Workload aware Cost-based Partial loading of Raw data for Limited Storage Resources
Futuristic Trends in Networks and Computing Technologies, Lecture Notes in Electrical Eng., Vol. 936 , PradeepKumar Singh et al. (Eds) Chapter 74, pp 1-12, Springer Nature, 2021
RDF Query Processing: Relational Versus Graph Approach
Futuristic Trends in Networks and Computing Technologies, Lecture Notes in Electrical Eng., Vol. 936 , PradeepKumar Singh et al. (Eds) Chapter 41, pp 1-13, Springer Nature, 2021
Inverse Kinematics Based Computational Framework for Robot Manipulation Inspired by Human Movements
in Proceedings of the Sixth International Conference on Mathematics and Computing, Advances in Intelligent Systems and Computing, vol 1262., Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Springer, Singapore. pp. 201-215. DOI: 10.1007/978-981-15-8061-1_17.
Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
Password-Based Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 329-387 doi: 10.1007/978-3-662-58146-9_8
Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
Key Agreement Protocols
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 165-240 doi: 10.1007/978-3-662-58146-9_5
Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion
Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
Computational Security Models
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 doi: 10.1007/978-3-662-58146-9_2