1. ACC 2011: Kochi, Kerala, India
Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi (Eds.): Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I. Springer 2011 Communications in Computer and Information Science 190 ISBN 978-3-642-22708-0
Adhoc Networks
Jayashree Padmanabhan, Abhinaya Sukumar, Ezhilarasi Elumalai, Sunanda Ramesh: An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment. 1-10
Chiranjeev Kumar, Neeraj Tyagi, Rajeev Tripathi, M. Lakshmi Prasanth Kumar, Dhirendra Kumar Sharma, Sanjay Kumar Biswash: An Efficient Routing Protocol for Ad-Hoc Networks. 11-20
Ravi Rastogi, Rohit Verma, Nitin, Durg Singh Chauhan: 3-Disjoint Paths Fault-tolerant Multi-stage Interconnection Networks. 21-33
Anitha Sheela Kankacharla, Tarun Kumar Juluru, Saritha Dedavath: Reduction of Inter Carrier Interference by Pilot Aided Self Cancellation Compared to Self Cancellation Method. 34-43
Manish Kumar, Rajbir Kaur, Vijay Laxmi, Manoj Singh Gaur: A Novel Attack Model Simulation in OLSR. 44-53
Surendra Singh Choudhary, Vijander Singh, Reena Dadhich: Performance Investigations of Routing Protocols in Manets. 54-63
Ch. Rajasekhar, D. Srinivasa Rao, M. Vanaja, K. Vijay: A Compact Low-Cost Phase Shifter for Wireless Applications. 78-82
Arindarjit Pal, Jyoti Prakash Singh, Paramartha Dutta: A Study on the Effect of Traffic Patterns in Mobile Ad Hoc Network. 83-90
Sanjeev Rana, Manpreet Singh: I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network. 91-100
E. A. Mary Anita: Sybil Secure Architecture for Multicast Routing Protocols for MANETs. 111-118

