The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Information Technology (cit)
2006 (conf/cit/2006)

  1. Anup Bhatkar, J. L. Rana
    Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian scope. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:3-6 [Conf]
  2. T. Sobha Rani, S. Durga Bhavani, Raju S. Bapi
    Promoter Recognition using dinucleotide Features : A Case Study for E.Coli. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:7-10 [Conf]
  3. Anirban Mukhopadhyay, Ujjwal Maulik, Sanghamitra Bandyopadhyay
    Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:11-14 [Conf]
  4. Rudra N. Hota, Vijendran Venkoparao, Saad Bedros
    Face Detection by using Skin Color Model based on One Class Classifier. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:15-16 [Conf]
  5. Anshu Bhardwaj, Shrish Tiwari
    Evaluating the Association of Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico Tool E-MIDAS. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:17-20 [Conf]
  6. L. S. Rath
    Ayurinformatics- the application of bioinformatics in the ayurvedic system of medicine. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:21-25 [Conf]
  7. S. T. Patil, D. S. Bormane
    Electroencephalograph Signal Analysis During Bramari. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:26-32 [Conf]
  8. Nejla Ghaboosi, Abolfazl Toroghi Haghighat
    A Tabu Search Based Algorithm for Multicast Routing with QoS Constraints. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:33-39 [Conf]
  9. Vinod Kone, Sukumar Nandi
    QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:40-45 [Conf]
  10. Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
    Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:46-51 [Conf]
  11. Punit Rathod, Srinath Perur, Raghuraman Rangarajan
    Bridging the Gap Between Reality and Simulations: An Ethernet Case Study. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:52-55 [Conf]
  12. P. Sukendar Reddy, Nityananda Sarma, Rajib Kumar Das
    Enhancing Fault-Tolerance in a Distributed Mutual Exclusion Algorithm. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:56-59 [Conf]
  13. R. Manoharan, P. Thambidurai
    Hypercube based Team Multicast Routing Protocol for Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:60-63 [Conf]
  14. Ash Mohammad Abbas
    Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:64-67 [Conf]
  15. Bhagi Sri Karthik, Manish Jaiswal, Vasant Menon, Vidhya Kannan, Shobha Venkobarao, Madan Pande, Asoke K. Talukder, Debabrata Das
    Seamless Network Management in Presence of Heterogeneous Management Protocols for Next Generation Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:68-71 [Conf]
  16. Mayank Mishra, Anirudha Sahoo
    A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:72-76 [Conf]
  17. Upinder Kaur, R. B. Patel
    Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:77-80 [Conf]
  18. Pabitra Mohan Khilar, S. Mahapatra
    Design and Evaluation of a Distributed Diagnosis Algorithm in Dynamic Fault Environments For Not-Completely Connected Network. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:81-82 [Conf]
  19. Minghui Zheng, Jianhua Zhu, Guohua Cui
    A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:83-84 [Conf]
  20. Manju Sarvagya
    Uplink Shared Channel in 3rd Generation (UMTS) Cellular System: Performance Analysis and Enhancement. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:85-86 [Conf]
  21. M. Tamilarasi, T. G. Palanivelu
    A Strategy to Reduce Control Packet Load of MANETs with Bidirectional Links using DSR. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:87-88 [Conf]
  22. R. Anitha, N. Rajkumar
    Compensation Based Grid Scheduling. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:89-93 [Conf]
  23. A. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty
    A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:94-95 [Conf]
  24. N. Sreenath, Balaji Palanisamy
    Distributed Reconfiguration for Traffic Changes in IP-Over-WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:96-97 [Conf]
  25. Rakesh Chandra Gangwar, Anil K. Sarje
    Complexity Analysis of Group Key Agreement Protocols for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:98-99 [Conf]
  26. Aditya Dhananjay, Debabrata Das
    Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:100-104 [Conf]
  27. Tapan K. Bhowmik, Swapan K. Parui, Ujjwal Bhattacharya, Bikash Shaw
    An HMM Based Recognition Scheme for Handwritten Oriya Numerals. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:105-110 [Conf]
  28. K. Sreenivasa Rao, B. Yegnanarayana
    Voice Conversion by Prosody and Vocal Tract Modification. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:111-116 [Conf]
  29. M. Ezhilarasan, P. Thambidurai
