nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Behaviour based Framework for Worm Detection
|
Saikia, Tonmoy |
|
2012 |
6 |
C |
p. 1011-1018 8 p. |
artikel |
2 |
A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity
|
Chakravarthy, Srinivasa L. |
|
2012 |
6 |
C |
p. 889-896 8 p. |
artikel |
3 |
A Dynamic Fault Tolerant Threshold based Replication Mechanism in Distributed Environment
|
Vardhan, Manu |
|
2012 |
6 |
C |
p. 188-195 8 p. |
artikel |
4 |
A Framework for Outlier Detection in Evolving Data Streams by Weighting Attributes in Clustering
|
Yogita, |
|
2012 |
6 |
C |
p. 214-222 9 p. |
artikel |
5 |
A Genetic Algorithm based Approach for Topological Optimization of Interconnection Networks
|
Tripathy, P.K. |
|
2012 |
6 |
C |
p. 196-205 10 p. |
artikel |
6 |
Analysis of Clustering Algorithms for MR Image Segmentation using IQI
|
Patel, S. |
|
2012 |
6 |
C |
p. 387-396 10 p. |
artikel |
7 |
Analysis of Reconfigurable Multipliers for Integer and Galois Field Multiplication based on High Speed Adders
|
Madhuri, Divya |
|
2012 |
6 |
C |
p. 90-97 8 p. |
artikel |
8 |
Analytical Crosstalk Modelling of On-Chip RLC Global Interconnects with Skin Effect for Ramp Input
|
Maheshwari, V. |
|
2012 |
6 |
C |
p. 814-821 8 p. |
artikel |
9 |
An Analytical Model for Adaptive Multi-Guard Channel Scheme for Multi-Class Traffic in Cellular Networks with Reduced Handoff Drop Probabilities
|
Somagari, Suresh Reddy |
|
2012 |
6 |
C |
p. 690-697 8 p. |
artikel |
10 |
An Approach to Manage Mobility of Sensor Nodes in Sensor-Grid Infrastructure
|
Bhunia, Suman Sankar |
|
2012 |
6 |
C |
p. 754-762 9 p. |
artikel |
11 |
An Efficient and Tolerant Model for Real-time Transaction Management in a Cellular Environment with Random Multiple Handoffs and Frequent Short Disconnections
|
Kayal, Abhishek |
|
2012 |
6 |
C |
p. 640-649 10 p. |
artikel |
12 |
An Evolutionary Algorithm for Multi-criteria Resource Constrained Project Scheduling Problem based On PSO
|
Bakshi, Tuli |
|
2012 |
6 |
C |
p. 231-238 8 p. |
artikel |
13 |
A New and Efficient Method for Removal of High Density Salt and Pepper Noise Through Cascade Decision based Filtering Algorithm
|
Pattnaik, Ashutosh |
|
2012 |
6 |
C |
p. 108-117 10 p. |
artikel |
14 |
A New Authentication Protocol for Multi-tag RFID Applicable to Passive Tag
|
Dhal, Subhasish |
|
2012 |
6 |
C |
p. 880-888 9 p. |
artikel |
15 |
A New Soft-Thresholding Image Denoising Method
|
Biswas, Mantosh |
|
2012 |
6 |
C |
p. 10-15 6 p. |
artikel |
16 |
A New UWB Tri-Band Antenna for Cognitive Radio
|
Pandian, S. Siva Sundara |
|
2012 |
6 |
C |
p. 747-753 7 p. |
artikel |
17 |
An Improved DSDV Routing Protocol for Wireless Ad Hoc Networks
|
Ahmed, Gulfishan Firdose |
|
2012 |
6 |
C |
p. 822-831 10 p. |
artikel |
18 |
An Optimal Novel Byzantine Agreement Protocol (ONBAP) for Heterogeneous Distributed Database Processing Systems
|
Ramesh, Dharavath |
|
2012 |
6 |
C |
p. 57-66 10 p. |
artikel |
19 |
A Novel Approach for Web Service Run Time Exception Handling
|
Thirumaran, M. |
|
2012 |
6 |
C |
p. 145-152 8 p. |
artikel |
20 |
A Novel High Speed Two Stage Detector for Spectrum Sensing
