Scaling web Services by offloading expensive computation to a many-core GPGPU using CUDA (English)
- New search for: Gupta, Gaurav
- New search for: Gupta, Gaurav
In:
2015 International Conference on Computing and Network Communications (CoCoNet)
;
516-519
;
2015
- Conference paper / Electronic Resource
-
Title:Scaling web Services by offloading expensive computation to a many-core GPGPU using CUDA
-
Contributors:Gupta, Gaurav ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2015-12-01
-
Size:360602 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Copyright page| 2015
- 1
-
Table of contents| 2015
- 1
-
Committees| 2015
- 1
-
Ubiquitous fall detection through wireless channel state informationMaheshwari, Saurabh / Tiwari, Anil K. et al. | 2015
- 1
-
Program| 2015
- 10
-
Policy-based monitoring and energy management for NFV Data CentersKrishnan, Ram / Hinrichs, Tim / Krishnawamy, Dilip / Krishnaswamy, Ruby et al. | 2015
- 18
-
GPGPU implementation of information theoretic algorithms for the analysis of granular layer neuronsNair, Manjusha / Madhu, Prasanth / Mohan, Vyshnav / Rajendran, Arathi G / Nair, Bipin / Diwakar, Shyam et al. | 2015
- 27
-
Deployment of Wireless Sensor Network for radiation monitoringEbenezer, Jemimah / Murty, SAV Satya et al. | 2015
- 33
-
Oracle model to validate shoulder-surfing resistance of virtual keyboardsAriharan V, et al. | 2015
- 41
-
RiCoBiT - Ring Connected Binary Tree: A structured and scalable architecture for Network On Chip based systemsSanju V, / Chiplunkar, Niranjan et al. | 2015
- 50
-
Adaptation of multi-domain corpus learned seeds and polarity lexicon for sentiment analysisSanagar, Swati / Gupta, Deepa et al. | 2015
- 59
-
Brain-inspired method for constructing a robust virtual wireless sensor networkToyonaga, Shinya / Kominami, Daichi / Murata, Masayuki et al. | 2015
- 66
-
Modelling and implementation of two coupled Hodgkin-Huxley neuron modelDhanya E, / Pradhan, N. / Sunitha R, / Sreedevi, A. et al. | 2015
- 72
-
Energy efficient deployment of Wireless Sensor Network by multiple mobile robotsRajesh M, / George, Anu / Sudarshan T.S.B., et al. | 2015
- 79
-
Low energy fixed clustering algorithm (LEFCA) for wireless sensor networksCengiz, Korhan / Dag, Tamer et al. | 2015
- 85
-
Performance analysis of Zigbee for energy transmission monitoring in smart gridsVarghese, Anitha / Satheesh, Hariram / Valsan, Simi / Sekharan, Greeshma et al. | 2015
- 90
-
Adopting FEC and packet combining to increase the performance of IWSNs using relayingGirs, Svetlana / Uhlemann, Elisabeth / Bjorkman, Mats et al. | 2015
- 98
-
A computational geometric approach for overlapping community (cover) detection in social networkSumithra V.S, / Surendran, Subu et al. | 2015
- 106
-
Development and analysis of Wireless Mesh Networks with load-balancing for AMI in smart gridRobertsingh, A. / Devaraj, D. / Narmathabanu, R. et al. | 2015
- 112
-
Positive Influence Dominating Set generation in social networksDhawan, Akshaye / Rink, Matthew et al. | 2015
- 118
-
New approaches for discovering unsupervised human activities by mining sensor dataChitturi, Bhadrachalam / Thomas, Jyothi / Indulekha T. S., et al. | 2015
- 124
-
Economic access network selection in heterogeneous wireless networks environmentMah, Firmin / Dziong, Zbignew / Gregoire, Jean-Charles et al. | 2015
- 131
-
Wireless Sensor Network deployment using stochastic optimization techniques - a comparative studyDeif, Dina / Gadallah, Yasser et al. | 2015
- 139
-
Data aggregation for pest identification in coffee plantations using WSN: A hybrid modelAhmed, Roshan Zameer / Biradar, Rajashekhar C. et al. | 2015
- 147
-
Cooperative game theoretic approach for job scheduling in cloud computingAnanth, Alaka / Chandrasekaran, K. et al. | 2015
- 157
-
