CINXE.COM
callback( { "result":{ "query":":facetid:stream:\"streams/conf/a2cwic\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"70.71" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"70", "@dc":"70", "@oc":"70", "@id":"46114522", "text":":facetid:stream:streams/conf/a2cwic" } }, "hits":{ "@total":"70", "@computed":"70", "@sent":"70", "@first":"0", "hit":[{ "@score":"1", "@id":"5283482", "info":{"authors":{"author":[{"@pid":"90/9766","text":"Sunitha Abburu"},{"@pid":"13/9767","text":"R. J. Anandhi"}]},"title":"Concept ontology construction for sports video.","venue":"A2CWiC","pages":"50:1-50:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/AbburuA10","doi":"10.1145/1858378.1858428","ee":"https://doi.org/10.1145/1858378.1858428","url":"https://dblp.org/rec/conf/a2cwic/AbburuA10"}, "url":"URL#5283482" }, { "@score":"1", "@id":"5283483", "info":{"authors":{"author":[{"@pid":"13/9767","text":"R. J. Anandhi"},{"@pid":"53/3225-1","text":"S. Natarajan 0001"},{"@pid":"90/9766","text":"Sunitha Abburu"}]},"title":"An enhanced clusterer aggregation using nebulous pool.","venue":"A2CWiC","pages":"61:1-61:5","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/AnandhiNA10","doi":"10.1145/1858378.1858439","ee":"https://doi.org/10.1145/1858378.1858439","url":"https://dblp.org/rec/conf/a2cwic/AnandhiNA10"}, "url":"URL#5283483" }, { "@score":"1", "@id":"5283484", "info":{"authors":{"author":[{"@pid":"49/9766","text":"S. S. Anju"},{"@pid":"81/9766","text":"P. Harmya"},{"@pid":"61/9766","text":"Noopa Jagadeesh"},{"@pid":"51/9766","text":"R. Darsana"}]},"title":"Malware detection using assembly code and control flow graph optimization.","venue":"A2CWiC","pages":"65:1-65:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/AnjuHJD10","doi":"10.1145/1858378.1858443","ee":"https://doi.org/10.1145/1858378.1858443","url":"https://dblp.org/rec/conf/a2cwic/AnjuHJD10"}, "url":"URL#5283484" }, { "@score":"1", "@id":"5283485", "info":{"authors":{"author":[{"@pid":"56/7689","text":"T. Arathi"},{"@pid":"75/7158","text":"Latha Parameswaran"},{"@pid":"72/68","text":"K. P. Soman"}]},"title":"A study of reconstruction algorithms in computerized tomographic images.","venue":"A2CWiC","pages":"69:1-69:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ArathiPS10","doi":"10.1145/1858378.1858447","ee":"https://doi.org/10.1145/1858378.1858447","url":"https://dblp.org/rec/conf/a2cwic/ArathiPS10"}, "url":"URL#5283485" }, { "@score":"1", "@id":"5283486", "info":{"authors":{"author":[{"@pid":"72/9766","text":"Ipsita Bhattacharya"},{"@pid":"183/7076","text":"Mahinder Pal Singh Bhatia"}]},"title":"SVM classification to distinguish Parkinson disease patients.","venue":"A2CWiC","pages":"14:1-14:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/BhattacharyaB10","doi":"10.1145/1858378.1858392","ee":"https://doi.org/10.1145/1858378.1858392","url":"https://dblp.org/rec/conf/a2cwic/BhattacharyaB10"}, "url":"URL#5283486" }, { "@score":"1", "@id":"5283487", "info":{"authors":{"author":[{"@pid":"54/9766","text":"B. Bhavani"},{"@pid":"41/9766","text":"Srividya Sheshadri"},{"@pid":"23/9767","text":"R. Unnikrishnan 0001"}]},"title":"Vocational education technology: rural India.","venue":"A2CWiC","pages":"21:1-21:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/BhavaniSU10","doi":"10.1145/1858378.1858399","ee":"https://doi.org/10.1145/1858378.1858399","url":"https://dblp.org/rec/conf/a2cwic/BhavaniSU10"}, "url":"URL#5283487" }, { "@score":"1", "@id":"5283488", "info":{"authors":{"author":[{"@pid":"06/9767","text":"K. Hima Bindu"},{"@pid":"23/2953","text":"P. S. V. S. Sai Prasad"},{"@pid":"07/5281-1","text":"C. Raghavendra Rao 0001"}]},"title":"Hybrid decision tree based on inferred attribute.","venue":"A2CWiC","pages":"1:1-1:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/BinduPR10","doi":"10.1145/1858378.1858379","ee":"https://doi.org/10.1145/1858378.1858379","url":"https://dblp.org/rec/conf/a2cwic/BinduPR10"}, "url":"URL#5283488" }, { "@score":"1", "@id":"5283489", "info":{"authors":{"author":[{"@pid":"15/9767","text":"Najmeh Danesh"},{"@pid":"77/9766","text":"Malihe Danesh"},{"@pid":"92/9766","text":"Hossein Shirgahi"},{"@pid":"72/113","text":"Abbas Ghaemi Bafghi"}]},"title":"Improving multiplication and reminder using implementation based on word and index.","venue":"A2CWiC","pages":"10:1-10:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/DaneshDSB10","doi":"10.1145/1858378.1858388","ee":"https://doi.org/10.1145/1858378.1858388","url":"https://dblp.org/rec/conf/a2cwic/DaneshDSB10"}, "url":"URL#5283489" }, { "@score":"1", "@id":"5283490", "info":{"authors":{"author":[{"@pid":"30/9767","text":"D. Muruga