Kaushal Buch, Rahul Dubey and Saket Buch Low power techniques for greener hardware
Handbook of Research on Green ICT: Technology, Business and Social Perspectives Bhuvan Unhelkar, Ed. Hershey: Information Science Reference, 2011, pp. 513-522. doi: 10.4018/978-1-60960-472-1.ch804
Speaker identification over narrowband VoIP networks
in Forensic Speaker Recognition: Law Enforcement and Counter-terrorism, Amy Neustein and Hemant A. Patil, Eds.New York: Springer-Verlag, Doi: 10.1007/978-1-4614-0263-3_6.
Sanjay Chaudhary Preface
Semantic Services, Interoperability and Web Applications: Emerging Concepts Amit Sheth, Ed., Hershey: IGI Global, 2011.
Shiv Visvanathan Chandra: re-inventing an uncle,\" in
S. Chandrasekhar: man of science Radhika Ramnath, Ed. New Delhi: Harper Collins Publishers, 2011, pp. 138 - 146.
Whose Bollywood is this anyway? : Exploring critical frameworks for studying popular Hindi cinema
in Critical Pedagogy, Race, and Media : Diversity and Inclusion in Higher Education Teaching, Susan Flynn, Melanie A. Marotta (eds), Routledge, London pp.141-154 doi: 10.4324/9781003222835-10
Semi-inner Product: Application to Frame Theory and Numerical Range of Operators
in Mathematics and Computing 2013, Ram N. Mohapatra, [et al.], ed. New Delhi, Springer pp 77-90. Doi: 10.1007/978-81-322-1952-1_6
Security and Privacy Issues in Outsourced Personal Health Record
in Research advances in Cloud Computing, Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, (eds), Singapore: Springer, pp. 431-447. doi: 10.1007/978-981-10-5026-8_17
Analysis of normal and pathological voices by novel chaotic titration method
in Signal and Acoustic Modelling for Speech and Communication Disorders, Hemant A. Patil, Amy Neustein, and Manisha Kulshetra, (eds), Berlin: De Gruyter, pp. 87-120. doi: 10.1515/9781501502415
Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique
in Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET), Balwinder Raj, Mamta Khosla and Amandeep Singh, (eds), USA: IGI Global pp. 189-211 doi: 10.4018/978-1-7998-1393-4.ch009.
Securing Digital Image with Authentication Code
in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011