|
Geethu, S. |
|
2012 |
6 |
C |
p. 682-689 8 p. |
artikel |
21 |
A Novel Multi-Classifier Layered Approach to Improve Minority Attack Detection in IDS
|
Sharma, Neelam |
|
2012 |
6 |
C |
p. 913-921 9 p. |
artikel |
22 |
A Novel Spatial Fuzzy Clustering using Delaunay Triangulation for Large Scale GIS Data (NSFCDT)
|
Roy, Parthajit |
|
2012 |
6 |
C |
p. 452-459 8 p. |
artikel |
23 |
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussion Forum
|
Majumder, Mukta |
|
2012 |
6 |
C |
p. 379-386 8 p. |
artikel |
24 |
An Ultra-wideband Printed Monopole Antenna with Dual Band-Notched Characteristics Using DGS and SRR
|
Sharma, M.M. |
|
2012 |
6 |
C |
p. 778-783 6 p. |
artikel |
25 |
A Particle Swarm Optimization based Approach for Power System Transient Stability Enhancement with TCSC
|
Rautray, S.K. |
|
2012 |
6 |
C |
p. 31-38 8 p. |
artikel |
26 |
Application of Fuzzy Clustering on Software Quality using Max-min Method
|
Pal, Jaya |
|
2012 |
6 |
C |
p. 67-73 7 p. |
artikel |
27 |
Application of Multi-Objective Teaching Learning based Optimization Algorithm to Optimal Power Flow Problem
|
Nayak, M.R. |
|
2012 |
6 |
C |
p. 255-264 10 p. |
artikel |
28 |
A Prototype-Based Modified DBSCAN for Gene Clustering
|
Edla, Damodar Reddy |
|
2012 |
6 |
C |
p. 485-492 8 p. |
artikel |
29 |
Architecture Design and FPGA Implementation of CORDIC Algorithm for Fingerprint Recognition Applications
|
Revathi, P. |
|
2012 |
6 |
C |
p. 371-378 8 p. |
artikel |
30 |
A Real-time Model for Multiple Human Face Tracking from Low-resolution Surveillance Videos
|
Sarkar, Rajib |
|
2012 |
6 |
C |
p. 1004-1010 7 p. |
artikel |
31 |
A Resilient Authentication and Trojan Detection Technique for Hard IP
|
Saha, Debasri |
|
2012 |
6 |
C |
p. 24-30 7 p. |
artikel |
32 |
A Segment based Technique for Detecting Exudate from Retinal Fundus Image
|
Kumar, Atul |
|
2012 |
6 |
C |
p. 1-9 9 p. |
artikel |
33 |
Assessment of Software Quality: Choquet Integral Approach
|
Pasrija, Vatesh |
|
2012 |
6 |
C |
p. 153-162 10 p. |
artikel |
34 |
A Survey on Monochrome Image Segmentation Methods
|
Sridevi, M. |
|
2012 |
6 |
C |
p. 548-555 8 p. |
artikel |
35 |
A Transliteration of CRF based Manipuri POS Tagging
|
Nongmeikapam, Kishorjit |
|
2012 |
6 |
C |
p. 582-589 8 p. |
artikel |
36 |
Automatic System for Classification of Erythrocytes Infected with Malaria and Identification of Parasite's Life Stage
|
Savkare, S.S. |
|
2012 |
6 |
C |
p. 405-410 6 p. |
artikel |
37 |
Binarization based Image Edge Detection using Bacterial Foraging Algorithm
|
Verma, Om Prakash |
|
2012 |
6 |
C |
p. 315-323 9 p. |
artikel |
38 |
Block Encoding of Color Histogram for Content based Image Retrieval Applications
|
Shaila, S.G. |
|
2012 |
6 |
C |
p. 526-533 8 p. |
artikel |
39 |
CellTCS:A Secure Threshold Cryptography Scheme based on Non-linear Hybrid Cellular Automata
|
Jakhar, Jyoti |
|
2012 |
6 |
C |
p. 947-953 7 p. |
artikel |
40 |
Crosstalk Aware Bandwidth Modelling for VLSI RC Global Interconnects using 2-π Model
|
Maheshwari, V. |
|
2012 |
6 |
C |
p. 832-839 8 p. |
artikel |
41 |
