displayNone
banner

Publications

Books Chapters

  • Workload aware Cost-based Partial loading of Raw data for Limited Storage Resources Futuristic Trends in Networks and Computing Technologies, Lecture Notes in Electrical Eng., Vol. 936 , PradeepKumar Singh et al. (Eds) Chapter 74, pp 1-12, Springer Nature, 2021
  • RDF Query Processing: Relational Versus Graph Approach Futuristic Trends in Networks and Computing Technologies, Lecture Notes in Electrical Eng., Vol. 936 , PradeepKumar Singh et al. (Eds) Chapter 41, pp 1-13, Springer Nature, 2021
  • Inverse Kinematics Based Computational Framework for Robot Manipulation Inspired by Human Movements in Proceedings of the Sixth International Conference on Mathematics and Computing, Advances in Intelligent Systems and Computing, vol 1262., Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Springer, Singapore. pp. 201-215. DOI: 10.1007/978-981-15-8061-1_17.
  • Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
  • Password-Based Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8
  • Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
  • Key Agreement Protocols in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
  • Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
  • Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 doi: 10.1007/978-3-662-58146-9_2
Back to Top