A New Linearity Enhancing Technique for 802.11 b/g Low Noise Amplifiers
10.1109/MWSCAS.2006.382147
Banda, Kishore and Jotwani, Naresh. Efficient algorithm for hierarchical online mining of associative rulesin
Proceedings of the Thirteenth International Conference on Management of Data,
Design of Ultra Wideband Microstrip Antenna
10.1109/APS.2006.1711426
MAC Layer aware Stable Link Routing (MACSLR) in Mobile Adhoc Networks
10.1109/ISAHUC.2006.4290642
Kapoor, Hemangee K Formal modeling and verification of an asynchronous DLX pipelinein
Proceedings of the Fourth IEEE International Conference on Software Engineering and Formal Methods, 2006, (SEFM 2006),
Vadnala, Praveen Kumar and Mathuria, Anish. An efficient key assignment scheme for access control in a hierarchyin
Proceedings of Second International Conference on Information Systems Security (ICISS 2006),
Boyd, Colin; Choo, Kim-Kwang Raymond and Mathuria, Anish. An extension to Bellare and Rogaway (1993) Model: Resetting compromised long-term keysin
Proceedings of 11th Australasian Conference on Information Security and Privacy (ACISP 2006),
Mazumdar, Madhumita From improving icons to swadeshi heroes-scientists as moral exemplars in colonial Bengalin
Proceedings of the 19th European Conference on Modern South Asian Studies,
Patel, Hima M.; Bhavsar, Arnav. V. and Mitra, Suman K. Face recognition using modular principal component analysis and support vector machinein
Proceedings 3rd IET International Conference on Visual Information Engineering, (VIE2006),
Bhatt, Amit; Abbasi, Taher and Ramanujan Novel architecture of EBC for JPEG2000in
Proceedings of the 19th International Conference on VLSI Design, 2006, held jointly with 5th International Conference on Embedded Systems and Design,