displayNone
Banner

Publications

Conference Papers

  • Alok K. Jain, Jadhav Ashish Performance of MIMO under correlated Rayleigh fadingin Advances in Communications: Proceedings of the 12th National Conference on Communications (NCC 2006), New Delhi, Jan., 2006, pp. 38-42.
  • Ghodgaonkar Deepak K., Lenin, R. B Adaptive singlevariate rational data fitting with applications in electromagneticsin Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 160-163.
  • Jadhav Ashish, Thacker Grishma Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College, Aurangabad, Jan., 2006.
  • Dipankar, Malav, Nagchoudhuri, Shah BIST Scheme for Low Heat Dissipation and Reduced Test Application Time 2006 IFIP International Conference on Very Large Scale Integration
    Nice, France, 16-18 Oct. 2006, pp. 239-244.
  • Aris Mohd Aziz Bin, Ghodgaonkar Deepak K., Khadri Norasimah Comparison of nondestructive and noncontact dielectric measurement methods for liquids using free sp... Proceedings of National Conference on Recent Advancements in Microwave Technique and Applications, Jaipur, Oct., 2006, pp. 311-313.
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
  • Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
  • Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
  • Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.
  • Boyd, Choo Kim-Kwang Raymond, Colin and Mathuria, Anish Mathuria An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006), [LNCS, vol. 4058], Melbourne, Australia, Jul. 3-5, 2006, pp. 371-382.
Back to Top