


default search action
9. QSHINE 2013: Greader Noida, India
- Karan Singh, Amit K. Awasthi

:
Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 115, Springer 2013, ISBN 978-3-642-37948-2
Network
- Rahul Johari

, Neelima Gupta, Sandhya Aneja
:
DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers. 1-15 - Karan Singh

, Rama Shankar Yadav:
Integrated Approach for Multicast Source Authentication and Congestion Control. 16-30 - Rajeev Agrawal, Amit Sehgal:

Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network Parameter. 31-41 - Gayatri Sakya

, Vidushi Sharma:
Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2). 42-51 - Bahuguna Renu, Hardwari Lal Mandoria, Tayal Pranavi:

Routing Protocols in Mobile Ad-Hoc Network: A Review. 52-60 - Jolly Parikh

, Anuradha Basu
:
Carrier Aggregation for Enhancement of Bandwidth in 4G Systems. 61-74 - Anubhuti Roda Mohindra, Charu Kumar:

A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc Networks. 75-85 - Chandan Kumar Sonkar, Om Prakash Sangwan

, Arun Mani Tripathi:
Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks. 86-103 - Raju Pal, Ritu Sindhu, Ajay K. Sharma:

SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNs. 104-114 - Anil Kumar Sagar

, D. K. Lobiyal:
Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor Network. 115-127 - Tamoghna Ojha, Sudip Misra:

HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor Networks. 128-140 - Puneet Azad

, Vidushi Sharma
:
Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor Networks. 141-154 - Sarbari Mitra, Sourav Mukhopadhyay:

Key Pre-distribution in a Non-uniform Network Using Combinatorial Design. 155-170 - Seyed Dawood Sajjadi Torshizi

, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala:
FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks. 171-184 - Rajesh Duvvuru

, Sunil Kumar Singh, Gudikhandula Narasimha Rao, Ashok Kote, Bangaru Bala Krishna, Moturu Vijaya Raju:
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. 185-196 - Prabhat Kumar Sharma, Parul Garg:

The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading Channels. 197-206 - Sohan Kumar Yadav, D. K. Lobiyal:

Power Efficient MAC Protocol for Mobile Ad Hoc Networks. 207-217 - Akanksha Bhardwaj

, Prachi Badera, K. Rajalakshmi:
Fault Tolerant Range Grouping Routing in Dynamic Networks. 218-227 - Arup Kr. Chattopadhyay, Chandan Kumar Bhattacharyya

:
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN Units. 228-237 - Samayveer Singh, Satish Chand, Bijendra Kumar:

3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs. 238-247 - Manish Kumar, Itika Gupta, Sudarshan Tiwari, Rajeev Tripathi

:
A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor Networks. 248-260 - Ratnesh Prasad Srivastava, Hardwari Lal Mandoria, Rajesh Nautiyal:

Mobile Based Attendance System in Distributed LAN Server. 261-272
Robustness
- Shyam Lal, Rahul Kumar, Mahesh Chandra:

An Improved Method for Contrast Enhancement of Real World Hyperspectral Images. 273-282 - Rohtash Dhiman

, Priyanka, Jasbir Singh Saini
:
Wavelet Analysis of Electrical Signals from Brain: The Electroencephalogram. 283-289 - Sanjeev Jain, Indrasen Singh

, Vijay Shanker Tripathi, Sudarshan Tiwari:
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN Application. 290-297 - P. Mahesha

, D. S. Vinod
:
Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVM. 298-308 - Reema Aswani, N. Hema:

RoboGardner: A Low-Cost System with Automatic Plant Identification Using Markers. 309-324 - Amir Khan, Mohd. Hasan

, Anwar Sadat, Shamsuz Z. Usmani:
6H-SiC Based Power VJFET and Its Temperature Dependence. 325-332 - Akansha Mehrotra, Krishna Kant Singh, Kirat Pal, M. J. Nigam:

