Accepted Papers

The list of papers accepted in the conference

 

#

Authors and Titles

13

Lavanya A. Watermarking Medical Images Using Chaotic Map Lattices

19

Anushua Dutta, Kunjal Thakkar, Sunirmal Khatua and Rajib Das.  Power Efficient Data Gathering for Wireless Sensor Network

56

Suneet K. Gupta, Pratyay Kuila and Prasanta K. Jana.  GAR: An Energy Efficient GA-based Routing forWireless Sensor Networks

62

Abhijit Datta Banik and Sujit Samanta.  Controlling packet loss of bursty and correlated traffics in a variant of multiple vacation policy

83

Sandeep Vasani, Mohit Pandey, Minal Bhise and Trupti Padiya.  Faster Query Execution for PartitionedRDF Data

86

Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota and Muttukrishnan Rajarajan.  Adaptive TaskScheduling in Service Oriented Crowd using SLURM

115

Deveeshree Nayak, M Venkata Swamy and Dr Srini Ramaswamy.  "Supporting Location InformationPrivacy in Mobile Devices "

165

Hrushikesha Mohanty.  Computational Social Science: A bird's eye view

173

Bhawani Panda and Pushparaj Shetty D..  A Local Search based Approximation Algorithm for StrongMinimum Energy Topology Problem in Wireless Sensor Networks

108

Supriya Vaddi and Hrushikesha Mohanty.  Querying SMap based Web Services : An RDBMS Approach

8

Agostino Cortesi and Raju Halder.  Abstract Interpretation of Recursive Queries

21

Saurabh Wadwekar and Debajyoti Mukhopadhyay.  A Selection Algorithm for Focused CrawlersIncorporating Semantic Metadata

33

Suddhasil De, Diganta Goswami and Sukumar Nandi.  Consistent Coordination Decoupling in Tuple Space based Mobile Middleware: Design and Formal Specifications

87

Suparno Datta, Ayan Dutta, Sruti Gan Chaudhuri and Krishnendu Mukhopadhyaya.  Circle Formation byAsynchronous Transparent Fat Robots

94

Günter Fahrnberger.  Computing on Encrypted Character Strings in Clouds 12

112

Sankita Patel, Viren Patel and Devesh Jinwala.  Privacy Preserving Distributed K-Means Clustering inMalicious Model using Zero Knowledge Proof

131

Asrar Ahmed and Khaleel Ur Rahman Khan.  Trust Based Secure Gateway Discovery Mechanism forIntegrated Integrated and MANET

134

Ammlan Ghosh and Nabendu Chaki.  Design of a New OFTM Algorithm towards Abort-free Execution

28

Henryk Krawczyk, Jerzy Proficz and Bartlomiej Daca. Prediction of Processor Utilization for Real-TimeMultimedia Stream Processing Tasks

64

Ruman Sarkar, Smita Das and Sharmistha Roy.  SPARSHA: A LOW-COST REFRESHABLE BRAILLE FOR DEAF-BLIND PEOPLE FOR COMMUNICATION WITH DEAF-BLIND AND NON-DISABLED PERSONS

120

A. Santhanavijayan and S.R. Balasundaram.  Effective Web Service Discovery using K-means Clustering

7

Kumar Padmanabh, Amit Gupta and Purnendu Sinha.  An Efficient Method for Synchronizing Clocks ofNetworked ECUs in Automotive Systems

23

Sanjaya Kumar Panda and Pabitra Mohan Khilar.  MSSA: A M-Level Sufferage-based SchedulingAlgorithm in Grid Environment

32

Pragya Agrawal and Gautam K. Das. Improved Interference in Wireless Sensor Networks

76

S. Moses Dian and B. Ramadoss.  Trading of Grade Based Incetives to Avoid Free Riding and Starvation inP2P Network

95

Ch. Sanjeev Kumar Dash, Ajit Kumar Behera, Manoj Kumar Pandia and Satchidananda Dehuri.  Neural Networks Training Based on Differential Evolution in Radial Basis Function Networks for Classification of Web Logs

116

Kaushik Mondal, Arjun Talwar, Partha Sarathi Mandal and Bhabani Sinha.  Localization Based on Two-bound Reflected Signals in Wireless Sensor Networks

132

Ravi Tandon and Gautam Barua.  Recovery Protocols For Flash File Systems

133

Meenakshi D'Souza and Teodor Knapik.  Verification of Message Sequence Structures

160

Himangshu Ranjan Borah and Himkalyan Bordoloi.  An efficient Localization of Nodes in a Sensor Network using Conflict Minimization with Controlled Initialization

177

Julian Szymanski.  Wikipedia articles representation with Matrix’u

184

Xinghua Yao. A Model Language for Describing Spatio-Temporal Changes in Train Control System

27

Geetha V. and Sreenath N..  Semantic Concurrency Control on Continuously Evolving OODBMS usingAccess Control Lists

65

Bijaya Kishor Bhatta and Pushparaj Shetty D..  A Parallel 2-approximation NC-algorithm for RangeAssignment Problem in Packet Radio Networks

67

Adusumalli Sri Krishna and Valli Kumari V..  An Efficient and Dynamic Concept Hierarchy Generation forData Anonymization

100

Sukanta Sinha, Rana Dattagupta and Debajyoti Mukhopadhyay.  A New Approach to Design a DomainSpecific Web Search Crawler using Multilevel Domain Classifier

102

Alladi Sangameshwar and Ak Sarje.  Routing Misbehavior based Intrusion Detection and Response System for Wireless Ad hoc Networks

141

Krishna S, Gabriel Ciobanu and Bogdan Aman.  Solving the 4QBF Problem in Polynomial Time by Using the Biological-Inspired Mobility

180

Madhusmita Sahu and Durga Prasad Mohapatra.  Slicing XML Documents Using Dependence Graph

15

Hrushikesha Mohanty. Network of Social Listeners

167

Rajashekhar Arasanal and Daanish Rumani.  Improving MapReduce Performance through Complexity andPerformance based Data Placement in Heterogeneous Hadoop Clusters

183

Prasenjit Basu, Suman Bhattacharya and Samir Roy.  Online Recommendation of Learning Path for an e- learner Under Virtual University.

71

Itishree Behera, Chita Ranjan Tripathy and Satya Prakash Sahoo.  An Efficient Method of Load Balancing With Fault Tolerance for Mobile Grid

103

Sujoy Mistry, Dibyanshu Jaiswal, Sagar Virani, Arijit Mukherjee and Nandini Mukherjee.  An Architecture for Dynamic Web Service Provisioning using Peer-to-Peer Networks

 

 

 
Site designed and maintained by KIIT University