1. ACC 2011: Kochi, Kerala, India
Ajith Abraham, Jaime Lloret Mauri, John F. Buford, Junichi Suzuki, Sabu M. Thampi (Eds.): Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part IV. Springer 2011 Communications in Computer and Information Science 193 ISBN 978-3-642-22725-7
Position Papers
G. Jisha, Philip Samuel: Impact of Node Density on Node Connectivity in MANET Routing Protocols. 1-8
K. Vinod Kumar, G. Lakshmi Phani, K. Venkat Sayeesh, Aparna Chaganty, Garimella Rama Murthy: Two Layered Hierarchical Model for Cognitive Wireless Sensor Networks. 19-24
Sonam Tobgay, Rasmus L. Olsen, Ramjee Prasad: Architecture for Running Multiple Applications on a Single Wireless Sensor Network: A Proposal. 37-45
Abel Palaty, Mohammad Suaib, Kumar Sambhav Pandey: Exploiting ILP in a SIMD Type Vector Processor. 56-62
N. Sandeep Chaitanya, S. Ramachandram, B. Padmavathi, S. Shiva Skandha, G. Ravi Kumar: Data Privacy for Grid Systems. 70-78
Kannan Rajkumar, Frédéric Andrès, Fernando Ferri, Patrizia Grifoni: Towards Multimodal Capture, Annotation and Semantic Retrieval from Performing Arts. 79-88
Jai Prakash Singh: A New Indian Model for Human Intelligence. 89-97
P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan: Stepping Up Internet Banking Security Using Dynamic Pattern Based Image Steganography. 98-112
Rahul Roy, Madhabananda Das, Satchidananda Dehuri: A Combinatorial Multi-objective Particle Swarm Optimization Based Algorithm for Task Allocation in Distributed Computing Systems. 113-125
G. Sreenu, P. M. Dhanya, Sabu M. Thampi: Enhancement of BARTERCAST Using Reinforcement Learning to Effectively Manage Freeriders. 126-136
Dhanya Sudarsan, P. R. Mahalingam, G. Jisha: A Novel Approach to Represent Detected Point Mutation. 137-144
A. A. Arifa Azeez, Elizabeth Isaac, Sabu M. Thampi: Anonymous and Secured Communication Using OLSR in MANET. 145-154
S. Saraswathi, M. Anusiya, P. Kanivadhana, S. Sathiya: Bilingual Translation System for Weather Report. 155-164
Sudheer Kurakula, A. S. D. P. Sudhansh, Roy Paily, S. Dandapat: Design of QRS Detection and Heart Rate Estimation System on FPGA. 165-174
S. Saraswathi, M. Hemamalini, S. Janani, V. Priyadharshini: Multi-document Text Summarization in E-learning System for Operating System Domain. 175-186
Ana Elisa Ferreira, Anilton Salles Garcia, Carlos Alberto Malcher Bastos: Studies of Management for Dynamic Circuit Networks. 195-204
International Workshop on Identity: Security, Management and Applications (ID 2011)
Juhi Gupta, Ishan Kumar, Anil Kacholiya: Game Theoretic Approach to Resolve Energy Conflicts in Ad-Hoc Networks. 205-210
C. K. Raju, P. B. S. Bhadoria: Software Secureness for Users: Significance in Public ICT Applications. 211-222
Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay: Vector Space Access Structure and ID Based Distributed DRM Key Management. 223-232
B. B. Gupta, P. K. Agrawal, Anupama Mishra, M. K. Pattanshetti: On Estimating Strength of a DDoS Attack Using Polynomial Regression Model. 244-249
Zubair Ahmad Khattak, Jamalul-lail Ab Manan, Suziah Sulaiman: Finding New Solutions for Services in Federated Open Systems Interconnection. 250-259
Avinash Srinivasan, Jie Wu: Duplicate File Names-A Novel Steganographic Data Hiding Technique. 260-268
M. Priyadharshini, R. Baskaran, Madhan Kumar Srinivasan, Paul Rodrigues: A Framework for Securing Web Services by Formulating an Collaborative Security Standard among Prevailing WS-* Security Standards. 269-283
Vijayalaxmi Kakulapati, Ramakrishna Kolikipogu, P. Revathy, D. Karunanithi: Improved Web Search Engine by New Similarity Measures. 284-292
International Workshop on Applications of Signal Processing (I-WASP 2011)
