All Stories

  1. Shellmark
  2. Tweeting in Support of LGBT?
  3. Exploring Neural Networks with C#
  4. A Framework towards Generating Effective Business Process Model by Goal based Pruning
  5. An IPv6 based hierarchical address configuration scheme for smart grid
  6. Applied Computation and Security Systems
  7. Applied Computation and Security Systems
  8. Transactions on Computational Science XXV
  9. On creation of reference image for degraded documents binarisation
  10. A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities
  11. A Lightweight Implementation of Obstruction-Free Software Transactional Memory
  12. Flexible Cloud Architecture for Healthcare Applications
  13. Study on Handover Mechanism in Cellular Network: An Experimental Approach
  14. Dynamic discovery of query path on the lattice of cuboids using hierarchical data granularity and storage hierarchy
  15. Intrusion Detection in Wireless Ad-Hoc Networks
  16. Verification of i* models for existential compliance rules in remote healthcare systems
  17. Resource allocation in cloud using simulated annealing
  18. Gait recognition using partial silhouette-based approach
  19. Introduction
  20. Honesty and Trust-­Based IDS Solutions
  21. Intrusion Detection for Wireless Mesh Networks
  22. Future Trends in WAN Security
  23. Exploring Image Binarization Techniques
  24. Moving Object Detection Using Background Subtraction
  25. Conclusions
  26. Introduction
  27. Introduction
  28. Moving Object Detection Using Background Subtraction
  29. Conclusions
  30. Moving Object Detection: A New Approach
  31. Databases for Research
  32. Moving Object Detection Approaches, Challenges and Object Tracking
  33. A New Image Binarization Technique Using Iterative Partitioning
  34. A Framework for Creating Reference Image for Degraded Document Images
  35. A Comprehensive Survey on Image Binarization Techniques
  36. Applications of Binarization
  37. A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud
  38. Agent-Based Context Management for Service-Oriented Environments
  39. Modified Majority Voting Algorithm towards Creating Reference Image for Binarization
  40. Hyper Object Data Model: A Simple Data Model for Handling Semi-Structured Data
  41. Secure and trusted cloud of things
  42. A new voting-based mutual exclusion algorithm for distributed systems
  43. Static analysis techniques for robotics software verification
  44. Analysis and design of Learner Quanta Graph properties for efficient query processing in an adaptive dynamic courseware
  45. Dynamic query path selection from lattice of cuboids using memory hierarchy
  46. CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks
  47. Computer Networks & Communications (NetCom)
  48. Advances in Computing and Information Technology
  49. Advances in Computing and Information Technology
  50. Design of a New OFTM Algorithm towards Abort-Free Execution
  51. A Hierarchical Color Net Model for Smart Grid Security Monitoring
  52. Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
  53. On Generation of Silhouette of Moving Objects from Video
  54. Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication
  55. Bengali Printed Character Recognition – A New Approach
  56. Recognition of object orientation from images
  57. UNNOTI: Toolkit for Rural Service Modeling
  58. A Distributed Retail Beer Game for Decision Support System
  59. Materialized view construction using linear regression on attributes
  60. An Architecture to Maintain Materialized View in Cloud Computing Environment for OLAP Processing
  61. A new image binarization method using iterative partitioning
  62. Computer Information Systems and Industrial Management
  63. Advances in Computing and Information Technology
  64. Sustainable peer-based structure for content delivery networks
  65. DFRS
  66. Advances in Computer Science and Information Technology. Computer Science and Information Technology
  67. A New Scale for Attribute Dependency in Large Database Systems
  68. ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol
  69. TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
  70. A Hierarchical CPN Model for Mobility Analysis in Zone Based MANET
  71. Advances in Computer Science and Information Technology. Networks and Communications
  72. Advances in Computer Science and Information Technology. Computer Science and Engineering
  73. Image binarization using iterative partitioning: A global thresholding approach
  74. Modeling Smart Grid using Generalized Stochastic Petri Net
  75. The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
  76. A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems
  77. A light-weight, dynamic call admission control for sudden user influx management
  78. A New Trusted Third-Party Billing For Mobile Networks
  79. Efficient Traversal in Data Warehouse Based on Concept Hierarchy Using Galois Connections
  80. A Framework to Convert XML Schema to ROLAP
  81. Computer Information Systems – Analysis and Technologies
  82. Advances in Computing and Information Technology
  83. Trends in Network and Communications
  84. Advances in Network Security and Applications
  85. A Survey on the Semi-Structured Data Models
  86. A new agent based security framework for collaborative cloud environment
  87. Optimizing mobile terminal equipment for video-medic services
  88. Distributed framework for tele health monitoring system
  89. Agent Based Approach for Radio Resource Optimization for Cellular Networks
  90. On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method
  91. A Low Cost Moving Object Detection Method Using Boundary Tracking
  92. Trusted Third Party Synchronized Billing Framework using Multiple Authorizations by Multiple Owners (MAMO)
  93. A State-of-the-Art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
  94. On recognition of spoken Bengali numerals
  95. A comprehensive review on wormhole attacks in MANET
  96. An Improved Route Maintenance Strategy for QoS Based AODV Routing Protocol
  97. Design of QoS Routing Framework Based on OLSR Protocol
  98. LAR2P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET
  99. Object relational implementation of Graph based conceptual level Multidimensional Data Model
  100. Virtual Data Warehouse Modeling Using Petri Nets for Distributed Decision Making
  101. BHIDS: a new, cluster based algorithm for black hole IDS
  102. Recent Trends in Wireless and Mobile Networks
  103. FAPP: A New Fairness Algorithm for Priority Process Mutual Exclusion in Distributed Systems
  104. Recent Trends in Network Security and Applications
  105. Recent Trends in Networks and Communications
  106. WACA: A New Weighted Adaptive Clustering Algorithm for MANET
  107. E2IRP: A New Energy Efficient Integrated Routing Protocol for MANET
  108. Design of a low-cost positioning framework for location aided energy efficient routing
  109. A Secure Hypercube based Team Multicast Routing Protocois (S-HTMRP)
  110. PhishNet: Enhancing the Security Aspect of IMS Users
  111. Data diverse fault tolerant architecture for component based systems
  112. Modeling & analysis of transaction management for distributed database environment using Petri Nets
  113. Optimal Space and Time Complexity Analysis on the Lattice of Cuboids Using Galois Connections for Data Warehousing
  114. High Level Net Model for Analyzing Agent Base Distributed Decision Support System
  115. A study on QoS issues for mobile ad-hoc networks
  116. A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks
  117. HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks
  118. A Link-failure Resilient Token based Mutual Exclusion Algorithm for Directed Graph Topology
  119. A Novel Algorithm towards Designing the Protocol for Generation of Secret-Key with Authentication in Collaboration (PGSAC)
  120. ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks
  121. IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network
  122. Optimal Reactive Routing Protocol (ORRP): A New Reactive Routing Protocol for the Shortest Path in Ad Hoc Networks
  123. GDM: A New Graph Based Data Model Using Functional Abstractionx