1. ACC 2011: Kochi, Kerala, India
Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi (Eds.): Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 191 ISBN 978-3-642-22713-4
Database and Information Systems

Krishna Khajaria, Manoj Kumar: Evaluation of Approaches for Modeling of Security in Data Warehouses. 9-18
Distributed Software Development
Ashfa Umber, Imran Sarwar Bajwa, M. Asif Naeem: NL-Based Automated Software Requirements Elicitation and Specification. 30-39
Fateh Boutekkouk, Zakaria Tolba, Mustapha Okab: Automatic Interface Generation between Incompatible Intellectual Properties (IPs) from UML Models. 40-47
Puneet Mittal, Satwinder Singh, K. S. Kahlon: Identification of Error Prone Classes for Fault Prediction Using Object Oriented Metrics. 58-68
B. Athira, Philip Samuel: Traceability Matrix for Regression Testing in Distributed Software Development. 80-87
N. Sivakumar, K. Vivekanandan, S. Sandhya: Testing Agent-Oriented Software by Measuring Agent's Property Attributes. 88-98
Human Computer Interaction and Interface
Sneha G. Gondane, M. Dhivya, D. Shyam: Classifier Feature Extraction Techniques for Face Recognition System under Variable Illumination Conditions. 99-108
Adity Saikia, Shyamanta M. Hazarika: Bispectrum Analysis of EEG in Estimation of Hand Movement. 109-118
Adity Saikia, Nayan M. Kakoty, Shyamanta M. Hazarika: Wavelet Selection for EMG Based Grasp Recognition through CWT. 119-129
Adityo Ashari Wirjono, Z. S. Ricky Lincoln, William, Dewi Agushinta R.: Information Visualization for Tourist and Travelling in Indonesia. 130-137
Dewi Agushinta R., Bima Shakti Ramadhan Utomo, Denny Satria, Jennifer Sabrina Karla Karamoy, Nuniek Nur Sahaya: The Smart Goal Monitoring System. 138-145
Kezia Velda Roberta, Lulu Mawaddah Wisudawati, Muhammad Razi, Dewi Agushinta R.: Web Based Virtual Agent for Tourism Guide in Indonesia. 146-153
Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Md. Mostafizur Rahman, Mohammad Nasiruddin, Md. Abdul Latif, Mohammad Nurul Huda: Local Feature or Mel Frequency Cepstral Coefficients - Which One Is Better for MLN-Based Bangla Speech Recognition? 154-161
Rohit Agrawal, C. Sasi Kumar, Darshan Moodgal: Power Optimization Techniques for Segmented Digital Displays. 162-171
Santa Maiti, Debasis Samanta, Satya Ranjan Das, Monalisa Sarma: Language Independent Icon-Based Interface for Accessing Internet. 172-182
Preety Singh, Deepika Gupta, Vijay Laxmi, Manoj Singh Gaur: Contribution of Oral Periphery on Visual Speech Intelligibility. 183-190
ICT
Sugam Sharma, U. Sunday Tim, Shashi K. Gadia, Patrick Smith: Geo-spatial Pattern Determination for SNAP Eligibility in Iowa Using GIS. 191-200
Paul Anu, Paul Varghese: Project Management Model for e-Governance in the Context of Kerala State. 201-209
Deka Ganesh Chandra, Dutta Borah Malaya: ICT Its Role in e-Governance and Rural Development. 210-222
C. K. Raju, Ashok Mishra: Enhancing Sustainability of Software: A Case-Study with Monitoring Software for MGNREGS in India. 223-233
Internet and Web Computing
P. Dharanyadevi, P. Dhavachelvan, S. K. V. Jayakumar, R. Baskaran, V. S. K. Venkatachalapathy: Proficient Discovery of Service in Event Driven Service Oriented Architecture. 234-242
G. Poornalatha, Prakash S. Raghavendra: Web User Session Clustering Using Modified K-Means Algorithm. 243-252
S. Saritha, G. Santhosh Kumar: Semantic Association Mining on Spatial Patterns in Medical Images. 263-272
Anjali Thukral, Varun Mendiratta, Abhishek Behl, Hema Banati, Punam Bedi: FCHC: A Social Semantic Focused Crawler. 273-283
Vibha Gaur, Neeraj Kumar Sharma: A Dynamic Seller Selection Model for an Agent Mediated e-Market. 284-295
Bhaskara Rao Boddu, Valli Kumari Vatsavayi: A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm. 296-306
Ash Mohammad Abbas, Ravindra Kumar: A Client Perceived Performance Evaluation of Web Servers. 307-316
Imran Ahmed, Sunil Kumar Kopparapu: Enhanced Quality of Experience through IVR Mashup to Access Same Service Multiple Operator Services. 317-326
K. Saruladha, G. Aghila, A. Bhuvaneswary: Information Content Based Semantic Similarity Approaches for Multiple Biomedical Ontologies. 327-336
Harilal Parasuram, Bipin Nair, Krishnashree Achuthan, Shyam Diwakar: Taking Project Tiger to the Classroom: A Virtual Lab Case Study. 337-348
