Default Cover Image

2017 Tenth International Conference on Contemporary Computing (IC3)

Aug. 10 2017 to Aug. 12 2017

Noida, India

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Conference organizationFreely available from IEEE.pp. i-x
Table of contentsFreely available from IEEE.pp. xi-xv
Hybrid step size based cuckoo searchFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A study on the minimum dominating set problem approximation in parallelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
No-escape search: Design and implementation ofcloud based directory content searchFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An efficient algorithm for sampling of a single large graphFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A fast GPU algorithm for biconnected componentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Quantum genetic algorithm with rotation angle refinement for dependent task scheduling on distributed systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Analyzing fault prediction usefulness from cost perspective using source code metricsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Measuring the randomness of speech cues for emotion recognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fraud detection and frequent pattern matching in insurance claims using data mining techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Currency recognition system using image processingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Image based search engine using deep learningFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A fast and scalable crowd sensing based trajectory tracking systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Data clustering using enhanced biogeography-based optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Neural network with multiple training methods for web service quality of service parameter predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CRUISE: A platform for crowdsourcing Requirements Elicitation and evolutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Are tweets the real estimators of election results?Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Fault tolerant streaming of live news using multi-node CassandraFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Authorship attribution for textual data on online social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Keystroke dynamics based authentication system with unrestricted data collectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
CPLAG: Efficient plagiarism detection using bitwise operationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Tension detection in online communitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Acoustic features based word level dialect classification using SVM and ensemble methodsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Secure live virtual machine migration through runtime monitorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Sarcasm detection of tweets: A comparative studyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Deep sequential model for review rating predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
MSD-Apriori: Discovering borderline-rare items using association miningFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A frequent itemset reduction algorithm for global pattern mining on distributed data streamsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Cryptographic key generation from multimodal template using fuzzy extractorFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Region and feature matching based vehicle tracking for accident detectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Delay-based workflow scheduling for cost optimization in heterogeneous cloud systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Approaches for information retrieval in legal documentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Disassembling and patching iOS applications at assembly levelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Sentiment analysis of text using deep convolution neural networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Clickstream & behavioral analysis with context awareness for e-commercial applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A feature-based analysis of MOOC for learning analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A game-theoretic approach to solve the free-rider problemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design and implementation of an intelligent cab service systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Stability analysis of SRAM cell using CNT and GNR field effect transistorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Efficient design of full adder and subtractor using 5-input majority gate in QCAFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Meta-heuristic solution for relay nodes placement in constrained environmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Keystroke dynamics based authentication using fuzzy logicFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Impact of non-linear numerical methods on localization algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
KNNR:K-nearest neighbour classification based routing protocol for opportunistic networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A horizontal fat mesh interconnection networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Design of people counting system using MATLABFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Algorithms for projecting a bipartite networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Aspects of entrepreneurship education in higher education institutesFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
A ranking based recommender system for cold start & data sparsity problemFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Reach360: A comprehensive safety solutionFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Clustering based minimum spanning tree algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Diabetic retinopathy detection using feedforward neural networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Performance evaluation of various data structures in building efficient indexing schemes for XML documentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Efficient content based image retrieval using SVM and color histogramFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Resolving identities on Facebook and TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Randomized grey wolf optimizer (RGWO) with randomly weighted coefficientsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Hybrid particle swarm training for convolution neural network (CNN)Full-text access may be available. Sign in or learn about subscription options.pp. 1-3
An improved content based collaborative filtering algorithm for movie recommendationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Network diffusion for information propagation in online social communitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Differential evolution-based subspace clustering via thresholding ridge regressionFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
The low-rate denial of service attack based comparative study of active queue management schemeFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Smart intersection control algorithms for automated vehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Author indexFreely available from IEEE.pp. 401-403
Showing 82 out of 82