Paper # |
Paper Title |
Decision |
# of Pages Allocated |
Track |
132 |
Estimating neutral divergence
amongst Mammals for Comparative Genomics with Mammalian scope |
Accept-Full |
6 |
Bioinformatics |
287 |
Promoter Recognition using
Dinucleotide Features : A Case Study for E.Coli |
Accept-Short |
4 |
Bioinformatics |
158 |
Efficient Two-stage Fuzzy
Clustering of Microarray Gene Expression Data |
Accept-Short |
4 |
Bioinformatics |
147 |
Face Detection by using Skin
Color Model based on One Class Classifier |
Accept-Poster |
2 |
Bioinformatics |
153 |
Evaluating the Association of
Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico
Tool E-MIDAS |
Accept-Poster |
2 |
Bioinformatics |
204 |
Ayurinformatics- the application
of bioinformatics in the ayurvedic system of medicine |
Accept-Poster |
2 |
Bioinformatics |
291 |
Electroencephalograph signal
Analysis During Bramari |
Accept-Poster |
2 |
Bioinformatics |
25 |
A Tabu Search based algorithm
for Multicast Routing with QoS Constraints |
Accept-Full |
6 |
Networks |
189 |
QoS Constrained Adaptive Routing
Protocol For Mobile Adhoc Networks |
Accept-Full |
6 |
Networks |
202 |
Intelligent Query Tree (IQT)
Protocol to Improve RFID Tag Read Efficiency |
Accept-Short |
4 |
Networks |
297 |
Bridging the gap between Reality
and Simulations: An Ethernet Case Study |
Accept-Short |
4 |
Networks |
105 |
Enhancing Fault-Tolerant in
Distributed ME Algorithm |
Accept-Short |
4 |
Networks |
270 |
Hypercube based Team Multicast
Routing Protocol for Mobile Ad hoc Networks |
Accept-Short |
4 |
Networks |
59 |
An Analytical Framework for
Route Failure Time of Multiple Node-Disjoint Paths in Mobile Ad hoc Networks |
Accept-Short |
4 |
Networks |
170 |
Seamless Network Management In
Presence of Heterogeneous Management Protocols for Next Generation Networks |
Accept-Short |
4 |
Networks |
203 |
A Contention Window Based
Differentiation Mechanism for providing QoS in Wireless LANs |
Accept-Short |
4 |
Networks |
248 |
Intrusion Detection in Mobile
Ad-Hoc Networks: A Mobile Agent Approach |
Accept-Short |
4 |
Networks |
55 |
Design and Evaluation of a
Distributed Diagnosis Algorithm in Dynamic Fault Environments For
Not-Completely Connected Network |
Accept-Poster |
2 |
Networks |
208 |
A Hybrid Group Key Management
Scheme for Two-Layered Ad Hoc Networks |
Accept-Poster |
2 |
Networks |
220 |
UPLINK SHARED CHANNEL IN 3RD
GENERATION (UMTS) CELLULAR SYSTEM: PERFORMANCE ANALYSIS AND ENHANCEMENT |
Accept-Poster |
2 |
Networks |
251 |
A New Algorithm of Worm
Detection and Containment |
Accept-Poster |
2 |
Networks |
281 |
A strategy to reduce the control
packet load of MANETs with bidirectional links using DSR |
Accept-Poster |
2 |
Networks |
43 |
Incentive Driven Grid Scheduling |
Accept-Poster |
2 |
Networks |
69 |
A Self-adaptive Hybrid Channel
Assignment Scheme for Wireless Communication Systems |
Accept-Poster |
2 |
Networks |
99 |
Distributed Reconfiguration for
Link Failures in IP-Over-WDM Networks |
Accept-Poster |
2 |
Networks |
125 |
Complexity Analysis of Group Key
Agreement Protocols for Ad Hoc Networks |
Accept-Poster |
2 |
Networks |
140 |
Performance of Sniff and Embark
MAC Protocol for Real-Time Traffic in Wireless LANs |
Accept-Poster |
2 |
Networks |
259 |
An HMM Based Recognition Scheme
for Handwritten Oriya Numerals |
Accept-Full |
6 |
Language |
49 |
Voice conversion by Prosody and
Vocal tract modification |
Accept-Full |
6 |
Language |
148 |
A hybrid transform coding for
video codec |
Accept-Short |
4 |
Language |
193 |
A New Symmetry Based Cluster
Validity Index: Application to Satellite Image Segmentation |
Accept-Short |
4 |
Language |
209 |
An Ontology Mapping Method Based
on Tree Structure |