On the combined use of sketches and CUSUM for Anomaly DetectionCallegari, Christian / Giordano, Stefano / Pagano, Michele et al. | 2015
- 163
-
Cyber security attacks on network with transition mechanismsNarayan, Shaneel / Gupta, Ruchinav / Kumar, Avinesh / Ishrar, Salman / Khan, Ziafil et al. | 2015
- 170
-
Cyber Attack Thread: A control-flow based approach to deconstruct and mitigate cyber threatsSadhukhan, Koustav / Mallari, Rao Arvind / Yadav, Tarun et al. | 2015
- 179
-
Unusual internet traffic detection at network edgeBansal, Neha / Kaushal, Rishabh et al. | 2015
- 186
-
Analyzing the impact of selfishness on probabilistic routing algorithms in Delay Tolerant NetworksSobin C C, et al. | 2015
- 191
-
Personal authentication using partial palmprint and palmvein images with image quality measuresNayar, Gayathri R. / Bhaskar, Anusree / Satheesh, Leshmi / Kumar, Parvathy S. / Aneesh R.P, et al. | 2015
- 199
-
Privacy preserving smart grid Communications by verifiable secret key sharingBarletta, Antonella / Callegari, Christian / Giordano, Stefano / Pagano, Michele / Procissi, Gregorio et al. | 2015
- 205
-
A Survey of Security Frameworks Suitable for Distributed Control SystemsLisova, Elena / Uhlemann, Elisabeth / Steiner, Wilfried / Akerberg, Johan / Bjorkman, Mats et al. | 2015
- 212
-
A distributed cloud-based service recommendation systemGanchev, Ivan / Ji, Zhanlin / O'Droma, Mairtin et al. | 2015
- 216
-
Multi-cloud resource provisioning with Aneka: A unified and integrated utilisation of microsoft azure and amazon EC2 instancesBuyya, Rajkumar / Barreto, Diana et al. | 2015
- 230
-
SpokenWord identification for Malayalam using Artificial Neural NetworkMoneykumar, Maya / Elizabeth, Sherly et al. | 2015
- 234
-
Automatic detection of telugu single and multi-character text blocks in handwritten wordsRani, N. Shobha / Vasudev T., et al. | 2015
- 241
-
HMDSAD: Hindi multi-domain sentiment aware dictionaryJha, Vandana / Savitha R., / Hebbar, Sudhashri S / Shenoy, P Deepa / Venugopal K R, et al. | 2015
- 248
-
Performance evaluation of multi-focus image fusion techniquesMadhuri, G. / Bindu, CH. Hima et al. | 2015
- 255
-
Random sample measurement and reconstruction of medical image signal using Compressive SensingLakshminarayana, M / Sarvagya, Mrinal et al. | 2015
- 263
-
Edge Detection Technique Used for Identification of Cracks on Vertical Walls of The BuildingDhule, Jitesh J. / Dhurpate, Neelam B. / Gonge, Sudhanshu S. / Kandalkar, Gauri M. et al. | 2015
- 269
-
A fuzzy classifier using continuous automataZachariah, Jerry Jose / Abdul Nizar M., et al. | 2015
- 274
-
FPGA implementation of learning for online system identificationBiradar, Ravikant G. / Chatterjee, Abhishek / George, Koshy / Mishra, Prabhakar et al. | 2015
- 283
-
Quantum Walk based genetic algorithm for 0–1 quadratic knapsack problemPitchai, Arish / Reddy, A. V. / Savarimuthu, Nickolas et al. | 2015
- 288
-
Rethinking javascript loops as combinatorsSingh, Prashant / Mathew, Rejo / Singh, Veerdhwaj et al. | 2015
- 295
-
Uplink one-tone filtered multitone modulation transmission for machine type communicationsGuanping Lu, / Jinsong Wu, / Jun Wang, et al. | 2015
- 299
-
Regression based prediction algorithm for remote controlling of IoT based applicationsWagle, Satyavrat / Sathe, Tejas / Vamburkar, Gandhar / Gaikaiwari, Anand et al. | 2015
- 304
-
Aggregate interference from White Space Devices into digital television systemsLima, Mauro / Mauro, Fortes Jose et al. | 2015
- 310
-
FPGA implementation of reconfigurable frequency demodulatorsSenthilkumar E, / Santoshkumar NV, / Manikandan J, / Agrawal, V.K. et al. | 2015
- 318
-
Multiple mixer based multi cycle layer composition for power efficient display pipelinePateria, Shubham / Saxena, Aseem / Jha, Krishna Kishore et al. | 2015
- 326
-
