displayNone
banner

Publications

Conference Papers

  • Jaikumar, Padmini; Abhishek Singh and Mitra, Suman K. Background subtraction in videos using bayesian learning with motion informationin Proceedings of 19th British Machine Vision Conference, (BMVC 2008),
  • Rawal, Divyang; Vijaykumar, C. QR-RLS Based adaptive channel TEQ for OFDM wireless LANin Proceedings of International Conference on Signal Processing, Communication and Networking (ICSCN-2008),
  • Laliwala, Zakir; Desai, A.; Chaudhary, Sanjay and Allam, A Why context, content and contract are Key for dynamic service selection?in Proceedings of ESM-Workshop 2008, co-located with IEEE Services Computing 2008,
  • Bajoria, Shagun; Singh, vineet Kumar; Kunde, Raju and Parikh, Chetan Low power high bandwidth aplifier with RC miller and gain enchanced feedforward compensationin Proceedings of International Symposium on Low Power Electronics and Design (ISLPED 2008),
  • Yalamanchili, Kishore; Pasalapudi, Aditya; Majeti, Deepak and V, Sunitha. Design of optimal architectures using homogeneous routers for application specific network on chipin... Proceedings of International Conference on Emerging Trends in Engineering and Technology (ICETET 2008),
  • Laliwala, Zakir and Chaudhary, Sanjay Event-driven Service-Oriented Architecturein Proceedings of 5th International Conference on Service Systems and Service Management (ICSSSM'08),
  • Gupta, Amit Kumar and Parikh, Chetan A CMOS comparator circuit optimized for power-delay product and input-output isolationin Proceedings of 12th IEEE VLSI design and Test Symposium (VDAT 2008),
  • Laliwala, Zakir and Chaudhary, Sanjay Service grouping and group notification in grid business processin Proceedings of the 1st Bangalore annual Compute conference (Compute 2008),
  • Parikh, Radha Teaching English at the college level through task based approaches: Using mass media for a communic... The Conference Proceedings Publication of The National Conference on Task-based Learning for Communicative Competence,
  • Das, Manik Lal Secure and efficient authentication scheme for remote systemsin Proceedings of International Conference of Information Technology (ICIT 2008),
Back to Top