All Stories

  1. Divide-and-Conquer Computational Approach to Principal Component Analysis
  2. Performance Improvement of MapReduce Framework in Heterogeneous Context using Reinforcement Learning
  3. Global Modular Principal Component Analysis
  4. An effective and intelligent driver assistance and warning system for sustained safety
  5. A Topology-aware Contributory Load based Channel Assignment algorithm for WMN
  6. A review of adaptive approaches to MapReduce scheduling in heterogeneous environments
  7. A theoretical investigation of feature partitioning principal component analysis methods
  8. A survey of distance/similarity measures for categorical data
  9. A topology preserving cluster-based channel assignment for wireless mesh networks
  10. Segmentation of closely set and touching lines in handwritten document images using fringe maps
  11. An Improved Approach of Dictionary Based Syntactic PR Using Trie
  12. New route discovery design for routing misbehaviour prevention in multi-hop wireless sensor networks
  13. Computational and space complexity analysis of SubXPCA
  14. Designing a high quality online course: A process driven approach using UML
  15. A Performance study of MANETs using a Trust Mechanism
  16. A two phased service oriented Broker for replica selection in data grids
  17. Performance Analysis of Routing Metrics for MultiRadio MultiChannel WMN
  18. A syntactic PR approach to Telugu handwritten character recognition
  19. A Method to Improve the Performance of endairA for MANETs
  20. An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
  21. Towards Improving the Accuracy of Telugu OCR Systems
  22. Fringe Map Based Text Line Segmentation of Printed Telugu Document Images
  23. Using Machine Learning Techniques for Performance Prediction on Multi-Cores
  24. Some Observations on Algorithms for Computing Minimum Independent Dominating Set
  25. Machine Learning Based Performance Prediction for Multi-core Simulation
  26. Enhanced Data Replication Broker
  27. Using Fringe Maps for Text Line Segmentation in Printed or Handwritten Document Images
  28. Replica Selection in Data Grids Using Preconditioning of Decision Attributes by K-means Clustering (K-RSDG)
  29. An Investigation on Recent Advances in Feature Partitioning Based Principal Component Analysis Methods
  30. Smart Replica Selection for Data Grids Using Rough Set Approximations (RSDG)
  31. Rough set clustering approach to replica selection in data grids (RSCDG)
  32. Performance Prediction on Multi-core Processors
  33. SubXPCA versus PCA: A Theoretical Investigation
  34. A Novel Stroke Width Based Binarization Method to Handle Closely Spaced Thick Characters
  35. Interference-traffic aware Channel Assignment for MRMC WMNs
  36. A Machine Learning Based Meta-Scheduler for Multi-Core Processors
  37. A Distributed Cluster based Interference-Traffic aware CA for MRMC WMN
  38. Authentication and dynamic key management protocol based on certified tokens for manets
  39. On Prediction Accuracy of Machine Learning Algorithms for Characterizing Shared L2 Cache Behavior of Programs on Multicore Processors
  40. CHANNEL ASSIGNMENT IN WMNS: ISSUES AND SOLUTIONS
  41. Robust Text Line, Word And Character Extraction from Telugu Document Image
  42. Progress in Gujarati Document Processing and Character Recognition
  43. Characterizing L2 cache behavior of programs on multi-core processors: Regression models and their transferability
  44. Multi-domain delegation and revocation model for grid systems
  45. Computing segmented backups using Resilient Routing Layers
  46. Cluster based multihop security protocol in MANET using ECC
  47. An energy efficient security provisioning scheme for TinySec in wireless sensor networks
  48. SubXPCA and a generalized feature partitioning approach to principal component analysis
  49. Novel approaches to principal component analysis of image data based on feature partitioning framework
  50. QoS-Aware Dynamic Source Routing Using Diffserv Principles
  51. Intramodal Palmprint Authentication
  52. Wavelet Feature Based Confusion Character Sets for Gujarati Script
  53. An approach to self-embedding document watermarking based on LZW algorithm
  54. An approach to adaptive steganography based on matrix embedding
  55. A feature partitioning approach to subspace classification
  56. A High Embedding Capacity Approach to Adaptive Steganography
  57. Effect of Adapter Promiscuous Mode Operation on DSR Performance in MANETs
  58. Indirect Authorization Topologies for Grid Access Control
  59. A Palmprint Classification Scheme using Heart Line Feature Extraction
  60. Mutual Authentication and Key Agreement based on Elliptic Curve Cryptography for GSM
  61. An Attribute Partitioning Approach to Correlation Connected Clusters
  62. Grid Security Through Delegation of Roles
  63. A Study of Effectiveness in Masquerade Detection
  64. A Filtering Based Approach to Adaptive Steganography
  65. Applying Machine Learning Techniques to Improve Linux Process Scheduling
  66. Zone identification in the printed Gujarati text
  67. A Hybrid Method to Intrusion Detection Systems Using HMM
  68. State Estimation and Tracking Problems: A Comparison Between Kalman Filter and Recurrent Neural Networks
  69. On Reduction of Bootstrapping Information Using Digital Multisignature
  70. Unsupervised texture segmentation using Hermite transform filters
  71. A Scalable and Adaptive Clustering Scheme for MANETs
  72. Dynamic Delegation Approach for Access Control in Grids
  73. A Machine Learning Based Meta-Scheduler for Multi-Core Processors
  74. A Machine Learning Based Meta-Scheduler for Multi-Core Processors
  75. Using Machine Learning Techniques for Performance Prediction on Multi-Cores
  76. Masquerade Detection Based Upon GUI User Profiling in Linux Systems