International Conference on Advanced Computing, Networking and Security最新文献

筛选
英文 中文
Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method 基于规则定向像素比较(RDPC)方法的直线检测
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_14
V. AnandT., M. S. Nair, R. Tatavarti
{"title":"Detection of Straight Lines Using Rule Directed Pixel Comparison (RDPC) Method","authors":"V. AnandT., M. S. Nair, R. Tatavarti","doi":"10.1007/978-3-642-29280-4_14","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_14","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks 排队算法在DDOS攻击中对缓冲区大小和攻击强度的影响
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_62
A. Bhandari, A. L. Sangal, K. Saluja
{"title":"Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks","authors":"A. Bhandari, A. L. Sangal, K. Saluja","doi":"10.1007/978-3-642-29280-4_62","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_62","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Obstacle Aware Routing in 3D Integrated Circuits 三维集成电路中的障碍物感知路由
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_53
P. Ghosal, H. Rahaman, Satrajit Das, Arindam Das, P. Dasgupta
{"title":"Obstacle Aware Routing in 3D Integrated Circuits","authors":"P. Ghosal, H. Rahaman, Satrajit Das, Arindam Das, P. Dasgupta","doi":"10.1007/978-3-642-29280-4_53","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_53","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Covertness Analysis of Subliminal Channels in Legitimate Communication 合法交际中潜意识渠道的隐蔽性分析
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_68
H. S. Gururaja, M. Seetha, Dr. Anjan K Koundinya
{"title":"Covertness Analysis of Subliminal Channels in Legitimate Communication","authors":"H. S. Gururaja, M. Seetha, Dr. Anjan K Koundinya","doi":"10.1007/978-3-642-29280-4_68","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_68","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Node - Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks - A Survey and Conceptual Modeling 无线传感器网络的节点-链路不相交多路径路由协议综述和概念建模
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_48
K. MuniVenkateswarlu, K. Chandrasekaran, A. Kandasamy
{"title":"Node - Link Disjoint Multipath Routing Protocols for Wireless Sensor Networks - A Survey and Conceptual Modeling","authors":"K. MuniVenkateswarlu, K. Chandrasekaran, A. Kandasamy","doi":"10.1007/978-3-642-29280-4_48","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_48","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration 处理身份验证分层配置中拜占庭故障的协议协议
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_71
P. Saini, Awadhesh Kumar Singh
{"title":"An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration","authors":"P. Saini, Awadhesh Kumar Singh","doi":"10.1007/978-3-642-29280-4_71","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_71","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments MANET环境下会话保证的k弹性服务器同步协议
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_35
Lukasz Piatkowski
{"title":"K-Resilient Server Synchronization Protocol for Session Guarantees in MANET Environments","authors":"Lukasz Piatkowski","doi":"10.1007/978-3-642-29280-4_35","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_35","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs 基于异构固定节点的无线传感器网络中间件服务救援与犯罪信息系统
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_46
N. Chandrakant, A. Bijil, P. D. Shenoy, K. Venugopal, L. Patnaik
{"title":"Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs","authors":"N. Chandrakant, A. Bijil, P. D. Shenoy, K. Venugopal, L. Patnaik","doi":"10.1007/978-3-642-29280-4_46","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_46","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PEAL - Packed Executable AnaLysis 包装可执行分析
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_28
V. Laxmi, M. Gaur, Parvez Faruki, Smita Naval
{"title":"PEAL - Packed Executable AnaLysis","authors":"V. Laxmi, M. Gaur, Parvez Faruki, Smita Naval","doi":"10.1007/978-3-642-29280-4_28","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_28","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch 变邻域搜索引导的非凸经济负荷调度差分进化
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_30
J. Jasper, T. Victoire
{"title":"Variable Neighborhood Search Guided Differential Evolution for Non Convex Economic Load Dispatch","authors":"J. Jasper, T. Victoire","doi":"10.1007/978-3-642-29280-4_30","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_30","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信