displayNone
banner

Publications

Conference Papers

  • Sharma, Swati and Joshi, M. V Practical approaches for the estimation of high resolution depth map and intensity field using photo... Proceedings of the Thirteenth National Conference on Communications,
  • Gajjar, Prakash P.; Joshi, M. V.; Banerjee, Asim and Mitra, Suman K. Decimation estimation and linear model based super-resolution using zoomed observationsin Proceedings of Third Iberian Conference on Pattern Recognition and Image Analysis (IbPRIA'2007),
  • Jain, Vishal; Lenin, R. B. and Srivastava, Sanjay. Modelling MANETs using Queueing networks\" in Proceedings of the thirteenth National Conference on Communication, 2007
  • Jain, Alok and Jadhav, Ashish Performance of MIMO under correlated Rayleigh fadingin Advances in Communications: Proceedings of the 12th National Conference on Communications (NCC 2006),
  • Thacker, Grishma and Jadhav, Ashish. Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College,
  • Gajjar, Prakash P.; Joshi, M. V.; Banerjee, Asim and Mitra, Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006),
  • Banda, Kishore and Jotwani, Naresh. Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data,
  • Kapoor, Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006),
  • Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
  • Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Back to Top