... International Conference on Contemporary Computing. IC3 (Conference)最新文献

筛选
英文 中文
Context Based Relevance Evaluation of Web Documents 基于上下文的Web文档相关性评价
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_24
Pooja Gupta
{"title":"Context Based Relevance Evaluation of Web Documents","authors":"Pooja Gupta","doi":"10.1007/978-3-642-32129-0_24","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_24","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"201-212"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73969429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services 使用安全服务级别协议访问云服务的身份验证和授权接口
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_38
D. Bajpai, M. Vardhan, D. S. Kushwaha
{"title":"Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services","authors":"D. Bajpai, M. Vardhan, D. S. Kushwaha","doi":"10.1007/978-3-642-32129-0_38","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_38","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"121 1","pages":"370-382"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85261603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Range Grouping for Routing in Dynamic Networks 动态网络中路由的范围分组
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_15
P. Badera, Akanksha Bhardwaj, K. Rajalakshmi
{"title":"Range Grouping for Routing in Dynamic Networks","authors":"P. Badera, Akanksha Bhardwaj, K. Rajalakshmi","doi":"10.1007/978-3-642-32129-0_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_15","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"95-105"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90445936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks 移动Ad Hoc网络的高效分层阈值对称组密钥管理协议
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_35
Adarsh Kumar, A. Aggarwal, Charu
{"title":"Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks","authors":"Adarsh Kumar, A. Aggarwal, Charu","doi":"10.1007/978-3-642-32129-0_35","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_35","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"32 1","pages":"335-346"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82223135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space 耗散半空间上均匀基底中扭转表面波的行为
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_18
S. Vishwakarma, Shishir Gupta
{"title":"Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space","authors":"S. Vishwakarma, Shishir Gupta","doi":"10.1007/978-3-642-32129-0_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_18","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"51 1","pages":"130-140"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77767156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Heuristic for Subgraph Isomorphism Problem 子图同构问题的启发式发展
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_10
Saifuddin Kaijar, S. Bhavani
{"title":"Developing Heuristic for Subgraph Isomorphism Problem","authors":"Saifuddin Kaijar, S. Bhavani","doi":"10.1007/978-3-642-32129-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_10","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"40-52"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77624336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Routing Table Implementation Using Integer Data Structure 使用整数数据结构实现路由表
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_27
P. Manasa, M. Prasad, T. Rani
{"title":"Routing Table Implementation Using Integer Data Structure","authors":"P. Manasa, M. Prasad, T. Rani","doi":"10.1007/978-3-642-32129-0_27","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_27","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"318 1","pages":"238-249"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75438593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Consumption in Multi-core Processors 多核处理器的功耗
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_3
M. Balakrishnan
{"title":"Power Consumption in Multi-core Processors","authors":"M. Balakrishnan","doi":"10.1007/978-3-642-32129-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_3","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"62 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment 云环境下防范DDoS攻击的混合入侵检测体系结构
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_53
Sanchika Gupta, Susmita Horrow, A. Sardana
{"title":"A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment","authors":"Sanchika Gupta, Susmita Horrow, A. Sardana","doi":"10.1007/978-3-642-32129-0_53","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_53","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"55 1","pages":"498-499"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90894044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Big Data and Compressive Sensing 大数据和压缩感知
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_5
H. T. Kung
{"title":"Big Data and Compressive Sensing","authors":"H. T. Kung","doi":"10.1007/978-3-642-32129-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_5","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86733205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信