Patel, Dhawal and Chaudhary, Sanjay. Non-uniform information dissemination for performance discovery in computational gridsin
Proceedings of the First International Conference on Communication Systems Software and Middleware,
Das, Manik Lal Authentication techniques: An overview
presented at the National Workshop on Cryptology
BIST Scheme for Low Heat Dissipation and Reduced Test Application Time
Jain, Alok and Jadhav, Ashish. Performance of VBLAST and cooperative diversity in a correlated rayleigh fading environment distribu...
Proceedings of Conference on Wireless Communication and Sensor Networks,
Jotwani, Naresh Cost-benefit analysis of providing rural knowledge connectivityin
Proceedings of the 93rd Indian Science Congress,
Jotwani, Naresh Hierarchical online mining for associative rulesin
Proceedings of the Twelfth International Conference on Management of Data: COMAD2005b,
Modi, Bhavesh; Jotwani, Naresh and Maitra, Anutosh Refinements to minimum interference routing for traffic engineeringin
Proceedings of IEEE Indicon 2005,
Kapoor, Hemangee K Controllable delay-insensitive processes and their reflection, interaction and factorisationin
Proceedings of the 5th International Conference on Application of Concurrency to System Design (ACSD)
Trivedi, Jigish; Maitra, Anutosh and Mitra, Suman K. A hybrid approach to speaker recognition in multi-speaker environmentin
Proceedings of First International Conference on Pattern Recognition and Machine Intelligence, (PReMI'05),
Mathuria, Anish; Choo, K. and Boyd, C Secure key agreement protocols efficient in messages and roundsin
Proceedings of INDOCRYPT 2005-6th International Conference on Cryptology,