11.00AM – 1.00PM |
Paper Presentation
- (#84 Full, 20+3 mins)Approximation Algorithms for Permanent Dominating Set Problem on Dynamic Networks, Subhrangsu Mandal and Arobinda Gupta
- (#130 Full, 20+3 mins) A Style Sheets based Approach for Semantic Transformation of Web Pages, Sai Prasad Vrj Gollapudi, Venkatesh Choppella, and Sridhar Chimalakonda
- (#75 Short, 10+3 mins)Efficient Anomaly Detection Methodology for Power Saving in Massive IoT Architecture, Palani Kumar S P, Meenakshi DSouza, and Debabrata Das
- (#78 Short, 10+3 mins) CapAct: A Wordnet-based Summarizer for Real-World Events from Microblogs, Surender Samant, NL Bhanu Murthy and Aruna Malapati
- (#105 Short, 10+3 mins) Simulation of Network Growth using Community Discovery in Biological Networks, Divya Brahamani Y, Sobha Rani T, and Durga Bhavani S
- (#121 Short, 10+3 mins)Ego-based Community Detection in Online Social Networks, Pramita Dey, Sarbani Roy and Sanjit Roy
- (#143 Short, 10+3 mins) Privacy Preserving Data Utility Mining Using Perturbation, Jisna Joseph K and Salim A
|
2.00PM – 3.00PM |
Paper Presentation
- (#59 Short, 10+3 mins) Lightweight Verifiable Auditing Scheme for Outsourced Database in Cloud Computing, Mayank Kumar and Syam Kumar Pasupuleti
- (#68 Short, 10+3 mins) A New Priority Heuristic Suitable in Mobile Distributed Real-Time Database Systems, Prakash Kumar Singh, and Udai Shankar
- (#77 Short, 10+3 mins) A One-Phase Priority Inheritance Commit Protocol, Sarvesh Pandey, and Udai Shanker
- (#154 Short, 10+3 mins) Auditing Access to Private Data on Android Platform, Vishal Maral, Nachiket Trivedi, and Manik Lal Das
|