ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
Latest Publications
TOTAL DOCUMENTS
130
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By ACM Press
9781450347563
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Performance Analysis of Java Virtual Machine for Machine Learning Workloads using Apache Spark
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2982117
◽
2016
◽
Author(s):
N. Hema
◽
K. G. Srinivasa
◽
Saravanan Chidambaram
◽
Sandeep Saraswat
◽
Sujoy Saraswati
◽
...
Keyword(s):
Machine Learning
◽
Performance Analysis
◽
Virtual Machine
◽
Apache Spark
◽
Java Virtual Machine
Download Full-text
Cloud Computing Overview, Security Threats and Solutions-A Survey
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2982046
◽
2016
◽
Cited By ~ 2
Author(s):
A. Kannaki VasanthaAzhagu
◽
J. M. Gnanasekar
Keyword(s):
Cloud Computing
◽
Security Threats
Download Full-text
Security Enhancement using a modified AES algorithm
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980264
◽
2016
◽
Cited By ~ 1
Author(s):
R. Bala
◽
N. P. Gopalan
Keyword(s):
Security Enhancement
◽
Aes Algorithm
◽
Modified Aes
Download Full-text
Computer Aided Mammography Techniques for Detection and Classification of Breast Cancers
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2982122
◽
2016
◽
Author(s):
S. Punitha
◽
S. Ravi
◽
M. Anusouya Devi
◽
J. Vaishnavi
Keyword(s):
Breast Cancers
◽
Computer Aided
Download Full-text
Bidirectional Data Dissemination in Vehicular Ad Hoc Networks using Epidemic Spreading Model
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980382
◽
2016
◽
Cited By ~ 1
Author(s):
M. Chitra
◽
S. Siva Sathya
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Data Dissemination
◽
Epidemic Spreading
◽
Spreading Model
◽
Hoc Networks
Download Full-text
Evolutionary Neural Networks versus Adaptive Resonance Theory Net for Breast Cancer Diagnosis
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980458
◽
2016
◽
Cited By ~ 3
Author(s):
Tanistha Nayak
◽
Tirtharaj Dash
◽
D. Chandrasekhar Rao
◽
Prabhat K. Sahu
Keyword(s):
Breast Cancer
◽
Neural Networks
◽
Cancer Diagnosis
◽
Breast Cancer Diagnosis
◽
Adaptive Resonance Theory
◽
Resonance Theory
◽
Adaptive Resonance
◽
Evolutionary Neural Networks
Download Full-text
Design of QOS based Web Service Selection/Composition Hyper-Heuristic Model
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980430
◽
2016
◽
Author(s):
Sangeetha Muthuraman
◽
V. Prasanna Venkatesan
Keyword(s):
Web Service
◽
Service Selection
◽
Heuristic Model
◽
Web Service Selection
Download Full-text
COPMOC
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980449
◽
2016
◽
Author(s):
Naveen Kumar
◽
S. Siva Sathya
Download Full-text
Integrity Verification For Outsourced XML Database In Cloud Storage
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980354
◽
2016
◽
Author(s):
G. Preethi
◽
N. P. Gopalan
Keyword(s):
Cloud Storage
◽
Xml Database
◽
Integrity Verification
Download Full-text
An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs
Proceedings of the International Conference on Informatics and Analytics - ICIA-16
◽
10.1145/2980258.2980464
◽
2016
◽
Author(s):
G. Santhi
Keyword(s):
Intrusion Detection
◽
Digital Signature
◽
Intrusion Detection System
◽
Detection System
◽
Signature Scheme
◽
Digital Signature Scheme
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close