|
Click below for a look at
the Preliminary Program
TECHNICAL PROGRAM
International
Conference on Information Technology 2005 (CIT2005)
Preliminary Announcement of
the Final Program
20th December
2005
Tutorials 9:00 AM 5:00 PM, Venues: TBA
(some of the tutorials may be of half day duration)
|
- .Net Programming: an Interactive
Tutorial, Speaker: Sunil Sabat (IBM USA)
- Logic Verification, Speaker: Dhiraj
Pradhan (University of Bristol, U.K) (Half-day)
- Embedded Systems: Models,
Hardware and OS,Speakers : D. Mukhopadhyay (Jadavpur
University) & S. Majumder (IIIT, Calcutta), (Half-day)
- E-Commerce
Web Application Security, Sukumar Nandi (IIT Guwahati) & Vivek
Ramachandran (Cisco Systems)
- Fault Diagnosis of Analog Circuits, P.
Kabisatpathy (CET, Bhubaneswar)
|
21st December
2005
8.00 AM 2.00 PM Registration
|
9.00 AM 10.00 AM: Inauguration
|
10.00AM 11.00 AM Keynote Address: IT
Enabled Embedded Systems, Speaker: Prof. Rabi Mahapatra, Texas
A&M University. |
11.00 11.30 AM Tea Break |
Session 1A:11.30 AM 1 PM |
Session 1B: 11.30 AM 1.00PM |
Distributed Computing |
Internet & QOS |
A Parallel
Algorithm for Dynamic Slicing of Distributed Java Programs in
non-DSM Systems
D P Mohapatra, R Mall,
R Kumar
Parallel
Program Scheduling in a Heterogeneous Wireless Mobile Computing
Environment
E.Ilavarasan, P.Thambidurai
Mobile Agent
Location Management in Global Networks
R. B. Patel, N
Mastorakis, K. Garg |
Developing
online instruction: Information Technology and Education in the
Global Context, H
Najjari
Bleeding
Edge DDoS Mitigation Techniques for ISPs,
V Ramachandran, S Nandi
Bandwidth
Efficient Resource Allocation Scheme for Wireless Video
Transmission,
G. Sivaradje,
S.Anbarasan,P. Dananjayan |
1.00PM 2:15 PM Lunch Break |
Session 2A 2:15PM - 3:45 PM |
Session 2B 2:15PM 3:45 PM |
Networks and Protocols |
Software Engineering |
Dependency
Sensitive Distributed Commit Protocol,
U. Shanker, M. Misra,
A.K.Sarje
A
multistage interconnection network with real time fault
detection and avoidance capabilities,
M Saha, I Sengupta
A
Pattern Matching Based Approach towards Phylogenetic Networks
with Constrained Recombination,
M.A.H Zahid, A Mittal, R.C.
Joshi
|
Software
Complexity Assessment Using Statistical Technique: Towards
Software Testing Effort Estimation,
P. Dhavachelvan, N.
Sivakumar, N. Saravanan,, S. Sampath Kumar,
V.S.K.Venkatachalapathy
Software
Testing A Graph Theoretic Approach,
V Bhattacherjee, D Suri, P K
Mahanti
Measuring
Users Role to Assess Organization Preparedness in a Systems
Acquisition Life Cycle: A Cognitive Framework,
H.K. Misra, B. Mohanty
|
3.45PM 4.05 PM Tea Break |
Session 3A 4.05 PM 5.05PM |
Parallel session 3B 4.05 PM
5.05PM |
Networks and Security |
Data Mining & Optimization |
Web
Document Classification Based on Extended Rough set (short),
Gaoxiang Yi, Heping Hu
Authenticating
Business Documents using J_HASH (short),
U K Ray, S Das Gupta
A Pair of
Symmetric Block Ciphers For The Secure Transmission of a File
(short), V.U.K Sastry,
V.Janaki |
Framework
for Detection of Commercial by Employing Cellular GP (short),
Manish Manoria, N
Saxena
Redundancy
Elimination Using Hash Based Value Numbering (short),
V. Vijay Kumar, K.V.N.Sunitha
Parallel
Visual Data Mining (short),
L.Suresh ,Madhusudan.G
|
5:05 PM 6:15 PM: Panel Discussion: Challenges to Indian IT
Industry Today
Panelists: TBA |
6:30 PM 8:30 PM Classical Music Concert |
22nd December 2005
9:00 AM 10:00 AM: Invited Talk Data
Driven Controller Synthesis and Design: New Results, Prof.
Shankar P. Bhattacharyya, Texas A & M University
|
10:10AM- 11:10 PM Session 4A
|
10:15 AM
-11:15 PM Session 4B |
Algorithms and Computability |
Network Protocols |
Generation
of L-System string from Ramification Matrix,
A.K.Bisoi, S.N.Mishra, S.Mishra
Mapcode
Computability,
Arindama Singh |
Security
Analysis of 802.1X Protocol For Wireless Local Area Networks,
D Nayak, D.B.Phatak,
V.P.
Gulati
Performance Analysis of 802.11 MAC & Time Bound Medium Access
Control (TBMAC) Protocol for Adhoc Wireless Network,
G. Saikia & D. Goswami |
11.10AM 11.30 AM Tea Break |
Parallel Session 5A:
Logic, Algorithms & IT in Society |
Parallel session 5B:
Internet & Security |
11.30 1.00 PM |
11.30 1.00 PM |
An
Algorithm for computing Prime Implicates in 1st order
Logic, M.K. Rout, A.
Singh
An
Algorithm for Efficient Search for a range of keys in B+ Trees,
J.