    A Hybrid Transform Coding for Video Codec. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:117-120 [Conf]
  30. Sriparna Saha, Sanghamitra Bandyopadhyay, Ujjwal Maulik
    A New Symmetry Based Cluster Validity Index: Application to Satellite Image Segmentation. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:121-124 [Conf]
  31. Chitta Baral, Luis Tari
    Using AnsProlog with Link Grammar and WordNet for QA with deep reasoning. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:125-128 [Conf]
  32. Deepa P. Gopinath, J. Divya Sree, Reshmi Mathew, S. J. Rekhila, Achuthsankar S. Nair
    Duration Analysis for Malayalam Text-To-Speech Systems. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:129-132 [Conf]
  33. N. Sharma, U. Pal, F. Kimura
    Recognition of Handwritten Kannada Numerals. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:133-136 [Conf]
  34. Ujjwal Bhattacharya, Bikash Shaw, Swapan K. Parui
    Analysis of Error Sources Towards Improved Form Processing. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:137-138 [Conf]
  35. Deepak Mishra, N. Subhash Chandra Bose, Arvind Tolambiya, Ashutosh Dwivedi, Prabhanjan Kandula, Ashiwani Kumar, Prem Kumar Kalra
    Color Image Compression with Modified Forward-Only Counterpropagation Neural Network: Improvement of the Quality using Different Distance Measures. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:139-140 [Conf]
  36. Swarnajyoti Patra, Susmita Ghosh, Ashish Ghosh
    Unsupervised Change Detection in Remote-Sensing Images using One-dimensional Self-Organizing Feature Map Neural Network. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:141-142 [Conf]
  37. Rajeswari Sridhar, T. V. Geetha
    Swara Indentification for South Indian Classical Music. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:143-144 [Conf]
  38. Nagappa U. Bhajantri, P. Nagabhushan
    Camouflage Defect Identification: A Novel Approach. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:145-148 [Conf]
  39. Barzan Mozafari, Mohammad Hasan Savoji
    A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:149-154 [Conf]
  40. Rajdeep Chakraborty, J. K. Mandal
    A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT). [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:155-159 [Conf]
  41. Yunfang Feng, Zhiyuan Liu, Jun Li
    Securing Membership Control in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:160-163 [Conf]
  42. Dasari Shailaja, Phalguni Gupta
    A Simple Geometric Approach for Ear Recognition. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:164-167 [Conf]
  43. G. Shailaja, K. Phani Kumar, Ashutosh Saxena
    Universal Designated Multi Verifier Signature without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:168-171 [Conf]
  44. A. Murali M. Rao
    Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:172-175 [Conf]
  45. P. K. Jha, J. K. Mandal
    Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:176-177 [Conf]
  46. Sarbjeet Singh, Seema Bawa
    Design of a Framework for Handling Security Issues in Grids. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:178-179 [Conf]
  47. Atul Negi, B. Panigrahi, M. V. N. K. Prasad, Madhabananda Das
    A Palmprint Classification Scheme using Heart Line Feature Extraction. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:180-181 [Conf]
  48. Nalini N, Raghavendra Rao G
    Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:182-185 [Conf]
  49. G. Geethakumari, Atul Negi, V. N. Sastry
    Indirect Authorization Topologies for Grid Access Control. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:186-187 [Conf]
  50. Anirban Chakraborty, Arnab Chatterjee, S. K. Basu
    Performance of Various Cost Functions in the Search for Strong S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:188-189 [Conf]
  51. Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury
    CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:190-191 [Conf]
  52. K. Ganesan, R. Anandan
    Version Control using Cryptographic Access Control. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:192-196 [Conf]
  53. R. Pradeep Kumar, P. Nagabhushan, A. Chouakria-Douzal
    WaveSim and Adaptive WaveSim Transform for Subsequence Time-Series Clustering. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:197-202 [Conf]
  54. Li Junkui, Wang Yuanzhen, Li Xinping
    LB HUST: A Symmetrical Boundary Distance for Clustering Time Series. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:203-208 [Conf]
  55. K. Saroj, Ashish Ghosh, B. Uma Shankar, Lorenzo Bruzzone
    Neuro-Fuzzy Fusion: A New Approach to Multiple Classifier System. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:209-212 [Conf]
  56. Navneet Goyal, Susheel Kumar Zaveri, Yashvardhan Sharma
    Improved Bitmap Indexing Strategy for Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:213-216 [Conf]