Rahul Raghuvanshi, Mukesh Kumar Giluka, Vasudev Dehalwar: An Approach to Suppress Selfish Behavior of a Node in MANET by Hiding Destination Identity in Routing Path. 153-161
H. Meena Sharma, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi: Broken Link Fraud in DSDV Routing - Detection and Countermeasure. 162-171
Advanced Micro Architecture Techniques
A. S. Radhamani, E. Baburaj: Research on Power Optimization Techniques for Multi Core Architectures. 172-181
M. Rajasekhara Babu, P. Venkata Krishna, M. Khalid: Optimization Techniques and Performance Evaluation of a Multithreaded Multi-core Architecture Using OpenMP. 182-191
Magesh Kannan Parthasarathy, Karthik Govindarajan, G. Gunaraj, S. Lakshmi Prabha: Review on VLSI Architectures for Optical OFDM Receivers. 192-203
B. Parvathy: A Pre-fetch Enabled Cache-Core Architecture for Multi-cores. 204-212
Avani Rao, Mahesh Devani, Mitesh Limachia, Nikhil Kothari: Performance Analysis of Adaptive Scan Compression Methodology and Calculations of Compression Ratio. 213-222
Autonomic and Context-Aware Computing
L. D. Dhinesh Babu, M. Nirmala, S. Santhoshkumar, S. Panneerselvam: Better Debugging of Logical Errors Using Optimized Call Stack Restricted Slicing. 223-231
Abhijan Bhattacharyya: On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing. 242-249
Bioinformatics and Bio-computing
Shweta Srivastava, Manisha Rathi, J. P. Gupta: Predictive Analysis of Lung Cancer Recurrence. 260-269
P. Vipeesh, N. J. R. Muniraj: Development and Validation of Matlab Models for Nanowire Sensors. 270-283
Saritha Namboodiri, Chandra Verma, Pawan K. Dhar, Alessandro Giuliani, Achuthsankar S. Nair: Application of Recurrence Quantification Analysis (RQA) in Biosequence Pattern Recognition. 284-293
Geetha Govindan, Achuthsankar S. Nair: New Feature Vector for Apoptosis Protein Subcellular Localization Prediction. 294-301
Vrinda V. Nair, Anita Mallya, Bhavya Sebastian, Indu Elizabeth, Achuthsankar S. Nair: Hurst CGR (HCGR) - A Novel Feature Extraction Method from Chaos Game Representation of Genomes. 302-309
J. Sajeev, T. Mahalakshmi: Hub Characterization of Tumor Protein P53 Using Artificial Neural Networks. 310-319
G. Gopakumar, Achuthsankar S. Nair: Lacunarity Analysis of Protein Sequences Reveal Fractal Like Behavior of Amino Acid Distributions. 320-327
Jyotshna Dongardive, Agnes Xavier, Kavita Jain, Siby Abraham: Classification and Rule-Based Approach to Diagnose Pulmonary Tuberculosis. 328-339
Ai Sasho, Shenhaochen Zhu, Rahul Singh: Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces. 340-350
Ajay K. Mandava, Shahram Latifi, Emma Regentova: Reliability Assessment of Microarray Data Using Fuzzy Classification Methods: A Comparative Study. 351-360
Seema More, M. Vidya, N. Sujana, H. D. Soumya: Association Rule Mining for the Identification of Activators from Gene Regulatory Network. 361-370
Cloud, Cluster, Grid and P2P Computing
Florian Schatz, Sven Koschnicke, Niklas Paulsen, Christoph Starke, Manfred Schimmler: MPI Performance Analysis of Amazon EC2 Cloud Services for High Performance Computing. 371-381
Gutha Jaya Krishna, Rajeev Wankar: Algorithmic Approach to Calculating Minimal Resource Allocation Recommender for Grid Using Reliability and Trust Computations. 382-398
P. Varalakshmi, Aravindh Ramaswamy, Aswath Balasubramanian, Palaniappan Vijaykumar: An Optimal Workflow Based Scheduling and Resource Allocation in Cloud. 411-420
Gopal Chand Gautam, T. P. Sharma: Energy Efficient Time Synchronization Protocol for Wireless Sensor Networks. 421-430
Wesam Dawoud, Ibrahim Takouna, Christoph Meinel: Elastic VM for Cloud Resources Provisioning Optimization. 431-445
Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala: Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments. 446-460
Naveen Kumar, Saumesh Kumar, Padam Kumar: Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing. 461-470
P. Varalakshmi, K. H. Priya, J. Pradeepa, V. Perumal: SLA with Dual Party Beneficiality in Distributed Cloud. 471-479
S. Ananthi, M. Sadish Sendil, S. Karthik: Privacy Preserving Keyword Search over Encrypted Cloud Data. 480-487
Sudharsan Sundararajan, Hari Narayanan, Vipin Pavithran, Kaladhar Vorungati, Krishnashree Achuthan: Preventing Insider Attacks in the Cloud. 488-500
Ankur Gupta, Lohit Kapoor, Manisha Wattal: C2C (Cloud-to-Cloud): An Ecosystem of Cloud Service Providers for Dynamic Resource Provisioning. 501-510
Cognitive Radio and Cognitive Networks
Dibyajnan Basak, Seba Maity, Santi P. Maity: Optimized Subcarrier Power Allocation in OFDM Underlay Cognitive Radio System. 519-528
Abdelaali Chaoub, Elhassane Ibn Elhaj, Jamal El Abbadi: Multimedia Traffic Transmission over Cognitive Radio Networks Using Multiple Description Coding. 529-543
Cyber Forensics
Digambar Povar, Divya S. Vidyadharan, K. L. Thomas: Digital Image Evidence Detection Based on Skin Tone Filtering Technique. 544-551
Satheesh Kumar Sasidharan, K. L. Thomas: BlackBerry Forensics: An Agent Based Approach for Database Acquisition. 552-561
Database and Information Systems

B. Ramasubbareddy, A. Govardhan, A. Ramamohanreddy: Mining Indirect Positive and Negative Association Rules. 581-591
Amita Sharma, S. S. Sarangdevot: Application of FOP and AOP Methodologies in Concert for Developing Insurance Software Using Eclipse-Based Open Source Environment. 592-606
Santosh Kumar, Sumit Kumar, Sukumar Nandi: Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset. 619-630
S. P. Syed Ibrahim, K. R. Chandran, R. V. Nataraj: LLAC: Lazy Learning in Associative Classification. 631-638
K. Indira, S. Kanmani: Association Rule Mining Using Genetic Algorithm: The role of Estimation Parameters. 639-648
Animesh Tripathy, Sumit Kumar Maji, Prashanta Kumar Patra: UDSCA: Uniform Distribution Based Spatial Clustering Algorithm. 649-660

P. Jaganathan, N. Rajkumar, R. Nagalakshmi: A Kernel Based Feature Selection Method Used in the Diagnosis of Wisconsin Breast Cancer Dataset. 683-690




