Research works discussed and/or presented in symposia thereby reported in the proceedings of a reputed conference, meeting, convention, workshop, etc. for generating new knowledge.

Follow


Submissions from 2017

Numerical analysis of the chimera states in the multilayered network model, Mikhail V. Goremyko, Vladimir A. Maksimenko, Vladimir V. Makarov, Dibakar Ghosh, Bidesh K. Bera, Syamal K. Dana, and Alexander E. Hramov

On chromatic number of colored mixed graphs, Sandip Das, Soumen Nandi, and Sagnik Sen

On diameter based community structure identification in networks, Arnab Kumar Ghoshal and Nabanita Das

One poison is antidote against another poison, Biswajit Bhowmik, Santosh Biswas, Jatindra Kumar Deka, and Bhargab B. Bhattacharya

On-line detection and diagnosis of stuck-at faults in channels of NoC-based systems, Biswajit Bhowmik, Jatindra Kumar Deka, Santosh Biswas, and Bhargab B. Bhattacharya

On reliability hardening in cyber-physical digital-microfluidic biochips, Guan Ruei Lu, Guan Ming Huang, Ansuman Banerjee, Bhargab B. Bhattacharya, Tsung Yi Ho, and Hung Ming Chen

Optimal covering and hitting of line segments by two axis-parallel squares, Sanjib Sadhu, Sasanka Roy, Subhas C. Nandy, and Suchismita Roy

Optimizing movement in convex and non-convex path-networks to establish connectivity, Sandip Das, Ayan Nandy, and Swami Sarvottamananda

Optimum algorithm for mutual visibility among asynchronous robots with lights, Subhash Bhagat and Krishnendu Mukhopadhyaya

Optimum gathering of asynchronous robots, Subhash Bhagat and Krishnendu Mukhopadhyaya

Paradigm shift of institutional ownership to open access repositories in an indian context (meeting abstract), Jiban K. Pal, Prabir Kumar Das, and Soumi Das

Parallelized common factor attack on RSA, Vineet Kumar, Aneek Roy, Sourya Sengupta, and Sourav Sen Gupta

Partitioned-based clustering approaches for single document extractive text summarization, Prannoy Subba, Susmita Ghosh, and Rahul Roy

Performance Attacks on Branch Predictors in embedded processors with SMT support, Moumita Das, Ansuman Banerjee, Nitesh K. Singh, and Bhaskar Sardar

Periodic points of solenoidal automorphisms, Sharan Gopal and C. R.E. Raja

Pincode detection using deep CNN for postal automation, Nabin Sharma, Abira Sengupta, Rabi Sharma, Umapada Pal, and Michael Blumenstein

Post lasso stability selection for high dimensional linear models, Niharika Gauraha, Tatyana Pavlenko, and Swapan K. Parui

Post-layout perturbation towards stitch friendly layout for multiple e-beam lithography, Sudipta Paul, Pritha Banerjee, and Susmita Sur-Kolay

Power spectral clustering on hyperspectral data, Aditya Challa, Sravan Danda, B. S.Daya Sagar, and Laurent Najman

Power tree filter: A theoretical framework linking shortest path filters and minimum spanning tree filters, Sravan Danda, Aditya Challa, B. S. Daya Sagar, and Laurent Najman

Practical fault attacks on minalpher: How to recover key with minimum faults?, Avik Chakraborti, Nilanjan Datta, and Mridul Nandi

Pre-selection in cluster Lasso methods for correlated variable selection in high-dimensional linear models, Niharika Gauraha and Swapan Parui

Prevention of information leakage by modulating the trust uncertainty in Ego-Network, Moumita Samanta, Pinakpani Pal, and Abhik Mukherjee

Principal Subspace Updation for Integrative Clustering of Multimodal Omics Data, Aparajita Khan and Pradipta Maji

Progressive granular neural networks with class based granulation, D. Arun Kumar, K. Padma Kumari, and Saroj K. Meher