  57. Ananta Charan Ojha, Sateesh Kumar Pradhan
    Fuzzy Linguistic Approach to Matchmaking in E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:217-220 [Conf]
  58. Satchidananda Dehuri, Ashish Ghosh, Rajib Mall
    Particles with Age for Data Clustering. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:221-224 [Conf]
  59. Shirish S. Sane, Ashok A. Ghatol
    Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:225-228 [Conf]
  60. R. Gururaj, P. Sreenivasa Kumar
    Cumulative Path Summary for Structurally Dynamic XML Documents. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:229-230 [Conf]
  61. Rashid Ali, Mirza Mohd. Sufyan Beg
    Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:231-234 [Conf]
  62. Ranjit Abraham, Jay B. Simha, S. S. Iyengar
    A comparative analysis of discretization methods for Medical Datamining with Naïve Bayesian classifier. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:235-236 [Conf]
  63. Prasanna H. Bammigatti, P. R. Rao
    GenericWA-RBAC: Role Based Access Control Model for Web Applications. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:237-240 [Conf]
  64. M. V. Sudhamani, C. R. Venugopal
    Segmentation of Color Images using Mean Shift Algorithm for Feature Extraction. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:241-242 [Conf]
  65. Ranjan Parekh
    Towards an Architecture of an Image Database. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:243-244 [Conf]
  66. Jay B. Simha, S. S. Iyengar
    Fuzzy data mining for customer loyalty analysis. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:245-246 [Conf]
  67. Saeed Hassan Hisbani
    A generic prototype for storing and querying XML documents in RDBMS using model mapping methods. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:247-248 [Conf]
  68. Rajesh C. Dash, Chris Hubbard, Stanley J. Robboy, Alan D. Proia
    Designing the "Next Generation" of Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:249-252 [Conf]
  69. Himanshu Thapliyal, Sumedha K. Gupta
    Design of Novel Reversible Carry Look-Ahead BCD Subtractor. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:253-258 [Conf]
  70. Megha Kothari, Susmita Ghosh, Ashish Ghosh
    Aggregation Pheromone Density Based Clustering. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:259-264 [Conf]
  71. Ash Mohammad Abbas, Vibhu Saujanya Sharma, Anoop Jain
    A Domain Based Prioritized Model forWeb Servers. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:265-268 [Conf]
  72. B. K. Sarkar, Shahid Jamal, Bhagirath Kumar
    An efficient parallel algorithm for finding the largest and the second largest elements from a list of elements. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:269-272 [Conf]
  73. Amir Kaivani, A. Zaker Alhosseini, Saeid Gorgin, M. Fazlali
    Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:273-276 [Conf]
  74. Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
    A Programmable Parallel Structure to perform Galois Field Exponentiation. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:277-280 [Conf]
  75. Sriparna Saha, Susmita Sur-Kolay, Sanghamitra Bandyopadhyay, Parthasarathi Dasgupta
    Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:281-284 [Conf]
  76. Ravinder Thirumala, N. Usha Rani, Timothy A. Gonsalves
    An Event Notification Service based on XML Messaging on Different Transport Technologies. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:285-288 [Conf]
  77. Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mikler, Elias Kougianos, Brandon Parker
    A High Performance ASIC for Cellular Automata (CA) Applications. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:289-290 [Conf]
  78. Vandana Bhattacherjee
    The Soft Computing Approach to Program Development Time Estimation. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:291-292 [Conf]
  79. Shang-Fang Tsai, Shanq-Jang Ruan
    DS2IS: Dictionary-based Segmented Signal Inversion Scheme for Low Power Dynamic Bus Design. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:293-296 [Conf]
  80. Anirban Kundu, Ruma Dutta, Debajyoti Mukhopadhyay
    An Alternate Way to Rank Hyper-linked Web-Pages. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:297-298 [Conf]
  81. Sumagna Patnaik
    Primitives for StructuredWorkflow Design: A Mathematical Specification and Analysis. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:299-300 [Conf]
  82. Anita Das, B. S. Panda, Rajendra P. Lal
    A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphs. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:301-304 [Conf]
  83. Swatee Rekha Mohanty, Durga Prasad Mohapatra, Himansu Sekhar Behara
    A Novel Approach for Static Slicing of Inter-Procedural Programs. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:305-306 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002