Accept-Short |
4 |
Language |
214 |
Using AnsProlog with Link
Grammar and WordNet for QA with deep reasoning |
Accept-Short |
4 |
Language |
233 |
Duration analysis for Malayalam
Text - to - Speech systems |
Accept-Short |
4 |
Language |
262 |
Recognition of Handwritten
Kannada Numerals |
Accept-Short |
4 |
Language |
82 |
Utilization of Volterra Series
in Speech Signal Coding |
Accept-Poster |
2 |
Language |
115 |
A Novel Heuristic-based High
Performance Vowel Classifier for Spoken Indian English |
Accept-Poster |
2 |
Language |
41 |
A structural method for
extracting features in printed characters |
Accept-Poster |
2 |
Language |
267 |
Analysis of Error Sources
Towards Improved Form Processing |
Accept-Poster |
2 |
Language |
34 |
Characterizing Handwritten
Devanagari Characters using Evolved Regular Expressions |
Accept-Poster |
2 |
Language |
100 |
Color Image Compression with
Modified Forward Only Counter Propagation Neural Network: Improvement of the
Quality Using Different Distance Measures |
Accept-Poster |
2 |
Language |
88 |
Unsupervised Change Detection in
Remote-Sensing Images using One-dimensional Self-Organizing Feature Map
Neural Network |
Accept-Poster |
2 |
Language |
135 |
SWARA IDENTIFICATION FOR SOUTH
INDIAN CLASSICAL MUSIC |
Accept-Poster |
2 |
Language |
177 |
Camouflage Defect
Identifiaction: A Novel Approach |
Accept-Poster |
2 |
Language |
90 |
A new collision resistant hash
function based on optimum dimensionality reduction using Walsh-Hadamard
transform |
Accept-Full |
6 |
Security |
154 |
A Microprocessor-based Block
Cipher through Rotational Addition Technique (RAT) |
Accept-Full |
6 |
Security |
218 |
Securing Membership Control in
Mobile Ad Hoc Networks |
Accept-Short |
4 |
Security |
142 |
A Simple Geometric Approach for
Ear Recognition |
Accept-Short |
4 |
Security |
161 |
Universal Designated Multi
Verifier Signature without Random Oracles |
Accept-Short |
4 |
Security |
206 |
Modeling Chinese Wall Policy
Using Colored Petri Nets |
Accept-Short |
4 |
Security |
266 |
Policy Specification and
Enforcement for Detection of Security Violations in a Mail Service |
Accept-Short |
4 |
Security |
117 |
Cascaded Encryption Through
Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key |
Accept-Poster |
2 |
Security |
201 |
A Framework for Handling
Security Issues in Grid Environment |
Accept-Poster |
2 |
Security |
261 |
A Palmprint Classification
Scheme using Heart Line Feature Extraction |
Accept-Poster |
2 |
Security |
57 |
Crypatanalysis of Block Ciphers
via Improved Simulated Annealing Technique |
Accept-Poster |
2 |
Security |
67 |
Grid Access Control Through
Delegation of Roles |
Accept-Poster |
2 |
Security |
130 |
Performance Of Various Cost
Functions In The Search For Strong S-Boxes And The Effect Of Varying Their
Parameters |
Accept-Poster |
2 |
Security |
144 |
CARMA: Cellular Automata-based
Remote Mutual Authentication |
Accept-Poster |
2 |
Security |
37 |
Version Control using
Cryptographic Access Control |
Accept-Poster |
2 |
Security |
229 |
WaveSim and Adaptive WaveSim
Transform for Subsequence Time-Series Clustering |
Accept-Full |
6 |
Databases |
260 |
LB_HUST: A Symmetrical Boundary
Distance for Clustering Time Series |
Accept-Full |
6 |
Databases |
221 |
Neuro-Fuzzy Fusion: A New
Approach to Multiple Classifier System |
Accept-Short |
4 |
Databases |
60 |
Improved Bitmap Indexing
Strategy for Data Warehouses |
Accept-Short |
4 |
Databases |
48 |
Fuzzy Linguistic Approach to
Matchmaking in E-Commerce |
Accept-Short |
4 |
Databases |
72 |
Particles with Age for Data
Clustering |
Accept-Short |
4 |
Databases |
77 |
Use of Instance Typicality for
Efficient Detection of Outliers with Neural Network Classifiers |
