:
Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment Analysis. 179-191 - Antonio Candiello, Agostino Cortesi:
KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment. 192-201 - Sudip Kundu, Sriyankar Acharyya:
Stochastic Local Search Approaches in Solving the Nurse Scheduling Problem. 202-211
Algorithmic Applications and Data Management
- Jyotsna Kumar Mandal, Somnath Mukhopadhyay:
GA Based Denoising of Impulses (GADI). 212-220 - Sangeeta Sen, Rituparna Chaki:
Handling Write Lock Assignment in Cloud Computing Environment. 221-230 - Sundarapandian Vaidyanathan, Sarasu Pakiriswamy:
The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems. 231-238 - Lukás Vojácek, Jan Martinovic, Jiri Dvorský, Katerina Slaninová, Ivo Vondrák:
Parallel Hybrid SOM Learning on High Dimensional Sparse Data. 239-246 - Abhijit Sanyal, Sankhayan Choudhury:
Operational Algebra for a Graph Based Semantic Web Data Model. 247-256 - Supriya Chakraborty, Nabendu Chaki:
A Survey on the Semi-Structured Data Models. 257-266
Information and Network Security
- Raju Halder, Agostino Cortesi:
Observation-Based Fine Grained Access Control for XML Documents. 267-276 - Subhasis Dasgupta, Aditya Bagchi:
Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology. 277-285 - Prabir Kumar Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri:
Secret Image Sharing with Embedded Session Key. 286-294 - Anna Bartkowiak:
Command and Block Profiles for Legitimate Users of a Computer Network. 295-304 - Uttam Kr. Mondal, Jyotsna Kumar Mandal:
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). 305-313 - Riti Chowdhury, Debashis De:
Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques. 314-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.