Radha Devi"},{"@pid":"00/9060","text":"V. Maheswari"},{"@pid":"34/5938","text":"P. Thambidurai"}]},"title":"Adaptive dimensionality reduction for recent-biased time series analysis.","venue":"A2CWiC","pages":"9:1-9:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/DeviMT10","doi":"10.1145/1858378.1858387","ee":"https://doi.org/10.1145/1858378.1858387","url":"https://dblp.org/rec/conf/a2cwic/DeviMT10"}, "url":"URL#5283490" }, { "@score":"1", "@id":"5283491", "info":{"authors":{"author":[{"@pid":"60/9766","text":"Ranaganayakulu Dhanalakshmi"},{"@pid":"59/6650","text":"Chenniappan Chellappan"}]},"title":"An intelligent technique to detect file formats and e-mail spam.","venue":"A2CWiC","pages":"53:1-53:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/DhanalakshmiC10","doi":"10.1145/1858378.1858431","ee":"https://doi.org/10.1145/1858378.1858431","url":"https://dblp.org/rec/conf/a2cwic/DhanalakshmiC10"}, "url":"URL#5283491" }, { "@score":"1", "@id":"5283492", "info":{"authors":{"author":[{"@pid":"51/4946","text":"Sapna P. G."},{"@pid":"74/5678","text":"Hrushikesha Mohanty"}]},"title":"Clustering test cases to achieve effective test selection.","venue":"A2CWiC","pages":"15:1-15:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/GM10","doi":"10.1145/1858378.1858393","ee":"https://doi.org/10.1145/1858378.1858393","url":"https://dblp.org/rec/conf/a2cwic/GM10"}, "url":"URL#5283492" }, { "@score":"1", "@id":"5283493", "info":{"authors":{"author":[{"@pid":"96/7950","text":"Poonam Gera"},{"@pid":"77/6619","text":"Kumkum Garg"},{"@pid":"71/3734","text":"Manoj Misra"}]},"title":"Trust based security in MANET routing protocols: a survey.","venue":"A2CWiC","pages":"47:1-47:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/GeraGM10","doi":"10.1145/1858378.1858425","ee":"https://doi.org/10.1145/1858378.1858425","url":"https://dblp.org/rec/conf/a2cwic/GeraGM10"}, "url":"URL#5283493" }, { "@score":"1", "@id":"5283494", "info":{"authors":{"author":[{"@pid":"43/9766","text":"Nisha Haridas"},{"@pid":"84/4815","text":"M. Nirmala Devi 0001"}]},"title":"PSO learning on artificial neural networks.","venue":"A2CWiC","pages":"3:1-3:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/HaridasD10","doi":"10.1145/1858378.1858381","ee":"https://doi.org/10.1145/1858378.1858381","url":"https://dblp.org/rec/conf/a2cwic/HaridasD10"}, "url":"URL#5283494" }, { "@score":"1", "@id":"5283495", "info":{"authors":{"author":[{"@pid":"18/9767","text":"G. Hemalatha"},{"@pid":"39/7413","text":"K. Thanuskodi"}]},"title":"Optimization of joins using random record generation method.","venue":"A2CWiC","pages":"28:1-28:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/HemalathaT10","doi":"10.1145/1858378.1858406","ee":"https://doi.org/10.1145/1858378.1858406","url":"https://dblp.org/rec/conf/a2cwic/HemalathaT10"}, "url":"URL#5283495" }, { "@score":"1", "@id":"5283496", "info":{"authors":{"author":[{"@pid":"48/9766","text":"B. Sarojini Ilango"},{"@pid":"64/2959","text":"N. Ramaraj"}]},"title":"A hybrid prediction model with F-score feature selection for type II Diabetes databases.","venue":"A2CWiC","pages":"13:1-13:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/IlangoR10","doi":"10.1145/1858378.1858391","ee":"https://doi.org/10.1145/1858378.1858391","url":"https://dblp.org/rec/conf/a2cwic/IlangoR10"}, "url":"URL#5283496" }, { "@score":"1", "@id":"5283497", "info":{"authors":{"author":[{"@pid":"46/9766","text":"S. Kirthiga"},{"@pid":"47/5769","text":"M. Jayakumar 0001"}]},"title":"AutoRegressive channel modeling and estimation using Kalman filter for downlink LTE systems.","venue":"A2CWiC","pages":"45:1-45:5","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/KirthigaJ10","doi":"10.1145/1858378.1858423","ee":"https://doi.org/10.1145/1858378.1858423","url":"https://dblp.org/rec/conf/a2cwic/KirthigaJ10"}, "url":"URL#5283497" }, { "@score":"1", "@id":"5283498", "info":{"authors":{"author":[{"@pid":"07/9767","text":"Vallidevi Krishnamurthy"},{"@pid":"79/5489","text":"Chitra Babu"}]},"title":"Effective self adaptation by integrating adaptive framework with architectural patterns.","venue":"A2CWiC","pages":"67:1-67:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/KrishnamurthyB10","doi":"10.1145/1858378.1858445","ee":"https://doi.org/10.1145/1858378.1858445","url":"https://dblp.org/rec/conf/a2cwic/KrishnamurthyB10"}, "url":"URL#5283498" }, { "@score":"1", "@id":"5283499", "info":{"authors":{"author":[{"@pid":"33/9767","text":"Dancy