Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSDE
DSDE 2010
Generate Citations
Data Storage and Data Engineering, International Conference on
Feb. 9 2010 to Feb. 10 2010
Bangalore, India
ISBN: 978-0-7695-3958-4
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-ix
Papers
Preface
Freely available from IEEE.
pp. x-xi
Papers
Organizing Committee
Freely available from IEEE.
pp. xii
Papers
list-reviewer
Freely available from IEEE.
pp. xiii-xiv
Papers
Amalgamtion of Internet for Supervisory Control and Data Acquisition System (SCADA) Encompassing Security Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Samaksh Kumar
,
Sidhant Sachdev
Papers
Approximation of the Node-Pair Reliability of Data Communication Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-9
by
Mou Dasgupta
,
G.P. Biswas
Papers
Biotechnology Virtual Labs - Integrating Wet-lab Techniques and Theoretical Learning for Enhanced Learning at Universities
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-14
by
Shyam Diwakar
,
Krishnashree Achuthan
,
Prema Nedungadi
Papers
Random Access OFDMA Network with Dynamic Resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Sunil Jacob
,
R. Dhanasekaran
Papers
Comparison of Load Balancing Algorithms in a Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-23
by
Janhavi Arvind Baikerikar
,
Sunil K. Surve
,
Sapna U. Prabhu
Papers
Implementation of Relational Algebra Interpreter Using Another Query Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-28
by
Ratnesh Litoriya
,
Anshu Ranjan
Papers
A Survey of Algorithms in FCIM
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-33
by
Maryam Shekofteh
Papers
TC-GXML - A Transcoder for HTML to XML Grammar
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-38
by
Raghuraj Singh
,
Prabhat Verma
,
Avinash Kumar Singh
Papers
A DWT Based Approach for Steganography Using Biometrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-43
by
Anjali A. Shejul
,
U.L. Kulkarni
Papers
Optimization of Detected Deadlock Views of Distributed Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-48
by
B.M. Monjurul Alom
,
Frans Alexander Henskens
,
Michael Richard Hannaford
Papers
Preserving Location Privacy in Peer-to-Peer Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-53
by
Rupam Deb
,
Sumaya Kazary
,
Kazi Rafiqul Islam
,
Reaz Ahmed
Papers
Binary Classification Using Linear SVM Pyramidal Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-58
by
M. Arun Kumar
,
M. Gopal
Papers
A Novel Structural Similarity with High Distinguishability
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Shaojun Chen
,
Lianfen Huang
,
Jianan Lin
,
Zhiyuan Shi
Papers
Application of Data Mining in Predicting Cell Phones Subscribers Behavior Employing the Contact Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Rahman Mansouri
,
Mohamad Saraee
,
Rasoul Amirfattahi
Papers
Research on Fault Tree Based Complex Electronic Device Fault Diagnosis Expert System
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Liang Xiao-lin
,
Yang Qing-zhen
Papers
Enterprise Storage Architecture for Optimal Business Continuity
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Rekha Singhal
,
Shreya Bokare
,
Prasad Pawar
Papers
Active Learning Algorithm for Threshold of Decision Probability on Imbalanced Text Classification Based on Protein-Protein Interaction Documents
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-82
by
Guixian Xu
,
Zhendong Niu
,
Xu Gao
,
Yujuan Cao
,
Yumin Zhao
Papers
A Comparative Study of View Update Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-89
by
Haitao Chen
,
Husheng Liao
Purpose Based Access Control for Privacy Protection in Object Relational Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-94
by
Emilin Shyni
,
Swamynathan S.
Papers
Clustering of Evolving Data Stream with Multiple Adaptive Sliding Window
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-100
by
Hongbo Zhu
,
Yaqiang Wang
,
Zhonghua Yu
Papers
Multimedia Distribution over IPTV and its Integration with IMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-105
by
Mohammed Abdul Qadeer
,
Afaq Hasan Khan
Papers
Implementation of an IMS Testbed for Wired and Wireless Clients
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-110
by
Afaq Hasan Khan
,
Mohammed Abdul Qadeer
Papers
Design of Data Replication System on FreeBSD
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-115
by
Kun Ren
,
Zhanhuai Li
,
Chao Wang
,
Nan Jiang
Papers
Optimization and Implementation of LBM Benchmark on Multithreaded GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-122
by
Xiaoguang Ren
,
Yuhua Tang
,
Guibin Wang
,
Tao Tang
,
Xudong Fang
Papers
Research on Evaluation of Digital Library
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
Yumin Zhao
,
Zhendong Niu
,
Yujuan Cao
,
Lin Dai
Papers
IT Service Support Process Meta-Modeling Based on ITIL
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-131
by
Xin Huang
,
Beijun Shen
,
Delai Chen
Design and Implementation of Inference Engine in Safety Risk Assessment Expert System in Petrochemical Industry Based on Fault Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Huifang Shi
,
Wenhua Song
,
Qinggong Li
Papers
A Personalized Search Engine Using Ontology-Based Fuzzy Concept Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
Fardin Akhlaghian
,
Batool Arzanian
,
Parham Moradi
Papers
A New Requirement Prioritization Model for Market Driven Products Using Analytical Hierarchical Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-149
by
Muhammad Atif Iqbal
,
Athar Mohsin Zaidi
,
Saeed Murtaza
Papers
Automated CAD for Lung Nodule Detection using CT Scans
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-153
by
M. Gomathi
,
P.P. Thangaraj
Papers
SpreadStore: A LDPC Erasure Code Scheme for Distributed Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-158
by
Harihara Subramanyam G.
