Saturday, Session C1, 10.20 am - 11.40 am:
Network Protocols and Applications:
Chair: R. Manivasakan, IIT Madras
124 |
Vanniarajan Chellappan and Kamala Krithivasan.
Network (Tree) Topology Inference Based on Prufer Sequence |
121 |
Vinay Joseph, Vinod Sharma and Utpal Mukherji.
Opportunistic Splitting for Scheduling via Stochastic Approximation |
150 |
Ashok Sairam and Gautam Barua.
Distributed Route Control Schemes to Load Balance Incoming Traffic in Multihomed Stub Networks |
218 |
Abul Bashar, Gerard Parr, Santosh Chaudhari, Mani Subramanian, Timothy Gonsalves, Sally McClean and Bryan Scotney.
Employing Bayesian Belief Networks for Energy Efficient Network Management |
Saturday, Session C2, 12 noon - 1.30 pm:
Broadband RF Antennas:
Chair: Hari Ramachandran, IIT Madras
42 |
J. William and R. Nakkeeran
Development of CPW-Fed UWB Printed Slot Antenna |
116 |
B. Vedaprabhu and K. J. Vinoy
A Double U-slot Patch Antenna with Dual Wideband Characteristics |
5 |
Amit Deshmukh and Kamala Prasan Ray
Broadband reactively coupled E-shaped Microstrip Antennas |
15 |
D Packiaraj, K. J. Vinoy, M. Ramesh and A. T. Kalghatgi
Elliptic slot antenna for Broadband wireless communications |
156 |
S. Oudaya coumar, R. Nakkeeran and K Thirumalaivasan
Resonator Based Compact Ultra-Wideband and Notched Wideband Filters |
Saturday, Session C3, 2.20 pm - 3.50 pm:
Wireless and Sensor Networks:
Chair: Abhay Karandikar, IIT Bombay
225 |
B. Santhana Krishnan
On the Bounds of Separability in Sensor Networks |
244 |
Priyatosh Mandal, Swades De and Shyam Chakraborty.
Characterization of Aloha in Underwater Wireless Networks |
198 |
Santosh Ramachandran, S. V. R. Anand, Malati Hegde, Anurag Kumar and Rajesh Sundaresan.
Neighbor Oblivious Link Reversal over Duty-Cycled WSNs |
95 |
Brijesh Patel and Sanjay Srivastava.
Performance Analysis of Zone Routing Protocols in Ad Hoc Networks |
182 |
Varsha Jain, Gerard Parr, D. W. Bustard and P. J. Morrow.
Deriving a Generic Energy Consumption Model for Network Enabled Devices |
Saturday, Session C4, 4.10 pm - 5.40 pm:
Network Applications and Analysis:
Chair: N. Radhika, Amrita Institute, Coimbatore
192 |
Vikrant Tomar, Himanshu Asnani, Abhay Karandikar, Vinay Chander, Swati Agrawal and Prateek Kapadia.
Social Network Analysis of the Short Message Service |
212 |
Kartik Bommepally, Glisa TK, Jeena J Prakash, Ranbir Sanasam and Hema Murthy.
Internet Activity Analysis Through Proxy Log |
203 |
Deepti Kumar, Timothy Gonsalves, Ashok Jhunjhunwala and Gaurav Raina.
Mobile Payment Architectures for India |
217 |
Ganesh Narayana Murthy and Sridhar Iyer
Study Element based adaption of lecture videos to mobile devices |
Sunday, Session C5, 10 am - 11.30 am:
Wireless and Ad Hoc networks:
Chair: Swades De, IIT Delhi
253 |
Mayur M Vegad, Swades De and Brejesh Lall.
Mitigation of Exposed Terminals Problem with Differential Capture Capable Receivers |
222 |
Weizhi Luo and Eliane Bodanese.
Network Resource Availability Evaluation for IEEE802.11a/b based WLAN Carrying Different Service Types |
104 |
Purvang Dalal and K. S. Dasgupta.
TCP Cross Layer Adaptive Policy - Throughput Optimization over Wireless Links |
172 |
T. Selvam and S. Srikanth
A Frame Aggregation Scheduler for IEEE 802.11n |
176 |
Arijit Ukil and Jaydip Sen.
Proactive Resource Reservation in Next-Generation Wireless Networks |
Sunday, Session C6, 11.50 am - 1.20 pm:
RF and Optical Communication:
Chair: Balaji Srinivasan, IIT Madras
206 |
Anil Prabhakar, Shree Krishnamoorthy and S. Thiruthakkathevan
Characterizing multi-photon states using gated photo-detection |
119 |
M. Shanmugapriya and M. Meenakshi
Design of MEMS Components for All-Optical Code Based Router |
72 |
Ankit Singh and K. J. Vinoy
Modeling of Propagation Characteristics of Non-linear Transmission Lines with Loss |
21 |
Pradeep Kumar
Optical modulation schemes to implement BB84 and B92 protocols using frequency-coding method |
Sunday, Session C7, 2 pm - 3.30 pm:
Survivability and Security:
Chair: Gaurav Raina, IIT Madras
148 |
Mukundan Madhavan, Andrew Thangaraj, Kapali Viswanathan and Yogesh Sankarasubramaniam.
NLHB: A Light-weight, Provably-secure Variant of the HB Protocol Using Simple Non-linear Functions |
178 |
Sandeep Sood, Anil K. Sarje and Kuldip Singh
An Improvement of Wang et al.'s Authentication Scheme Using Smart Cards |
219 |
Pallavi Manohar, Maryna Vereshchaka and D. Manjunath
Survivability Analysis under Non-Uniform Stochastically Dependent Node Damages |
145 |
Nikhil Ranjan, Hema A Murthy and Timothy A Gonsalves.
Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Modeling Technique | |