|  
 | 
          
            
              
                | 
                    
                      |   Third Conference on Theoretical and Applied Computer Science (TACS 2012)
 
   Oklahoma State UniversityStillwater, OK
 February 17, 2012
 
 
                          
                            |  |   |   |  
                          
                            | 
                              
                              Conference ProgramCopyright is not held by the conference. Authors can re-submit their work at other conferences or journals.
 Pictures of the conference.
 Best Paper Award: An Online Threshold Key Distribution Scheme for Symmetric Key Management, by Alireza Boloorchi, M. H. Samadzadeh, and Tingting Chen 
 Best Presentation Award:  Sindhu Chitikela, "Random Sequences for Choosing Base States and Rotations in Quantum Cryptography" 
 Paper proceedings will be posted within a week of the conference date.
 Held in MSCS 214
 
| Time | Presentation |  
| 9:30am to 9:45am | Breakfast |  
| 9:45am to 10:00am | Welcome by program chair |  
| 10:00am to 10:20am | Improving availability of mobile networks using a cluster routing protocol with redundant cluster head paperAuthors: Rommel Torres, Luis Mengual and Liliana Enciso
 |  
| 10:20am to 10:40am | An Approach to Contention-Free Protocol in Wireless Sensor Networks Using Smart Clusters.paperAuthor: Sujith Reddy Bheemireddi
 |  10:40am to 11:00am | An Improved Distributed Routing Protocol for Multi-domain Optical Networks using Topology Aggregation.paperAuthors: Giridhar Sharma, Michel Toulouse and Dieu-Linh Truong
 
| 11:00am to 11:20am | Break |  
| 11:20am to 11:40am | HMM-driven Smart White Space-aware Frame Control Protocol for Coexistence of ZigBee and WiFi.paper Author: Jie Yuan
 |  
| 11:40am to 12:00pm | Distributed Cloud Architecture: Resource Modelling and Security Concerns.paperAuthors: Praveenkumar Khethavath and Johnson Thomas
 |  
| 12:00pm to 1:30pm | Lunch (provided to all authors) |  
| 1:40pm to 2:00pm | Faked states attack and quantum cryptography protocols.paperAuthor: Travis Denny
 |  
| 2:00pm to 2:20pm | Sequence Randomization Using Quasigroups and Number Theoretic Transforms.paperAuthor: Vaignana Spoorthy Ella
 |  
| 2:20pm to 2:40pm | Random Sequences for Choosing Base States and Rotations in Quantum Cryptography.paper (Best Presentation AwardAuthors: Sindhu Chitikela and Subhash Kak
 |  
| 2:40pm to 3:00pm | An Online Threshold Key Distribution Scheme for Symmetric Key Management.paper (Best Paper AwardAuthors: Alireza T. Boloorchi, M. H. Samadzadeh and Tingting Chen
 |  
| 3:00pm to 3:20pm | Break |  
| 3:20pm to 3:40pm | Building a Telepresence Robot Based on an open-source Robot Operating System and Android. Authors: Ha Do, Craig Mouser and Weihua Sheng |  
| 3:40pm to 4:00pm | Introduction to Mobile Learning Systems and Usability Factors.paperAuthors: Lee K.B. and Praveenkumar Khethavath
 |  
| 4:00pm to 4:15pm | Best paper awards |  |    |  |  |  | 
    
      |  |