A two step hybrid method for loop topology estimation of two wire and Power LinesRavishankar S, / Arjun R, et al. | 2015
- 333
-
Pipelined implementation of high radix adaptive CORDIC as a coprocessorOza, Saharsh Samir / Shah, Ankit Parag / Thokala, Tarun / David, Sumam et al. | 2015
- 343
-
Electrocardiogram signal enhancement using an efficient Sign Regressor error normalized variable step size adaptive algorithmGowri T., / Rajesh Kumar P., et al. | 2015
- 348
-
Cloud forensic investigation: A sneak-peek into acquisitionRaju, BKSP Kumar / Meera G, / Geethakumari, G et al. | 2015
- 353
-
Generalized and constraint specific composite facial search model for effective web image miningJunjea, Kapil et al. | 2015
- 362
-
Secure transmission of data by splitting imageJitha Raj T, / Sivadasan, E.T et al. | 2015
- 369
-
Secure and QoS aware architecture for cloud using software defined networks and HadoopDesai, Abhijeet / Nagegowda K S, / Ninikrishna T, et al. | 2015
- 374
-
IGSK: Index Generation on Split Keyword for search over cloud dataRaghavendra S, / Girish S, / Geeta C M, / Buyya, Rajkumar / Venugopal K R, / Iyengar, S S / Patnaik, L M et al. | 2015
- 381
-
Analysis of ring topology for NoC architectureKamath, Avinash / Saxena, Gaurangi / Talawar, Basavaraj et al. | 2015
- 389
-
Performance of Spatial-Modulation and spatial-multiplexing systems over Weibull fading channelGoutham Simha G.D., / Koila, Shriharsha / Neha N, / Sripati, U. et al. | 2015
- 395
-
Modeling and predicting fault tolerance in Vehicular Cloud ComputingGhazizadeh, Puya / Mukkamala, Ravi / Fathi, Reza et al. | 2015
- 401
-
Determination of task scheduling mechanism using computational intelligence in Cloud ComputingGeorge, Neenu / Chandrasekaran, K. / Binu A, et al. | 2015
- 408
-
A comprehensive survey of Fault Tolerance techniques in Cloud ComputingAgarwal, Himanshu / Sharma, Anju et al. | 2015
- 414
-
Missing QoS-values predictions using neural networks for cloud computing environmentsKumar, Sunil / Pandey, Manish Kumar / Nath, Abhigyan / Subbiah, Karthikeyan et al. | 2015
- 420
-
SA-TCP: A novel approach to mitigate TCP Incast in data center networksYongmao Ren, / Jun Li, / Guodong Wang, / Lingling Li, / Shanshan Shi, et al. | 2015
- 427
-
Policy based Role Centric Attribute Based Access Control model Policy RC-ABACVaradharajan, Vijayaraghavan / Amid, Alon / Rai, Sudhanshu et al. | 2015
- 433
-
Computation of performance parameters of ONU placement algorithms for FiWi networkBhatt, Uma Rathore / Hirve, Sada / Chouhan, Nitin / Upadhyay, Raksha et al. | 2015
- 439
-
Reliability analysis and evaluation for various protection schemes for FiWi networksBhatt, Uma Rathore / Sarsodia, Tapesh / Kori, Aashu / Upadhyay, Raksha et al. | 2015
- 446
-
Detection and prevention of DDOS attack in WSN for AODV and DSR using battery drainUpadhyay, Raksha / Khan, Salman / Tripathi, Harendra / Bhatt, Uma Rathore et al. | 2015
- 452
-
A security context migration framework for Virtual Machine migrationMajhi, Santosh Kumar / Dhal, Sunil Kumar et al. | 2015
- 457
-
TrackMe - a low power location tracking system using smart phone sensorsSaha, Subhanjan / Chatterjee, Samrat / Gupta, Amit Kr. / Bhattacharya, Indrajit / Mondal, Tamal et al. | 2015
- 465
-
Latin matrix based channel and backoff slot assignment strategy for MRMC WMNKulkarni, Nitya N. / Naragund, Jayalakshmi G. / Banakar, R. M. et al. | 2015
- 473
-
FIR3: A fuzzy inference based reliable replica replacement strategy for cloud Data CentreVijayakumar, D. / Srinivasagan, K. G. / Sabarimuthukumar, R. et al. | 2015
- 480
-
Performance analysis of a PLC system over log-normal fading channel and impulsive noiseJani, Manan / Garg, Parul / Bansal, Ankur et al. | 2015
- 485
-
