default search action
CUBE 2012: Pune, India
- Vidyasagar M. Potdar, Debajyoti Mukhopadhyay:
CUBE International IT Conference & Exhibition, CUBE '12, Pune, India - September 03 - 06, 2012. ACM 2012, ISBN 978-1-4503-1185-4
Image processing track
- Siddhartha Banerjee, Subhabrata Datta, Biplab Paul, Sanjoy Kumar Saha:
Segmentation of three phase micrograph: an automated approach. 1-4 - Priyanka Srivastava, Prateek Gupta, Satyam Bhardwaj, Vikrant Bhateja:
A new model for performance evaluation of denoising algorithms based on image quality assessment. 5-10 - Yuri L. Borissov, Moon Ho Lee:
Revisiting butson hadamard matrix construction based on a prominent class of pseudo-random sequences. 11-16 - Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal:
An attempt to ensure security of payload by targeting non-linear seed pixel positions in carrier image. 17-20 - Arijit Ghosal, Rudrasis Chakraborty, Bibhas Chandra Dhara, Sanjoy Kumar Saha:
Song/instrumental classification using spectrogram based contextual features. 21-25 - Siddharth, Rohit Gupta, Vikrant Bhateja:
A log-ratio based unsharp masking (UM) approach for enhancement of digital mammograms. 26-31 - Sonam Singh, Akshat Jain, Vikrant Bhateja:
A comparative evaluation of various de-speckling algorithms for medical images. 32-37 - Archana Deka, Kandarpa Kumar Sarma:
SVD and PCA features for ANN based detection of diabetes using retinopathy. 38-41 - Bhabesh Deka, Dipranjan Baishnab:
Removal of random-valued impulse noise using overcomplete DCT dictionary. 42-46 - Alok Kumar Singh Kushwaha, Maheshkumar H. Kolekar, Ashish Khare:
Vision based method for object classification and multiple human activity recognition in video survelliance system. 47-52 - Amiya Halder, Avijit Dasgupta:
Image segmentation using rough set based k-means algorithm. 53-58 - Neetesh Saxena, Narendra S. Chaudhari:
A secure approach for SMS in GSM network. 59-64 - Akshat Jain, Vikrant Bhateja:
A versatile denoising method for images contaminated with Gaussian noise. 65-68 - D. N. D. Harini, Dhavala Lalitha Bhaskari:
Image retrieval system based on feature extraction and relevance feedback. 69-73 - R. Gagan, Hardik Sanghavi, S. Ramachandran, K. Manikantan:
Circular sector DCT based feature extraction for enhanced face recognition using histogram based dynamic gamma intensity correction. 74-81 - Naveen N. Murthy, R. Raghunandana, K. Manikantan, S. Ramachandran:
Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing technique. 82-89 - Jaya Thomas, Narendra S. Chaudhari:
An analytical approach for column generation for one-dimensional cutting stock problem. 90-94 - R. Divya, Anwesha Rath, S. Ramachandran, K. Manikantan:
Astroid shaped DCT feature extraction for enhanced face recognition. 95-101 - Madhavi Gudavalli, S. Viswanadha Raju, K. S. M. V. Kumar:
A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits. 102-107 - C. Kalaiselvan, A. SivananthaRaja:
Investigation on tracking system for real time video surveillance applications. 108-112 - Ajit Danti, M. Suresha:
Texture based decision tree classification for Arecanut. 113-117 - Shashidhar G. Koolagudi, Shan E. Fatima, K. Sreenivasa Rao:
Speaker recognition in the case of emotional environment using transformation of speech features. 118-123 - Pankaj P. Chitte, J. G. Rana, Sachin Taware:
Iris recognition based security system using RFID. 124-127 - Sunil B. Mane, Sandip B. Bansode, Pradeep K. Sinha:
Optimized private information retrieval using graphics processing unit with reduced accessibility. 128-132
Networks track
- Sansar Singh Chauhan, M. M. Gore:
LDC-MAC: low latency DC-MAC protocol for wireless sensor network. 133-137 - Anand Pandya, Mrudang Mehta:
A novel energy efficient routing approach using multipath ring routing and clustering for WSN. 138-143 - Siba Mitra, Ajanta De Sarkar, Sarbani Roy:
A review of fault management system in wireless sensor network. 144-148 - Avishek Mukhopadhyay, Sarbani Roy, Nandini Mukherjee:
An approach of beacon placement and beacon based routing towards mobile sink in WSN. 149-154 - Abhineet Anand, Vikas Kumar Sihag, S. N. Gupta:
Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: a survey. 155-159 - Tamal Chakraborty, Iti Saha Misra, Salil Kumar Sanyal:
Design and study of VoIP model in cognitive radio network under different simulation platforms. 160-165 - Mohammad Wazid, Roshan Singh Sachan, R. H. Goudar:
Performance of a LAN under different ethernet wiring standards. 166-172 - Milind Pande, Vishal Pawar:
Mobile number portability (MNP): service providers perspective (pros & cons). 173-176 - Pooja Soman, Shishir B. Sahay:
Chirp Parameter Estimation - A New View Through Filters. 177-179 - Milind Pande, Neha Patel:
Regional study of telecom technology options for Indian rural education: with special reference to Vidarbha region, Maharashtra, India. 180-185 - Ashish Tanwer, Rishika Mehta, Tauqir Azam:
High capacity service provider design using GPMLS for IP next generation networks. 186-191 - R. Harish, L. Swarna Jyothi:
Design and verification of flexray to CAN protocol converter node. 192-197 - Milind Pande, N. K. Choudhari, Shantanu Pathak:
Energy efficient hybrid architecture and positioning of sensors in WSN for precision agriculture. 198-203 - Suman Sangwan, Parvinder Singh, R. B. Patel:
Periodic route selection for secure packet delivery. 204-209 - Suman Sangwan, Parvinder Singh, R. B. Patel:
UIVH-algorithm for seamless mobility in heterogeneous wireless network. 210-215 - Ashish Tanwer, Rishika Mehta, Tauqir Azam:
Scaling service provider backbone using BGP confederations for next generation networks. 216-221 - Sankirti Sandeep Shiravale, Sumedha Sirsikar, Debajyoti Mukhopadhyay:
IP v6 secure tunneling mechanism. 222-225
Artificial intelligence track
- Seema Purohit, Krantee Jamdaade:
Rule based system to facilitate the immunity of HIV/AIDS patients using Ayurveda therapy. 226-234 - Sarfaraz Masood, Pravin Chandra:
Training neural network with zero weight initialization. 235-239 - Santosh Kumar Bharti, Shashidhar G. Koolagudi, K. Sreenivasa Rao, Ankur Choudhary, Binod Kumar:
Voice conversion using linear prediction coefficients and artificial neural network. 240-245 - Meeta Kumar, Jayshree Ghorpade, Vrushali Y. Kulkarni, Rajni Bedi:
Neural network based smart vision system for driver assistance in extracting traffic signposts. 246-251 - Madhumita Kedlaya, Harsha Bhatia, S. Ramachandran, K. Manikantan:
Novel KNN-motivation-PSO and its application to image segmentation. 252-258 - Sanyukta Chetia, Kandarpa Kumar Sarma:
SOM based dimension reduction techniques for quaternary protein structure prediction. 259-262 - Hari Mohan Pandey, Anurag Dixit, Deepti Mehrotra:
Genetic algorithms: concepts, issues and a case study of grammar induction. 263-271 - Kishorjit Nongmeikapam, Sivaji Bandyopadhyay:
SVM based Manipuri POS tagging using SVM based identified reduplicated MWE (RMWE). 272-277 - Aniruddha M. Ujlambkar, Vahida Z. Attar:
Mood classification of Indian popular music. 278-283 - Abhijeet Godase, Vahida Attar:
Classifier Ensemble for Imbalanced Data Stream Classification. 284-289 - M. S. Shirdhonkar, Manesh Kokare:
Off-line handwritten signature retrieval. 290-293 - Parismita Gogoi, Kandarpa Kumar Sarma:
Recurrent neural network based channel estimation technique for STBC coded MIMO system over Rayleigh fading channel. 294-298 - Mousmita Sarma, Kandarpa Kumar Sarma:
Recognition of Assamese phonemes using three different ANN structures. 299-302 - B. Saleena, S. K. Srivatsa:
ConSim: an enhanced semantic similarity measure to find the relationship between concepts in cross ontology. 303-307 - Yashodhara V. Haribhakta, Santosh Kalamkar, Parag A. Kulkarni:
Feature annotation for text categorization. 308-313 - Yashodhara V. Haribhakta, Arti Malgaonkar, Parag A. Kulkarni:
Unsupervised topic detection model and its application in text categorization. 314-319 - Sangeeta Jadhav, Manish R. Joshi, Jyoti Pawar:
Modeling BharataNatyam dance steps: art to SMart. 320-325 - Sonia Sunny, S. David Peter, K. Poulose Jacob:
A comparative study of parametric coding and wavelet coding based feature extraction techniques in recognizing spoken words. 326-331 - Arnab Mitra, Anirban Kundu:
CA based cost optimized PRNG for Monte-Carlo simulation of distributed computation. 332-337 - Pornpit Wongthongtham, K. Siripun, P. Jitsangiam:
Visualization of road segment for road analysis and design. 338-343 - Preety Sharma, Sansar Singh Chauhan, Sandeep Saxena:
Multihop/direct forwarding for 3D wireless sensor networks. 344-349
Software engineering track
- Samer Al-Zain, Derar Eleyan, Joy Garfield:
Automated user interface testing for web applications and TestComplete. 350-354 - Preeti Kaur, Priti Bansal, Ritu Sibal:
Prioritization of test scenarios derived from UML activity diagram using path complexity. 355-359 - Sushama Nagpal, Anjana Gosain, Sangeeta Sabharwal:
Complexity metric for multidimensional models for data warehouse. 360-365 - Shiv Nath Kumar, Sagun Baijal, Leena Chourey, Aparna Ramamurthy, M. Sasikumar:
Conceptualizing a desktop environment for cognitively challenged people. 366-370 - Carlos Huertas, Reyes Juárez-Ramírez:
NLARE, a natural language processing tool for automatic requirements evaluation. 371-378 - Radha Vedala, Simhadri Anil Kumar:
Automatic detection of printf format string vulnerabilities in software applications using static analysis. 379-384 - Nitin Uikey, Ugrasen Suman:
An empirical study to design an effective agile project management framework. 385-390 - Ritu Arora, Sanjay Goel:
Collaboration in software development: a spotlight. 391-396 - Jitender Choudhari, Ugrasen Suman:
Phase wise effort estimation for software maintenance: an extended SMEEM model. 397-402 - Aparup Khatua, Nabendu Chaki:
Sustainable peer-based structure for content delivery networks. 403-408 - R. Kamatchi:
A service oriented life cycle model for educational information system. 409-412 - M. Thirumaran, P. Dhavachelvan, G. Naga Venkata Kiran:
A collaborative framework for evaluation of run-time changes in enterprise web services. 413-418
Bioinformatics track
- Ramamani Tripathy, Debahuti Mishra, Rudra Kalyan Nayak:
Endogenous rice (Oryza Sativa) miRNAs and their potential targets against Rice Tungro Virus using various string matching algorithms. 419-423 - Anurag Pal, Debahuti Mishra, Shruti Mishra, Sandeep Kumar Satapathy:
A comparative study on homology modeling of P-glycoprotein (P-gp) structure using computational approach. 424-428 - James Carmichael:
Classifying voice quality via pitch and spectral analysis. 429-434 - Ali Alatabbi, Maxime Crochemore, Costas S. Iliopoulos, Tewogboye A. Okanlawon:
Overlapping repetitions in weighted sequence. 435-440 - Ali Alatabbi, Maxime Crochemore, Jacqueline W. Daykin, Laurent Mouchard:
Lyndon fountains and the Burrows-Wheeler transform. 441-446
Databases track
- Supriya Chakraborty, Nabendu Chaki:
DFRS: a domain-based framework for representing semi-structured data. 447-452 - Rashmi Rekha Sahoo, Smita Prava Mishra, Debahuti Mishra:
Rough-FS: a feature selection method for classification of gene expression data set using rough set. 453-458 - Dipalee Shah, Rajesh Ingle:
Privacy-preserving deletion to generalization-based anonymous database. 459-463 - Sangeeta Viswanadham, Vatsavayi Valli Kumari:
An efficient approach to identify n-wMVD for eliminating data redundancy. 464-469 - Prasun Dutta, Rituparna Chaki:
A survey of data mining applications in water quality management. 470-475 - Sushan Chakraborty, Madhulina Sarkar, Nandini Mukherjee:
Implementation of execution history in non-relational databases for feedback-guided job modeling. 476-482
Smart grid track
- A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Monica H. Ou:
Prosumer management in socio-technical smart grid. 483-489 - (Withdrawn) Turnaround time based job scheduling algorithm in dynamic grid computing environment. 490-493
- Monica H. Ou, Jérôme Maillot:
Association rule variation with respect to time. 494-500
e-learning track
- Haji Binali, Vidyasagar M. Potdar:
Emotion detection state of the art. 501-507 - Lenuta Alboaie, Mircea-Florin Vaida, Diana Pojar:
Alternative methodologies for automated grouping in education and research. 508-513 - Manish R. Joshi, Lall Manoj, O. Olugbara Oludayo, Michael M. Modiba, Virendrakumar C. Bhavsar:
Automated matchmaking of student skills and academic course requisites. 514-519
Cloud computing track
- A. Vani Vathsala, Hrushikesha Mohanty:
Using HMM for predicting response time of web services. 520-525 - Gauri S. Bhange, Swapnaja R. Hiray:
Dental patient records maintenance on cloud computing using data protection model. 526-531 - V. Santhosh Kumar Tangudu, Manoj Mishra:
Estimating makespan using double trust thresholds for workflow applications. 532-536 - Gaurangkumar Khalasi, Minubhai Chaudhari:
TrustGK monitor: 'customer trust as a service' for the cloud. 537-543 - Khalid Mohiuddin, Asharul Islam, Aftab Alam, Awais Ali:
24X7X365: mobile cloud access. 544-551 - Nitin S. More, Swapnaja R. Hiray:
Load balancing and resource monitoring in cloud. 552-556 - Hiren B. Patel, Dhiren R. Patel, Jagdish Chaudhari, Sachin Patel, Kaushik Prajapati:
Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing. 557-560 - Manu Vardhan, Nidhi Jain, Shakti Mishra, Dharmender Singh Kushwaha:
A demand based fault tolerant file replication model for clouds. 561-566 - Jagdish Chandra Patni, Nitin Trivedi, Om Prakash Pal, Pradeep Chauhan, Anubhav Sharma:
An optimal approach of load balancing for grid computing. 567-571 - T. Bharat Kumar, C. Rajendra, A. Srilakshmi, Venu Madhav Kuthadi:
A catholic and enhanced study of temporal visual backchannel for dynamically changing events in SNs present in clouds. 572-578
Mobile computing track
- Sangeeta Mittal, Alok Aggarwal, S. L. Maskara:
Situation recognition in sensor based environments using concept lattices. 579-584 - Suman Bala, Gaurav Sharma, Anil K. Verma:
A survey and taxonomy of symmetric key management schemes for wireless sensor networks. 585-592
Management information systems track
- Atsushi Kato:
Software industry in Okinawa: the critical success factors for the Japanese Bangalore. 593-597 - Andrés Mejía-Figueroa, Reyes Juárez-Ramírez, Sergio Inzunza, Rocio Valenzuela:
Implementing adaptive interfaces: a user model for the development of usability in interactive systems. 598-604 - Diego Edixon Rodriguez Segura, Victor Hugo Medina García:
Model of knowledge management in an intelligent individual public transport to taxi. 605-610
e-commerce track
- Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay:
Designing an ontology based domain specific web search engine for commonly used products using RDF. 612-617 - Jie Liu:
The key cornerstones to successful B2C: a case study of an online grocer in China. 618-622 - Saurabh Wadwekar, Debajyoti Mukhopadhyay:
A ranking algorithm integrating vector space model with semantic metadata. 623-628 - Sanjeev Kumar Sharma, Ugrasen Suman:
Comparative study and analysis of web personalization frameworks of recommender systems for e-commerce. 629-634 - Supriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. 635-640 - Shiladitya Munshi, Ayan Chakraborty, Debajyoti Mukhopadhyay:
A hybrid graph based framework for integrating information from RDF and topic map: a proposal. 641-646 - Saurabh Deochake, Suresh Sarode, Shashank Kanth, Vidyasagar M. Potdar, Subhadip Chakraborty, Debajyoti Mukhopadhyay:
HENRI: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internet. 647-652 - Debajyoti Mukhopadhyay, Archana Chougule:
An approach to manage ontology dynamically based on web service composition requests. 653-658 - Sunil B. Mane, Suraj T. Sawant, Pradeep K. Sinha:
Using private information retrieval protocol for an e-commerce application. 659-663
WWW track
- A. B. Sagar:
Modeling collaborative task execution in social networks. 664-669 - Abhinav Kumar Gupta, Glitto Mathew:
Item recommender system by incorporating metadata information into ternary semantic analysis. 670-675 - Pragya Dwivedi, Kamal Kant Bharadwaj:
e-learning recommender system for learners in online social networks through association retrieval. 676-681 - Meera Mudholkar, Jagannath Aghav, Saloni Peswani, Härish Jädhäø, Seema Kela, S. K. Hiremath:
Visualizing semantic web. 682-687 - Vishwas Raval, Padam Kumar, Yogeshwar Prasad Kosta:
SEReleC# - C# implementation of SEReleC: a meta search engine based on combinatorial search and search keyword based link classification. 688-693 - A. B. Sagar:
Dependability of social network groups. 694-700 - Vikas Kumar Sihag:
A clustering approach for structural k-anonymity in social networks using genetic algorithm. 701-706 - Meera Narvekar, Rashmi Ravikumar, S. S. Mantha:
Personalization of mobile value added services. 707-711 - A. B. Sagar:
Modeling transparency and collaborativeness in distributed work groups. 712-717 - Rahul Moriwal, Vijay Prakash:
An efficient info-gain algorithm for finding frequent sequential traversal patterns from web logs based on dynamic weight constraint. 718-723
Information security track
- Vidyasagar M. Potdar, Farida Ridzuan, Jaipal Singh:
Spam 2.0. 724-731 - Pedram Hayati, Nazanin Firoozeh, Vidyasagar M. Potdar, Kevin Chai:
How much money do spammers make from your website? 732-739 - Kyung-kug Kim, Myung-Hwan Kim:
An improved anonymous authentication and key exchange scheme. 740-743 - Ankur Choudhary, Sanjay Pratap Singh Chauhan, Mohd. Afshar Alam, Safdar Tanveer:
Schur decomposition and dither modulation: an efficient and robust audio watermarking technique. 744-748 - Kumar Sourav, Debi Prasad Mishra:
DDoS detection and defense: client termination approach. 749-752 - P. L. V. Vihari, Manoj Mishra:
Chaotic image encryption on GPU. 753-758 - Sandeep Singh, Priyanka Ahlawat:
Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem. 759-763 - Sarnali Saha, Asmita Nag:
Comparison of policy specification languages for access control. 764-770 - Aziz Qaroush, Ismail M. Khater, Mahdi Washaha:
Identifying spam e-mail based-on statistical header features and sender behavior. 771-778 - Pallavi Khatri, Shashikala Tapaswi, Udai P. Verma:
Trust evaluation in wireless ad hoc networks using fuzzy system. 779-783 - P. Rajesh, G. Narasimha, Ch. Rupa:
Fuzzy based privacy preserving classification of data streams. 784-788 - Deepika Dutta Mishra, C. S. R. C. Murthy, Kislay Bhatt, A. K. Bhattacharjee, R. S. Mundada:
Development and performance analysis of HPC based framework for cryptanalytic attacks. 789-794 - Pragya Jain, Anjali Sardana:
Defending against internet worms using honeyfarm. 795-800 - Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi:
Specification and validation of enterprise information security policies. 801-808 - Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar, Mridul Sankar Barik:
A two-phase quantitative methodology for enterprise information security risk analysis. 809-815 - Heasuk Jo, Seungjoo Kim, Dongho Won:
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer. 816-819 - Mourad Elloumi, Pedram Hayati, Costas S. Iliopoulos, Solon P. Pissis, Arfaat Shah:
Detection of fixed length web spambot using REAL (read aligner). 820-825 - Vidyasagar M. Potdar, Yan Like, Nazanin Firoozeh, Debajyoti Mukhopadhyay, Farida Ridzuan, Dhiren Tejani:
The changing nature of Spam 2.0. 826-831 - Bambang Harjito, Vidyasagar M. Potdar, Jaipal Singh:
Watermarking technique for wireless multimedia sensor networks: a state of the art. 832-840 - Sheetal Devidas Rathod, Kota Solomon Raju, S. A. Akbar:
Design and simulation of adaptive PID controller powered by PWM signals to actuate DC motor drive system used in climbing robot. 841-846 - Ritu Tiwari, Abhishek Jain:
Improving network security and design using honeypots. 847-852 - Vivek S. Deshpande, Jagdish B. Helonde, Vijay Wadhai, Vidyasagar M. Potdar, A. J. Dinusha Rathnayaka:
Handling the Quality of Service for the data dissemination in Wireless Sensor Networks. 853-856 - Rajesh Yerneni, Anil K. Sarje:
Enhancing performance of AODV against Black hole Attack. 857-862
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.