skip to main content
10.1145/1517303acmconferencesBook PagePublication PagescomputeConference Proceedingsconference-collections
COMPUTE '09: Proceedings of the 2nd Bangalore Annual Compute Conference
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
Compute '09: ACM Bangalore Chapter Compute 2009 Bangalore India January 9 - 10, 2009
ISBN:
978-1-60558-476-8
Published:
09 January 2009
Sponsors:

Reflects downloads up to 24 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

With the growth of IT industry in India, there has been a long felt need for a forum where active researchers in CS and IT from academia and industry can interact with aim of extracting abstractions from a plethora of applications using rigorous methods. Extracting abstractions and refining them are the basic necessities for the next generation scalable applications that would aid serving global clients satisfactorily. ACM Bangalore Compute 2009 is the second in the series of such attempts by ACM Bangalore Chapter at providing an integrated forum for such an endeavor. The aim of Compute 2009 conference, sponsored and organized by ACM Bangalore chapter, has been to provide a forum for researchers in CS and IT to engage in a symbiotic relationship, with benefits for the Indian IT industry, entrepreneurs, investors and Academia (CS and interdisciplinary) alike.

The key focus areas for Compute 2009 are:

1. Next Generation Information Management - Search in both enterprise and internet context, information/data management, Business Intelligence, Data Warehousing, structured-unstructured information integration, Semantic Web, text/data mining, and analytics, data services, Enterprise Information Integration, Latest Database Trends, XML databases, XML information management etc. --- Track Chair --- Dr. Umeshwar Dayal, HP Labs, USA

2. Distributed Systems - Grid Computing, High Performance Computing, Cluster Computing, Cloud Computing, Virtualization, etc. --- Track Chair --- Dr. Rajkumar Buyya, University of Melbourne and Manjrasoft Pty Ltd, Australia

3. Contemporary Internet Trends including Web 2.0 , Social Computing, Service Architectures, Hosted Models, etc.

4. Green Technological Systems (Environmental, Power saving, Energy efficient, and Eco-Friendly systems)

Skip Table Of Content Section
SESSION: List of accepted papers
research-article
Parallel algorithm for sorting on OTIS-ring multicomputer
Article No.: 1, Pages 1–5https://doi.org/10.1145/1517303.1517305

The Optical Transpose Interconnection System (OTIS) based interconnection network has already gained popularity among researchers for achieving high performance computation. It has become one of the efficient models for optoelectronic parallel ...

research-article
Data analysis, visualization and knowledge discovery in sustainable data centers
Article No.: 2, Pages 1–8https://doi.org/10.1145/1517303.1517306

A significant amount of energy consumption is now attributed to data centers due to their ever increasing numbers, size and power densities. Thus, there are efforts focused at making a data center more sustainable by reducing its energy consumption and ...

research-article
A framework for mining top-k frequent closed itemsets using order preserving generators
Article No.: 3, Pages 1–6https://doi.org/10.1145/1517303.1517307

In this paper, we propose OP-TKC (Order Preserving Top K Closed itemsets) algorithm for mining top-k frequent closed itemsets. Our methodology visits the closed itemsets lattice in breadth first manner and generates all the top-k closed itemsets without ...

research-article
Performance evaluation of similarity join for real time information integration
Article No.: 4, Pages 1–7https://doi.org/10.1145/1517303.1517308

Approximate join processing serves a key role in many application areas such as data cleansing, data integration, text mining, and bio-informatics. There has been much research interest in approximate join processing based on the concept of an edit ...

research-article
Multi agent system based service architectures for service level agreement in cellular networks
Article No.: 5, Pages 1–6https://doi.org/10.1145/1517303.1517309

To provide Service Level Agreement (SLA) in wireless cellular network the network provider needs to do resource management through call admission and channel allocation strategies. Also if the SLA is unsatisfactory it has to react rapidly to reinstate ...

research-article
Iris feature extraction using directional filter bank for personal identification
Article No.: 6, Pages 1–8https://doi.org/10.1145/1517303.1517310

Iris Recognition is a biometric tool, which has great emphasis in both research and practical applications. In this paper an Iris Recognition System using Directional Filter Bank (IRSDFB) is proposed. The normalized Iris is fragmented into three ...

research-article
Offline signature authentication using cross-validated graph matching
Article No.: 7, Pages 1–8https://doi.org/10.1145/1517303.1517311

The biometric system is used to identify a person depending on his physiological or behavioral characteristics. Signature verification is a commonly accepted biometric method and is widely used for banking transactions. In this paper, we propose Offline ...

research-article
Intelligent business knowledge management using topic maps
Article No.: 8, Pages 1–8https://doi.org/10.1145/1517303.1517312

We present a method, complete with case study, for capturing and managing the information stored in business transactions based on the widely used UBL. Where conventional wisdom would use a RDBMS-based approach, we use Topic Maps as the knowledge ...

research-article
Segmentation of touching characters in upper zone in printed Gurmukhi script
Article No.: 9, Pages 1–6https://doi.org/10.1145/1517303.1517313

A new technique for segmenting touching characters in upper zone of printed Gurmukhi script has been presented in this paper. The technique is based on the structural properties of the Gurmukhi script characters. Concavity and convexity of the ...

research-article
An interactive method for generalized association rule mining using FP-tree
Article No.: 10, Pages 1–6https://doi.org/10.1145/1517303.1517314

Generalized association rule mining plays a very important role in Knowledge discovery in Databases (KDD). Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules. In this paper, we ...

