displayNone
banner

Publications

Books Chapters

  • Hammerstrom, Dan and Zaveri, Mazad S. CMOL/CMOS implementations of bayesian inference engine: Digital and mixed-signal architectures and p... CMOS Processors and Memories Krzysztof Iniewski Ed. Berlin: Springer, 2010, pp. 97-238.
  • Whose Bollywood is this anyway? : Exploring critical frameworks for studying popular Hindi cinema in Critical Pedagogy, Race, and Media : Diversity and Inclusion in Higher Education Teaching, Susan Flynn, Melanie A. Marotta (eds), Routledge, London pp.141-154 doi: 10.4324/9781003222835-10
  • Semi-inner Product: Application to Frame Theory and Numerical Range of Operators in Mathematics and Computing 2013, Ram N. Mohapatra, [et al.], ed. New Delhi, Springer pp 77-90. Doi: 10.1007/978-81-322-1952-1_6
  • Message from the general chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VI 10.1007/978-3-642-17714-9
  • Security and Privacy Issues in Outsourced Personal Health Record in Research advances in Cloud Computing, Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, (eds), Singapore: Springer, pp. 431-447. doi: 10.1007/978-981-10-5026-8_17
  • Message from the technical program chairs Information Systems Security, Lecture Notes in Computer Science 6503, by Somesh Jha, Anish Mathuria (Eds.) Springer-Verlag, Berlin, Heidelberg, Dec. 2010, pp. VII 10.1007/978-3-642-17714-9
  • Analysis of normal and pathological voices by novel chaotic titration method in Signal and Acoustic Modelling for Speech and Communication Disorders, Hemant A. Patil, Amy Neustein, and Manisha Kulshetra, (eds), Berlin: De Gruyter, pp. 87-120. doi: 10.1515/9781501502415
  • Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique in Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET), Balwinder Raj, Mamta Khosla and Amandeep Singh, (eds), USA: IGI Global pp. 189-211 doi: 10.4018/978-1-7998-1393-4.ch009.
  • Securing Digital Image with Authentication Code in Computer Vision and Image Processing in Intelligent Systems and Multimedia Technologies, Muhammad Sarfraz, (ed), Pennsylvania, USA: IGI Global pp. 203-215. Doi:10.4018/978-1-4666-6030-4.ch011
  • Privacy and Accountability Concerns in the Age of Big Data in Big Data: Storage, Sharing, and Security, Fei Hu (ed), CRC Press, pp. 341-356. DOI: 10.1201/b19694-17
Back to Top