Sorathia, Vikram and Maitra, Anutosh. Situation awareness unified processin
Proceedings of Second International conference on Software Engineering Advances (ICSEA 2007),
Modelling Latency-Insensitive Systems in CSP
Mathuria, Anish; Singh, Aditya Raj; Sharavan, P. Venkata and Kirtankar, Rohit Some New Multi-Protocol Attacksin
Proceedings of International Conference on Advanced Computing and Communications (ADCOM 2007),
Gajjar, Prakash P.; Joshi, M. V.; Banerjee, Asim and Mitra, Suman K. Decimation estimation and super-resolution using zoomed observationsin
Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006),
Patel, Dhawal and Chaudhary, Sanjay. Non-uniform information dissemination for performance discovery in computational gridsin
Proceedings of the First International Conference on Communication Systems Software and Middleware,
Banda, Kishore and Jotwani, Naresh. Efficient algorithm for hierarchical online mining of associative rulesin
Proceedings of the Thirteenth International Conference on Management of Data,
Das, Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology
Kapoor, Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein
Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006),
Ghodgaonkar, Deepak Kumar and Lenin, R. B. Adaptive singlevariate rational data fitting with applications in electromagneticsin
Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin
Proceedings of Second International Conference on Information Systems Security (ICISS 2006),