default search action
COMPUTE 2013: Vellore, Tamil Nadu, India
- R. K. Shyamasundar, Lokendra Shastri, D. Janakiram, Srinivas Padmanabhuni:
Proceedings of the 6th ACM India Computing Convention, COMPUTE 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013. ACM 2013, ISBN 978-1-4503-2545-5 - Rajeshwari Ganesan, Yogesh Murarka, Santonu Sarkar, Kristoffer Frey:
Empirical study of performance benefits of hardware assisted virtualization. 1:1-1:8 - Richa Garg, Ravi Sankar Veerubhotla, Ashutosh Saxena:
AtDRM: a DRM architecture with rights transfer and revocation capability. 2:1-2:6 - Gopichand Agnihotram, Hari Manassery Koduvely:
A comparative study of Monte Carlo methods to compute rare event probabilities of failure in reliability models. 3:1-3:6 - Sabyasachi Abadhan, Sohini De, Suddhasil De:
Uncoupling of mobile cloud computing architecture using tuple space: modeling and reasoning. 4:1-4:6 - Ashutosh Saxena, Ina Jain, M. Choudary Gorantla:
An integrated framework for enhancing privacy in online social networks. 5:1-5:6 - Subhajit Datta, Santonu Sarkar, A. S. M. Sajeev, Nishant Kumar:
How many researchers does it take to make impact?: mining software engineering publication data for collaboration insights. 6:1-6:8 - Devasia Kurian, Pethuru Raj Chelliah:
Upgradation of business applications with autonomic computing. 7:1-7:7 - Sathiya Prabhu Kumar, Raja Chiky, Sylvain Lefebvre, Eric Gressier-Soudan:
LibRe: a consistency protocol for modern storage systems. 8:1-8:9 - Naveen Kumar, Anish Mathuria, Manik Lal Das, Kanta Matsuura:
Improving security and efficiency of time-bound access to outsourced data. 9:1-9:8 - Jithin Justin, A. S. Ajeena Beegom:
Nearest neighbour based social recommendation using heat diffusion. 10:1-10:7 - Deep Parekh, Sanjay Chaudhary:
Durable data storage in distributed non persistent caching environment. 11:1-11:7 - Saurabh Kumar, Mayank Kulkarni:
Graph based techniques for user personalization of news streams. 12:1-12:7 - Suman Roy, Kiran Prakash Sawant, Olivier Maurice Charvin:
Generating topic maps from XML/XSD documents. 13:1-13:8 - Allahbaksh M. Asadullah, Nikita Jain, Kanika Kapoor, Hajar Falih:
A data-centric heuristic for Hadoop provisioning in the cloud. 14:1-14:6 - Hasmukh Patel, Devesh C. Jinwala:
Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant. 15:1-15:6 - Pratik Narang, Jagan Mohan Reddy, Chittaranjan Hota:
Feature selection for detection of peer-to-peer botnet traffic. 16:1-16:9 - Divya Sharma, Akz Alam, Parthasarathi Dasgupta, Debashis Saha:
A ranking algorithm for online social network search. 17:1-17:7 - S. Jaya Nirmala, Shah Maulik, S. Mary Saira Bhanu:
SLA achievement by negotiation in a cloud. 18:1-18:4 - Prabukumar Manoharan, Bimal Kumar Ray:
An alternate line drawing algorithm on hexagonal grid. 19:1-19:7 - Munish Bhatia, D. C. Kiran, Janardan Prasad Misra, S. Gurunarayanan:
Fine grain thread scheduling on multicore processors: cores with multiple functional units. 20:1-20:6 - Tanmay Sinha, Vrns Srikanth, Mangal Sain, Hoon-Jae Lee:
Trends and research directions for privacy preserving approaches on the cloud. 21:1-21:12 - Praveen Ranjan Srivastava, Rahul Kapoor, Rajat Gupta:
Study of the effect of a rule based classifier modeled anti-corruption body in a neural network based environment. 22:1-22:9 - Rohan Bhargava, Balakrushna Tripathy, Anurag Tripathy, Rajkamal Dhull, Ekta Verma, P. Swarnalatha:
Rough intuitionistic fuzzy C-means algorithm and a comparative analysis. 23:1-23:11 - Mary A. Geetha, Debi Prasanna Acharjya, N. Ch. Sriman Narayana Iyengar:
Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulation. 24:1-24:8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.