Sciweavers

CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 8 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 8 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta
CORR
2010
Springer
196views Education» more  CORR 2010»
13 years 8 months ago
Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval
In this work we have compared two indexing algorithms that have been used to index and retrieve Carnatic music songs. We have compared a modified algorithm of the Dual ternary ind...
Rajeswari Sridhar, A. Amudha, S. Karthiga, T. V. G...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 8 months ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 8 months ago
Towards Performance Measurement And Metrics Based Analysis of PLA Applications
This article is about a measurement analysis based approach to help software practitioners in managing the additional level complexities and variabilities in software product line...
Zeeshan Ahmed
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 8 months ago
Examining Requirements Change Rework Effort: A Study
Although software managers are generally good at new project estimation, their experience of scheduling rework tends to be poor. Inconsistent or incorrect effort estimation can in...
Bee Bee Chua, June M. Verner
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 8 months ago
Building Reusable Software Component For Optimization Check in ABAP Coding
Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes...
P. Shireesha, S. S. V. N. Sharma
CORR
2010
Springer
190views Education» more  CORR 2010»
13 years 8 months ago
Stable marriage problems with quantitative preferences
The stable marriage problem is a well-known problem of matching men to women so that no man and woman, who are not married to each other, both prefer each other. Such a problem ha...
Maria Silvia Pini, Francesca Rossi, Kristen Brent ...
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 8 months ago
Bayesian Network Based XP Process Modelling
A Bayesian Network based mathematical model has been used for modelling Extreme Programming software development process. The model is capable of predicting the expected finish ti...
Mohamed Abouelela, Luigi Benedicenti
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 8 months ago
Where are the hard manipulation problems?
One possible escape from the Gibbard-Satterthwaite theorem is computational complexity. For example, it is NP-hard to compute if the STV rule can be manipulated. However, there is...
Toby Walsh