displayNone
Banner

Publications

Conference Papers

  • M V Joshi, Sharma Swati Practical approaches for the estimation of high resolution depth map and intensity field using photo... Proceedings of the Thirteenth National Conference on Communications, Kanpur, 2007.
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and linear model based super-resolution using zoomed observationsin Proceedings of Third Iberian Conference on Pattern Recognition and Image Analysis (IbPRIA'2007), (LNCS, vol. 4477), Girona, Spain, Jun. 6-8, 2007, pp.314-321.
  • Jain Vishal, Lenin, R. B, Sanjay Srivastava Modelling MANETs using Queueing networks\" in Proceedings of the thirteenth National Conference on Communication, 2007
  • Alok K. Jain, Jadhav Ashish Performance of MIMO under correlated Rayleigh fadingin Advances in Communications: Proceedings of the 12th National Conference on Communications (NCC 2006), New Delhi, Jan., 2006, pp. 38-42.
  • Jadhav Ashish, Thacker Grishma Enhancements to CA\'s revocation services in PKIin Proceedings of Technical Symposium at Governmenr Engineering College, Aurangabad, Jan., 2006.
  • Banerjee Asim, Gajjar Prakash, M V Joshi, Mitra Suman K. Decimation estimation and super-resolution using zoomed observationsin Proceedings 5th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP 2006), [LNCS, vol. 4338], Madurai, Dec. 13-16, 2006, pp. 45-57.
  • Banda Kishore, Naresh jotwani Efficient algorithm for hierarchical online mining of associative rulesin Proceedings of the Thirteenth International Conference on Management of Data, New Delhi, Dec. 2006.
  • Kapoor Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006), pp. 118-127.
  • Anish Mathuria, Vadnala Praveen Kumar An efficient key assignment scheme for access control in a hierarchyin Proceedings of Second International Conference on Information Systems Security (ICISS 2006), [LNCS, vol. 4332], Dec. 17-21, 2006, pp. 205-219.
  • Boyd, Choo Kim-Kwang Raymond, Colin and Mathuria, Anish Mathuria An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006), [LNCS, vol. 4058], Melbourne, Australia, Jul. 3-5, 2006, pp. 371-382.
Back to Top