displayNone
Banner

Publications

Conference Papers

  • Maitra Anutosh, Sorathia Vikram Situation awareness unified processin Proceedings of Second International conference on Software Engineering Advances (ICSEA 2007), France, 2007.
  • Hemangee K. and Josephs, Kapoor Modelling Latency-Insensitive Systems in CSP Seventh International Conference on Application of Concurrency to System Design (ACSD 2007)
    Bratislava, Slovakia, 10-13 Jul. 2007, pp. 231-232.
  • Kirtankar Rohit, Anish Mathuria, Sharavan P. Venkata, Sing Aditya Raj Some New Multi-Protocol Attacksin Proceedings of International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Dec. 18-21, 2007, pp. 465-470.
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
  • Chaudhary Sanjay, Patel Dhawal Non-uniform information dissemination for performance discovery in computational gridsin Proceedings of the First International Conference on Communication Systems Software and Middleware, New Delhi, Jan, 2006, pp. 1-4.
  • Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
  • Das Manik Lal Authentication techniques: An overview presented at the National Workshop on Cryptology Pune, Sept., 2006.
  • Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
  • Ghodgaonkar Deepak K., Lenin, R. B Adaptive singlevariate rational data fitting with applications in electromagneticsin Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 160-163.
  • Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.
Back to Top