| Paper # | Paper Title | Decision | # of Pages Allocated | Track |
| 132 | Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian scope | Accept-Full | 6 | Bioinformatics |
| 287 | Promoter Recognition using Dinucleotide Features : A Case Study for E.Coli | Accept-Short | 4 | Bioinformatics |
| 158 | Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data | Accept-Short | 4 | Bioinformatics |
| 147 | Face Detection by using Skin Color Model based on One Class Classifier | Accept-Poster | 2 | Bioinformatics |
| 153 | Evaluating the Association of Mitochondrial SNP Haplotypes with Disease Phenotypes using a Novel in silico Tool E-MIDAS | Accept-Poster | 2 | Bioinformatics |
| 204 | Ayurinformatics- the application of bioinformatics in the ayurvedic system of medicine | Accept-Poster | 2 | Bioinformatics |
| 291 | Electroencephalograph signal Analysis During Bramari | Accept-Poster | 2 | Bioinformatics |
| 25 | A Tabu Search based algorithm for Multicast Routing with QoS Constraints | Accept-Full | 6 | Networks |
| 189 | QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks | Accept-Full | 6 | Networks |
| 202 | Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency | Accept-Short | 4 | Networks |
| 297 | Bridging the gap between Reality and Simulations: An Ethernet Case Study | Accept-Short | 4 | Networks |
| 105 | Enhancing Fault-Tolerant in Distributed ME Algorithm | Accept-Short | 4 | Networks |
| 270 | Hypercube based Team Multicast Routing Protocol for Mobile Ad hoc Networks | Accept-Short | 4 | Networks |
| 59 | An Analytical Framework for Route Failure Time of Multiple Node-Disjoint Paths in Mobile Ad hoc Networks | Accept-Short | 4 | Networks |
| 170 | Seamless Network Management In Presence of Heterogeneous Management Protocols for Next Generation Networks | Accept-Short | 4 | Networks |
| 203 | A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs | Accept-Short | 4 | Networks |
| 248 | Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach | Accept-Short | 4 | Networks |
| 55 | Design and Evaluation of a Distributed Diagnosis Algorithm in Dynamic Fault Environments For Not-Completely Connected Network | Accept-Poster | 2 | Networks |
| 208 | A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc Networks | Accept-Poster | 2 | Networks |
| 220 | UPLINK SHARED CHANNEL IN 3RD GENERATION (UMTS) CELLULAR SYSTEM: PERFORMANCE ANALYSIS AND ENHANCEMENT | Accept-Poster | 2 | Networks |
| 251 | A New Algorithm of Worm Detection and Containment | Accept-Poster | 2 | Networks |
| 281 | A strategy to reduce the control packet load of MANETs with bidirectional links using DSR | Accept-Poster | 2 | Networks |
| 43 | Incentive Driven Grid Scheduling | Accept-Poster | 2 | Networks |
| 69 | A Self-adaptive Hybrid Channel Assignment Scheme for Wireless Communication Systems | Accept-Poster | 2 | Networks |
| 99 | Distributed Reconfiguration for Link Failures in IP-Over-WDM Networks | Accept-Poster | 2 | Networks |
| 125 | Complexity Analysis of Group Key Agreement Protocols for Ad Hoc Networks | Accept-Poster | 2 | Networks |
| 140 | Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs | Accept-Poster | 2 | Networks |
| 259 | An HMM Based Recognition Scheme for Handwritten Oriya Numerals | Accept-Full | 6 | Language |
| 49 | Voice conversion by Prosody and Vocal tract modification | Accept-Full | 6 | Language |
| 148 | A hybrid transform coding for video codec | Accept-Short | 4 | Language |
| 193 | A New Symmetry Based Cluster Validity Index: Application to Satellite Image Segmentation | Accept-Short | 4 | Language |
| 209 | An Ontology Mapping Method Based on Tree Structure | Accept-Short | 4 | Language |
