With the growth of IT industry in India, there has been a long felt need for a forum where active researchers in CS and IT from academia and industry can interact with aim of extracting abstractions from a plethora of applications using rigorous methods. Extracting abstractions and refining them are the basic necessities for the next generation scalable applications that would aid serving global clients satisfactorily. ACM Bangalore Compute 2009 is the second in the series of such attempts by ACM Bangalore Chapter at providing an integrated forum for such an endeavor. The aim of Compute 2009 conference, sponsored and organized by ACM Bangalore chapter, has been to provide a forum for researchers in CS and IT to engage in a symbiotic relationship, with benefits for the Indian IT industry, entrepreneurs, investors and Academia (CS and interdisciplinary) alike.
The key focus areas for Compute 2009 are:
1. Next Generation Information Management - Search in both enterprise and internet context, information/data management, Business Intelligence, Data Warehousing, structured-unstructured information integration, Semantic Web, text/data mining, and analytics, data services, Enterprise Information Integration, Latest Database Trends, XML databases, XML information management etc. --- Track Chair --- Dr. Umeshwar Dayal, HP Labs, USA
2. Distributed Systems - Grid Computing, High Performance Computing, Cluster Computing, Cloud Computing, Virtualization, etc. --- Track Chair --- Dr. Rajkumar Buyya, University of Melbourne and Manjrasoft Pty Ltd, Australia
3. Contemporary Internet Trends including Web 2.0 , Social Computing, Service Architectures, Hosted Models, etc.
4. Green Technological Systems (Environmental, Power saving, Energy efficient, and Eco-Friendly systems)
Proceeding Downloads
Parallel algorithm for sorting on OTIS-ring multicomputer
The Optical Transpose Interconnection System (OTIS) based interconnection network has already gained popularity among researchers for achieving high performance computation. It has become one of the efficient models for optoelectronic parallel ...
Data analysis, visualization and knowledge discovery in sustainable data centers
- Manish Marwah,
- Ratnesh Sharma,
- Rocky Shih,
- Chandrakant Patel,
- Vaibhav Bhatia,
- Mohandas Mekanapurath,
- Rajkumar Velumani,
- Sankaragopal Velayudhan
A significant amount of energy consumption is now attributed to data centers due to their ever increasing numbers, size and power densities. Thus, there are efforts focused at making a data center more sustainable by reducing its energy consumption and ...
A framework for mining top-k frequent closed itemsets using order preserving generators
In this paper, we propose OP-TKC (Order Preserving Top K Closed itemsets) algorithm for mining top-k frequent closed itemsets. Our methodology visits the closed itemsets lattice in breadth first manner and generates all the top-k closed itemsets without ...
Performance evaluation of similarity join for real time information integration
Approximate join processing serves a key role in many application areas such as data cleansing, data integration, text mining, and bio-informatics. There has been much research interest in approximate join processing based on the concept of an edit ...
Multi agent system based service architectures for service level agreement in cellular networks
To provide Service Level Agreement (SLA) in wireless cellular network the network provider needs to do resource management through call admission and channel allocation strategies. Also if the SLA is unsatisfactory it has to react rapidly to reinstate ...
Iris feature extraction using directional filter bank for personal identification
Iris Recognition is a biometric tool, which has great emphasis in both research and practical applications. In this paper an Iris Recognition System using Directional Filter Bank (IRSDFB) is proposed. The normalized Iris is fragmented into three ...
Offline signature authentication using cross-validated graph matching
The biometric system is used to identify a person depending on his physiological or behavioral characteristics. Signature verification is a commonly accepted biometric method and is widely used for banking transactions. In this paper, we propose Offline ...
Intelligent business knowledge management using topic maps
We present a method, complete with case study, for capturing and managing the information stored in business transactions based on the widely used UBL. Where conventional wisdom would use a RDBMS-based approach, we use Topic Maps as the knowledge ...
Segmentation of touching characters in upper zone in printed Gurmukhi script
A new technique for segmenting touching characters in upper zone of printed Gurmukhi script has been presented in this paper. The technique is based on the structural properties of the Gurmukhi script characters. Concavity and convexity of the ...
An interactive method for generalized association rule mining using FP-tree
Generalized association rule mining plays a very important role in Knowledge discovery in Databases (KDD). Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules. In this paper, we ...
Rough set based ad-hoc on demand distance vector routing algorithm for MANETs
The existing reactive routing algorithms in Mobile Ad-hoc Networks (MANETs) generally send route request packet to all the neighbor nodes when it needs to find the destination. This greatly reduces the performance of network and consumes much of the ...
