By Topic

2012 Second International Conference on Advanced Computing & Communication Technologies

Date 7-8 Jan. 2012

Filter Results

Displaying Results 1 - 25 of 124
  • [Front cover]

    Publication Year: 2012, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (969 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Programme Committee

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Use of Clonal Selection Algorithm as Software Test Data Generation Technique

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Clonal selection algorithm is an algorithm that belongs to the class of immune algorithm inspired form clonal selection principle of biological immune system. Initially clonal selection algorithm was designed for machine learning approach and was used in pattern recognition process of artificial intelligence. The other implementation of clonal selection algorithm is in the field of function optimi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Clustering Techniques for Software Quality Prediction

    Publication Year: 2012, Page(s):6 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Clustering is the unsupervised classification of patterns into groups. A clustering algorithm partitions a data set into several groups such that similarity within a group is larger than among groups The clustering problem has been addressed in many contexts and by researchers in many disciplines, this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. There... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Modelling of Websites Quality Using Fuzzy Technique

    Publication Year: 2012, Page(s):10 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    The quality of websites is evaluated on the basis of eleven important metrics load time, response time, mark-up validation, broken link, accessibility error, size, page rank, frequency of update, traffic and design optimisation. The metrics are taken as linguistic variables. Fuzzy logic is used to evaluate grade of a website. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To Achieve Trust in the Cloud

    Publication Year: 2012, Page(s):16 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    By providing businesses, universities, government agencies, and other entities with access to shared and often physically dispersed computing resources, cloud computing can simultaneously offer increased flexibility, reduced cost, and access to a wider array of services. However, the lack of confidence in entrusting sensitive information to cloud computing service providers is one of the primary o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Pair Programming in the Context of Facilitating the Team Building

    Publication Year: 2012, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Anecdotal and qualitative evidence from industry indicates that two programmers working side-by-side at one computer, collaborating on the same design, algorithm, code, or test, perform substantially better than the two working alone and they have produced higher-quality software products in shorter amounts of time. But their evidence was anecdotal and subjective: "It works" or "It feels right." I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adoption of Knowledge Management Practices in Software Engineering Organizations: A Survey of Software Engineers' Perceptions

    Publication Year: 2012, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Most businesses rely on the fact that their employees possess relevant knowledge and that they can apply it to the task at hand. But a serious problem exists, this knowledge is not owned by the organisation as such. Rather the knowledge is owned and controlled by its employees. The success or failure of the KM systems and the various KM practices claimed to be adopted by software engineering organ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience Base Approach to Software Process Improvement: Comparative Analysis and Design of Improved Model

    Publication Year: 2012, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Most of the modelling approaches presently used in software engineering concentrate on some specific aspect of software development and ignore other relevant aspects. For instance, process modelling approaches do not address product quality and methods for modelling product quality do not consider process modelling. Moreover, the modelling of software engineering reusable objects or technologies h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Clustered Approach to Analyze the Software Quality Using Software Defects

    Publication Year: 2012, Page(s):36 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    As the software development begins there also exists the probability of occurrence of some defect in the software system. Software defects plays important role to take the decision about when the testing will be stopped. Software defects are one of the major factors that can decide the time of software delivery. Not only has the number of defects also the type of defect as well the criticality of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of Automation in Fuzzy Decision Rules

    Publication Year: 2012, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The advances in data collection have generated an urgent need for techniques that can intelligently and automatically analyze and mine knowledge from huge amounts of data. The Knowledge Discovery in Databases (KDD) is the process of extracting the knowledge from huge data collection. Data mining is a step of KDD in which patterns or models are extracted from data by using some automated techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Object Models with Theory of Innovative Solution

    Publication Year: 2012, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    Object-Oriented Modeling is a modeling paradigm mainly used in computer programming that assists the programmer to address the complexity of a problem domain by considering the problem and reduce the effect on model caused by such problem and make designs more robust, more maintainable, and more reusable. It is a design strategy where system designers think in terms of 'things' instead of operatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Tools Required to Develop GIS Applications: An Overview

    Publication Year: 2012, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Due to the improved performance of computer systems, Geographic information systems (GIS) are becoming more usual. In this paper, we are elaborating the software tools that are used in the development of a complete and complex real-life GIS application in the analysis, design and implementation. We describe characteristics of these software tools helpful to understand better and to develop differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible Discrete Software Reliability Growth Model for Distributed Environment Incorporating Two Types of Imperfect Debugging

    Publication Year: 2012, Page(s):57 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    In literature we have several software reliability growth models developed to monitor the reliability growth during the testing phase of the software development. These models typically use the calendar / execution time and hence are known as continuous time SRGM. However, very little seems to have been done in the literature to develop discrete SRGM. Discrete SRGM uses test cases in computer test... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profound Survey on Cross Language Information Retrieval Methods (CLIR)

    Publication Year: 2012, Page(s):64 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Cross Language Information Retrieval is a sub field of Information Retrieval that deals with retrieving relevant information stored in a language different from the language of user's given query. It plays a vital role in future because large volume of information is stored in the web is in English. So there is a necessity of proper mechanisms that can retrieve some required relevant information i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic Algorithm Approach to Automated Discovery of Comprehensible Production Rules

    Publication Year: 2012, Page(s):69 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In the recent past, there has been an increasing interest in applying evolutionary methods to Knowledge Discovery in Databases (KDD) and a number of successful applications of Genetic Algorithms (GA) and Genetic Programming (GP) to KDD have been demonstrated. The most predominant representation of the discovered knowledge is the standard Production Rules (PRs) in the form If P Then D. This paper p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting Interestingness Measures for Knowledge Discovery in Databases

    Publication Year: 2012, Page(s):72 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The voluminous amount of data stored in databases contains hidden knowledge which could be valuable to improve decision making process of any organization. As it is not humanely possible to analyze large databases, it has become essential to apply advanced data mining algorithms for extracting patterns (models) from data to support decision making. A number of data mining algorithms produce inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.