Design and Development of an Ontology based Personal Web Search Engine
|
Priya, T. Sakthi |
|
2012 |
6 |
C |
p. 299-306 8 p. |
artikel |
42 |
Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social Networks
|
Chakraborty, Partha Sarathi |
|
2012 |
6 |
C |
p. 534-539 6 p. |
artikel |
43 |
Design of RSA-CA Based E-Health System for Supporting HIPAA Privacy-Security Regulations
|
Ray, Sangram |
|
2012 |
6 |
C |
p. 954-961 8 p. |
artikel |
44 |
Design of Trapezoidal Monopole Antenna with Truncated Ground Plane for 2.5GHz Band
|
Rajendran, Jolly |
|
2012 |
6 |
C |
p. 650-657 8 p. |
artikel |
45 |
Design Pattern for Dynamic Reconfiguration of Component-based Autonomic Computing Systems using RMI
|
Mannava, Vishnuvardhan |
|
2012 |
6 |
C |
p. 590-597 8 p. |
artikel |
46 |
Dual Mode VLSI Architecture for Spread Spectrum Image Watermarking using Binary Watermark
|
Ghosh, Sudip |
|
2012 |
6 |
C |
p. 784-791 8 p. |
artikel |
47 |
Duplication with Trapdoor Sensitive Attribute Values: A New Approach for Privacy Preserving Data Publishing
|
Purushothama, B.R. |
|
2012 |
6 |
C |
p. 970-977 8 p. |
artikel |
48 |
DWT based Feature Extraction using Edge Tracked Scale Normalization for Enhanced Face Recognition
|
Rinky, B.P. |
|
2012 |
6 |
C |
p. 344-353 10 p. |
artikel |
49 |
DWT Feature Extraction Based Face Recognition using Intensity Mapped Unsharp Masking and Laplacian of Gaussian Filtering with Scalar Multiplier
|
Yaji, Gautham Sitaram |
|
2012 |
6 |
C |
p. 475-484 10 p. |
artikel |
50 |
Dynamic Particle Swarm Optimization to Solve Multi-objective Optimization Problem
|
Urade, Hemlata S. |
|
2012 |
6 |
C |
p. 283-290 8 p. |
artikel |
51 |
Edge Strength Extraction using Orthogonal Vectors for Shot Boundary Detection
|
Priya, G.G. Lakshmi |
|
2012 |
6 |
C |
p. 247-254 8 p. |
artikel |
52 |
Effectiveness of Software Metrics for Object-oriented System
|
Suresh, Yeresime |
|
2012 |
6 |
C |
p. 420-427 8 p. |
artikel |
53 |
Effect of Harmony Search Parameters’ Variation in Clustering
|
Kumar, Vijay |
|
2012 |
6 |
C |
p. 265-274 10 p. |
artikel |
54 |
Efficiently Mining of Effective Web Traversal Patterns with Average Utility
|
Thilagu, M. |
|
2012 |
6 |
C |
p. 444-451 8 p. |
artikel |
55 |
Energy Efficient Load-Balanced Clustering Algorithm for Wireless Sensor Networks
|
Kuila, Pratyay |
|
2012 |
6 |
C |
p. 771-777 7 p. |
artikel |
56 |
Energy Efficient Routing in Wireless Sensor Network
|
Das, Subhajit |
|
2012 |
6 |
C |
p. 731-738 8 p. |
artikel |
57 |
Energy Efficient Target Tracking Mechanism using Rotational Camera Sensor in WMSN
|
De, Debashis |
|
2012 |
6 |
C |
p. 674-681 8 p. |
artikel |
58 |
Entropy based Log Chromaticity Projection for Real-time Stereo Matching
|
Raghavendra, U. |
|
2012 |
6 |
C |
p. 223-230 8 p. |
artikel |
59 |
Evaluation of Change Factors for Web Service Change Management
|
Thirumaran, M. |
|
2012 |
6 |
C |
p. 163-170 8 p. |
artikel |
60 |
Evolution of Degree of Purity in Programming Languages
|
RajasekharaBabu, M. |
|
2012 |
6 |
C |
p. 354-361 8 p. |
artikel |
61 |
Face Recognition using Geometric Measurements, Directional Edges and Directional Multiresolution Information