Kiran Kumar Bhuvanagiri, Sunil Kumar Kopparapu: Recognition of Subsampled Speech Using a Modified Mel Filter Bank. 293-299
C. L. Biji, D. Selvathi, Asha Panicker: Tumor Detection in Brain Magnetic Resonance Images Using Modified Thresholding Techniques. 300-308
B. Vivekavardhana Reddy, Y. S. Kumara Swamy, N. Usha: Generate Vision in Blind People Using Suitable Neuroprosthesis Implant of BIOMEMS in Brain. 309-317
Ibrahim Missaoui, Zied Lachiri: Undecimated Wavelet Packet for Blind Speech Separation Using Independent Component Analysis. 318-328
Rajeev Kumaraswamy, Lekhesh V. Prabhu, K. Suchithra, P. S. Sreejith Pai: SVM Based Classification of Traffic Signs for Realtime Embedded Platform. 339-348
Aditya R. Kanitkar, Brijendra K. Bharti, Umesh N. Hivarkar: Object Classification Using Encoded Edge Based Structural Information. 358-367
Gaurav Kumar Yadav, Tarun Kancharla, Smita Nair: Real Time Vehicle Detection for Rear and Forward Collision Warning Systems. 368-377
Ramaswamy Palaniappan, Jenish Gosalia, Kenneth Revett, Andrews Samraj: PIN Generation Using Single Channel EEG Biometric. 378-385
International Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp 2011)

Likewin Thomas, B. Annappa: Application of Parallel K-Means Clustering Algorithm for Prediction of Optimal Path in Self Aware Mobile Ad-Hoc Networks with Link Stability. 396-405
Imad M. Abbadi: Clouds' Infrastructure Taxonomy, Properties, and Management Services. 406-420
Jie Song, Tiantian Li, Lulu Jia, Zhiliang Zhu: A Deduced SaaS Lifecycle Model Based on Roles and Activities. 421-431
Ryan K. L. Ko, Bu-Sung Lee, Siani Pearson: Towards Achieving Accountability, Auditability and Trust in Cloud Computing. 432-444
Venkatarami Reddy Chintapalli: A Deadline and Budget Constrained Cost and Time Optimization Algorithm for Cloud Computing. 455-462
International Workshop on Multimedia Streaming (MultiStreams 2011)
Kaliappan Gopalan: A Bit Modification Technique for Watermarking Images and Streaming Video. 463-472
R. Roopalakshmi, G. Ram Mohana Reddy: Efficient Video Copy Detection Using Simple and Effective Extraction of Color Features. 473-480
Tatiana Gualotuña, Diego Marcillo, Elsa María Macías López, Álvaro Suárez Sarmiento: Mobile Video Service Disruptions Control in Android Using JADE. 481-490
Hira Sathu, Mohib A. Shah: Performance Analysis of Video Protocols over IP Transition Mechanisms. 491-500
Hira Sathu, Mohib A. Shah, Kathiravelu Ganeshan: Performance Comparison of Video Protocols Using Dual-Stack and Tunnelling Mechanisms. 501-511
J. Mohamedmoideen Kader Mastan, G. A. Sathish Kumar, K. Bhoopathy Bagan: A Color Image Encryption Technique Based on a Substitution-Permutation Network. 524-533
Second International Workshop on Trust Management in P2P Systems (IWTMP2PS 2011)
Chenglian Liu, Marjan Kuchaki Rafsanjani, Liyun Zheng: Comment on the Improvement of an Efficient ID-Based RSA Mutlisignature. 534-540
Jayashree Padmanabhan, Tamil Selvan Raman Subramaniam, Kumaresh Prakasam, Vigneswaran Ponpandiyan: A Secure Routing Protocol to Combat Byzantine and Black Hole Attacks for MANETs. 541-548
Subhalaxmi Das, Sujata Mohanty, Banshidhar Majhi: A Convertible Designated Verifible Blind Multi-signcryption Scheme. 549-556
Imad M. Abbadi: Middleware Services at Cloud Application Layer. 557-571
Jaydip Sen: An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks. 580-592
Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui: Data Dissemination and Power Management in Wireless Sensor Networks. 593-607
Rama Krishna Challa, Rakesh Sambyal: Performance Evaluation of ID Assignment Schemes for Wireless Sensor Networks. 608-615



