ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2013 2nd International Conference on Advanced Computing, Networking and Security
Latest Publications
TOTAL DOCUMENTS
58
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9780769551272
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Key Update Mechanism in PKI: Study and a New Approach
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.52
◽
2013
◽
Cited By ~ 1
Author(s):
V. Spoorthi
◽
Balaji Rajendran
◽
K. Chandrasekaran
Keyword(s):
New Approach
◽
Key Update
Download Full-text
Table of Contents
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.7
◽
2013
◽
Download Full-text
Wavelet Based Sharp Features (WASH): An Image Quality Assessment Metric Based on HVS
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.25
◽
2013
◽
Cited By ~ 5
Author(s):
M. Reenu
◽
Dayana David
◽
S. S. Aneesh Raj
◽
Madhu S. Nair
Keyword(s):
Image Quality
◽
Quality Assessment
◽
Image Quality Assessment
Download Full-text
Title Page i
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.1
◽
2013
◽
Keyword(s):
Title Page
Download Full-text
Robust Face Recognition in the Presence of Noises and Blurring Effects by Fusing Appearance Based Techniques and Sparse Representation
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.16
◽
2013
◽
Cited By ~ 12
Author(s):
Steven L. Fernandes
◽
G. Josemin Bala
◽
P. Nagabhushan
◽
S. K. Mandal
Keyword(s):
Face Recognition
◽
Sparse Representation
◽
Robust Face Recognition
Download Full-text
Technical Program Committee
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.57
◽
2013
◽
Keyword(s):
Program Committee
◽
Technical Program Committee
◽
Technical Program
Download Full-text
A Review of Monitoring Techniques for Service Based Applications
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.18
◽
2013
◽
Cited By ~ 1
Author(s):
Sridevi Saralaya
◽
Rio D'Souza
Keyword(s):
Monitoring Techniques
Download Full-text
Automatic Cloud Detection Using Spectral Rationing and Fuzzy Clustering
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.44
◽
2013
◽
Cited By ~ 7
Author(s):
S. R. Surya
◽
Philomina Simon
Keyword(s):
Fuzzy Clustering
◽
Cloud Detection
Download Full-text
Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.33
◽
2013
◽
Cited By ~ 12
Author(s):
Gurpreet Singh
◽
Supriya
Keyword(s):
Encryption Algorithm
Download Full-text
Image Denoising Based on Undecimated Double Density Dual Tree Wavelet Transform and Modified Firm Shrinkage
2013 2nd International Conference on Advanced Computing, Networking and Security
◽
10.1109/adcons.2013.38
◽
2013
◽
Cited By ~ 1
Author(s):
Varun P. Gopi
◽
M. Pavithran
◽
T. Nishanth
◽
S. Balaji
◽
V. Rajavelu
◽
...
Keyword(s):
Wavelet Transform
◽
Image Denoising
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close