Web Log Data Analysis and Mining (English)
- New search for: Grace, L. K. Joshila
- New search for: Maheswari, V.
- New search for: Nagamalai, Dhinaharan
- New search for: Grace, L. K. Joshila
- New search for: Maheswari, V.
- New search for: Nagamalai, Dhinaharan
In:
Advanced Computing
5
;
459-469
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Web Log Data Analysis and Mining
-
Contributors:
-
Published in:Advanced Computing , 5 ; 459-469Communications in Computer and Information Science ; 133, 5 ; 459-469
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Analysis of the Severity of Hypertensive Retinopathy Using Fuzzy LogicParthibarajan, Aravinthan / Narayanamurthy, Gopalakrishnan / Parthibarajan, Arun srinivas / Narayanamurthy, Vigneshwaran et al. | 2011
- 10
-
An Intelligent Network for Offline Signature Verification Using Chain CodeTomar, Minal / Singh, Pratibha et al. | 2011
- 23
-
An Improved and Adaptive Face Recognition Method Using Simplified Fuzzy ARTMAPThomas, Antu Annam / Wilscy, M. et al. | 2011
- 35
-
An Automatic Evolution of Rules to Identify Students’ Multiple IntelligenceMankad, Kunjal / Sajja, Priti Srinivas / Akerkar, Rajendra et al. | 2011
- 46
-
A Survey on Hand Gesture Recognition in Context of Soft ComputingChaudhary, Ankit / Raheja, J. L. / Das, Karen / Raheja, Sonia et al. | 2011
- 56
-
Handwritten Numeral Recognition Using Modified BP ANN StructureChoudhary, Amit / Rishi, Rahul / Ahlawat, Savita et al. | 2011
- 66
-
Expert System for Sentence RecognitionPandey, Bipul / Shukla, Anupam / Tiwari, Ritu et al. | 2011
- 76
-
RODD: An Effective Reference-Based Outlier Detection Technique for Large DatasetsBhuyan, Monowar H. / Bhattacharyya, D. K. / Kalita, J. K. et al. | 2011
- 85
-
A Review of Dynamic Web Service Composition TechniquesD’Mello, Demian Antony / Ananthanarayana, V. S. / Salian, Supriya et al. | 2011
- 98
-
Output Regulation of Arneodo-Coullet Chaotic SystemVaidyanathan, Sundarapandian et al. | 2011
- 108
-
A High-Speed Low-Power Low-Latency Pipelined ROM-Less DDFSHatai, Indranil / Chakrabarti, Indrajit et al. | 2011
- 120
-
A Mathematical Modeling of Exceptions in Healthcare WorkflowPatnaik, Sumagna et al. | 2011
- 130
-
Functional Based Testing in Web Services Integrated Software ApplicationsRamachandran, Selvakumar / Santapoor, Lavanya / Rayudu, Haritha et al. | 2011
- 139
-
Design and Implementation of a Novel Distributed Memory File SystemKarnani, Urvashi / Kalmady, Rajesh / Chand, Phool / Bhattacharjee, Anup / Jagadeesh, B. S. et al. | 2011
- 149
-
Decentralized Dynamic Load Balancing for Multi Cluster Grid EnvironmentNandagopal, Malarvizhi / Uthariaraj, V. Rhymend et al. | 2011
- 161
-
Adoption of Cloud Computing in e-GovernanceDas, Rama Krushna / Patnaik, Sachidananda / Misro, Ajita Kumar et al. | 2011
- 173
-
Efficient Web Logs Stair-Case Technique to Improve Hit Ratios of CachingHemnani, Khushboo / Chawda, Dushyant / Verma, Bhupendra et al. | 2011
- 183
-
A Semantic Approach to Design an Intelligent Self Organized Search Engine for Extracting Information Relating to Educational ResourcesSaleena, B. / Srivatsa, S. K. / Kumar, M. Chenthil et al. | 2011
- 190
-
Cluster Bit Collision Identification for Recognizing Passive Tags in RFID SystemParveen, Katheeja / Khader, Sheik Abdul / Rabbani, Munir Ahamed et al. | 2011
- 200
-