Shiva Prasad, B.K. panigrahy
Reasoning
Through Bayesian Modelling ,
R K Mohanty, D. Rodriguez |
Improving
Web Performance through Hierarchical Caching & Content Aliasing,
S B Patil, D B
Kulkarni, S Shere, A K Tripathy
A Research
Paradigm for Analysis of TCP SYN Flood And UDP Flood DDoS
Attacks, J.
S. Bhatia, R. K. Sehgal
A
Bayesian-CHI Square Approach to Junk Mail Filtering,
Rajesh T , Arun K
Pujari |
1.00PM 2.15 PM Lunch Break |
Parallel Session 6A: Computer Vision |
Parallel session
6B: Networks & protocols |
2.15 PM 3.45 PM |
2.15 PM 3.45 PM |
Retrieving
Video in Wavelet Compressed Domain,
Navajit Saikia ,Prabin
K. Bora
Fractal
image compression with edge detection,
M.L.Valarmathi,
K.Anbumani
Development
of GA Based Adaptive Techniques for non-linear identification,
G. Panda, B. Majhi, D.
Mohanty, A. Choubey
|
Active
Replication to Improve the Dependability of a Dual
Redundant System, J.
Chattopadhyay, Mazumdar
Extended
Varietal Hypercube - A Fault-tolerant Interconnection Topology
for Parallel Systems,
C.R. Tripathy, R K Dash
A Hardware
Aceelerator for Controlling Access to multiple Unit Resource in
safety/Time critical Systems,
M. Marchand, P. Sinha |
Parallel Session 7A: Computer Vision |
Parallel
session 7B: Natural Language Processing |
4.00PM 5.00 PM |
4.00 PM 5.00 PM |
Decision Directed Median Filter
, B. Majhi,
P.K. Sa, G. Panda
MUSIG
and MUBET guided PSONN based color object extraction: A
Comparative Study, S
Bhattacharyya, P Dutta, U Maulik
|
Formant
Analysis of Vowels in Emotional States of Oriya Speech Across
Gender, S Mohanty, S
Swain, R Mishra
Machine
Recognition of Printed Malayalam Characters,
Roshni, Dr Revathy, S Beevi |
5:00 PM - 5:45 PM: Invited Talk Prof. Chitta Baral, Arizona
State University, USA |
6:00 PM 7:00 PM: OITS Business Meeting |
23rd December 2005
9:00 AM 10.00 AM : Invited Talk Coverage, Connectivity and Routing Problems in
Networks, Prof. Arunabh Sen, Arizona State University,
USA |
Parallel Session 8A:
Bioinformatics |
Parallel session 8B:
Language Processing & AI |
10.10AM 11.10 AM |
10.10AM 11.10 AM |
Efficient DNA
Fragment Extraction (short),
S Silakari, A
Sugandhi
Predicting
Secondary Structure of RNA using Correlation Framework ,
Ravi Gupta,Ankush
Mittal, Sumit Gupta
|
Question
Answering System based on Paninian Framework: A case study over
Oriya Language (short)Chinmaya
Kumar Swain
Churn
Modeling in Personal Banking using Decision Trees (short),
V. Visweswar,,
V. Ravi , P. Radha Krishna, A. Sharma, G. Priyadarshi. R. K.
Pati, R.
Sahu,D. Singh
Designing
Multiple Star Schema from XML Scheme (short)
P. Pahwa, N. Parimal |
11.10 AM 11.30AM: Tea Break |
Parallel Session 9A: Internet,
Network Protocol & Architecture |
Parallel session 9B:
Scientific Computing
Organizer: Prof. S C Phatak |
11.30AM 1.00 PM |
11.30AM 1.00 PM |
Virtual
Topology Design in WDM Optical Networks Using Multi-Objective
Optimization,
B Karki, A Paul, R
Dutta
System-On-Chip
(Soc) Test With Mixed-Signal And Analog Cores,
S R. Das, J Zakizadeh, M H.
Assaf, E
M. Petriu, M Sahinoglu
An
Efficient Protocol for Certificate Path Validation,
V. Valli Kumari, KVSVN
Raju
|
To be Announced |
1.00 PM 2.30 PM Lunch Break |
2:30 PM 3:15 PM Invited
Talk Service Convergence and Optical Ethernet - Scaling from
LAN to WAN, Dr. Sukant Mohapatra, Lucent Technology, USA |
3:15 PM - 3:35 PM Tea Break |
Parallel Session 10A: Logic, Algorithms &
Architecture |
Parallel session 10B:
Network Topology and Routing |
3.35 PM 5.10 PM |
3.35 PM 5.10 PM |
Breaking
Propositional Logic Based Cryptosystem Using Networks of
Evolutionary Processor with Parallel String Rewritting Rules,
A Choudhary , K
Krithivasan
Reconfigurable
digital FIR filter for FPGA mplementation - A study with
different multiplier architectures,
Sunil Budumuru ,R.K.Singh
High Speed
Hardware Units for Efficient Performance of Modified Montgomery
Multiplication, H
Thapliyal ,S Kotiyal, M.B Srinivas
|
Self-Stabilizing
Ad hoc On-demand Distance Vector Routing in Mobile Ad hoc
Network, S Padhy, D
Goswami
Wavelength
Assignment in a Ring Topology for Wavelength Selective WDM
Optical Networks,
Amit Shukla, L. P
Singh, R Datta
Shared
Path Protection in DWDM Mesh Networks,
D Mandal, B Mitra
|
|
5.15 PM - 5:30 PM |
Best
Paper Award Ceremony and Closing |
|
|
|