A 1×2 array circularly polarised Microstrip antenna with a high Gain for RFID applicationsKaria, Deepak C. / Dhengale, Bhushan Bhimrao / Goswami, Siddhant A. et al. | 2015
- 491
-
Greedy routing performance analysis of network embedded in Hyperbolic and Euclidean SpaceNasrullah, Sheikh / Varma, Shirshu et al. | 2015
- 496
-
Revealing viber communication patterns to assess protocol vulnerabilityMarik, Radek / Bezpalec, Pavel / Kucerak, Jan / Kencl, Lukas et al. | 2015
- 505
-
PDF methodology of analysis of L branch equal gain combiner with carrier phase error and CCI over Nakagami-m fadingAruna, G. et al. | 2015
- 511
-
CMFB for spectrum detection and utilization in CR applicationsPrema, S Chris / Rani, Dara Sudha et al. | 2015
- 516
-
Scaling web Services by offloading expensive computation to a many-core GPGPU using CUDAGupta, Gaurav et al. | 2015
- 520
-
Hardware design for multiplicative modular inverse based on table look up techniqueVollala, Satyanarayana / Begum, B. Shameedha / Ramasubramanian, N. et al. | 2015
- 524
-
Automatic, reference-free and conformity-oriented evaluation and interpretation of CT-modelsPrsa, Jelena / Jain, Rusheel / Irlinger, Franz / Lueth, Tim C. et al. | 2015
- 530
-
Sentiment analysis of code - mix scriptSharma, Shashank / Srinivas, PYKL / Balabantaray, Rakesh Chandra et al. | 2015
- 535
-
An alternative approach for risk assessment in ScrumAndrat, Hycinta / Jaswal, Shree et al. | 2015
- 540
-
Decision Tree classifier using theme based partitioningKadappa, Vijayakumar / Guggari, Shankru / Negi, Atul et al. | 2015
- 547
-
Identification of relations from IndoWordNet for Indian languages using Support Vector MachineGarg, Megha / Sinha, Bhaskar / Chandra, Somnath et al. | 2015
- 553
-
Fingerprinting based detection system for identifying plagiarism in Malayalam text documentsSindhu.L, / Idicula, Sumam Mary et al. | 2015
- 559
-
Speech disabilities in adults and the suitable speech recognition software tools - a reviewBalaji V, / Sadashivappa, G. et al. | 2015
- 565
-
Detection of Breast cancer with Hybrid image segmentation and Otsu's thresholdingSwetha, T.L.V.N. / Bindu, CH.Hima et al. | 2015
- 571
-
Review of IEEE 802.22 and IEC 61850 for real-time communication in Smart GridDehalwar, Vasudev / Kalam, Akhtar / Kolhe, Mohan Lal / Zayegh, Aladin et al. | 2015
- 576
-
Evaluation of similarity based recommender using Fuzzy Inference SystemSharon Moses J, / Babu, L.D Dhinesh / Raj, Ebin Deni et al. | 2015
- 582
-
A model fuzzy inference system for online social network analysisRaj, Ebin Deni / Babu, L.D Dhinesh et al. | 2015
- 589
-
Randomized algorithms for approximating a Connected Dominating Set in Wireless Sensor NetworksDhawan, Akshaye / Tanco, Michelle / Yeiser, Aaron et al. | 2015
- 597
-
Role of handshaking packets in improving peer to peer BotNet detectionRitu, / Kaushal, Rishabh et al. | 2015
- 602
-
Memory optimized lifetime vehicle data acquisition frameworkAthavan, Aravindhan / Radhika. N, et al. | 2015
- 607
-
Automatic detection of rumoured tweets and finding its originSahana V P, / Pias, Alwyn R / Shastri, Richa / Mandloi, Shweta et al. | 2015
- 613
-
Min-O-Mee: A Proximity Based Network application leveraging the AllJoyn frameworkLokhandwala, Hatim / Kala, Srikant Manas / Tamma, Bheemarjuna Reddy et al. | 2015
- 620
-
Sandalwood tree protection using Bluetooth version 4.0Hebbar, Santhosh / Pattar, Praveenraj / Madli, Rajeshwari / Golla, Varaprasad et al. | 2015
- 627
-
Performance evaluation of cooperative communication in WBANs with maximal ratio combiningPaul, Princy Maria / Babu, A.V. et al. | 2015
- 633
-
Decision tree based data classification for marine wireless communicationRoy, Retsy Ann / Nair, Jitha P / Sherly, Elizabeth et al. | 2015
- 639
-
Performance of a STBC-CDMA system in a fading channelWojuola, Olanrewaju B. / Mneney, Stanley H / Srivastava, Viranjay et al. | 2015
