{"title":"Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System","authors":"Tulsidas Patil, G. Bhutkar, N. Tarapore","doi":"10.1007/978-3-642-31513-8_33","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_33","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126324181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator","authors":"Manjusha Karkhanis, Achala Deshmukh","doi":"10.1007/978-3-642-31513-8_39","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_39","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126498510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Plugging DHCP Security Holes Using S-DHCP","authors":"Amit Kumar Srivastava, A. Misra","doi":"10.1007/978-3-642-31513-8_23","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_23","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV","authors":"Chaitali Biswas Dutta, U. Biswas","doi":"10.1007/978-3-642-31513-8_21","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_21","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128236994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Based Image Retrieval System for Web Images","authors":"K. Umesh, Suresha","doi":"10.1007/978-3-642-31600-5_48","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_48","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125705478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement in MIMO Systems Using Rotating Codebooks","authors":"J. Julia, Meenakshi Murugappan","doi":"10.1007/978-3-642-31513-8_50","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_50","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130797958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment","authors":"M. Goyal, A. Aggarwal","doi":"10.1007/978-3-642-31513-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_16","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Particle Based Fluid Animation Using CUDA","authors":"U. Nuli, P. Kulkarni","doi":"10.1007/978-3-642-31552-7_51","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_51","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"10170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network","authors":"Chandra Thapa, C. Chandrasekhar","doi":"10.1007/978-3-642-31513-8_37","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_37","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133397014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Cryptography Technique on Perturbed Data in Distributed Environment","authors":"Nishant Goswami, Tarulata Chauhan, Nishant Doshi","doi":"10.1007/978-3-642-31513-8_24","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_24","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133022113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}