Change Detection from Satellite Images Using PNN. 333-340 - Rajendra P. Payasi, Asheesh Kumar Singh

, Devender Singh:
Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load Models. 341-357 - Indrasen Singh

, Sanjeev Jain, Vijay Shanker Tripathi, Sudarshan Tiwari:
Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit Cell. 358-364 - Bhavnesh Kumar

, Yogesh Kumar Chauhan
, Vivek Shrivastava
:
Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping System. 365-376 - Himani Mittal, Dinesh Chandra, Arvind Tiwari:

Design of Low Power FSM Using Verilog in VLSI. 377-386 - Farid Arfi, Jean-Michel Ilié

, Djamel-Eddine Saïdouni:
Pruning Search Spaces of RATA Model for the Job-Shop Scheduling. 387-401 - Goutam Datta

, Bushan L. Raina:
Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite Graphs. 402-414 - Suddhasil De, Diganta Goswami, Sukumar Nandi:

Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks. 415-430 - Ajay Kumar Maurya, Yogesh Kumar Chauhan

:
Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power Filter. 431-440 - Manoj Pandey, Dorothi Borgohain, Gargi Baruah, Jagpal Singh Ubhi, Kota Solomon Raju

:
Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft Processor. 441-450 - Asutosh Kar

, Mahesh Chandra:
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length Selection. 451-460
Security
- Mayank Tiwari, Rajeshwar Kumar, Shaivya Jindal, Pankaj Sharma, Priyanshu:

An Efficient and Secure Micro-payment Transaction Using Shell Cryptography. 461-469 - Navaid Z. Rizvi, Raaziyah Shamim, Rajesh Mishra, Sandeep Sharma:

High Speed Reconfigurable FPGA Based Digital Filter. 470-478 - Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna

, N. Saraf, Anant Gupta, Rajesh Mishra:
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System. 479-484 - Kumar Chanchal, D. K. Lobiyal:

NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack. 485-495 - D. Chandramohan, T. Vengattaraman, D. Rajaguru, Ramachandran Baskaran, P. Dhavachelvan:

A Privacy Preserving Representation for Web Service Communicators' in the Cloud. 496-506 - Niranjan Lal

, Shamimul Qamar, Mayank Singh:
Detailed Dominant Approach Cloud Computing Integration with WSN. 507-516 - Tapasi Bhattacharjee, Jyoti Prakash Singh:

Secret Image Sharing Scheme Based on Pixel Replacement. 517-526 - Pritom Rajkhowa, Shyamanta M. Hazarika

, Guillermo Ricardo Simari:
An Application of Defeasible Logic Programming for Firewall Verification and Reconfiguration. 527-542 - Shalini Bhartiya

, Deepti Mehrotra
:
Threats and Challenges to Security of Electronic Health Records. 543-559 - Deep Singh

, Maheshanand Bhaintwal:
On Second-Order Nonlinearities of Two Classes of Cubic Boolean Functions. 560-567 - Dheerendra Mishra

, Sourav Mukhopadhyay:
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System. 568-577 - Narayan Gowraj, Srinivas Avireddy, Sruthi Prabhu:

GAS: A Novel Grid Based Authentication System. 578-590 - Jyotsna Singh, Parul Garg, Alok Nath De:

Multiplicative Watermarking of Audio in Spectral Domain. 591-605 - Karanbir Singh

, Navdeep Kaur, Deepa Nehra:
A Comparative Analysis of Various Deployment Based DDoS Defense Schemes. 606-616 - Xinxin Fan, Kalikinkar Mandal, Guang Gong:

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. 617-632 - Rohit Ranchal, Bharat K. Bhargava:

Protecting PLM Data Throughout Their Lifecycle. 633-642 - Kalikinkar Mandal, Guang Gong:

Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. 643-657 - Yashpal Dutta, Varun Sethi:

Performance Analysis of Cryptographic Acceleration in Multicore Environment. 658-667 - Sandeep Sharma, Rajesh Mishra, Karan Singh:

A Review on Wireless Network Security. 668-681 - Sahadeo Padhye

, Namita Tiwari
:
Improved Proxy Signature Scheme without Bilinear Pairings. 682-688 - Arvind Kumar, Pawan Singh Mehra

, Gagan Gupta, Manika Sharma:
Enhanced Block Playfair Cipher. 689-695 - A. Balu

, Kuppusamy Krishnamoorthy
:
Ciphertext-Policy Attribute-Based Encryption with User Revocation Support. 696-705 - Ashok Kumar Nanda

, Lalit Kumar Awasthi:
A Proposal for SMS Security Using NTRU Cryptosystem. 706-718 - Sonam Devgan Kaul, Amit K. Awasthi

:
Analysis and Improvement of an Authentication Scheme Using Smart Cards. 719-728 - Keerti Srivastava

, Amit K. Awasthi
, R. C. Mittal:
A Review on Remote User Authentication Schemes Using Smart Cards. 729-749 - Adarsh Kumar, Krishna Gopal, Alok Aggarwal

:
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks. 750-763 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:

Image Secret Sharing in Stego-Images with Authentication. 764-770 - Ankita Chaturvedi, Aditi Kar Gangopadhyay:

On Generalized Nega-Hadamard Transform. 771-777 - Kirat Pal Singh

, Shivani Parmar, Dilip Kumar:
Design of High Performance MIPS Cryptography Processor. 778-793 - Arup Kumar Pal, Tarok Pramanik:

Design of an Edge Detection Based Image Steganography with High Embedding Capacity. 794-800 - Riaz Ahmed Shaikh

, Ahmed Saeed Alzahrani:
Trust Management Method for Vehicular Ad Hoc Networks. 801-815 - Dhiraj Pandey

, Anil Kumar
, Yudhvir Singh
:
Feature and Future of Visual Cryptography Based Schemes. 816-830 - Gambhir Mohit, M. N. Doja, Moinuddin:

A Novel Framework for Users' Accountability on Online Social Networks. 831-841 - Dindayal Mahto, Dilip Kumar Yadav:

Network Security Using ECC with Biometric. 842-853 - Ravi Kishore Kodali, Sushant Chougule:

Hybrid Key Management Technique for WSN's. 854-865 - Nagaraj Ambika

, G. T. Raju:
DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor Network. 866-878 - Manisha Manjul

, Rakesh Kumar
, Rajesh Mishra:
Security Improvement in Group Key Management. 879-893 - Niranjan Lal

, Shamimul Qamar, Mayank Singh:
Detailed Dominant Approach Cloud Computing Integration with WSN. 894-903
Reliability
- Rudra Pratap Ojha

, Rama Shankar Yadav, Sarsij Tripathi
:
Secure Real Time Scheduling on Cluster with Energy Minimization. 904-914 - Babu Sean Paul, Suvendi Rimer

:
Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding Vegetation. 915-927 - Remani Naga Venkata Jagan Mohan, Vegi Srinivas, Kurra Rajasekhara Rao:

Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-Peer. 928-938 - Mohd Ashraf

, Rajesh Mishra:
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved Reliability. 939-950 - Devpriya Soni:

Evaluation of Understandability of Object-Oriented Design. 951-961 - Ajeet Kumar Pandey, Srinivas Panchangam, Jessy George Smith:

Safety Analysis of Automatic Door Operation for Metro Train: A Case Study. 962-974 - Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:

A Generalized Model for Internet-Based Access Control Systems with Delegation Support. 975-988
Quality of Service
- Pooja Gupta, Brijesh Kumar

, Bushan L. Raina:
QoS Support Downlink for WiMAX Network. 989-997 - Akhilendra Pratap Singh

, O. P. Vyas, Shirshu Varma:
A Framework of Service Selection and Composition for Flexible Network Architecture. 998-1007

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