- 643
-
A novel hybrid MPPT algorithm using linear ExtrapolationSivaramakrishnan.S, et al. | 2015
- 649
-
Modeling and analysis of routing in IoT networksSankaran, Sriram / Sridhar, Ramalingam et al. | 2015
- 656
-
Random grid based visual cryptography using a common shareJoseph, Sruthy K / Ramesh R, et al. | 2015
- 663
-
Automated cervical cancer detection through RGVF segmentation and SVM classificationSajeena T A, / Jereesh A S, et al. | 2015
- 670
-
Application of residue number system in the generation of PN-sequences for CDMA systemsJames, Jilu / Pe, Ameenudeen / Vasu, Sreejith / Venu, Vipin et al. | 2015
- 675
-
An innovative lemmatization technique for Bangla nouns by using longest suffix stripping methodology in decreasing orderPal, Alok Ranjan / Dash, Niladri Sekhar / Saha, Diganta et al. | 2015
- 679
-
Dense dielectric patch antenna with parasitic elements for wireless applicationBindhu S, / Manu Mohan C M, / Jeemon, Basil K et al. | 2015
- 684
-
LMDPRO platform: Contribution to the quality, the performance and the follow-up of the learners in higher education in SenegalDiop, Alassane et al. | 2015
- 689
-
A low area & low power SOC design for the baseband demodulator of an indoor local positioning systemRupanagudi, Sudhir Rao / Bhat, Varsha G. / Bhavana N, / Venkatesan, Anirudh / Supriya, A S / Shushrutha Raj N, / Navyashree C, / Jairaj, Ashuli / Devi, Renu / Shalini N. R., et al. | 2015
- 696
-
FORESIGHT - A novel design of travel aid for the blindBaliga, Ashwin / Hegde, Veena / Sharma, Rahul / D'Souza, Rainer / Chakravorty, Siddharth / Ramdas, Gautam et al. | 2015
- 703
-
Minimizing the false alarm probability of speaker verification systems for mimicked speechGeorge, Kuruvachan K. / Kumar, C. Santhosh / Panda, Ashish / Ramachandran, K. I. / Das, K. Arun / Veni, S. et al. | 2015
- 710
-
Automatic plant species recognition technique using machine learning approachesPurohit, Suchit / Viroja, Ronak / Gandhi, Savita / Chaudhary, Naina et al. | 2015
- 720
-
Malayalam Word Sense Disambiguation using YamchaJunaida M K, / Jayan, Jisha P / Elizabeth, Sherly et al. | 2015
- 725
-
Affinity based seeded region growing algorithm for medical image segmentationNagaraju S, / Kashyap, Manish / Kumar, Sandeep / Bhattacharya, Mahua et al. | 2015
- 731
-
Prediction of protein cellular localization site by using data mining techniquesPriya, Bhanu / Chhabra, Amit et al. | 2015
- 737
-
Genetic algorithms based enhanced K Strange points clustering algorithmJohnson, Terence / Singh, Santosh Kumar et al. | 2015
- 742
-
Protection of confidential color image information based on Reversible Data Hiding technique (PCCIRT)Anitha Devi M.D, / ShivaKumar, K.B. et al. | 2015
- 748
-
A novel method for discovery of objectsGeorge, Sonia et al. | 2015
- 757
-
Reinforcement learning for taxi-out time prediction: An improved Q-learning approachGeorge, Elizabeth / Khan, Shamsuddin S et al. | 2015
- 765
-
Near-duplicate web page detection by enhanced TDW and simHash techniqueArun PR, / Sumesh MS, et al. | 2015
- 771
-
Multilingual speech to speech MT based chat systemGopi, Arun / Shobana Devi P, / Sajini T, / Stephen, Jose / Bhadhran VK, et al. | 2015
- 777
-
Randomly hiding secret data using dynamic programming for image steganographyKhandelwal, Pulkit / Bisht, Neha / Thanikaiselvan V, et al. | 2015
- 784
-
Classification of patterns on high resolution SAR imagesBhadran, Bindhya / Nair, Jyothisha J et al. | 2015
- 793
-
A novel MF-LDTP approach for contactless palm vein recognitionRahul, Roshni C / Cherian, Merin / Manu Mohan C M, et al. | 2015
- 799
-
A novel video processing based smart helmet for rear vehicle intimation & collision avoidanceRupanagudi, Sudhir Rao / Bharadwaj, Sumukha / Bhat, Varsha G. / Eshwari, S. / Shreyas, S. / Aparna, B. S. / Venkatesan, Anirudh / Shandilya, Amrit / Subrahmanya, Vikram / Jabeen, Fathima et al. | 2015
