10. CISIM 2011: Kolkata, India
Nabendu Chaki, Agostino Cortesi (Eds.): Computer Information Systems - Analysis and Technologies - 10th International Conference, CISIM 2011, Kolkata, India, December 14-16, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 245 ISBN 978-3-642-27244-8
Keynote and Plenary Lectures
Young Im Cho: The Future of Intelligent Ubiquitous Computing Systems. 1-3
Dipankar Dasgupta: Who Is Responsible for Security and Privacy in the Cloud? 4
Aditya Ghose: The Optimizing Web: Leveraging Agent Technology for Sustainability. 5-8
Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian: Scalable Detection of Cyber Attacks. 9-18

Networking and Its Applications
Chandreyee Chowdhury, Sarmistha Neogy: Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANET. 38-47
Michal Choras, Rafal Kozik: Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. 48-54
Anupam Saha, Rituparna Chaki: VAMI - A Novel Architecture for Vehicular Ambient Intelligent System. 55-64
Subhendu Barat, Ashok Kumar Pradhan, Tanmay De: A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network. 65-73
Agent-Based Systems
Mohamed Achraf Dhouib, Lamine Bougueroua, Katarzyna Wegrzyn-Wolska: Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent Approach. 74-84
Debdutta Barman Roy, Rituparna Chaki: MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. 85-94
Rakesh Kumar Mishra, Suparna Saha, Sankhayan Choudhury, Nabendu Chaki: Agent Based Approach for Radio Resource Optimization for Cellular Networks. 95-104
Biometric Applications
Piotr Panasiuk, Khalid Saeed: Influence of Database Quality on the Results of Keystroke Dynamics Algorithms. 105-112
Jakub Karwan, Khalid Saeed: A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech. 113-120
Pattern Recognition and Image Processing
Rafal Doroz, Piotr Porwik: Handwritten Signature Recognition with Adaptive Selection of Behavioral Features. 128-136
Kamil Surmacz, Khalid Saeed: Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor. 137-144
Arijit Sinharay, Syed Mohd Bilal, Tanushyam Chattopadhyay: A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence Plot. 145-151
Tomás Kocyan, Jan Martinovic, Jiri Dvorský, Václav Snásel: Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann law. 152-160
Soharab Hossain Shaikh, Asis Kumar Maiti, Nabendu Chaki: On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method. 161-169
Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu: Medical Aid for Automatic Detection of Malaria. 170-178
Industrial Applications
Pouyeh Rezazadeh: Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment Analysis. 179-191
Antonio Candiello, Agostino Cortesi: KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment. 192-201
Sudip Kundu, Sriyankar Acharyya: Stochastic Local Search Approaches in Solving the Nurse Scheduling Problem. 202-211
Algorithmic Applications and Data Management

Sangeeta Sen, Rituparna Chaki: Handling Write Lock Assignment in Cloud Computing Environment. 221-230
Sundarapandian Vaidyanathan, Sarasu Pakiriswamy: The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems. 231-238
Lukás Vojácek, Jan Martinovic, Jiri Dvorský, Katerina Slaninová, Ivo Vondrák: Parallel Hybrid SOM Learning on High Dimensional Sparse Data. 239-246
Abhijit Sanyal, Sankhayan Choudhury: Operational Algebra for a Graph Based Semantic Web Data Model. 247-256
Information and Network Security
Raju Halder, Agostino Cortesi: Observation-Based Fine Grained Access Control for XML Documents. 267-276
Subhasis Dasgupta, Aditya Bagchi: Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology. 277-285
Prabir Kumar Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri: Secret Image Sharing with Embedded Session Key. 286-294
Anna Bartkowiak: Command and Block Profiles for Legitimate Users of a Computer Network. 295-304
Uttam Kr. Mondal, Jyotsna Kumar Mandal: Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). 305-313
Riti Chowdhury, Debashis De: Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques. 314-323