Kurian"},{"@pid":"26/9767","text":"R. S. Jayasree"},{"@pid":"11/832","text":"M. Wilscy"},{"@pid":"40/6824","text":"A. K. Gupta"}]},"title":"White Matter Hyperintensity segmentation using multiple stage FCM.","venue":"A2CWiC","pages":"36:1-36:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/KurianJWG10","doi":"10.1145/1858378.1858414","ee":"https://doi.org/10.1145/1858378.1858414","url":"https://dblp.org/rec/conf/a2cwic/KurianJWG10"}, "url":"URL#5283499" }, { "@score":"1", "@id":"5283500", "info":{"authors":{"author":{"@pid":"41/2488-2","text":"K. Lakshmi 0002"}},"title":"Multi-criteria hybrid PSO algorithm with communications for combinatorial optimisation.","venue":"A2CWiC","pages":"7:1-7:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Lakshmi10","doi":"10.1145/1858378.1858385","ee":"https://doi.org/10.1145/1858378.1858385","url":"https://dblp.org/rec/conf/a2cwic/Lakshmi10"}, "url":"URL#5283500" }, { "@score":"1", "@id":"5283501", "info":{"authors":{"author":[{"@pid":"65/9766","text":"R. Deepa Lakshmi"},{"@pid":"47/9767","text":"N. Radha"}]},"title":"Spam classification using supervised learning techniques.","venue":"A2CWiC","pages":"66:1-66:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/LakshmiR10","doi":"10.1145/1858378.1858444","ee":"https://doi.org/10.1145/1858378.1858444","url":"https://dblp.org/rec/conf/a2cwic/LakshmiR10"}, "url":"URL#5283501" }, { "@score":"1", "@id":"5283502", "info":{"authors":{"author":[{"@pid":"80/9322","text":"Kanapathy Maheswari"},{"@pid":"67/8035","text":"M. Punithavalli"}]},"title":"Enhanced packet loss recovery in voice multiplex-multicast based VoIP networks.","venue":"A2CWiC","pages":"68:1-68:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MaheswariP10","doi":"10.1145/1858378.1858446","ee":"https://doi.org/10.1145/1858378.1858446","url":"https://dblp.org/rec/conf/a2cwic/MaheswariP10"}, "url":"URL#5283502" }, { "@score":"1", "@id":"5283503", "info":{"authors":{"author":[{"@pid":"95/9766","text":"D. Maheswari"},{"@pid":"49/6665","text":"V. Radha 0002"}]},"title":"Enhanced layer based compound image compression.","venue":"A2CWiC","pages":"40:1-40:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MaheswariR10","doi":"10.1145/1858378.1858418","ee":"https://doi.org/10.1145/1858378.1858418","url":"https://dblp.org/rec/conf/a2cwic/MaheswariR10"}, "url":"URL#5283503" }, { "@score":"1", "@id":"5283504", "info":{"authors":{"author":[{"@pid":"00/9767","text":"R. Maheswari"},{"@pid":"97/9766","text":"S. Sheeba Rani"}]},"title":"An interactive RTOS based machine controller through speech using ESTREL.","venue":"A2CWiC","pages":"54:1-54:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MaheswariR10a","doi":"10.1145/1858378.1858432","ee":"https://doi.org/10.1145/1858378.1858432","url":"https://dblp.org/rec/conf/a2cwic/MaheswariR10a"}, "url":"URL#5283504" }, { "@score":"1", "@id":"5283505", "info":{"authors":{"author":[{"@pid":"244/1898-2","text":"Nandagopal Malarvizhi"},{"@pid":"155/8759","text":"Kandaswamy Gokulnath"},{"@pid":"50/2498","text":"V. Rhymend Uthariaraj"}]},"title":"Sender initiated decentralized dynamic load balancing for multi cluster computational grid environment.","venue":"A2CWiC","pages":"63:1-63:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MalarvizhiGU10","doi":"10.1145/1858378.1858441","ee":"https://doi.org/10.1145/1858378.1858441","url":"https://dblp.org/rec/conf/a2cwic/MalarvizhiGU10"}, "url":"URL#5283505" }, { "@score":"1", "@id":"5283506", "info":{"authors":{"author":[{"@pid":"65/7588","text":"Marimuthu Krishnaveni"},{"@pid":"89/9766","text":"Radha Venkatachalam"}]},"title":"Feature extraction based on multiphase level set framework for sign language recognition system.","venue":"A2CWiC","pages":"25:1-25:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MarimuthuV10","doi":"10.1145/1858378.1858403","ee":"https://doi.org/10.1145/1858378.1858403","url":"https://dblp.org/rec/conf/a2cwic/MarimuthuV10"}, "url":"URL#5283506" }, { "@score":"1", "@id":"5283507", "info":{"authors":{"author":[{"@pid":"74/9075","text":"Namita Mittal"},{"@pid":"99/1071","text":"Richi Nayak"},{"@pid":"45/11139","text":"Mahesh Chandra Govil"},{"@pid":"50/10833","text":"Kamal Chand Jain"}]},"title":"Evaluation of a hybrid approach of personalized web information retrieval using the FIRE data