Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing

  • Vinu V. Das
Conference proceedings

DOI: 10.1007/978-1-4614-3363-7

Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 150)

Table of contents (79 papers)

  1. Front Matter
    Pages i-xiv
  2. Poster Papers

    1. Front Matter
      Pages 561-561
  3. Full Papers

    1. Front Matter
      Pages 1-1
  4. Full Papers

    1. Formal Approach to Reliability Improvement with Model Checker
      Kazuhiro Yamada, Shin-ya Nishizaki
      Pages 15-24
    2. DDoS Attacks Defense System Using Information Metrics
      P. C. Senthilmahesh, S. Hemalatha, P. Rodrigues, A. Shanthakumari
      Pages 25-30
    3. CEAR: Cluster based Energy Aware Routing Algorithm to Maximize Lifetime of Wireless Sensor Networks (WSNs)
      H. Sivasankari, R. Leelavathi, M. Vallabh, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik
      Pages 31-37
    4. TGAR: Trust Dependent Greedy Anti-Void Routing in Wireless Sensor Networks (WSNs)
      H. Sivasankari, R. Aparna, K. R. Venugopal, S. S. Iyengar, L. M. Patnaik
      Pages 39-45
    5. DoS Attack-Resistant Framework for Client/Server Intelligent Computing
      Shintaro Tabata, Shin-ya Nishizaki
      Pages 47-53
    6. Concept Similarity and Cosine Similarity Result Merging Approaches in Metasearch Engine
      K. Srinivas, A. Govardhan, V. Valli Kumari, P. V. S. Srinivas
      Pages 65-74
    7. Aspect Dependency Analyzer Framework for Aspect Oriented Requirements
      K. Santhi, G. Zayaraz, V. Vijayalakshmi
      Pages 75-81
    8. Hybrid Extremal Optimization and Glowworm Swarm Optimization
      Niusha Ghandehari, Elham Miranian, Mojtaba Maddahi
      Pages 83-89
    9. Developing Embedded Systems from Formal Specifications Written in Temporal Logic
      Shigeki Hagihara, Takahiro Arai, Masaya Shimakawa, Naoki Yonezaki
      Pages 107-113
    10. Network Log Clustering Using K-Means Algorithm
      Preeti Sharma, Thaksen J. Parvat
      Pages 115-124
    11. Improvement Public Key Kerberos Using Identity-Based Signcryption
      Hussein Khalid Abd-Alrazzaq
      Pages 125-136
    12. Intrusion Detection Using Keystroke Dynamics
      Mahalaxmi Sridhar, Teby Abraham, Johnelle Rebello, Winchell D’souza, Alishia D’Souza
      Pages 137-144

About these proceedings


The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunication Technology. This book provides a broad vision for the future of research in these fields with ideas on how to support these new technologies currently practice. Every submitted paper received a careful review from the committee and the final accept/reject decisions were made by the co-chairs on the bases of recommendations from the committee members.


Cellular arrays and automata Control design Data Communications Devices Data-path design Hardware description languages Memory design Performance Analysis and Design Aids Register-Transfer-Level Implementation Web technologies Wireless systems

Editors and affiliations

  • Vinu V. Das
    • 1
  1. 1.Saintgits College of EngineeringKottayamIndia

Bibliographic information

  • Copyright Information Springer Science+Business Media New York 2013
  • Publisher Name Springer, New York, NY
  • eBook Packages Engineering
  • Print ISBN 978-1-4614-3362-0
  • Online ISBN 978-1-4614-3363-7
  • Series Print ISSN 1876-1100
  • Series Online ISSN 1876-1119