|
Maheshkar, Vikas |
|
2012 |
6 |
C |
p. 939-946 8 p. |
artikel |
62 |
Face Recognition using Threshold Based DWT Feature Extraction and Selective Illumination Enhancement Technique
|
Vidya, V. |
|
2012 |
6 |
C |
p. 334-343 10 p. |
artikel |
63 |
Fault Tolerant Decentralized Scheduling Algorithm for P2P Grid
|
Chauhan, Piyush |
|
2012 |
6 |
C |
p. 698-707 10 p. |
artikel |
64 |
Feature Binding Technique for Integration of Biological Databases with Optimized Search and Retrieve
|
Rao, A Chandra Sekhara |
|
2012 |
6 |
C |
p. 622-629 8 p. |
artikel |
65 |
Feature Extraction using Normalized Difference Vegetation Index (NDVI): A Case Study of Jabalpur City
|
Bhandari, A.K. |
|
2012 |
6 |
C |
p. 612-621 10 p. |
artikel |
66 |
Formal Verification of IEEE 802.11w Authentication Protocol
|
Kumari, V. Valli |
|
2012 |
6 |
C |
p. 716-722 7 p. |
artikel |
67 |
Formulating Particle Swarm Optimization based Generalized Kernel Function for Kernel-Linear Discriminant Analysis
|
Gopi, E.S. |
|
2012 |
6 |
C |
p. 517-525 9 p. |
artikel |
68 |
FPGA based Real Time Human Hand Gesture Recognition System
|
Gupta, Amit |
|
2012 |
6 |
C |
p. 98-107 10 p. |
artikel |
69 |
Genetic Algorithm Driven ANN Model for Runoff Estimation
|
Dhamge, Nina R. |
|
2012 |
6 |
C |
p. 501-508 8 p. |
artikel |
70 |
Gravitational Search Algorithm for Optimal Economic Dispatch
|
Swain, R.K. |
|
2012 |
6 |
C |
p. 411-419 9 p. |
artikel |
71 |
Heuristic Frequent Term-Based Clustering of News Headlines
|
Bora, Nibir Nayan |
|
2012 |
6 |
C |
p. 436-443 8 p. |
artikel |
72 |
Hierarchy Classification for Data Warehouse: A Survey
|
Talwar, Kanika |
|
2012 |
6 |
C |
p. 460-468 9 p. |
artikel |
73 |
Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques
|
Agarwal, Basant |
|
2012 |
6 |
C |
p. 996-1003 8 p. |
artikel |
74 |
Image Retrieval from WWW using Attributes in HTML TAGs
|
Vadivu, P. Shanmuga |
|
2012 |
6 |
C |
p. 509-516 8 p. |
artikel |
75 |
Improvement of Initial Cluster Center of C-means using Teaching Learning based Optimization
|
Naik, Anima |
|
2012 |
6 |
C |
p. 428-435 8 p. |
artikel |
76 |
Improvisation of the Document Summarization by Combining the IR Techniques with “Code-Quantity Memory and Attention” Linguistic Principles
|
Reddy, Pranitha |
|
2012 |
6 |
C |
p. 118-125 8 p. |
artikel |
77 |
Incremental Indexing for High-Dimensional Data using Tree Structure
|
Priya, R Vishnu |
|
2012 |
6 |
C |
p. 540-547 8 p. |
artikel |
78 |
Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing
|
Modi, Chirag N. |
|
2012 |
6 |
C |
p. 905-912 8 p. |
artikel |
79 |
Inter Cipher Block Diffusion: A Novel Transformation for Proposed Parallel AES
|
Srivastava, Shashank |
|
2012 |
6 |
C |
p. 872-879 8 p. |
artikel |
80 |
Inverted File Compression using EGC and FEGC
|
Domnic, S. |
|
2012 |
6 |
C |
p. 493-500 8 p. |
artikel |
81 |
Joint Precoding and Decoding in MU-MIMO Downlink Systems with Perfect Channel State Information (CSI)
|
M.Raja, |
|
2012 |
6 |
C |
p. 708-715 8 p. |
artikel |
82 |
Joint Robust and Reversible Watermarking for Medical Images
|
Maity, Hirak Kumar |
|
2012 |
6 |