set.","venue":"A2CWiC","pages":"52:1-52:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MittalNGJ10","doi":"10.1145/1858378.1858430","ee":"https://doi.org/10.1145/1858378.1858430","url":"https://dblp.org/rec/conf/a2cwic/MittalNGJ10"}, "url":"URL#5283507" }, { "@score":"1", "@id":"5283508", "info":{"authors":{"author":[{"@pid":"34/9767","text":"Anuj Mohamed"},{"@pid":"53/5050","text":"K. N. Ramachandran Nair"}]},"title":"Continuous Malayalam speech recognition using Hidden Markov Models.","venue":"A2CWiC","pages":"59:1-59:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/MohamedN10","doi":"10.1145/1858378.1858437","ee":"https://doi.org/10.1145/1858378.1858437","url":"https://dblp.org/rec/conf/a2cwic/MohamedN10"}, "url":"URL#5283508" }, { "@score":"1", "@id":"5283509", "info":{"authors":{"author":[{"@pid":"09/9767","text":"Manjusha Nair"},{"@pid":"31/9767","text":"Nidheesh Melethadathil"},{"@pid":"11/9767","text":"Bipin Nair"},{"@pid":"04/9716","text":"Shyam Diwakar"}]},"title":"Information processing via post-synaptic EPSP-spike complex and model-based predictions of induced changes during plasticity in cerebellar granular neuron.","venue":"A2CWiC","pages":"5:1-5:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/NairMND10","doi":"10.1145/1858378.1858383","ee":"https://doi.org/10.1145/1858378.1858383","url":"https://dblp.org/rec/conf/a2cwic/NairMND10"}, "url":"URL#5283509" }, { "@score":"1", "@id":"5283510", "info":{"authors":{"author":[{"@pid":"32/9767","text":"Athira M. Nambiar"},{"@pid":"41/9767","text":"Asha Vijayan"},{"@pid":"01/9767","text":"Aishwarya Nandakumar"}]},"title":"Wireless intrusion detection based on different clustering approaches.","venue":"A2CWiC","pages":"42:1-42:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/NambiarVN10","doi":"10.1145/1858378.1858420","ee":"https://doi.org/10.1145/1858378.1858420","url":"https://dblp.org/rec/conf/a2cwic/NambiarVN10"}, "url":"URL#5283510" }, { "@score":"1", "@id":"5283511", "info":{"authors":{"author":[{"@pid":"79/9766","text":"Mrudula Nimbarte"},{"@pid":"57/9766","text":"Smita Nagtode"}]},"title":"Method based technique of compilation with compilation server.","venue":"A2CWiC","pages":"11:1-11:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/NimbarteN10","doi":"10.1145/1858378.1858389","ee":"https://doi.org/10.1145/1858378.1858389","url":"https://dblp.org/rec/conf/a2cwic/NimbarteN10"}, "url":"URL#5283511" }, { "@score":"1", "@id":"5283512", "info":{"authors":{"author":{"@pid":"64/8145","text":"Rozita Jamili Oskouei"}},"title":"The role of social networks on female students activities.","venue":"A2CWiC","pages":"26:1-26:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Oskouei10","doi":"10.1145/1858378.1858404","ee":"https://doi.org/10.1145/1858378.1858404","url":"https://dblp.org/rec/conf/a2cwic/Oskouei10"}, "url":"URL#5283512" }, { "@score":"1", "@id":"5283513", "info":{"authors":{"author":[{"@pid":"73/9766","text":"Mithula Parangan"},{"@pid":"22/9767","text":"Chitra Aravind"},{"@pid":"18/10123","text":"Harilal Parasuraman"},{"@pid":"46/9715","text":"Krishnashree Achuthan"},{"@pid":"11/9767","text":"Bipin Nair"},{"@pid":"04/9716","text":"Shyam Diwakar"}]},"title":"Action potential and bursting phenomena using analog electrical neuron.","venue":"A2CWiC","pages":"6:1-6:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ParanganAPAND10","doi":"10.1145/1858378.1858384","ee":"https://doi.org/10.1145/1858378.1858384","url":"https://dblp.org/rec/conf/a2cwic/ParanganAPAND10"}, "url":"URL#5283513" }, { "@score":"1", "@id":"5283514", "info":{"authors":{"author":[{"@pid":"62/9766","text":"Devi S. T. Pavithra"},{"@pid":"21/1693","text":"M. S. Vijaya"}]},"title":"Electroencephalogram wave signal analysis and epileptic seizure prediction using supervised classification approach.","venue":"A2CWiC","pages":"18:1-18:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/PavithraV10","doi":"10.1145/1858378.1858396","ee":"https://doi.org/10.1145/1858378.1858396","url":"https://dblp.org/rec/conf/a2cwic/PavithraV10"}, "url":"URL#5283514" }, { "@score":"1", "@id":"5283515", "info":{"authors":{"author":[{"@pid":"45/9767","text":"Raji R. Pillai"},{"@pid":"59/6024","text":"Sumam Mary Idicula"}]},"title":"Linear text segmentation using classification techniques.","venue":"A2CWiC","pages":"58:1-58:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/PillaiI10","doi":"10.1145/1858378.1858436","ee":"https://doi.org/10.1145/1858378.1858436","url":"https://dblp.org/rec/conf/a2cwic/PillaiI10"}, "url":"URL#5283515" }, { "@score":"1", "@id":"5283516", "info":{"authors":{"author":[{"@pid":"78/9766","text":"E. Poovammal"},{"@pid":"73/1898","text":"M. Ponnavaikko"}]},"title":"APPT: A privacy preserving transformation tool for micro data release.","venue":"A2CWiC","pages":"29:1-29:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/PoovammalP10","doi":"10.1145/1858378.1858407","ee":"https://doi.org/10.1145/1858378.1858407","url":"https://dblp.org/rec/conf/a2cwic/PoovammalP10"}, "url":"URL#5283516" }, { "@score":"1", "@id":"5283517", "info":{"authors":{"author":[{"@pid":"71/9766","text":"M. P. Preeja"},{"@pid":"72/68","text":"K. P. Soman"}]},"title":"Fast computation of marginalized walk kernel for virtual screening in drug discovery.","venue":"A2CWiC","pages":"16:1-16:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/PreejaS10","doi":"10.1145/1858378.1858394","ee":"https://doi.org/10.1145/1858378.1858394","url":"https://dblp.org/rec/conf/a2cwic/PreejaS10"}, "url":"URL#5283517" }, { "@score":"1", "@id":"5283518", "info":{"authors":{"author":[{"@pid":"30/7685","text":"V. Radhika"},{"@pid":"58/7146","text":"G. Padmavathi"}]},"title":"A study on impulse noise removal for varied noise densities.","venue":"A2CWiC","pages":"56:1-56:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/RadhikaP10","doi":"10.1145/1858378.1858434","ee":"https://doi.org/10.1145/1858378.1858434","url":"https://dblp.org/rec/conf/a2cwic/RadhikaP10"}, "url":"URL#5283518" }, { "@score":"1", "@id":"5283519", "info":{"authors":{"author":[{"@pid":"21/9767","text":"Bai. V. Ramani"},{"@pid":"91/2781","text":"S. N. Sivanandam"}]},"title":"An intelligent numerical algorithm for solving system of linear algebraic equations.","venue":"A2CWiC","pages":"55:1-55:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/RamaniS10","doi":"10.1145/1858378.1858433","ee":"https://doi.org/10.1145/1858378.1858433","url":"https://dblp.org/rec/conf/a2cwic/RamaniS10"}, "url":"URL#5283519" }, { "@score":"1", "@id":"5283520", "info":{"authors":{"author":[{"@pid":"76/9766","text":"V. Smrithi Rekha"},{"@pid":"29/3215","text":"Vidhya Balasubramanian"},{"@pid":"87/9766","text":"V. Adinarayanan"}]},"title":"Social computing in universities: an evaluation of practicality.","venue":"A2CWiC","pages":"27:1-27:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/RekhaBA10","doi":"10.1145/1858378.1858405","ee":"https://doi.org/10.1145/1858378.1858405","url":"https://dblp.org/rec/conf/a2cwic/RekhaBA10"}, "url":"URL#5283520" }, { "@score":"1", "@id":"5283521", "info":{"authors":{"author":[{"@pid":"75/9766","text":"Swati Saigaonkar"},{"@pid":"33/9321","text":"Madhuri Rao"}]},"title":"XML filtering system based on ontology.","venue":"A2CWiC","pages":"51:1-51:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SaigaonkarR10","doi":"10.1145/1858378.1858429","ee":"https://doi.org/10.1145/1858378.1858429","url":"https://dblp.org/rec/conf/a2cwic/SaigaonkarR10"}, "url":"URL#5283521" }, { "@score":"1", "@id":"5283522", "info":{"authors":{"author":[{"@pid":"59/7796-1","text":"S. Sangeetha 0001"},{"@pid":"54/2426","text":"Michael Arock"},{"@pid":"254/1687","text":"Rini Smita Thakur"}]},"title":"Event mention detection using rough set and semantic similarity.","venue":"A2CWiC","pages":"62:1-62:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SangeethaAT10","doi":"10.1145/1858378.1858440","ee":"https://doi.org/10.1145/1858378.1858440","url":"https://dblp.org/rec/conf/a2cwic/SangeethaAT10"}, "url":"URL#5283522" }, { "@score":"1", "@id":"5283523", "info":{"authors":{"author":[{"@pid":"26/9571","text":"R. Sangeetha"},{"@pid":"09/1427","text":"B. Kalpana"}]},"title":"Optimizing the kernel selection for support vector machines using performance measures.","venue":"A2CWiC","pages":"8:1-8:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SangeethaK10","doi":"10.1145/1858378.1858386","ee":"https://doi.org/10.1145/1858378.1858386","url":"https://dblp.org/rec/conf/a2cwic/SangeethaK10"}, "url":"URL#5283523" }, { "@score":"1", "@id":"5283524", "info":{"authors":{"author":[{"@pid":"59/8467","text":"Mary Priya Sebastian"},{"@pid":"37/9767","text":"Sheena Kurian K"},{"@pid":"08/4093","text":"G. Santhosh Kumar"}]},"title":"English to Malayalam translation: a statistical approach.","venue":"A2CWiC","pages":"64:1-64:5","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SebastianKK10","doi":"10.1145/1858378.1858442","ee":"https://doi.org/10.1145/1858378.1858442","url":"https://dblp.org/rec/conf/a2cwic/SebastianKK10"}, "url":"URL#5283524" }, { "@score":"1", "@id":"5283525", "info":{"authors":{"author":[{"@pid":"05/5826","text":"M. Selvanayaki"},{"@pid":"03/9767","text":"V. Bhuvaneswari"}]},"title":"Finding