... International Conference on Contemporary Computing. IC3 (Conference)最新文献

筛选
英文 中文
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks 移动Ad Hoc网络的高效分层阈值对称组密钥管理协议
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_35
Adarsh Kumar, A. Aggarwal, Charu
{"title":"Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks","authors":"Adarsh Kumar, A. Aggarwal, Charu","doi":"10.1007/978-3-642-32129-0_35","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_35","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"32 1","pages":"335-346"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82223135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Range Grouping for Routing in Dynamic Networks 动态网络中路由的范围分组
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_15
P. Badera, Akanksha Bhardwaj, K. Rajalakshmi
{"title":"Range Grouping for Routing in Dynamic Networks","authors":"P. Badera, Akanksha Bhardwaj, K. Rajalakshmi","doi":"10.1007/978-3-642-32129-0_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_15","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"95-105"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90445936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context Based Relevance Evaluation of Web Documents 基于上下文的Web文档相关性评价
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_24
Pooja Gupta
{"title":"Context Based Relevance Evaluation of Web Documents","authors":"Pooja Gupta","doi":"10.1007/978-3-642-32129-0_24","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_24","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"24 1","pages":"201-212"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73969429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services 使用安全服务级别协议访问云服务的身份验证和授权接口
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_38
D. Bajpai, M. Vardhan, D. S. Kushwaha
{"title":"Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services","authors":"D. Bajpai, M. Vardhan, D. S. Kushwaha","doi":"10.1007/978-3-642-32129-0_38","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_38","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"121 1","pages":"370-382"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85261603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space 耗散半空间上均匀基底中扭转表面波的行为
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_18
S. Vishwakarma, Shishir Gupta
{"title":"Behaviour of Torsional Surface Wave in a Homogeneous Substratum over a Dissipative Half Space","authors":"S. Vishwakarma, Shishir Gupta","doi":"10.1007/978-3-642-32129-0_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_18","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"51 1","pages":"130-140"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77767156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Heuristic for Subgraph Isomorphism Problem 子图同构问题的启发式发展
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_10
Saifuddin Kaijar, S. Bhavani
{"title":"Developing Heuristic for Subgraph Isomorphism Problem","authors":"Saifuddin Kaijar, S. Bhavani","doi":"10.1007/978-3-642-32129-0_10","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_10","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"40-52"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77624336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Routing Table Implementation Using Integer Data Structure 使用整数数据结构实现路由表
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_27
P. Manasa, M. Prasad, T. Rani
{"title":"Routing Table Implementation Using Integer Data Structure","authors":"P. Manasa, M. Prasad, T. Rani","doi":"10.1007/978-3-642-32129-0_27","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_27","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"318 1","pages":"238-249"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75438593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Consumption in Multi-core Processors 多核处理器的功耗
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_3
M. Balakrishnan
{"title":"Power Consumption in Multi-core Processors","authors":"M. Balakrishnan","doi":"10.1007/978-3-642-32129-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_3","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"62 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment 云环境下防范DDoS攻击的混合入侵检测体系结构
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_53
Sanchika Gupta, Susmita Horrow, A. Sardana
{"title":"A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment","authors":"Sanchika Gupta, Susmita Horrow, A. Sardana","doi":"10.1007/978-3-642-32129-0_53","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_53","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"55 1","pages":"498-499"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90894044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Big Data and Compressive Sensing 大数据和压缩感知
... International Conference on Contemporary Computing. IC3 (Conference) Pub Date : 2012-08-06 DOI: 10.1007/978-3-642-32129-0_5
H. T. Kung
{"title":"Big Data and Compressive Sensing","authors":"H. T. Kung","doi":"10.1007/978-3-642-32129-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-32129-0_5","url":null,"abstract":"","PeriodicalId":72026,"journal":{"name":"... International Conference on Contemporary Computing. IC3 (Conference)","volume":"54 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86733205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信