C |
p. 275-282 8 p. |
artikel |
83 |
Learnable Focused Meta Crawling Through Web
|
Kumar, Mukesh |
|
2012 |
6 |
C |
p. 606-611 6 p. |
artikel |
84 |
Mathematical Modeling, Equivalent Circuit Analysis and Genetic Algorithm Optimization of an N-sided Regular Polygon Split Ring Resonator (NRPSRR)
|
Bose, Sumanta |
|
2012 |
6 |
C |
p. 763-770 8 p. |
artikel |
85 |
Mobility Aided Cooperative MIMO Transmission in Wireless Sensor Networks
|
Medhi, N. |
|
2012 |
6 |
C |
p. 362-370 9 p. |
artikel |
86 |
Modified Gate Diffusion Input Technique: A New Technique for Enhancing Performance in Full Adder Circuits
|
Uma, R. |
|
2012 |
6 |
C |
p. 74-81 8 p. |
artikel |
87 |
Multiobjective Optimization for Biomedical Named Entity Recognition and Classification
|
Ekbal, Asif |
|
2012 |
6 |
C |
p. 206-213 8 p. |
artikel |
88 |
Negative Correlation Aided Network Module Extraction
|
Ahmed, Hasin Afzal |
|
2012 |
6 |
C |
p. 658-665 8 p. |
artikel |
89 |
Network Status Aware Routing in 3D-CGIN
|
Borkar, Meenal A. |
|
2012 |
6 |
C |
p. 630-639 10 p. |
artikel |
90 |
Non Blind Digital Watermarking Technique Using DWT and Cross Chaos
|
Pradhan, Chittaranjan |
|
2012 |
6 |
C |
p. 897-904 8 p. |
artikel |
91 |
Non-uniform Concentric Circular Antenna Array Design using IPSO Technique for Side Lobe Reduction
|
Mandal, Durbadal |
|
2012 |
6 |
C |
p. 856-863 8 p. |
artikel |
92 |
On-line Electronic Payment System using signcryption
|
Mazumdar, Arpita |
|
2012 |
6 |
C |
p. 930-938 9 p. |
artikel |
93 |
Optimal Design of Zig-Zag Antenna Using Nonlinear Segment Length and Pitch Angle
|
Anjitha, V. |
|
2012 |
6 |
C |
p. 799-805 7 p. |
artikel |
94 |
Optimized Hybrid Optical Communication System for First Mile and Last Mile Problem Solution of Today's Optical Network
|
Patnaik, Bijayananda |
|
2012 |
6 |
C |
p. 723-730 8 p. |
artikel |
95 |
Optimum Design of Exponentially Varying Helical Antenna with Non Uniform Pitch Profile
|
Jimisha, K. |
|
2012 |
6 |
C |
p. 792-798 7 p. |
artikel |
96 |
Outlier Detection in Microarray Data Using Hybrid Evolutionary Algorithm
|
Rao, A Chandra Sekhara |
|
2012 |
6 |
C |
p. 291-298 8 p. |
artikel |
97 |
Outlier Identification using Symmetric Neighborhoods
|
Gogoi, Prasanta |
|
2012 |
6 |
C |
p. 239-246 8 p. |
artikel |
98 |
Performance Evaluation of Synchronous Energy Efficient MAC Protocols for Wireless Sensor Networks
|
Roy, Alak |
|
2012 |
6 |
C |
p. 806-813 8 p. |
artikel |
99 |
Plant Identification based on Fractal Refinement Technique (FRT)
|
Jobin, Antony |
|
2012 |
6 |
C |
p. 171-179 9 p. |
artikel |
100 |
Predictive Queue-based Technique for Network Latency Optimization in Established TCP/IP Gigabit Ethernet Stations
|
Ekpenyong, Moses |
|
2012 |
6 |
C |
p. 739-746 8 p. |
artikel |
101 |
Privacy Preservation for Global Cyclic Associations in Distributed Databases
|
Nanavati, Nirali |
|
2012 |
6 |
C |
p. 962-969 8 p. |
artikel |
102 |
Pruning Strategies to Refine Resource List for NN Queries in Location based Services
|
Saravanan, A. |
|
2012 |
6 |
C |
p. 598-605 8 p. |
artikel |
103 |
Q-Learning Approach for Minutiae Extraction from Fingerprint Image
