By Topic

15th International Conference on Advanced Computing and Communications (ADCOM 2007)

18-21 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 138
  • 15th International Conference on Advanced Computing and Communications - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (355 KB)
    Freely Available from IEEE
  • 15th International Conference on Advanced Computing and Communications - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • 15th International Conference on Advanced Computing and Communications - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 15th International Conference on Advanced Computing and Communications - TOC

    Publication Year: 2007, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2007, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (122 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (116 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Tutorial 1: Utility-Oriented Grid Computing and the Gridbus Middleware

    Publication Year: 2007, Page(s):xxiii - xxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    In this paper, we carry out the performance evaluation of satellite image resampling software, which follows service-oriented architecture and the service executes on a distributed operating system. The parameters, which are used for performance evaluation, include load balancing under multiple instance execution, overheads of process migration, effect of file caching and replication and performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 2: Search Engines in Indian Languages

    Publication Year: 2007, Page(s): xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    This paper extends the idea of presenting multimedia information through presentation by developing a PowerPoint Annotation Tool (PPAT) for teachers to insert various annotations into PowerPoint slides. The tool is built on multi-monitor technologies, aiming to make the presentations more instructional. Many studies have shown that annotations can support remembering, thinking, and clarifying to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 3: Infrastructure Protection from Distributed Denial of Service Attacks

    Publication Year: 2007, Page(s): xxvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    This paper presents a new method for solving planted-motif problem, which is a well-known motif-finding problem in the field of computational molecular biology. Motif-finding problem is considered to be a NP-complete problem and constant research is being carried out to solve the stated problem using some deterministic algorithm in polynomial time. This paper is an attempt to solve the plated-moti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 4: Multicores: Architectures, Programming and Beyond

    Publication Year: 2007, Page(s): xxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    In this paper, we present a simple and novel technique for classification of multiple channel electro-oculogram signals (EOG) using VHDL based hardware. The classifier is based on deterministic finite automata (DFA). The system is capable of classifying sixteen different EOG signals. The viability of the system was tested by performing online experiments with able bodied subjects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 5: Management of Transactions on Mobile Database Systems

    Publication Year: 2007, Page(s): xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    This tutorial is all about the management of mobile transactions- clean and malicious-on Mobile Database System. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDAC-ACS Lecture Award 2007 Talk: Petaflop Computing

    Publication Year: 2007, Page(s): xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (103 KB) | HTML iconHTML

    Padmashree Dr Vijay Bhatkar pioneered India's massively parallel processing initiative and built the first of the country's supercomputers in the PARAM series at the Centre for Development of Advanced Computing that he set up. Dr. Vijay P. Bhaskar is Founder Executive Director of Centre for Development of Advanced Computing Organization (C-DAC). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptography and security - future challenges and issues

    Publication Year: 2007, Page(s):xxxii - xxxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    We live in an era of unimaginably rapidly advancing and amazing technologies that enable instantaneous flow of information - anytime, anywhere. The convergence of computers and networks has been the key force behind the development of these awe inspiring technologies. Increasing use of systems built using these information technologies (IT) is having a profound impact on our everyday lives. These ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwriting Recognition Paradigms in Interpretation, Transcription, and Search Applications

    Publication Year: 2007, Page(s):xxxiv - xxxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Recognition of handwritten documents has been a success in well-constrained domains, such as automatic recognition of handwritten postal addresses and validating bank check amounts. However, unconstrained offline handwriting recognition is still a very challenging task when lexicon size is very large. Thus, the large amount of handwritten material of the world, historical manuscripts and contempor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach for Test Pattern Generation for Digital Cores in Mixed Signal Circuits

    Publication Year: 2007, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    This paper proposes a new algorithm in an optical network using online routing with the application of optical buffers comprising of delay-lines (FDLs). The model for the algorithm has been theoretically developed and the corresponding call connection probability has been calculated. The limitation on the amount of delay permitted per packet has been addressed by limiting the number of delay-lines... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling of Cores for Power Constrained System-on-Chip Testing

    Publication Year: 2007, Page(s):9 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    A system-on-chip (SOC) may contain numerous cores. If each core has its own distinct set of tests then in order to reduce the total testing time some of these cores may be tested in parallel. The order of such testing is determined by a schedule. An efficient scheduling algorithm can bring about a considerable reduction in the total test time of chips for large scale testing. This paper proposes a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing the Side-Channel Leakage of Masked AES S-Box

    Publication Year: 2007, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Masking of gates is one of the most popular techniques to prevent Differential Power Analysis (DPA) of AES S- Boxes. However due to the presence of glitches in circuits even masked circuits leak side-channel information. Moti- vated by this fact, we proposed a balanced masked multi- plier where the inputs are synchronized either by sequential components or controlled AND logic, that can be a possi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Approach to Develop Secure Scan Tree for Crypto-Hardware

    Publication Year: 2007, Page(s):21 - 26
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Scan chain based test has been a common and useful method for testing VLSI designs due to its high controllability and observability. However scan chains have recently been shown to pose security threat to cryptographic chips. Researchers have proposed various prevention architectures like scan tree followed by a compactor, locking and TAP architecture. But these solutions lead to huge hardware ov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modification to Circular-Scan Architecture to Improve Test Data Compression

    Publication Year: 2007, Page(s):27 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2709 KB) | HTML iconHTML

    The authors in (B. Arslan and A. Orailuglu, 2004) propose circular-scan chain architecture to reduce test time and cost in SOCs. The technique presented in this paper is based on circular-scan architecture (B. Arslan and A. Orailuglu, 2004). The basic idea of circular-scan architecture is use of the captured response of the previously applied pattern as a template for the next pattern while allowi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Aspect-Oriented Approach for Instance Adaptation for Object-Oriented Databases

    Publication Year: 2007, Page(s):35 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Developing object-oriented database for web applications may not remain constant and may vary to a large extent due to a variety of reasons like correcting mistakes, adding new features or any changes in the structure of the real world artifacts modeled in the database. Class versioning is one of the evolution strategy employed that addressing the above issues. The existing strategy for instance a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agile Technique for Agent Based Goal Refinement to Elicit Soft Goals in Goal Oriented Requirements Engineering

    Publication Year: 2007, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Goal oriented requirements engineering methods have gained significance because they define the requirements in terms of goals which are well understood by the stakeholders. Although the goals are extracted from the stakeholders having good domain knowledge, but extracting these goals is a challenging task in the goal oriented methods, especially the soft goals about which even the stakeholders ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Analysis Based Application Specific Dispatch Table Compaction

    Publication Year: 2007, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Object oriented programming languages are increasingly used in software development for embedded systems as they support elegant programming and easier extensibility. Dispatch table is introduced to support message passing mechanism. For a large number of classes and methods the dispatch table is also larger and needs substantial amount of memory space. But memory size is the main constraint in em... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.