


default search action
DSDE 2010: Bangalore, India
- Proceedings of the International Conference on Data Storage and Data Engineering, DSDE 2010, Bangalore, India, 9-10 February 2010. IEEE Computer Society 2010, ISBN 978-0-7695-3958-4

- Samaksh Kumar, Sidhant Sachdev:

Amalgamtion of Internet for Supervisory Control and Data Acquisition System (SCADA) Encompassing Security Issues. 1-4 - Mou Dasgupta

, G. P. Biswas:
Approximation of the Node-Pair Reliability of Data Communication Networks. 5-9 - Shyam Diwakar

, Krishnashree Achuthan, Prema Nedungadi
:
Biotechnology Virtual Labs - Integrating Wet-lab Techniques and Theoretical Learning for Enhanced Learning at Universities. 10-14 - Sunil Jacob

, Dhanasekaran Raghavan
:
Random Access OFDMA Network with Dynamic Resource Allocation. 15-19 - Janhavi Arvind Baikerikar, Sunil K. Surve

, Sapna U. Prabhu:
Comparison of Load Balancing Algorithms in a Grid. 20-23 - Ratnesh Litoriya

, Anshu Ranjan:
Implementation of Relational Algebra Interpreter Using Another Query Language. 24-28 - Maryam Shekofteh

:
A Survey of Algorithms in FCIM. 29-33 - Raghuraj Singh

, Prabhat Verma
, Avinash Kumar Singh
:
TC-GXML - A Transcoder for HTML to XML Grammar. 34-38 - Anjali A. Shejul

, Umesh L. Kulkarni:
A DWT Based Approach for Steganography Using Biometrics. 39-43 - B. M. Monjurul Alom, Frans A. Henskens

, Michael Richard Hannaford:
Optimization of Detected Deadlock Views of Distributed Database. 44-48 - Rupam Deb, Sumaya Kazary, Kazi Rafiqul Islam

, Reaz Ahmed:
Preserving Location Privacy in Peer-to-Peer Environments. 49-53 - M. Arun Kumar, Madan Gopal:

Binary Classification Using Linear SVM Pyramidal Tree. 54-58 - Shaojun Chen, Lianfen Huang, Jianan Lin, Zhiyuan Shi:

A Novel Structural Similarity with High Distinguishability. 59-62 - Rahman Mansouri, Mohamad Saraee, Rassoul Amirfattahi:

Application of Data Mining in Predicting Cell Phones Subscribers Behavior Employing the Contact Pattern. 63-68 - Xiao-lin Liang, Qing-zhen Yang:

Research on Fault Tree Based Complex Electronic Device Fault Diagnosis Expert System. 69-72 - Rekha Singhal, Shreya Bokare, Prasad Pawar:

Enterprise Storage Architecture for Optimal Business Continuity. 73-77 - Guixian Xu, Zhendong Niu

, Xu Gao, Yunjuan Cao, Yumin Zhao:
Active Learning Algorithm for Threshold of Decision Probability on Imbalanced Text Classification Based on Protein-Protein Interaction Documents. 78-82 - Haitao Chen, Husheng Liao:

A Comparative Study of View Update Problem. 83-89 - C. Emilin Shyni, S. Swamynathan:

Purpose Based Access Control for Privacy Protection in Object Relational Database Systems. 90-94 - Hongbo Zhu, Yaqiang Wang, Zhonghua Yu:

Clustering of Evolving Data Stream with Multiple Adaptive Sliding Window. 95-100 - Mohammed Abdul Qadeer, Afaq Hasan Khan:

Multimedia Distribution over IPTV and its Integration with IMS. 101-105 - Afaq Hasan Khan, Mohammed Abdul Qadeer:

Implementation of an IMS Testbed for Wired and Wireless Clients. 106-110 - Kun Ren, Zhanhuai Li, Chao Wang, Nan Jiang:

Design of Data Replication System on FreeBSD. 111-115 - Xiaoguang Ren, Yuhua Tang, Guibin Wang, Tao Tang, Xudong Fang:

Optimization and Implementation of LBM Benchmark on Multithreaded GPU. 116-122 - Yumin Zhao, Zhendong Niu

, Yujuan Cao, Lin Dai:
Research on Evaluation of Digital Library. 123-126 - Xin Huang, Beijun Shen, Delai Chen:

IT Service Support Process Meta-Modeling Based on ITIL. 127-131 - Huifang Shi, Wenhua Song, Qinggong Li:

Design and Implementation of Inference Engine in Safety Risk Assessment Expert System in Petrochemical Industry Based on Fault Tree. 132-136 - Fardin Akhlaghian Tab, Batool Arzanian, Parham Moradi

:
A Personalized Search Engine Using Ontology-Based Fuzzy Concept Networks. 137-141 - Muhammad Atif Iqbal, Athar Mohsin Zaidi, Saeed Murtaza:

A New Requirement Prioritization Model for Market Driven Products Using Analytical Hierarchical Process. 142-149 - M. Gomathi, P. Thangaraj:

Automated CAD for Lung Nodule Detection using CT Scans. 150-153 - Subramanyam G. Harihara, Balaji Janakiram, M. Girish Chandra, Aravind Kota Gopalakrishna

