ACCEPTED PAPERS

  • 8. Gunter Fahrnberger. A Second View on SecureString 2.0
  • 12. Dwijen Rudrapal, Smita Das and Swapan Debbarma. Improvisation of Biometrics Authentication & Identification through Keystrokes Pattern Analysis
  • 16. Chiranjib Sur and Anupam Shukla. Discrete Krill Herd Algorithm - A Bio-Inspired Meta-Heuristics for Graph Based Network Route Optimization
  • 22. Rabindranath Ghosh, Koushik Sinha and Bhabani Prasad Sinha. A New Number System using Alternate Fibonacci Numbers as the Positional Weights with some Engineering Applications
  • 27. Pooja Aggarwal and Smruti R. Sarangi. Software Transactional Memory Friendly Slot Schedulers
  • 36. Mohd.Mustafa Faisan and Durga Bhavani S. Maximizing Information or Influence Spread using Flow Authority Model in Social Networks
  • 39. Tarachand Amgoth, Nabin Ghosh and Prasanta K. Jana. Energy-aware Multi-level Routing Algorithm for Two-tier Wireless Sensor Networks
  • 70. Deepa Anand and Bonson Sebastian Mampilli. User Profiling Based on Keyword Clusters for Improved Recommendations
  • 92. Sohini De, Alok Mishra and Suddhasil De. An Improved Approach of Decoupling in Mobile Cloud Computing
  • 94. Debashis Mishra, Isita Bose and Madhabananda Das. Detection and Reduction of Impulse Noise in RGB Color Image using Fuzzy Technique
  • 95. Bhawani Sankar Panda and Pushparaj Shetty D. Minimum Range Assignment Problem for Two Connectivity in Wireless Sensor Networks
  • 96. Dibyajyoti Guha, Abhijit Datta Banik, Veena Goswami and Souvik Ghosh. Equilibrium balking strategy in an unobservable GI/M/c queue with customers' impatience
  • 115. Arani Bhattacharya, Ansuman Banerjee and Susmita Sur-Kolay. Energy-Aware H.264 Decoding
  • 120. Dibakar Saha, Nabanita Das and Shyamosree Pal. A Digital-Geometric Approach for Computing Area Coverage in Wireless Sensor Networks
  • 124. Arjun Datt Sharma, Ansuya Ahluwalia, Shaleen Deep and Divya Bansal. Friend or Foe: Twitter Users under Magnification
  • 125. Sanjaya Kumar Panda, Pabitra Mohan Khilar and Durga Prasad Mohapatra. FTM2: Fault Tolerant Batch Mode Heuristics in Computational Grid
  • 126. Venkata Swamy Martha, Nitin Agarwal and Srini Ramaswamy. Enhancing Privacy in Online Social Communities: Can Trust Help Mitigate Privacy Risks?
  • 136. Suganya Ramamoorthy and Rajaram Siva Subramaniam. Modified Laplacian Pyramid Nonlinear Diffusion for Speckle Reduction in Ultrasound Liver Images
  • 144. Anupama Potluri, Krishna Vutukuri and Garvit Sharma. SNAPWebD and SNAPSync: A Web Desktop and Transparent \textit{sync} of NFS and Standalone System Logical Volumes
  • 158. Sangeeta Mittal. Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation
  • 163. Vignesh Narayanan, Shankar Rengaraj, Sathyamoorthy Sundararajan and Mary Anita Rajam V. Value Added Services on Stationary Vehicular Cloud
  • 167. Ganesh Khandu Narwane, Krishna S and Anup Kumar Bhattacharjee. A Cost Effective Approach for Analyzing Software Product Lines
  • 169. Sonal Patil, Shrutilipi Bhattacharjee and Soumya Ghosh. A Spatial Web Crawler for Discovering Geo-Servers and Semantic Referencing with Spatial Features
  • 171. Arkadeep Kundu and Soumya Ghosh. Game Theoretic Attack Response Framework for Enterprise Networks
  • 172. Suman Deb and Subarna Sinha. Comparative improvement of image segmentation performance with graph based method over watershed transform image segmentation
  • 174. Y.Sreenivasa Rao and Ratna Dutta. Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
  • 177. Raghu Raman, Prema Nedungadi and Maneesha Ramesh. Modeling diffusion of tabletop for collaborative learning using interactive science lab simulations
  • 185. Yogesh Gupta, Ashish Saini, A.K. Saxena and Aditi Sharan. Fuzzy logic based similarity measure for Information Retrieval System performance improvement
  • 202. Amit Choudhary. A Binarization Feature Extraction Approach to OCR: MLP vs. RBF