International Conference on Advanced Computing, Networking and Security最新文献

筛选
英文 中文
Self Healing Wireless Sensor Network 自修复无线传感器网络
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_49
S. Sumathi, M. Chandrasekaran
{"title":"Self Healing Wireless Sensor Network","authors":"S. Sumathi, M. Chandrasekaran","doi":"10.1007/978-3-642-29280-4_49","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_49","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125059874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Approach for Color Edge Detection with Automatic Threshold Detection 基于自动阈值检测的颜色边缘检测方法
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_13
D. ArpithaM., M. P. Arakeri, G. R. M. Reddy
{"title":"An Approach for Color Edge Detection with Automatic Threshold Detection","authors":"D. ArpithaM., M. P. Arakeri, G. R. M. Reddy","doi":"10.1007/978-3-642-29280-4_13","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_13","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132375790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext 基于隐式访问结构密文策略属性的恒长密文加密
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_60
Nishant Doshi, D. Jinwala
{"title":"Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext","authors":"Nishant Doshi, D. Jinwala","doi":"10.1007/978-3-642-29280-4_60","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_60","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation 利用异或运算降低计算成本的付费电视系统密钥分配
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_56
P. Vijayakumar, S. Bose, A. Kannan
{"title":"Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation","authors":"P. Vijayakumar, S. Bose, A. Kannan","doi":"10.1007/978-3-642-29280-4_56","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_56","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CBRM - Cluster Based Replica Management in Mobile Adhoc Networks 移动Adhoc网络中基于集群的副本管理
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_40
Rajeev Kumar, Prashant S. Kumar, N. Chauhan
{"title":"CBRM - Cluster Based Replica Management in Mobile Adhoc Networks","authors":"Rajeev Kumar, Prashant S. Kumar, N. Chauhan","doi":"10.1007/978-3-642-29280-4_40","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_40","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anonymity in Attribute-Based Group Signatures 基于属性的组签名的匿名性
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_58
Bhumika K. Patel, D. Jinwala
{"title":"Anonymity in Attribute-Based Group Signatures","authors":"Bhumika K. Patel, D. Jinwala","doi":"10.1007/978-3-642-29280-4_58","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_58","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contention Detection and Minimization in All Optical Routers 全光路由器中的争用检测与最小化
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_50
Surinder Singh, M. Garg
{"title":"Contention Detection and Minimization in All Optical Routers","authors":"Surinder Singh, M. Garg","doi":"10.1007/978-3-642-29280-4_50","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_50","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129538349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks 改进的无线传感器网络负载均衡聚类算法
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_47
P. Kuila, P. K. Jana
{"title":"Improved Load Balanced Clustering Algorithm for Wireless Sensor Networks","authors":"P. Kuila, P. K. Jana","doi":"10.1007/978-3-642-29280-4_47","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_47","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation 基于边缘辅助小波插值的高质量图像压缩技术
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_16
A. Joseph, Baskaran Ramachandran
{"title":"Enhanced Quality Preserved Image Compression Technique Using Edge Assisted Wavelet Based Interpolation","authors":"A. Joseph, Baskaran Ramachandran","doi":"10.1007/978-3-642-29280-4_16","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_16","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122486286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology 农村地区的电子治理:WiMAX技术的绩效案例研究
International Conference on Advanced Computing, Networking and Security Pub Date : 2011-12-16 DOI: 10.1007/978-3-642-29280-4_33
R. Jha, U. Dalal
{"title":"Electronic Governance in Rural Areas: A Performance Case Study with WiMAX Technology","authors":"R. Jha, U. Dalal","doi":"10.1007/978-3-642-29280-4_33","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_33","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信