- 806
-
Texture based multi-view face recognition in noisy images using BRINE featureJain Stoble B, / Sreeraj M, et al. | 2015
- 816
-
Image Retrieval using Bipartite Reiterative AlgorithmJoseph, Deepa / Mathew, Ajai et al. | 2015
- 829
-
A novel approach for extracting feature from EEG signal for mental task classificationGupta, Akshansh / Kirar, Jyoti Singh et al. | 2015
- 833
-
Wideband printed monopole VHF antennaAbraham, Mary Rani / Kundukulam, Sona O. et al. | 2015
- 838
-
Fine tuning network MTU for HPC cluster: Correlating MTU with PCIe parameters and HCA architectureKulkarni, Kedar / Badhe, Shreeya / Gadre, Geetanjali et al. | 2015
- 842
-
A robust viewing angle independent hand gesture recognition systemBaruah, Gaurab / Talukdar, Anjan Kr. / Sarma, Kandarpa Kumar et al. | 2015
- 848
-
Predictive model for transferring stroke in-patients to Intensive Care UnitAlotaibi, Nawal N. / Sasi, Sreela et al. | 2015
- 854
-
A novel method for bleeding detection in Wireless Capsule Endoscopic imagesDilna C., / Gopi, Varun P. et al. | 2015
- 859
-
A review on noise estimation methods in multi-coil MRISoumya V, / Varghese, Abraham / Neetha N, et al. | 2015
- 867
-
Low cost high voltage battery string monitoring systemSingh, Mandeep / Khurana, Rajeev / Jain, Prateek et al. | 2015
- 872
-
A comparative study of cache performance for embedded applicationsShameedha Begum, B. / Ramasubramanian, N. et al. | 2015
- 877
-
An improved feature extraction method based on DWT and 2DSubXPCA methodsRajeshwari Devi, D. V. / Narasimha Rao, K. et al. | 2015
- 882
-
A person identification system combining recognition of face and lip-read passwordsRadha, N. / Shahina, A. / Nayeemulla Khan, A. et al. | 2015
- 886
-
A novel BS power saving scheme with virtual coverage management for green heterogeneous LTE networksJun Yeop Kim, / Junsu Kim, / Chang Soon Kang, et al. | 2015
- 892
-
Hardware implementation of key functionalities of NIPS for high speed networkVaidya, Nagesh / Godbole, Parikshit et al. | 2015
- 898
-
Capturing and characterizing network actions of mobile applications for behavior consistencyGaoxiang Wu, / Songjie Wei, / Na Luo, / Ling Yang, et al. | 2015
- 906
-
Evaluation of channel assignment performance prediction techniques in random wireless mesh networksReddy, M Pavan Kumar / Kala, Srikant Manas / Tamma, Bheemarjuna Reddy et al. | 2015
- 912
-
Energy efficient timing-sync Protocol for Sensor NetworkSeth, Gautam / Harisha, A et al. | 2015
- 917
-
Stable route AODV routing protocol for mobile Wireless Sensor NetworksRajesh M, / Vanishree K, / Sudarshan T.S.B., et al. | 2015
- 924
-
Efficient wireless network services for civil Structure Health MonitoringKulkarni, Jyotsna A. / Anupama, K. R. / Goveas, Neena et al. | 2015
- 928
-
Location based mobile advertising framework for commutersMathai, John / Ramasamy, Gobi / Purusothaman, Sathya / Ezra, Kirubakaran et al. | 2015
- 936
-
Dynamic Carrier Aggregation in 5G network scenarioVidhya R, / Karthik P, et al. | 2015
- 941
-
A green energy optimized scheduling algorithm for cloud data centersSanjeevi P, / Viswanathan P, et al. | 2015
- 946
-
Mobile secure data protection using eMMC RPMB partitionAnil Kumar Reddy, / Paramasivam, Periyasamy / Prakash Babu Vemula, et al. | 2015
- 951
-
Layering technique for visualizing social networks under force directed placementDeepak K L, / Surendran, Subu et al. | 2015
- 960
-
An empirical analysis of Mobile learning (M-learning) awareness and acceptance in higher educationSarrab, Mohamed / Al-Shihi, Hafedh / Khan, Asharul Islam et al. | 2015
- 964
-
An attempt to transfer information using light as a medium and camera as receiverPenubaku, Lohit / LakshmiShree. K, et al. | 2015