displayNone
banner

Publications

Conference Papers

  • Sorathia, Vikram and Maitra, Anutosh. Situation awareness unified processin Proceedings of Second International conference on Software Engineering Advances (ICSEA 2007),
  • Modelling Latency-Insensitive Systems in CSP
  • Mathuria, Anish; Singh, Aditya Raj; Sharavan, P. Venkata and Kirtankar, Rohit Some New Multi-Protocol Attacksin Proceedings of International Conference on Advanced Computing and Communications (ADCOM 2007),
  • Gajjar, Prakash P.; Joshi, M. V.; Banerjee, Asim and Mitra, Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006),
  • Patel, Dhawal and Chaudhary, Sanjay. Non-uniform information dissemination for performance discovery in computational gridsin Proceedings of the First International Conference on Communication Systems Software and Middleware,
  • Banda, Kishore and Jotwani, Naresh. Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data,
  • Das, Manik Lal Authentication techniques: An overview presented at the National Workshop on Cryptology
  • Kapoor, Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006),
  • Ghodgaonkar, Deepak Kumar and Lenin, R. B. Adaptive singlevariate rational data fitting with applications in electromagneticsin Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications,
  • Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
Back to Top