displayNone
Banner

Publications

Conference Papers

  • Jadia Pawan, Mathuria Anish Efficient secure aggregation in sensor networksin Proceedings of 11th Annual International Conference on High Performance Computing (HiPC 2004), [LNCS, vol. 3296], Dec., 2004, pp. 40-49.
  • Mitra Suman K. A study on the application of color transfer technique for video compressionin Proceedings of Indian Conference on Vision, Graphics and Image Processing, Kolkata, 2004, pp. 628-631.
  • Mitra Suman K., Rao K. Madhusudhana Color transfer technique for video compressionin Proceedings of the 12th International Conference on Advanced Computing and Communication, Ahmedabad, 2004, pp. 450-453.
  • Acharya Y. B., Bhattacharyya, Kundu M. K., Mitra Suman K., Murthy C. A. Digital watermarking using homogeneity in imagein Proceedings of the IEEE Region-10 Conference on Convergent Technologies for Asia-pacific region, (TENCON'03), Bangalore, 2003, pp. 944-948.
  • Bhatt Amit, Desai Meghana Reconfiguration in SOC with programmable interconnect presented at the VLSI Design and Test, 2003.
  • Ashok Patel, Buddhadeve B V, Chaudhary Sanjay Krushimantra: A decision support system for Indian farmersin Proceedings of International Conference on Agricultural Policies and Strategies for Profitable Farming, GAU, Anand, 2003.
  • Integrated CMOS transceiver front-end for CDMA-based mobile communication applicationsin Proceedings of 1st International Conference on Microwaves, Antenna, Propagation and Remote Sensing (ICMARS-2003), Jodhpur, 2003.
  • Oza Hiral D, Sanjeev Gupta Computer aided design of microstrip array antenna for beam scanning applicationsin Proceedings of 1st International Conference on Microwaves, Antenna, Propagation and Remote Sensing (ICMARS-2003), Jodhpur, 2003.
  • Jadhav Ashish, Jotwani Naresh Examination reforms in engineering and technology programmesin UGC Golden Jubilee National Seminar: 2002-2003 on Examination Reforms, 2003, pp. 99-104.
  • Anish Mathuria, Boyd, Colin and Mathuria Two undetectable on-line guessing attacks revisitedin Proceedings of the National Workshop on Cryptology-2003, Anna University, pp. II-16.1-16.5.
Back to Top