default search action
14th ICDCIT 2018: Bhubaneswar, India
- Atul Negi, Raj Bhatnagar, Laxmi Parida:
Distributed Computing and Internet Technology - 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10722, Springer 2018, ISBN 978-3-319-72343-3
Invited Papers
- André Rossi, Alok Singh, Shyam Sundar:
Properties and Exact Solution Approaches for the Minimum Cost Dominating Tree Problem. 3-26 - S. Subhashree, Rajeev Irny, P. Sreenivasa Kumar:
Review of Approaches for Linked Data Ontology Enrichment. 27-49 - Yiji Zhang, Lenore D. Zuck:
Formal Verification of Optimizing Compilers. 50-65
Security and Privacy
- Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:
Security Analysis of EMV Protocol and Approaches for Strengthening It. 69-85 - Shashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. 86-104 - Vishal Maral, Nachiket Trivedi, Manik Lal Das:
Auditing Access to Private Data on Android Platform. 105-111 - Joseph Jisna, A. Salim:
Privacy Preserving Data Utility Mining Using Perturbation. 112-120 - Kollapalli Ramesh Babu, Vineet Padmanabhan:
BDI Based Performance Enhancement in DNSSEC. 121-126 - Pinki Prakash Vishwakarma, Amiya Kumar Tripathy, Srikanth Vemuru:
A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment System. 127-131
Distributed and Multiprocessing Approaches
- Lalatendu Behera, Purandar Bhaduri:
Time-Triggered Scheduling for Multiprocessor Mixed-Criticality Systems. 135-151 - Garima Singh, Anil Kumar Singh:
Effect of Live Migration on Virtual Hadoop Cluster. 152-157 - V. Santhi, Rini Jose:
Performance Analysis of Parallel K-Means with Optimization Algorithms for Clustering on Spark. 158-162 - U. Venkata Divya, P. S. V. S. Sai Prasad:
Hashing Supported Iterative MapReduce Based Scalable SBE Reduct Computation. 163-170
Networks Protocols and Applications
- Günter Fahrnberger:
Reliable Condition Monitoring of Telecommunication Services with Time-Varying Load Characteristic. 173-188 - Pranav Kumar Singh, Subhrendu Chattopadhyay, Pradeepkumar Bhale, Sukumar Nandi:
Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment. 189-204 - Paramita Dey, Sarbani Roy, Sanjit Roy:
Ego Based Community Detection in Online Social Network. 205-210 - Utkal Sinha, Ratnakar Dash, Nandish Jayaram Kopri:
A Gateway Virtual Network Function for InfiniBand and Ethernet Networks. 211-216 - Sumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh:
GMP2P: Mobile P2P over GSM for Efficient File Sharing. 217-231 - Y. Divya Brahmani, T. Sobha Rani, S. Durga Bhavani:
Simulation of Network Growth Using Community Discovery in Biological Networks. 232-239 - Gollapudi V. R. J. Sai Prasad, Venkatesh Choppella, Sridhar Chimalakonda:
A Style Sheets Based Approach for Semantic Transformation of Web Pages. 240-255 - Palani Kumar, Meenakshi D'Souza, Debabrata Das:
Efficient Anomaly Detection Methodology for Power Saving in Massive IoT Architecture. 256-262
Databases, Algorithms, Data Processing and Applications
- Subhrangsu Mandal, Arobinda Gupta:
Approximation Algorithms for Permanent Dominating Set Problem on Dynamic Networks. 265-279 - Mayank Kumar, Syam Kumar Pasupuleti:
Lightweight Verifiable Auditing for Outsourced Database in Cloud Computing. 280-287 - Sarvesh Pandey, Udai Shanker:
A One Phase Priority Inheritance Commit Protocol. 288-294 - Ripon Patgiri:
Issues and Challenges in Big Data: A Survey. 295-300 - Ruby Rani:
Generate Optimal Distributed Query Plans Using Clonal Selection Process. 301-305 - Surender Singh Samant, N. L. Bhanu Murthy, Aruna Malapati:
CapAct: A Wordnet-Based Summarizer for Real-World Events from Microblogs. 306-314 - Harshpreet Singh, Rajneesh Randhawa:
ARMM: Adaptive Resource Management Model for Workflow Execution in Clouds. 315-329 - Prakash Kumar Singh, Udai Shanker:
A New Priority Heuristic Suitable in Mobile Distributed Real Time Database System. 330-335 - Ankita Sinha, Prasanta K. Jana:
Efficient Algorithms for Local Density Based Anomaly Detection. 336-342
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.