displayNone
banner

Publications

Conference Papers

  • Patel, Dhawal and Chaudhary, Sanjay. Non-uniform information dissemination for performance discovery in computational gridsin Proceedings of the First International Conference on Communication Systems Software and Middleware,
  • Das, Manik Lal Authentication techniques: An overview presented at the National Workshop on Cryptology
  • BIST Scheme for Low Heat Dissipation and Reduced Test Application Time
  • Jain, Alok and Jadhav, Ashish. Performance of VBLAST and cooperative diversity in a correlated rayleigh fading environment distribu... Proceedings of Conference on Wireless Communication and Sensor Networks,
  • Jotwani, Naresh Cost-benefit analysis of providing rural knowledge connectivityin Proceedings of the 93rd Indian Science Congress,
  • Jotwani, Naresh Hierarchical online mining for associative rulesin Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b,
  • Modi, Bhavesh; Jotwani, Naresh and Maitra, Anutosh Refinements to minimum interference routing for traffic engineeringin Proceedings of IEEE Indicon 2005,
  • Kapoor, Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD)
  • Trivedi, Jigish; Maitra, Anutosh and Mitra, Suman K. A hybrid approach to speaker recognition in multi-speaker environmentin Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),
  • Mathuria, Anish; Choo, K. and Boyd, C Secure key agreement protocols efficient in messages and roundsin Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology,
Back to Top