|
Tiwari, Sandeep |
|
2012 |
6 |
C |
p. 82-89 8 p. |
artikel |
104 |
Reduced Feature Based Efficient Cancer Classification Using Single Layer Neural Network
|
Mahapatra, Rosalin |
|
2012 |
6 |
C |
p. 180-187 8 p. |
artikel |
105 |
Relational Database Watermarking for Ownership Protection
|
Rao, Udai Pratap |
|
2012 |
6 |
C |
p. 988-995 8 p. |
artikel |
106 |
Robust Distributed Learning in Wireless Sensor Network using Efficient Step Size
|
Panigrahi, T. |
|
2012 |
6 |
C |
p. 864-871 8 p. |
artikel |
107 |
Scalable Rough-fuzzy Weighted Leader based Non-parametric Methods for Large Data Sets
|
Veluru, Suresh |
|
2012 |
6 |
C |
p. 307-314 8 p. |
artikel |
108 |
Secure Data Aggregation in Vehicular-Adhoc Networks: A Survey
|
Mohanty, Sagarika |
|
2012 |
6 |
C |
p. 922-929 8 p. |
artikel |
109 |
Security Frameworks for Wireless Sensor Networks-Review
|
Sharma, Gaurav |
|
2012 |
6 |
C |
p. 978-987 10 p. |
artikel |
110 |
Semiautomatic Method for Segmenting Pedicles in Vertebral Radiographs
|
Kumar, Sampath |
|
2012 |
6 |
C |
p. 39-48 10 p. |
artikel |
111 |
Simulation and Performance Analysis of Various IEEE 802.11 Backoff Algorithms
|
Nithya, B. |
|
2012 |
6 |
C |
p. 840-847 8 p. |
artikel |
112 |
Smart Applications of Context Services using Automatic Adaptive Module and Making users Profiles
|
Garg, Neeraj |
|
2012 |
6 |
C |
p. 324-333 10 p. |
artikel |
113 |
Soft Output Decoding Algorithm for Turbo Codes Implementation in Mobile Wi-Max Environment
|
Kene, Jagdish D. |
|
2012 |
6 |
C |
p. 666-673 8 p. |
artikel |
114 |
Speckle Noise Reduction using Local Binary Pattern
|
Mandava, Ajay K. |
|
2012 |
6 |
C |
p. 574-581 8 p. |
artikel |
115 |
Speech Coding Based on Orthogonal and Biorthogonal Wavelet
|
Joseph, Shijo M. |
|
2012 |
6 |
C |
p. 397-404 8 p. |
artikel |
116 |
Test Case Design Using Slicing of UML Interaction Diagram
|
Swain, Ranjita Kumari |
|
2012 |
6 |
C |
p. 136-144 9 p. |
artikel |
117 |
The Lion's Algorithm: A New Nature-Inspired Search Algorithm
|
Rajakumar, B.R. |
|
2012 |
6 |
C |
p. 126-135 10 p. |
artikel |
118 |
Thinned Concentric Circular Antenna Array Synthesis using Particle Swarm Optimization
|
Mandal, D. |
|
2012 |
6 |
C |
p. 848-855 8 p. |
artikel |
119 |
Towards Improving Self-adaptive Differential Evolution for Numerical Optimization: A Progress Note
|
Saha, Indrajit |
|
2012 |
6 |
C |
p. 49-56 8 p. |
artikel |
120 |
Towards Optimized Placement of Cameras for Gait Pattern Recognition
|
Raman, Rahul |
|
2012 |
6 |
C |
p. 1019-1025 7 p. |
artikel |
121 |
TRANS Outperforms MTF for Two Special Types of Request Sequence Without Locality of Reference
|
Mohanty, Rakesh |
|
2012 |
6 |
C |
p. 556-563 8 p. |
artikel |
122 |
Using the Triangle Inequality to Accelerate Density based Outlier Detection Method
|
Patra, Bidyut Kr. |
|
2012 |
6 |
C |
p. 469-474 6 p. |
artikel |
123 |
Visible Spectrum, Bi-Modal Ocular Biometrics
|
Tankasala, Sriram Pavan |
|
2012 |
6 |
C |
p. 564-573 10 p. |
artikel |
124 |
WiMAX-UMTS Converging Architecture with IMS Signalling Analysis to Achieve QoS
|
Vijayalakshmy, G. |
|
2012 |
6 |
C |
p. 16-23 8 p. |
artikel |