Maitra Anutosh, Sorathia Vikram Situation awareness unified processin
Proceedings of Second International conference on Software Engineering Advances (ICSEA 2007), France, 2007.
Hemangee K. and Josephs, Kapoor Modelling Latency-Insensitive Systems in CSP
Seventh International Conference on Application of Concurrency to System Design (ACSD 2007)
Bratislava, Slovakia, 10-13 Jul. 2007, pp. 231-232.
Kirtankar Rohit, Anish Mathuria, Sharavan P. Venkata, Sing Aditya Raj Some New Multi-Protocol Attacksin
Proceedings of International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Dec. 18-21, 2007, pp. 465-470.
Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin
Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
Chaudhary Sanjay, Patel Dhawal Non-uniform information dissemination for performance discovery in computational gridsin
Proceedings of the First International Conference on Communication Systems Software and Middleware, New Delhi, Jan, 2006, pp. 1-4.
Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin
Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
Das Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology Pune, Sept., 2006.
Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein
Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
Ghodgaonkar Deepak K., Lenin, R. B Adaptive singlevariate rational data fitting with applications in electromagneticsin
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 160-163.
Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin
Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.