Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_35
Adarsh Kumar, A. Aggarwal, Charu
{"title":"Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks","authors":"Adarsh Kumar, A. Aggarwal, Charu","doi":"10.1007/978-3-642-32129-0_35","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_35","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"32 1","pages":"335-346"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82223135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_15
P. Badera, Akanksha Bhardwaj, K. Rajalakshmi
{"title":"Range Grouping for Routing in Dynamic Networks","authors":"P. Badera, Akanksha Bhardwaj, K. Rajalakshmi","doi":"10.1007/978-3-642-32129-0_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_15","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"95-105"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90445936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_24
Pooja Gupta
{"title":"Context Based Relevance Evaluation of Web Documents","authors":"Pooja Gupta","doi":"10.1007/978-3-642-32129-0_24","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_24","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"201-212"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73969429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_38
D. Bajpai, M. Vardhan, D. S. Kushwaha
{"title":"Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services","authors":"D. Bajpai, M. Vardhan, D. S. Kushwaha","doi":"10.1007/978-3-642-32129-0_38","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_38","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"121 1","pages":"370-382"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85261603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_18
S. Vishwakarma, Shishir Gupta
{"title":"Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space","authors":"S. Vishwakarma, Shishir Gupta","doi":"10.1007/978-3-642-32129-0_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_18","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"51 1","pages":"130-140"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77767156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_10
Saifuddin Kaijar, S. Bhavani
{"title":"Developing Heuristic for Subgraph Isomorphism Problem","authors":"Saifuddin Kaijar, S. Bhavani","doi":"10.1007/978-3-642-32129-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_10","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"40-52"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77624336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_27
P. Manasa, M. Prasad, T. Rani
{"title":"Routing Table Implementation Using Integer Data Structure","authors":"P. Manasa, M. Prasad, T. Rani","doi":"10.1007/978-3-642-32129-0_27","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_27","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"318 1","pages":"238-249"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75438593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_3
M. Balakrishnan
{"title":"Power Consumption in Multi-core Processors","authors":"M. Balakrishnan","doi":"10.1007/978-3-642-32129-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_3","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"62 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_53
Sanchika Gupta, Susmita Horrow, A. Sardana
{"title":"A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment","authors":"Sanchika Gupta, Susmita Horrow, A. Sardana","doi":"10.1007/978-3-642-32129-0_53","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_53","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"55 1","pages":"498-499"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90894044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-08-06DOI: 10.1007/978-3-642-32129-0_5
H. T. Kung
{"title":"Big Data and Compressive Sensing","authors":"H. T. Kung","doi":"10.1007/978-3-642-32129-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_5","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86733205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}