| 214 | Using AnsProlog with Link Grammar and WordNet for QA with deep reasoning | Accept-Short | 4 | Language |
| 233 | Duration analysis for Malayalam Text - to - Speech systems | Accept-Short | 4 | Language |
| 262 | Recognition of Handwritten Kannada Numerals | Accept-Short | 4 | Language |
| 82 | Utilization of Volterra Series in Speech Signal Coding | Accept-Poster | 2 | Language |
| 115 | A Novel Heuristic-based High Performance Vowel Classifier for Spoken Indian English | Accept-Poster | 2 | Language |
| 41 | A structural method for extracting features in printed characters | Accept-Poster | 2 | Language |
| 267 | Analysis of Error Sources Towards Improved Form Processing | Accept-Poster | 2 | Language |
| 34 | Characterizing Handwritten Devanagari Characters using Evolved Regular Expressions | Accept-Poster | 2 | Language |
| 100 | Color Image Compression with Modified Forward Only Counter Propagation Neural Network: Improvement of the Quality Using Different Distance Measures | Accept-Poster | 2 | Language |
| 88 | Unsupervised Change Detection in Remote-Sensing Images using One-dimensional Self-Organizing Feature Map Neural Network | Accept-Poster | 2 | Language |
| 135 | SWARA IDENTIFICATION FOR SOUTH INDIAN CLASSICAL MUSIC | Accept-Poster | 2 | Language |
| 177 | Camouflage Defect Identifiaction: A Novel Approach | Accept-Poster | 2 | Language |
| 90 | A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform | Accept-Full | 6 | Security |
| 154 | A Microprocessor-based Block Cipher through Rotational Addition Technique (RAT) | Accept-Full | 6 | Security |
| 218 | Securing Membership Control in Mobile Ad Hoc Networks | Accept-Short | 4 | Security |
| 142 | A Simple Geometric Approach for Ear Recognition | Accept-Short | 4 | Security |
| 161 | Universal Designated Multi Verifier Signature without Random Oracles | Accept-Short | 4 | Security |
| 206 | Modeling Chinese Wall Policy Using Colored Petri Nets | Accept-Short | 4 | Security |
| 266 | Policy Specification and Enforcement for Detection of Security Violations in a Mail Service | Accept-Short | 4 | Security |
| 117 | Cascaded Encryption Through Recursive Carry Addition and Key Rotation (CRCAKR) of a Session Key | Accept-Poster | 2 | Security |
| 201 | A Framework for Handling Security Issues in Grid Environment | Accept-Poster | 2 | Security |
| 261 | A Palmprint Classification Scheme using Heart Line Feature Extraction | Accept-Poster | 2 | Security |
| 57 | Crypatanalysis of Block Ciphers via Improved Simulated Annealing Technique | Accept-Poster | 2 | Security |
| 67 | Grid Access Control Through Delegation of Roles | Accept-Poster | 2 | Security |
| 130 | Performance Of Various Cost Functions In The Search For Strong S-Boxes And The Effect Of Varying Their Parameters | Accept-Poster | 2 | Security |
| 144 | CARMA: Cellular Automata-based Remote Mutual Authentication | Accept-Poster | 2 | Security |
| 37 | Version Control using Cryptographic Access Control | Accept-Poster | 2 | Security |
| 229 | WaveSim and Adaptive WaveSim Transform for Subsequence Time-Series Clustering | Accept-Full | 6 | Databases |
| 260 | LB_HUST: A Symmetrical Boundary Distance for Clustering Time Series | Accept-Full | 6 | Databases |
| 221 | Neuro-Fuzzy Fusion: A New Approach to Multiple Classifier System | Accept-Short | 4 | Databases |
| 60 | Improved Bitmap Indexing Strategy for Data Warehouses | Accept-Short | 4 | Databases |
| 48 | Fuzzy Linguistic Approach to Matchmaking in E-Commerce | Accept-Short | 4 | Databases |
| 72 | Particles with Age for Data Clustering | Accept-Short | 4 | Databases |
| 77 | Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers | Accept-Short | 4 | Databases |