Accept-Short |
4 |
Databases |
87 |
Cumulative Path Summary for
Structurally Dynamic XML Documents |
Accept-Poster |
2 |
Databases |
103 |
Aggregating Subjective and
Objective Measures of Web Search Quality using Modified Shimura Technique |
Accept-Poster |
2 |
Databases |
171 |
A comparative analysis of
discretization methods for Medical Datamining with Naïve Bayesian classifier |
Accept-Poster |
2 |
Databases |
191 |
GenericWA-RBAC: Role Based
Access Control Model for Web Applications |
Accept-Poster |
2 |
Databases |
200 |
Segmentation of Color Images
using Mean Shift Algorithm for Feature Extraction |
Accept-Poster |
2 |
Databases |
215 |
An Adaptive Caching Location
Strategy by Location Database Clustering in PCS Networks |
Accept-Poster |
2 |
Databases |
26 |
Towards an Architecture of an
Image Database |
Accept-Poster |
2 |
Databases |
217 |
Fuzzy data mining for customer
loyalty analysis |
Accept-Poster |
2 |
Databases |
78 |
A generic prototype for storing
and querying XML documents in RDBMS using model mapping methods |
Accept-Poster |
2 |
Databases |
126 |
Designing the Next Generation of
Medical Information Systems |
Accept-Poster |
2 |
Databases |
64 |
Design
of Novel Reversible Carry
Look-Ahead BCD Subtractor |
Accept - Full |
6 |
Hardware/Software |
224 |
Aggregation Pheromone Density
Based Clustering |
Accept - Full |
6 |
Hardware/Software |
61 |
A Domain Based Prioritized Model
for Web Servers |
Accept - Short |
4 |
Hardware/Software |
207 |
Multi Source Streaming using
Multiple Description Coding with Content Delivery Networks |
Accept - Short |
4 |
Hardware/Software |
18 |
An efficient parallel algorithm
for finding the largest and the second largest elements from a list of
elements |
Accept - Short |
4 |
Hardware/Software |
74 |
Reversible Implementation of
Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format
Using in IEEE-754R |
Accept - Short |
4 |
Hardware/Software |
121 |
A Programmable Parallel
Structure to perform Galois Field Exponentiation |
Accept - Short |
4 |
Hardware/Software |
246 |
Multiobjective Genetic Algorithm
for k-way Equipartitioning of a Point Set with Application to
CAD-VLSI |
Accept - Short |
4 |
Hardware/Software |
225 |
An Event Notification Service
based on XML Messaging on Different Transport Technologies |
Accept - Short |
4 |
Hardware/Software |
15 |
Modeling the Classical and Folk
Dance Video Objects |
Accept - Poster |
2 |
Hardware/Software |
205 |
A High Performance ASIC for
Cellular Automata Applications |
Accept - Poster |
2 |
Hardware/Software |
24 |
THE SOFT COMPUTING APPROACH TO
PROGRAM DEVELOPMENT TIME ESTIMATION |
Accept - Poster |
2 |
Hardware/Software |
118 |
A Computer Aided FEM Based
Numerical Solution for Transient Response of Laminated Composite PlatesWith
CutOuts |
Accept - Poster |
2 |
Hardware/Software |
172 |
A comprehensive Fault model for
Quantum-dor Cellular Automata |
Accept - Poster |
2 |
Hardware/Software |
226 |
DSSIS: Dictionary-based
Segmented Signal Inversion Scheme for Low Power Dynamic Bus Design |
Accept - Poster |
2 |
Hardware/Software |
108 |
An Alternate Way to Rank
Hyper-linked Web-Pages |
Accept - Poster |
2 |
Hardware/Software |
258 |
Primitives for Structured
Workflow Design: A Mathematical Specification and Analysis |
Accept - Poster |
2 |
Hardware/Software |
112 |
ENERGY EFFICIENT SCHEDULING FOR
REAL-TIME TASKS BY DVS |
Accept - Poster |
2 |
Hardware/Software |
190 |
A linear time algorithm for
constructing tree 3-spanner in simple chordal bipartite graphs |
Accept - Poster |
2 |
Hardware/Software |
249 |
A Novel Approach for Static
Slicing of Inter-Procedural Programs |
Accept - Poster |
2 |
Hardware/Software |
|
|
|
|
|