,
Balaji Janakiram
,
M. Girish Chandra
,
Aravind K.G.
,
Swanand Kadhe
,
Balamuralidhar P.
,
B.S. Adiga
Papers
A Novel Classification Method for Diagnosis of Diabetes Mellitus Using Artificial Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
T. Jayalakshmi
,
A. Santhakumaran
Papers
An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented Paradigm
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-168
by
Vibha Gaur
,
Anuja Soni
,
Punam Bedi
Papers
An Efficient Feature Extraction Method for Classification of Image Spam Using Artificial Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-172
by
M. Soranamageswari
,
C. Meena
Papers
Generating Distributed Query Processing Plans Using Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-177
by
T.V. Vijay Kumar
,
Vikram Singh
,
Ajay Kumar Verma
Papers
Increasing Packet Delivery Ratio in GPSR Using Buffer Zone Based Greedy Forwarding Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-182
by
Wen Wei
,
Zhang Heng Yang
Papers
E Governance
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-186
by
Tejas R. Marawar
,
Swapnil P. Kale
,
Ketan I. Araspure
Papers
Web Mining: Key Accomplishments, Applications and Future Directions
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-191
by
Mahesh Thylore Ramakrishna
,
Latha Kolal Gowdar
,
Malatesh Somashekar Havanur
,
Banur Puttappa Mallikarjuna Swamy
Papers
Study of Medical Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-196
by
Sonali Bhadoria
,
C.G. Dethe
Papers
Noise Load Adaptive Filter Using Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-200
by
M.V. Jagannatha Reddy
,
Saroj Kumar Gupta
,
B. Kavitha
Papers
Investigation and Research on Physical Education Informationization in Higher Institutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-215
by
Tao Zhang
Papers
Web Usage Data Clustering Using Dbscan Algorithm and Set Similarities
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
K. Santhisree
,
A. Damodaram
,
S.V. Appaji
,
D. Nagarjunadevi
Web Site Mining Using Entropy Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-229
by
Sonawane Vijay Ramnath
,
Halkarnikar Pratap P.
Papers
More on Elicitation of Software Requirements and Prioritization Using AHP
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-234
by
Mohd. Sadiq
,
Jawed Ahmed
,
Mohammad Asim
,
Aslam Qureshi
,
R. Suman
Papers
Aligning Raw Image to Real-time Coordinate System
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-239
by
Ameya Gawde
,
Gresha Bhatia
,
Daishik Mehta
,
Hitesh Rohira
,
Aniket Phatak
Papers
DDCSP: Constraint Satisfaction Problem Used for Rule-Based System
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-244
by
Belaid Saad
,
Francine Herrmann
,
Yann Lanuel
,
Thomas Tamisier
Papers
Web Data Visualization Based on the Function and Implementaion Dimension
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-249
by
Jiaxin Wu
Papers
An Effective Clustering Algorithm for Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-253
by
Singh Vijendra
,
Laxman Sahoo
,
Kelkar Ashwini
Papers
XLight, An Efficient Relational Schema to Store and Query XML Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-257
by
Hasan Zafari
,
Keramat Hasani
,
M. Ebrahim Shiri
Papers
A New Replica Creation and Placement Algorithm for Data Grid Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-269
by
K. Sashi
,
Antony Selvadoss Thanamani
Papers
A Layered Architecture for Checking Rewriting Attacks in Resource Constrained Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-274
by
P.P. Abdul Haleem
,
M.P. Sebastian
Papers
Determining Robust Solutions in Supply Chain Using Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-277
by
Niju P. Joseph
,
G. Radhamani
Papers
Raid 5 for Secured Storage Virtualisation
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-282
by
Shubhalaxmi Joshi
,
Umesh Patwardhan
,
Pallavi Deshpande
Papers
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
M. Daris Femila
,
A. Anthony Irudhayaraj
Papers
Agile Disk Replacement Strategy for Data Cloud Environment Using Evolutionary Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-291
by
Sandeep Patil
,
Abhinay Nagpal
Papers
A Coplanar Waveguide Power Divider and It's Neural Network Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Bingyi Gao
,
Yuxia Xin
Papers
Autonomicity in Oracle Database Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Basit Raza
,
Abdul Mateen
,
Muhammad Sher
,
Mian Muhammad Awais
,
Tauqeer Hussain
Papers
Discuss on the Researching and Using Geo-Spatial Technology In the History Changing of the Silk Road
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-304
by
Xing-xing Wang
,
Jian-tao Bi
Papers
Correction and Interpolation of Noise Corrupted Voice Using Markov Chain Detection Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-309
by
Naseeb Ahmed Adnan
,
Md. Sajedul Islam
Papers
Author Index
Freely available from IEEE.
pp. 310-312
Papers
[Publisher's information]
Freely available from IEEE.
pp. 314
Showing 68 out of 68