microarray genes using GO ontology.","venue":"A2CWiC","pages":"49:1-49:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SelvanayakiB10","doi":"10.1145/1858378.1858427","ee":"https://doi.org/10.1145/1858378.1858427","url":"https://dblp.org/rec/conf/a2cwic/SelvanayakiB10"}, "url":"URL#5283525" }, { "@score":"1", "@id":"5283526", "info":{"authors":{"author":[{"@pid":"49/9767","text":"Smita Sengupta"},{"@pid":"77/8750","text":"Kavita V. V. Ganeshan"},{"@pid":"s/NandlalLSarda","text":"Nandlal L. Sarda"}]},"title":"Developing IITB Smart CampusGIS Grid.","venue":"A2CWiC","pages":"30:1-30:8","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SenguptaGS10","doi":"10.1145/1858378.1858408","ee":"https://doi.org/10.1145/1858378.1858408","url":"https://dblp.org/rec/conf/a2cwic/SenguptaGS10"}, "url":"URL#5283526" }, { "@score":"1", "@id":"5283527", "info":{"authors":{"author":[{"@pid":"76/7665","text":"K. J. Shanthi"},{"@pid":"91/7664","text":"M. Sasi Kumar"}]},"title":"VLSI implementation of image segmentation processor for brain MRI.","venue":"A2CWiC","pages":"38:1-38:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ShanthiK10","doi":"10.1145/1858378.1858416","ee":"https://doi.org/10.1145/1858378.1858416","url":"https://dblp.org/rec/conf/a2cwic/ShanthiK10"}, "url":"URL#5283527" }, { "@score":"1", "@id":"5283528", "info":{"authors":{"author":{"@pid":"35/9766","text":"Upasana Sharma"}},"title":"Fault tolerant techniques for reconfigurable platforms.","venue":"A2CWiC","pages":"60:1-60:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Sharma10","doi":"10.1145/1858378.1858438","ee":"https://doi.org/10.1145/1858378.1858438","url":"https://dblp.org/rec/conf/a2cwic/Sharma10"}, "url":"URL#5283528" }, { "@score":"1", "@id":"5283529", "info":{"authors":{"author":{"@pid":"36/9766","text":"Archana Shukla"}},"title":"A metadata and annotation extractor from PDF document for semantic web.","venue":"A2CWiC","pages":"48:1-48:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Shukla10","doi":"10.1145/1858378.1858426","ee":"https://doi.org/10.1145/1858378.1858426","url":"https://dblp.org/rec/conf/a2cwic/Shukla10"}, "url":"URL#5283529" }, { "@score":"1", "@id":"5283530", "info":{"authors":{"author":[{"@pid":"93/164","text":"S. S. Shylaja"},{"@pid":"53/3225-1","text":"S. Natarajan 0001"},{"@pid":"44/751","text":"K. N. Balasubramanya Murthy"},{"@pid":"29/9693","text":"K. G. Abhijit"},{"@pid":"43/9767","text":"Jayashree Diwakar"},{"@pid":"40/9767","text":"S. Mohammed Saifulla"}]},"title":"Aggregation of Gabor wavelets and curvelets with PCA for efficient retrieval of face images.","venue":"A2CWiC","pages":"37:1-37:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ShylajaNMADS10","doi":"10.1145/1858378.1858415","ee":"https://doi.org/10.1145/1858378.1858415","url":"https://dblp.org/rec/conf/a2cwic/ShylajaNMADS10"}, "url":"URL#5283530" }, { "@score":"1", "@id":"5283531", "info":{"authors":{"author":[{"@pid":"91/9766","text":"S. Simi"},{"@pid":"117/5227","text":"Maneesha V. Ramesh"}]},"title":"Real-time monitoring of explosives using wireless sensor networks.","venue":"A2CWiC","pages":"44:1-44:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SimiR10","doi":"10.1145/1858378.1858422","ee":"https://doi.org/10.1145/1858378.1858422","url":"https://dblp.org/rec/conf/a2cwic/SimiR10"}, "url":"URL#5283531" }, { "@score":"1", "@id":"5283532", "info":{"authors":{"author":[{"@pid":"30/7625","text":"Upasna Singh"},{"@pid":"87/1587","text":"Gora Chand Nandi"}]},"title":"Efficient temporal pattern mining for humanoid robot.","venue":"A2CWiC","pages":"19:1-19:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SinghN10","doi":"10.1145/1858378.1858397","ee":"https://doi.org/10.1145/1858378.1858397","url":"https://dblp.org/rec/conf/a2cwic/SinghN10"}, "url":"URL#5283532" }, { "@score":"1", "@id":"5283533", "info":{"authors":{"author":{"@pid":"94/455","text":"Rekha Singhal"}},"title":"A national public healthcare framework using grid.","venue":"A2CWiC","pages":"20:1-20:5","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Singhal10","doi":"10.1145/1858378.1858398","ee":"https://doi.org/10.1145/1858378.1858398","url":"https://dblp.org/rec/conf/a2cwic/Singhal10"}, "url":"URL#5283533" }, { "@score":"1", "@id":"5283534", "info":{"authors":{"author":[{"@pid":"48/9767","text":"T. Sridevi"},{"@pid":"94/9766","text":"B. Krishnaveni"},{"@pid":"72/95","text":"V. Vijaya