ANAS Volume 8, Number 16: EEICC Special 4 2014 for Computer Science
----------------------------------------------------------------------------------------------------------------------------------
Gleaming System – A Resourceful System Designed to Maximize the Utilization of
Cloud Infrastructure by Scheduling the Heterogeneous Workloads
P.Amudhavalli and Dr.A.Chandrasekar
1-7
----------------------------------------------------------------------------------------------------------------------------------
An Effectual Routing Protocol for In-Network Aggregation in Wireless Sensor
Networks
P.Thirumoorthy and Dr. N. K.Karthikeyan
8-14
----------------------------------------------------------------------------------------------------------------------------------
Abnormal Behavior Recognition in Infrared Imagery Based on Daubechies Wavelets
Dr. Ramar Kadarkaraiyandi, Dr. Velayutham Ramakrishnan, Prof. Selvarathy Thirumani and Mr. Sathish
Vetrivel
15-20
----------------------------------------------------------------------------------------------------------------------------------
ELRT: Improved Packet delivery ratio using Enhanced Link Residual Time in VANET
Karthikeyan L, Selvakumar S and Balasubramani S
21-24
----------------------------------------------------------------------------------------------------------------------------------
A Chronological Survey on Combinatorial Testing Strategies
B.Vani and Dr. R. Deepa Lakshmi
25-32
----------------------------------------------------------------------------------------------------------------------------------
Detection of Static and Dynamic Behavior in Forbidden Areas of a Complex
Environment
Sumalatha Ramachandran and Lakshmi Harika Palivela
33-39
----------------------------------------------------------------------------------------------------------------------------------
Exhibiting Human Behavior in Transforming Informal Words in to Formal Words on
Tweet Messages
Kumaragurubaran Thangavel and IndraDevi M
40-43
----------------------------------------------------------------------------------------------------------------------------------
Identifying Security threats using Signature based Intrusion detection system in
wireless sensor networks
A.Hyils Sharon Magdalene and Dr.P.Kumar
44-47
----------------------------------------------------------------------------------------------------------------------------------
A Unique Location-Key pair based Security for Wireless Sensor Network
R. Amuthavalli and Dr. R. S. Bhuvaneswaran
48-53
----------------------------------------------------------------------------------------------------------------------------------
Flexible Tradeoff Based Real Time Service Selection Process Based On Priorities and
User Preferences
Adlin Suji.K and Dr.S.Sujatha
54-59
----------------------------------------------------------------------------------------------------------------------------------
Clustering Text Reviews for Opinion Mining
Periakaruppan Sudhakaran, Shanmugasundaram Hariharan and Joan Lu
60-65
----------------------------------------------------------------------------------------------------------------------------------
Analysis of Residual Energy and SNR of DSR/AODV/RPAR Protocols in Wireless
Multimedia Sensor Networks
A.Sivagami, S.Malarkkan, S.Sandiya and R.Ramakrishnan
66-74
----------------------------------------------------------------------------------------------------------------------------------
A Novel Approach for Detecting Rare Drug-Drug Interaction using Data Mining
Bazila Banu. A, Appavu alias Balamurugan and Shyni Beaulah.M
75-83
----------------------------------------------------------------------------------------------------------------------------------
|