, Swanand Kadhe
, P. Balamuralidhar, B. S. Adiga:
SpreadStore: A LDPC Erasure Code Scheme for Distributed Storage System. 154-158 - T. Jayalakshmi, A. Santhakumaran:

A Novel Classification Method for Diagnosis of Diabetes Mellitus Using Artificial Neural Networks. 159-163 - Vibha Gaur, Anuja Soni, Punam Bedi

:
An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented Paradigm. 164-168 - M. Soranamageswari, C. Meena:

An Efficient Feature Extraction Method for Classification of Image Spam Using Artificial Neural Networks. 169-172 - T. V. Vijay Kumar, Vikram Singh

, Ajay Kumar Verma:
Generating Distributed Query Processing Plans Using Genetic Algorithm. 173-177 - Wen Wei, Zhang Heng Yang:

Increasing Packet Delivery Ratio in GPSR Using Buffer Zone Based Greedy Forwarding Strategy. 178-182 - Tejas R. Marawar, Swapnil P. Kale, Ketan I. Araspure:

E Governance. 183-186 - Mahesh Thylore Ramakrishna, Latha Kolal Gowdar, Malatesh Somashekar Havanur, Banur Puttappa Mallikarjuna Swamy:

Web Mining: Key Accomplishments, Applications and Future Directions. 187-191 - Sonali Bhadoria

, Chandrashekhar G. Dethe
:
Study of Medical Image Retrieval. 192-196 - M. V. Jagannatha Reddy, Saroj Kumar Gupta, B. Kavitha:

Noise Load Adaptive Filter Using Neural Network. 197-200 - (Withdrawn) Implementation of Embedded Mobile Database Based on Mobile Agent. 201-203

- (Withdrawn) A Residential District Building Environment Information System Based on WebGIS. 204-207

- (Withdrawn) A Novel Wavelet Image Compression Method Based on Zerotree Codec. 208-211

- Tao Zhang:

Investigation and Research on Physical Education Informationization in Higher Institutions. 212-215 - (Withdrawn) A Fast Timing Data Mining Technique Based on Grey System. 216-219

- K. Santhisree, A. Damodaram, S. Appaji, D. NagarjunaDevi:

Web Usage Data Clustering Using Dbscan Algorithm and Set Similarities. 220-224 - Vijay R. Sonawane

, Pratap P. Halkarnikar
:
Web Site Mining Using Entropy Estimation. 225-229 - Mohd. Sadiq, Jawed Ahmed

, Mohammad Asim, Aslam Qureshi, R. Suman:
More on Elicitation of Software Requirements and Prioritization Using AHP. 230-234 - Gresha Bhatia

, Hitesh Rohira, Daishik Mehta, Aniket Phatak, Ameya Gawde:
Aligning Raw Image to Real-time Coordinate System. 235-239 - Belaid Saad, Francine Herrmann

, Yann Lanuel
, Thomas Tamisier
:
DDCSP: Constraint Satisfaction Problem Used for Rule-Based System. 240-244 - Jiaxin Wu:

Web Data Visualization Based on the Function and Implementaion Dimension. 245-249 - Singh Vijendra

, Laxman Sahoo, Kelkar Ashwini:
An Effective Clustering Algorithm for Data Mining. 250-253 - Hasan Zafari, Keramat Hasani, Mohammad Ebrahim Shiri:

XLight, An Efficient Relational Schema to Store and Query XML Data. 254-257 - (Withdrawn) Design and Implementation on System Model of Government Knowledge Management Based on Multi-Agent. 258-260

- (Withdrawn) Distributed Data Mining Algorithm in Electronic Commerce Environment. 261-264

- K. Sashi, Antony Selvadoss Thanamani:

A New Replica Creation and Placement Algorithm for Data Grid Environment. 265-269 - P. P. Abdul Haleem, M. P. Sebastian:

A Layered Architecture for Checking Rewriting Attacks in Resource Constrained Networks. 270-274 - Niju P. Joseph

, G. Radhamani:
Determining Robust Solutions in Supply Chain Using Genetic Algorithm. 275-277 - Shubhalaxmi Joshi, Umesh Patwardhan, Pallavi Deshpande:

Raid 5 for Secured Storage Virtualisation. 278-282 - M. Daris Femila, A. Anthony Irudhayaraj:

On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics. 283-286 - Sandeep Patil, Abhinay Nagpal:

Agile Disk Replacement Strategy for Data Cloud Environment Using Evolutionary Algorithms. 287-291 - Bingyi Gao, Yuxia Xin:

A Coplanar Waveguide Power Divider and It's Neural Network Model. 292-295 - Basit Raza

, Abdul Mateen, Muhammad Sher
, Mian M. Awais, Tauqeer Hussain:
Autonomicity in Oracle Database Management System. 296-300 - Xing-xing Wang, Jian-tao Bi:

Discuss on the Researching and Using Geo-Spatial Technology In the History Changing of the Silk Road. 301-304 - Naseeb Ahmed Adnan, Md. Sajedul Islam:

Correction and Interpolation of Noise Corrupted Voice Using Markov Chain Detection Technique. 305-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