Kumar"},{"@pid":"10/9767","text":"Y. Rama Devi"}]},"title":"A video watermarking algorithm for MPEG videos.","venue":"A2CWiC","pages":"35:1-35:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SrideviKKD10","doi":"10.1145/1858378.1858413","ee":"https://doi.org/10.1145/1858378.1858413","url":"https://dblp.org/rec/conf/a2cwic/SrideviKKD10"}, "url":"URL#5283534" }, { "@score":"1", "@id":"5283535", "info":{"authors":{"author":[{"@pid":"05/9767","text":"P. K. Srimani"},{"@pid":"36/9767","text":"Nanditha Prasad"}]},"title":"Analysis and evaluation of classifiers using multi-temporal images in land use and land cover mapping.","venue":"A2CWiC","pages":"31:1-31:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SrimaniP10","doi":"10.1145/1858378.1858409","ee":"https://doi.org/10.1145/1858378.1858409","url":"https://dblp.org/rec/conf/a2cwic/SrimaniP10"}, "url":"URL#5283535" }, { "@score":"1", "@id":"5283536", "info":{"authors":{"author":[{"@pid":"124/3829","text":"P. Subashini 0001"},{"@pid":"65/7588","text":"M. Krishnaveni"},{"@pid":"35/8073","text":"Bernadetta Kwintiana Ane"},{"@pid":"r/DieterRoller0002","text":"Dieter Roller 0002"},{"@pid":"34/6798","text":"Gerald Schaefer"}]},"title":"A combined preprocessing scheme for texture based ice classification from SAR images.","venue":"A2CWiC","pages":"33:1-33:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SubashiniKARS10","doi":"10.1145/1858378.1858411","ee":"https://doi.org/10.1145/1858378.1858411","url":"https://dblp.org/rec/conf/a2cwic/SubashiniKARS10"}, "url":"URL#5283536" }, { "@score":"1", "@id":"5283537", "info":{"authors":{"author":{"@pid":"59/9766","text":"G. Sudhamathy"}},"title":"Mining web logs: an automated approach.","venue":"A2CWiC","pages":"57:1-57:4","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/Sudhamathy10","doi":"10.1145/1858378.1858435","ee":"https://doi.org/10.1145/1858378.1858435","url":"https://dblp.org/rec/conf/a2cwic/Sudhamathy10"}, "url":"URL#5283537" }, { "@score":"1", "@id":"5283538", "info":{"authors":{"author":[{"@pid":"95/8810","text":"K. Sujatha"},{"@pid":"317/0489","text":"N. Pappa"}]},"title":"Temperature and combustion quality control in power station boilers using artificial neural networks.","venue":"A2CWiC","pages":"4:1-4:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SujathaP10","doi":"10.1145/1858378.1858382","ee":"https://doi.org/10.1145/1858378.1858382","url":"https://dblp.org/rec/conf/a2cwic/SujathaP10"}, "url":"URL#5283538" }, { "@score":"1", "@id":"5283539", "info":{"authors":{"author":[{"@pid":"74/9766","text":"K. V. Sujatha"},{"@pid":"88/9766","text":"S. Meenakshi Sundaram"}]},"title":"A combined PCA-MLP model for predicting stock index.","venue":"A2CWiC","pages":"17:1-17:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SujathaS10","doi":"10.1145/1858378.1858395","ee":"https://doi.org/10.1145/1858378.1858395","url":"https://dblp.org/rec/conf/a2cwic/SujathaS10"}, "url":"URL#5283539" }, { "@score":"1", "@id":"5283540", "info":{"authors":{"author":[{"@pid":"75/9570","text":"S. S. Sujatha"},{"@pid":"14/8037","text":"M. Mohammed Sathik"}]},"title":"A novel pixel based blind watermarking algorithm by applying Fibonacci transform.","venue":"A2CWiC","pages":"39:1-39:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SujathaS10a","doi":"10.1145/1858378.1858417","ee":"https://doi.org/10.1145/1858378.1858417","url":"https://dblp.org/rec/conf/a2cwic/SujathaS10a"}, "url":"URL#5283540" }, { "@score":"1", "@id":"5283541", "info":{"authors":{"author":[{"@pid":"83/9766","text":"N. Sumathi"},{"@pid":"13/7867","text":"Antony Selvadoss Thanamani"}]},"title":"Pipelined backoff scheme for bandwidth measurement in QoS enabled routing towards scalability for MANets.","venue":"A2CWiC","pages":"41:1-41:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SumathiT10","doi":"10.1145/1858378.1858419","ee":"https://doi.org/10.1145/1858378.1858419","url":"https://dblp.org/rec/conf/a2cwic/SumathiT10"}, "url":"URL#5283541" }, { "@score":"1", "@id":"5283542", "info":{"authors":{"author":[{"@pid":"96/7800","text":"K. V. N. Sunitha"},{"@pid":"86/9766","text":"A. Sharada"}]},"title":"Digitization of Indian literature: problem and solution.","venue":"A2CWiC","pages":"22:1-22:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/SunithaS10","doi":"10.1145/1858378.1858400","ee":"https://doi.org/10.1145/1858378.1858400","url":"https://dblp.org/rec/conf/a2cwic/SunithaS10"}, "url":"URL#5283542" }, { "@score":"1", "@id":"5283543", "info":{"authors":{"author":[{"@pid":"29/9767","text":"Jisha