Integration Testing of Multiple Embedded Processing ComponentsPakala, Hara Gopal Mani / Raju, K. V. S. V. N. / Khan, Ibrahim et al. | 2011
- 210
-
A New Defense Scheme against DDoS Attack in Mobile Ad Hoc NetworksArunmozhi, S. A. / Venkataramani, Y. et al. | 2011
- 217
-
A Model for Delegation Based on Authentication and AuthorizationChandersekaran, Coimbatore / Simpson, William R. et al. | 2011
- 237
-
Identification of Encryption Algorithm Using Decision TreeManjula, R. / Anitha, R. et al. | 2011
- 247
-
A Novel Mechanism for Detection of Distributed Denial of Service AttacksSen, Jaydip et al. | 2011
- 258
-
Authenticating and Securing Mobile Applications Using MicrologGupta, Siddharth / Singh, Sunil Kumar et al. | 2011
- 268
-
Assisting Programmers Resolving Vulnerabilities in Java Web ApplicationsBathia, Pranjal / Beerelli, Bharath Reddy / Laverdière, Marc-André et al. | 2011
- 280
-
Estimating Strength of a DDoS Attack Using Multiple Regression AnalysisGupta, B. B. / Agrawal, P. K. / Joshi, R. C. / Misra, Manoj et al. | 2011
- 290
-
A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical ApplicationSathishkumar, G. A. / Bhoopathybagan, K. / Sriraam, N. / Venkatachalam, S. P. / Vignesh, R. et al. | 2011
- 300
-
Chest X-Ray Analysis for Computer-Aided DiagnosticLe, Kim et al. | 2011
- 310
-
Overcoming Social Issues in Requirements EngineeringRamachandran, Selvakumar / Dodda, Sandhyarani / Santapoor, Lavanya et al. | 2011
- 325
-
Range-Free Localization for Air-Dropped WSNs by Filtering Neighborhood Estimation ImprovementsGarcía, Eva M. / Bermúdez, Aurelio / Casado, Rafael et al. | 2011
- 338
-
Evolution of Various Controlled Replication Routing Schemes for Opportunistic NetworksShah, Hemal / Kosta, Yogeshwar P. et al. | 2011
- 348
-
Collaborative Context Management and Selection in Context Aware ComputingVanathi, B. / Uthariaraj, V. Rhymend et al. | 2011
- 358
-
Privacy Preservation of Stream Data Patterns Using Offset and Trusted Third Party Computation in Retail-Shop Market Basket AnalysisB.N., Keshavamurthy / Toshniwal, Durga et al. | 2011
- 367
-
Application of Euclidean Distance Power Graphs in Localization of Sensor NetworksPurohit, G. N. / Verma, Seema / Sharma, Usha et al. | 2011
- 390
-
Spelling Corrector for Indian LanguagesSunitha, K. V. N. / Sharada, A. et al. | 2011
- 400
-
Voltage Collapse Based Critical Bus RankingShankar, Shobha / Ananthapadmanabha, T. et al. | 2011
- 410
-
Multiplexer Based Circuit Synthesis with Area-Power Trade-OffPradhan, Sambhu Nath / Chattopadhyay, Santanu et al. | 2011
- 421
-
Exergaming – New Age Gaming for Health, Rehabilitation and EducationKamal, Ankit et al. | 2011
- 431
-
Inclusion/Exclusion Protocol for RFID TagsPiramuthu, Selwyn et al. | 2011
- 438
-
Min Max Threshold Range (MMTR) Approach in Palmprint RecognitionMalik, Jyoti / Sainarayanan, G. / Dahiya, Ratna et al. | 2011
- 450
-
Power and Buffer Overflow Optimization in Wireless Sensor NodesJoshi, Gauri / Dwivedi, Sudhanshu / Goel, Anshul / Mulherkar, Jaideep / Ranjan, Prabhat et al. | 2011
- 459
-
Web Log Data Analysis and MiningGrace, L. K. Joshila / Maheswari, V. / Nagamalai, Dhinaharan et al. | 2011
- 470
-
Steganography Using Version Control SystemTidake, Vaishali S. / Talekar, Sopan A. et al. | 2011
- E1
-
Erratum: A New Protocol to Secure AODV in Mobile AdHoc NetworksKrishnan, Avinash / Manjunath, Aishwarya / Reddy, Geetha J. et al. | 2011