| 87 | Cumulative Path Summary for Structurally Dynamic XML Documents | Accept-Poster | 2 | Databases |
| 103 | Aggregating Subjective and Objective Measures of Web Search Quality using Modified Shimura Technique | Accept-Poster | 2 | Databases |
| 171 | A comparative analysis of discretization methods for Medical Datamining with Naïve Bayesian classifier | Accept-Poster | 2 | Databases |
| 191 | GenericWA-RBAC: Role Based Access Control Model for Web Applications | Accept-Poster | 2 | Databases |
| 200 | Segmentation of Color Images using Mean Shift Algorithm for Feature Extraction | Accept-Poster | 2 | Databases |
| 215 | An Adaptive Caching Location Strategy by Location Database Clustering in PCS Networks | Accept-Poster | 2 | Databases |
| 26 | Towards an Architecture of an Image Database | Accept-Poster | 2 | Databases |
| 217 | Fuzzy data mining for customer loyalty analysis | Accept-Poster | 2 | Databases |
| 78 | A generic prototype for storing and querying XML documents in RDBMS using model mapping methods | Accept-Poster | 2 | Databases |
| 126 | Designing the Next Generation of Medical Information Systems | Accept-Poster | 2 | Databases |
| 64 | Design of Novel Reversible Carry Look-Ahead BCD Subtractor | Accept - Full | 6 | Hardware/Software |
| 224 | Aggregation Pheromone Density Based Clustering | Accept - Full | 6 | Hardware/Software |
| 61 | A Domain Based Prioritized Model for Web Servers | Accept - Short | 4 | Hardware/Software |
| 207 | Multi Source Streaming using Multiple Description Coding with Content Delivery Networks | Accept - Short | 4 | Hardware/Software |
| 18 | An efficient parallel algorithm for finding the largest and the second largest elements from a list of elements | Accept - Short | 4 | Hardware/Software |
| 74 | Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R | Accept - Short | 4 | Hardware/Software |
| 121 | A Programmable Parallel Structure to perform Galois Field Exponentiation | Accept - Short | 4 | Hardware/Software |
| 246 | Multiobjective Genetic Algorithm for k-way Equipartitioning of a Point Set with Application to CAD-VLSI | Accept - Short | 4 | Hardware/Software |
| 225 | An Event Notification Service based on XML Messaging on Different Transport Technologies | Accept - Short | 4 | Hardware/Software |
| 15 | Modeling the Classical and Folk Dance Video Objects | Accept - Poster | 2 | Hardware/Software |
| 205 | A High Performance ASIC for Cellular Automata Applications | Accept - Poster | 2 | Hardware/Software |
| 24 | THE SOFT COMPUTING APPROACH TO PROGRAM DEVELOPMENT TIME ESTIMATION | Accept - Poster | 2 | Hardware/Software |
| 118 | A Computer Aided FEM Based Numerical Solution for Transient Response of Laminated Composite PlatesWith CutOuts | Accept - Poster | 2 | Hardware/Software |
| 172 | A comprehensive Fault model for Quantum-dor Cellular Automata | Accept - Poster | 2 | Hardware/Software |
| 226 | DSSIS: Dictionary-based Segmented Signal Inversion Scheme for Low Power Dynamic Bus Design | Accept - Poster | 2 | Hardware/Software |
| 108 | An Alternate Way to Rank Hyper-linked Web-Pages | Accept - Poster | 2 | Hardware/Software |
| 258 | Primitives for Structured Workflow Design: A Mathematical Specification and Analysis | Accept - Poster | 2 | Hardware/Software |
| 112 | ENERGY EFFICIENT SCHEDULING FOR REAL-TIME TASKS BY DVS | Accept - Poster | 2 | Hardware/Software |
| 190 | A linear time algorithm for constructing tree 3-spanner in simple chordal bipartite graphs | Accept - Poster | 2 | Hardware/Software |
| 249 | A Novel Approach for Static Slicing of Inter-Procedural Programs | Accept - Poster | 2 | Hardware/Software |