Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
AIMOC
AIMOC 2015
Generate Citations
2015 Applications and Innovations in Mobile Computing (AIMoC)
Feb. 12 2015 to Feb. 14 2015
Kolkata, India
Table of Contents
2015 Applications and Innovations in Mobile Computing (AIMoC) [Proceedings]
Freely available from IEEE.
pp. c2
Copyright
Freely available from IEEE.
pp. i
Table of contents
Freely available from IEEE.
pp. iii-vi
Preface
Freely available from IEEE.
pp. vii
Committee lists
Freely available from IEEE.
pp. viii
Program Committee
Freely available from IEEE.
pp. ix-x
Performance analysis of cooperative systems using majority decision rule in Nakagami-m fading channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
S. Rajmohan
,
M. Santhoshkumar
Enhanced ZigBee tree addressing for flexible network topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
Uttam Kumar Roy
,
Parama Bhaumik
Functionality analysis of centralized CR network with integrated femtocell under the presence of PU
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Joydev Ghosh
,
Amitrakshar Mohanta
,
Sanjay Dhar Roy
Optimized HMIPv6 (O-HMIPv6): reducing handoff latency in HMIPv6 networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-24
by
Manoj Kumar Rana
,
Swarup Mandal
,
Bhaskar Sardar
A location based mobility prediction scheme for post disaster communication network using DTN
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Sandipan Ganguly
,
Souvik Basu
,
Siuli Roy
,
Suvankar Mitra
Adapting mobility of observers for quick reputation assignment in a sparse post-disaster communication network
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-35
by
Chandrima Chakrabarti
,
Siuli Roy
A comparative study of paging techniques for diurnal mobility in dual homed cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Samir K. Sadhukhan
,
Nilabja Moitra
,
P. Venkateswaran
,
Debashis Saha
Cluster-based comb-needle model for energy-efficient data aggregation in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
M. Shanmukhi
,
O.B.V. Ramanaiah
Multiple sink deployment in multi-hop wireless sensor networks to enhance lifetime
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-54
by
Punyasha Chatterjee
,
Nabanita Das
Employing cooperative group mobility model for mobile target tracking in MWSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-61
by
Tathagata Das
,
Sarbani Roy
Event boundary detection and gathering in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-67
by
Srabani Kundu
,
Nabanita Das
Energy-efficient data transmission in sensor-cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Subarna Chatterjee
,
Subhadeep Sarkar
,
Sudip Misra
Design and implementation of a time synchronization-free distributed localization scheme for underwater acoustic sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-80
by
Sudip Kundu
,
Pampa Sadhukhan
Location estimation of wireless sensor nodes using a few beacon nodes in a 2-D geographical area
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Subrata Dutta
,
Nandini Mukherjee
,
Sarmistha Neogy
Congestion avoidance topology in wireless sensor network using Karnaugh map
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Ranjan Dasgupta
,
Ritwick Mukherjee
,
Amitava Gupta
Gathering of Asynchronous Mobile Robots in a Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Sumitro Bhaumik
,
Sruti Gan Chaudhuri
Two-level mapping to mitigate congestion in machine to machine (M2M) cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-108
by
P. V. S. Ravi Teja
,
Subarna Chatterjee
,
Sankar Narayan Das
,
Sudip Misra
An IPv6 based hierarchical address configuration scheme for smart grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Manali Chakraborty
,
Nabendu Chaki
An analytical method to identify social ambassadors for a mobile service provider's brand page on facebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-123
by
Adrija Majumdar
,
Debashis Saha
,
Parthasarathi Dasgupta
An energy-efficient routing protocol for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Moumita Pramanick
,
Chandreyee Chowdhury
,
Paramita Basak
,
Md. Abdullah Al-Mamun
,
Sarmistha Neogy
Multi criteria routing in wireless sensor network using weighted product model and relative rating
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Bijoy Das
,
Suman Sankar Bhunia
,
Sarbani Roy
,
Nandini Mukherjee
A Multihop Routing Protocol for Wireless Sensor Network based on Grid Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-140
by
Manoj Pant
,
Biswanath Dey
,
Sukumar Nandi
A novel encounter based trust evaluation for AODV routing in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-145
by
Saswati Mukherjee
,
Matangini Chattopadhyay
,
Samiran Chattopadhyay
A distributed approach towards trusted cloud computing platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Partha Sen
,
Pritam Saha
,
Sunirmal Khatua
Detection of node-misbehavior using overhearing and autonomous agents in wireless Ad-Hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Dikshita Agarwal
,
Rashmi Ranjan Rout
,
Sadam Ravichandra
Secure sensor data management model in a sensor - cloud integration environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Sayantani Saha
A robust remote user authentication scheme resistant to known session specific temporary information attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Mrudula Sarvabhatla
,
M. Chandra Mouli Reddy
,
Chandra Sekhar Vorugunti
Spatial query handling in semantic web application: an experience report
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Dibyanshu Jaiswal
,
Sounak Dey
,
Ranjan Dasgupta
,
Arijit Mukherjee
Tracking context of smart handheld devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-181
by
Saikat Kr. Mazumder
,
Chandreyee Chowdhury
,
Sarmistha Neogy
An event-driven university campus navigation system on android platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Susovan Jana
,
Matangini Chattopadhyay
Author index
Freely available from IEEE.
pp. 1-2
Showing 37 out of 37