Chaudhary Sanjay, Patel Dhawal Non-uniform information dissemination for performance discovery in computational gridsin
Proceedings of the First International Conference on Communication Systems Software and Middleware, New Delhi, Jan, 2006, pp. 1-4.
Das Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology Pune, Sept., 2006.
Dipankar, Malav, Nagchoudhuri, Shah BIST Scheme for Low Heat Dissipation and Reduced Test Application Time
2006 IFIP International Conference on Very Large Scale Integration
Nice, France, 16-18 Oct. 2006, pp. 239-244.
Alok K. Jain, Jadhav Ashish Performance of VBLAST and cooperative diversity in a correlated rayleigh fading environment distribu...
Proceedings of Conference on Wireless Communication and Sensor Networks, Allahabad, Mar., 2005.
Naresh jotwani Cost-benefit analysis of providing rural knowledge connectivityin
Proceedings of the 93rd Indian Science Congress, Hyderabad, 2005, pp.1-6.
Naresh jotwani Hierarchical online mining for associative rulesin
Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b, Hyderabad, 2005.
Naresh jotwani, Maitra Anutosh, Modi Bhavesh Refinements to minimum interference routing for traffic engineeringin
Proceedings of IEEE Indicon 2005, Chennai.
Kapoor Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin
Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD) 2005, pp. 58-67.
Maitra Anutosh, Mitra Suman K., Trivedi Jigish A hybrid approach to speaker recognition in multi-speaker environmentin
Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05), [LNCS, vol. 3776], Kolkata, Dec., 18-22, 2005, pp. 272-275.
Boyd, Anish Mathuria Secure key agreement protocols efficient in messages and roundsin
Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology, Bangalore, 2005.