A greedy approach with criteria factors for QoS based web service discovery
Normally, the web service discovery mechanisms in web-sites have a trade-off between being Quality-driven or transaction cost-driven As goals of our paper, we decide upon several factors including the above-mentioned Quality and Transaction cost factors ...
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering ...
Adaptive partial dominating set algorithm for mobile ad-hoc networks
In Mobile Ad-hoc Networks (MANETs) each node has a transmission radius and is able to send message to all of its neighbors that are located with in its radius. In reactive based routing algorithms such as Ad-hoc on demand Routing Algorithm (AODV) and ...
Neural network based handwritten hindi character recognition system
Neural Networks are being used for character recognition from last many years but most of the works were reported to English character recognition. Character recognition is one of the applications of pattern recognition, which has enormous scientific ...
A novel discrete particle swarm clustering algorithm for data clustering
In this paper, a novel Discrete Particle Swarm Clustering algorithm (DPSC) for data clustering has been proposed. The particle positions and velocities are defined in a discrete form and an efficient approach is developed to move the particles for ...
NLION: Natural Language Interface for querying ONtologies
Use of semantic web models for representing expert knowledge about a domain as an ontology is becoming increasingly common. However, since these ontologies contain detailed domain information in a formal specification, it cannot be easily understood by ...
A tree structure for web service compositions
The composition of Web services is gaining a considerable momentum as an approach to the effective integration of distributed, heterogeneous and autonomous applications to build more sophisticated and value added services. Algorithms are needed to ...
Level-4 SaaS applications for healthcare industry
Software applications and solutions as Software as a Service (SaaS) has been gaining momentum all over the world in recent times. In the SaaS context, applications are hosted by the vendor using the vendor's IT infrastructure. Most SaaS applications are ...
Optimization of spinning process using hybrid approach involving ANN, GA and linear programming
The spinning process is one of the important production processes in the textile industry. Yarn is created using Cotton Fibre on a rotor or ring spinning machine. The quality of resulting yarn is very important in determining their application ...
Service composition using service selection with WS-agreement
The business requirements are dynamic in nature. Identification of suitable business partners who can satisfy a set of guarantees "on demand" is a critical process. Selection of business partners is influenced by several parameters including maximizing ...
New binning strategy for bitmap indices on high cardinality attributes
Bitmap indices are the preferred indexing structures for read only & high dimensional data in data warehouses and scientific databases. High cardinality attributes pose a new challenge in terms of having space efficient bitmap indices. Binning is a ...
A technique for mining negative association rules
In this paper, a methodology for mining and exploring all forms of negative association rules has been suggested. As the existing softwares do not provide any module to mine negative association rules directly and efficiently, the present research may ...
Quantum leap cluster upgrade
This paper describes upgrading a running high availability cluster while applications are still running. The whole software stack can be upgraded including operating system, cluster software, volume manager software, application software etc with almost ...
A rapid application development framework for rule-based named-entity extraction
Named Entity Recognition and Classification (NERC) consist of identifying and labeling specific pieces of information like proper names from free-form textual data. There are primarily three approaches to named-entity extraction: hand-crafted rule based,...
Extracting hidden image using histogram, DFT and SVM
- T. H. Manjula Devi,
- Pooja P. Shenoy,
- Swathi Saigali,
- Harsha Mathew,
- K. B. Raja,
- K. R. Venugopal,
- L. M. Patnaik
In covert communication, Information hiding is rapidly gaining momentum. There are many sophisticated techniques being developed in steganography. There is a need of universal method to detect hidden image. We have proposed a Universal method to detect ...
Cited By
-
Gete P A Quantitative Model of International Lending of Last Resort, SSRN Electronic Journal, 10.2139/ssrn.2810282
-
Venkataraman M Analyzing Urban Growth Boundary Effects in the City of Bengaluru, SSRN Electronic Journal, 10.2139/ssrn.2464946
-
Sun H Hull-White Model Calibration Notes, SSRN Electronic Journal, 10.2139/ssrn.2578774
-
Cao S, Shao E and Silos P Fixed-Term and Permanent Employment Contracts: Theory and Evidence, SSRN Electronic Journal, 10.2139/ssrn.1679204
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
Compute '17 | 70 | 19 | 27% |
COMPUTE '16 | 117 | 22 | 19% |
COMPUTE '14 | 110 | 21 | 19% |
Compute '13 | 96 | 24 | 25% |
COMPUTE '12 | 116 | 18 | 16% |
COMPUTE '09 | 113 | 10 | 9% |
Overall | 622 | 114 | 18% |