Technical Programme

DOWNLOAD

Day 1: December 14, 2011

Inauguration Ceremony

10:00 – 10:30

Keynote – I: Heinrich Voss, Hamburg University of Technology, Germany.
Regularization of Large Scale Total Least Squares Problems

10:30 – 11:30

Tea Break

11:30 – 12:00

Session I : Networking and Its Applications

12:00 – 13:30

Chandreyee Chowdhury, and Sarmistha Neogy, Reliability Estimation of Delay tolerant QoS Mobile Agent System in MANET

Michal Choras, and Rafal Kozik, Network Event Correlation and Semantic Reasoning for Federated Networks Protection System

Anupam Saha, and Rituparna Chaki, VAMI – A Novel architecture for Vehicular Ambient Intelligent System

Subhendu Barat, Ashok Kumar Pradhan, and Tanmay De, A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh Network

Lunch Break

13:30 – 14:15

Session II: Agent-based Systems

14:15 – 16:00

Plenary Lecture: Aditya Ghosh, University of Wollongong, Australia.
Optimizing Web: Leveraging Agent Technology for Sustainability

14:15 – 15:00

Mohamed Achraf Dhouib, Lamine Bougueroua, and Katarzyna Węgrzyn-Wolska, Combination of Decision Support System (DSS) for remote healthcare monitoring using a multi-agent approach

15:00 – 16:00

Debdutta Barman Roy, and Rituparna Chaki, MAHIDS: A New Mobile Agent Based Blackhole Intrusion Detection System

Rakesh Kumar Mishra, Suparna Saha, Sankhayan Choudhury, and Nabendu Chaki, Agent based approach for radio resource optimization for Cellular Networks

Tea Break

16:00 – 16:15

Session III: Biometric Applications

16:15 – 17:15

Piotr Panasiuk, and Khalid Saeed, Influence of Database Quality on the Results of Keystroke Dynamics Algorithms

Jakub Karwan, and Khalid Saeed, A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of Speech

Michal Choras, and Rafal Kozik, Fast Feature Extractors for Palmprint Biometrics

Cultural Programme and Welcome Reception

18:00 – 21:00

Day 2: December 15, 2011

Keynote 2: Dipankar Dasgupta, University of Memphis, USA.
Who is Responsible for Security & Privacy in the Cloud?

09:30 – 10:15

Keynote 3: Young Im Cho, The University of Suwon, Korea.
The Future of Intelligent Ubiquitous Computing Systems

10:15 – 11:00

Tea Break

11:00 – 11:15

Session IV: Pattern Recognition & Image Processing

11:15 – 13:15

Rafal Doroz, and Piotr Porwik, Handwritten signature recognition with adaptive selection of behavioral features

Kamil Surmacz, and Khalid Saeed, Robust algorithm for fingerprint identification with a simple image descriptor

Arijit Sinharay, Syed Mohd Bilal, and Tanushyam Chattopadhyay, A method for unsupervised detection of the boundary of coarticulated units from isolated speech using Recurrence Plot

Tomas Kocyan, Jan Martinovic, Jiri Dvorsky, and Vaclav Snasel, Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann law

Soharab Hossain Shaikh, Asis Kumar Maiti, and Nabendu Chaki, On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Methods

Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri, and Dipak Kumar Basu, Medical Aid for Automatic Detection of Malaria

Lunch Break

13:15 – 14:00

Keynote 4: Dong Hwa Kim, Hanbat National University, Korea.
An Effective Research of Emotion

14:00 – 14:45

Session V: Industrial Applications

14:45 – 15:45

Pouyeh Rezazadeh, Measuring Leanness and Agility Status of Iranians Food Industry Supply Chains Using Data Envelopment Analysis

Antonio Candiello, and Agostino Cortesi, KPIs from Web Agents for Policies' Impact Analysis and Products' Brand Assessment

Sudip Kundu, and Sriyankar Acharyya, Stochastic Local Search Aproaches in Solving the Nurse Scheduling Problem

Tea Break

15:45 – 16:00

Session VI: Algorithmic Applications & Data Management

16:00 – 17:30

J. K. Mandal, and Somnath Mukhopadhyay, GA based Denoising of Impulses (GADI)

Sangeeta Sen, and Rituparna Chaki, Handling Write Lock Assignment in Cloud Computing Environment

Sundarapandian Vaidyanathan, and Sarasu Pakiriswamy, The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz Systems

Lukas Vojacek, Jan Martinovic, Jiri Dvorsky, Katerina Slaninova, and Ivo Vondrak, Parallel Hybrid SOM Learning on High Dimensional Sparse Data

Abhijit Sanyal, and Sankhayan Choudhury, Operational Algebra for a Graph based Semantic Web Data Model

Supriya Chakraborty, and Nabendu Chaki, A Survey on the Semi-Structured Data Models

Conference Dinner

19:00 – 22:00

Day 3: December 16, 2011

Session VII: Information and Network Security

10:00 – 13:15

Plenary Lecture: Sushil Jajodia, George Mason Univ., Fairfax, USA
Scalable Detection of Cyber Attacks

10:00 – 10:45

Raju Halder, and Agostino Cortesi; Observation-based Fine Grained Access Control for XML Documents

10:45 – 11:30

Subhasis Dasgupta, and Aditya Bagchi, Controlled Access over Documents for concepts having Multiple Parents in a Digital Library Ontology

Tea Break

11:30 – 11:45

Session VII: Information and Network Security                              cont…

11:45 – 13:15

Prabir Kr. Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri, Secret Image Sharing with Embedded Session Key

Anna M. Bartkowiak, Block and command profiles for legitimate users of a computer network

Uttam Kr. Mondal, and  J. K. Mandal, Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS)

Riti Chowdhury, and Debashis De, Secure money transaction in NFC Enabled Mobile wallet using session based alternative cryptographic techniques

Lunch Break

13:15 – 14:15

Industry Presentations

14:15 – 16:00

 

Image Gallery, Kolkata

Overview

CISIM 2011 focuses on Agent based Computing and Its Applications. The technical program for CISIM 2011 has been planned with four distinct tracks.

Contact Us

For any enquiries contact us at :

 

Email: cisim2011@gmail.com
  nabendu@ieee.org