POSTER SESSION: List of accepted posters
research-article
Rough set based ad-hoc on demand distance vector routing algorithm for MANETs
Article No.: 11, Pages 1–5https://doi.org/10.1145/1517303.1517316

The existing reactive routing algorithms in Mobile Ad-hoc Networks (MANETs) generally send route request packet to all the neighbor nodes when it needs to find the destination. This greatly reduces the performance of network and consumes much of the ...

research-article
A greedy approach with criteria factors for QoS based web service discovery
Article No.: 12, Pages 1–5https://doi.org/10.1145/1517303.1517317

Normally, the web service discovery mechanisms in web-sites have a trade-off between being Quality-driven or transaction cost-driven As goals of our paper, we decide upon several factors including the above-mentioned Quality and Transaction cost factors ...

research-article
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes
Article No.: 13, Pages 1–4https://doi.org/10.1145/1517303.1517318

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering ...

research-article
Adaptive partial dominating set algorithm for mobile ad-hoc networks
Article No.: 14, Pages 1–4https://doi.org/10.1145/1517303.1517319

In Mobile Ad-hoc Networks (MANETs) each node has a transmission radius and is able to send message to all of its neighbors that are located with in its radius. In reactive based routing algorithms such as Ad-hoc on demand Routing Algorithm (AODV) and ...

research-article
Neural network based handwritten hindi character recognition system
Article No.: 15, Pages 1–4https://doi.org/10.1145/1517303.1517320

Neural Networks are being used for character recognition from last many years but most of the works were reported to English character recognition. Character recognition is one of the applications of pattern recognition, which has enormous scientific ...

research-article
A novel discrete particle swarm clustering algorithm for data clustering
Article No.: 16, Pages 1–4https://doi.org/10.1145/1517303.1517321

In this paper, a novel Discrete Particle Swarm Clustering algorithm (DPSC) for data clustering has been proposed. The particle positions and velocities are defined in a discrete form and an efficient approach is developed to move the particles for ...

research-article
NLION: Natural Language Interface for querying ONtologies
Article No.: 17, Pages 1–4https://doi.org/10.1145/1517303.1517322

Use of semantic web models for representing expert knowledge about a domain as an ontology is becoming increasingly common. However, since these ontologies contain detailed domain information in a formal specification, it cannot be easily understood by ...

research-article
A tree structure for web service compositions
Article No.: 18, Pages 1–4https://doi.org/10.1145/1517303.1517323

The composition of Web services is gaining a considerable momentum as an approach to the effective integration of distributed, heterogeneous and autonomous applications to build more sophisticated and value added services. Algorithms are needed to ...

research-article
Level-4 SaaS applications for healthcare industry
Article No.: 19, Pages 1–4https://doi.org/10.1145/1517303.1517324

Software applications and solutions as Software as a Service (SaaS) has been gaining momentum all over the world in recent times. In the SaaS context, applications are hosted by the vendor using the vendor's IT infrastructure. Most SaaS applications are ...

research-article
Optimization of spinning process using hybrid approach involving ANN, GA and linear programming
Article No.: 20, Pages 1–4https://doi.org/10.1145/1517303.1517325

The spinning process is one of the important production processes in the textile industry. Yarn is created using Cotton Fibre on a rotor or ring spinning machine. The quality of resulting yarn is very important in determining their application ...

research-article
Service composition using service selection with WS-agreement
Article No.: 21, Pages 1–5https://doi.org/10.1145/1517303.1517326

The business requirements are dynamic in nature. Identification of suitable business partners who can satisfy a set of guarantees "on demand" is a critical process. Selection of business partners is influenced by several parameters including maximizing ...

research-article
New binning strategy for bitmap indices on high cardinality attributes
Article No.: 22, Pages 1–5https://doi.org/10.1145/1517303.1517327

Bitmap indices are the preferred indexing structures for read only & high dimensional data in data warehouses and scientific databases. High cardinality attributes pose a new challenge in terms of having space efficient bitmap indices. Binning is a ...

research-article
A technique for mining negative association rules
Article No.: 23, Pages 1–4https://doi.org/10.1145/1517303.1517328

In this paper, a methodology for mining and exploring all forms of negative association rules has been suggested. As the existing softwares do not provide any module to mine negative association rules directly and efficiently, the present research may ...

research-article
Quantum leap cluster upgrade
Article No.: 24, Pages 1–4https://doi.org/10.1145/1517303.1517329

This paper describes upgrading a running high availability cluster while applications are still running. The whole software stack can be upgraded including operating system, cluster software, volume manager software, application software etc with almost ...

research-article
A rapid application development framework for rule-based named-entity extraction
Article No.: 25, Pages 1–4https://doi.org/10.1145/1517303.1517330

Named Entity Recognition and Classification (NERC) consist of identifying and labeling specific pieces of information like proper names from free-form textual data. There are primarily three approaches to named-entity extraction: hand-crafted rule based,...

research-article
Extracting hidden image using histogram, DFT and SVM
Article No.: 26, Pages 1–4https://doi.org/10.1145/1517303.1517331

In covert communication, Information hiding is rapidly gaining momentum. There are many sophisticated techniques being developed in steganography. There is a need of universal method to detect hidden image. We have proposed a Universal method to detect ...

Contributors
  • Indian Institute of Technology Bombay
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

COMPUTE '09 Paper Acceptance Rate 10 of 113 submissions, 9%;
Overall Acceptance Rate 114 of 622 submissions, 18%
YearSubmittedAcceptedRate
Compute '17701927%
COMPUTE '161172219%
COMPUTE '141102119%
Compute '13962425%
COMPUTE '121161816%
COMPUTE '09113109%
Overall62211418%