Sami J. Habib, Paulvanna Nayaki Marimuthu, Naser Zaeri: Green Communications through Network Redesign. 349-357
D. Devakumari, K. Thangavel: Unsupervised Modified Adaptive Floating Search Feature Selection. 358-365
M. Thilagu, R. Nadarajan: Fast and Efficient Mining of Web Access Sequences Using Prefix Based Minimized Trees. 366-373
Mobile Computing
Muhammad Awais, Ashwani Singh, Guido Masera: Scalable, High Throughput LDPC Decoder for WiMAX (802.16e) Applications. 374-385
Gustavo Jiménez, Yezid Donoso: Unique Mechanism of Selection of Traffic Flow Templates for Mobility IP Protocols Using Multihoming and IP Flow Mobility on the NGMN. 386-396
Sharmishta Desai, R. K. Bedi, B. N. Jagdale, V. M. Wadhai: Elliptic Curve Cryptography for Smart Phone OS. 397-406
Anjani Kumar Rai, Shivendu Mishra, Pramod Narayan Tripathi: An Improved Secure Authentication Protocol for WiMAX with Formal Verification. 407-416
Suneeta Chawla, Apurv Nigam, Pankaj Doke, Sanjay Kimbahune: A Survey of Virtualization on Mobiles. 430-441
Abhishek Varshney, Mohammed Abdul Qadeer: Mobile Peer to Peer Spontaneous and Real-Time Social Networking. 442-451
Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur: Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. 452-459
Multi Agent Systems
Vikram Saralaya, J. K. Kishore, Sateesh Reddy, Radhika M. Pai, Sanjay Singh: Modeling and Verification of Chess Game Using NuSMV. 460-470
Muhammad Tahir, Dominique Gaïti, Majid Iqbal Khan: SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents. 471-479
Multimedia and Video Systems
Pradipta K. Banerjee, Jayanta K. Chandra, Asit K. Datta: Face Detection and Eye Localization in Video by 3D Unconstrained Filter and Neural Network. 480-489
Noopa Jagadeesh, Aishwarya Nandakumar, P. Harmya, S. S. Anju: Secret Image Sharing Using Steganography with Different Cover Images. 490-497
Aishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, S. S. Anju: A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods. 498-505
Sattvik Sharma, R. Sreevathsan, M. V. V. N. S. Srikanth, C. Harshith, T. Gireesh Kumar: Cognitive Environment for Pervasive Learners. 506-515
Anand Singh Jalal, Vrijendra Singh: A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet Transform. 516-524
Azzat A. Al-Sadi, El-Sayed M. El-Alfy: An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing. 535-544
Parallel and Distributed Algorithms
A. Neela Madheswari, R. S. D. Wahida Banu: Communication Aware Co-Scheduling For Parallel Job Scheduling In Cluster Computing. 545-554
Rajendra Prasath: Shared Resource Allocation Using Token Based Control Strategy in Augmented Ring Networks. 555-567
Ved Prakash Bhardwaj, Nitin, Vipin Tyagi: An Algorithmic Approach to Minimize the Conflicts in an Optical Multistage Interconnection Network. 568-576
Peter Joseph Basil Morris, Saikat Roy Chowdhury, Debasish Deb: An Efficent Methodology for Realization of Parallel FFT for Large Data Set. 577-584
Suchetana Chakraborty, Sushanta Karmakar: A Novel Approach for Adaptive Data Gathering in Sensor Networks by Dynamic Spanning Tree Switching. 585-594
Vikas Agarwal, Pansoo Kim, Deock-Gil Oh, Do-Seob Ahn: Hardware Efficient Root-Raised-Cosine Pulse Shaping Filter for DVB-S2 Receivers. 595-603
Security, Trust and Privacy
Zahid Akhtar, Sandeep Kale: Security Analysis of Multimodal Biometric Systems against Spoof Attacks. 604-611
Amitava Nag, Jyoti Prakash Singh, Sushanta Biswas, Dipankar Sarkar, Partha Pratim Sarkar: A Novel Copyright Protection Scheme Using Visual Cryptography. 612-619
Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar: A Weighted Location Based LSB Image Steganography Technique. 620-627
S. K. Hafizul Islam, G. P. Biswas: Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. 628-635
N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik: Covariance Based Steganography Using DCT. 636-647
Usha Banerjee, A. Swaminathan: An Efficient Algorithm to Enable Login into Secure Systems Using Mouse Gestures. 648-655
R. Jayaprakash, V. Uma: Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM. 656-665
Jan Vykopal: A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. 666-675
Hamed Saljooghinejad, Wilson Naik Rathore: Multi Application User Profiling for Masquerade Attack Detection. 676-684
Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais: A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers. 685-692