C. Thankappan"},{"@pid":"59/6024","text":"Sumam Mary Idicula"}]},"title":"Language independent voice-based gender identification system.","venue":"A2CWiC","pages":"23:1-23:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ThankappanI10","doi":"10.1145/1858378.1858401","ee":"https://doi.org/10.1145/1858378.1858401","url":"https://dblp.org/rec/conf/a2cwic/ThankappanI10"}, "url":"URL#5283543" }, { "@score":"1", "@id":"5283544", "info":{"authors":{"author":[{"@pid":"50/9767","text":"N. Valliammal"},{"@pid":"70/7906","text":"S. N. Geethalakshmi"}]},"title":"Performance analysis of various leaf boundary edge detection algorithms.","venue":"A2CWiC","pages":"34:1-34:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/ValliammalG10","doi":"10.1145/1858378.1858412","ee":"https://doi.org/10.1145/1858378.1858412","url":"https://dblp.org/rec/conf/a2cwic/ValliammalG10"}, "url":"URL#5283544" }, { "@score":"1", "@id":"5283545", "info":{"authors":{"author":[{"@pid":"92/9570","text":"B. Vanathi"},{"@pid":"50/2498","text":"V. Rhymend Uthariaraj"}]},"title":"Context representation using hierarchical method and heuristic based context selection in context aware computing.","venue":"A2CWiC","pages":"32:1-32:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/VanathiU10","doi":"10.1145/1858378.1858410","ee":"https://doi.org/10.1145/1858378.1858410","url":"https://dblp.org/rec/conf/a2cwic/VanathiU10"}, "url":"URL#5283545" }, { "@score":"1", "@id":"5283546", "info":{"authors":{"author":[{"@pid":"117/0695","text":"Vani V"},{"@pid":"17/3950","text":"S. Mohan"}]},"title":"Interactive 3D class room: a framework for Web3D using J3D and JMF.","venue":"A2CWiC","pages":"24:1-24:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/VaniM10","doi":"10.1145/1858378.1858402","ee":"https://doi.org/10.1145/1858378.1858402","url":"https://dblp.org/rec/conf/a2cwic/VaniM10"}, "url":"URL#5283546" }, { "@score":"1", "@id":"5283547", "info":{"authors":{"author":[{"@pid":"57/1854","text":"N. A. Vasanthi"},{"@pid":"26/6587","text":"S. Annadurai"}]},"title":"Pattern based routing for event driven wireless sensor-actor networks.","venue":"A2CWiC","pages":"43:1-43:6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/VasanthiA10","doi":"10.1145/1858378.1858421","ee":"https://doi.org/10.1145/1858378.1858421","url":"https://dblp.org/rec/conf/a2cwic/VasanthiA10"}, "url":"URL#5283547" }, { "@score":"1", "@id":"5283548", "info":{"authors":{"author":[{"@pid":"20/9562","text":"Deepali Virmani"},{"@pid":"30/9561","text":"Satbir Jain"}]},"title":"Fault tolerant optimal path for data delivery in wireless sensor networks.","venue":"A2CWiC","pages":"46:1-46:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/VirmaniJ10","doi":"10.1145/1858378.1858424","ee":"https://doi.org/10.1145/1858378.1858424","url":"https://dblp.org/rec/conf/a2cwic/VirmaniJ10"}, "url":"URL#5283548" }, { "@score":"1", "@id":"5283549", "info":{"authors":{"author":[{"@pid":"80/9766","text":"Rama Devi Yellasiri"},{"@pid":"19/9767","text":"P. Venu Gopal"},{"@pid":"23/2953","text":"P. S. V. S. Sai Prasad"}]},"title":"Impact analysis of Jensen and Sk pal fuzzification in classification.","venue":"A2CWiC","pages":"2:1-2:7","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/a2cwic/YellasiriGP10","doi":"10.1145/1858378.1858380","ee":"https://doi.org/10.1145/1858378.1858380","url":"https://dblp.org/rec/conf/a2cwic/YellasiriGP10"}, "url":"URL#5283549" }, { "@score":"1", "@id":"5410616", "info":{"authors":{"author":[{"@pid":"46/9715","text":"Krishnashree Achuthan"},{"@pid":"38/9767","text":"Gayatri Buragohain"}]},"title":"Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, September 16-17, 2010, Tamilnadu, India","venue":"A2CWiC","publisher":"ACM","year":"2010","type":"Editorship","key":"conf/a2cwic/2010","doi":"10.1145/1858378","ee":"https://doi.org/10.1145/1858378","url":"https://dblp.org/rec/conf/a2cwic/2010"}, "url":"URL#5410616" }, { "@score":"1", "@id":"5422671", "info":{"title":"Adaptive computer assisted instruction (CAI) for students with dyscalculia (learning disability in mathematics).","venue":"A2CWiC","pages":"12:1-12:7","year":"2010","type":"Withdrawn Items","access":"withdrawn","key":"conf/a2cwic/BrundaB10","doi":"10.1145/1858378.1858390","ee":"https://doi.org/10.1145/1858378.1858390","url":"https://dblp.org/rec/conf/a2cwic/BrundaB10"}, "url":"URL#5422671" } ] } } } )