Research works discussed and/or presented in symposia thereby reported in the proceedings of a reputed conference, meeting, convention, workshop, etc. for generating new knowledge.

Follow


Submissions from 2018

Word embedding based semantic cross-lingual document alignment in comparable corpora, Debasis Ganguly, Haithem Afli, and Dwaipayan Roy

Word Level Font-to-Font Image Translation using Convolutional Recurrent Generative Adversarial Networks, Ankan Kumarbhunia, Ayan Kumarbhunia, Prithaj Banerjee, Aishik Konwer, Abir Bhowmick, Partha Pratim Roy, and Umapada Pal

Writer identification in indic scripts: A stroke distribution Based Approach, Santhoshini Reddy, Chris Andrew, Umapada Pal, Alireza Alaei, and Viswanath Pulabaigari

ZCZ – Achieving n-bit SPRP security with a minimal number of tweakable-block-cipher calls, Ritam Bhaumik, Eik List, and Mridul Nandi

Submissions from 2017

A comparative study of two recent word spotting techniques in the run-length compressed domain, Mohammed Javed, P. Nagabhushank, and Bidyut B. Chaudhuri

Adaptive subspace sampling for class imbalance processing, Yu Ting Liu, Nikhil R. Pal, Shang Lin Wu, Tsung Yu Hsieh, and Chin Teng Lin

A decision-level fusion strategy for multimodal ocular biometric in visible spectrum based on posterior probability, Abhijit Das, Umapada Pal, Miguel A. Ferrer, and Michael Blumenstein

A distributed algorithm for D2D communication in 5G using stochastic model, Durgesh Singh and Sasthi C. Ghosh

Advances in rough set based hybrid approaches for medical image analysis, Pradipta Maji

A framework for branch predictor selection with aggregation on multiple parameters, Moumita Das, Ansuman Banerjee, and Bhaskar Sardar

A general formulation and solution of fuzzy multi-objective linear programming problems, P. K. De, A. K. Chakraborty, and Moumita Deb

A generalised formulation for collaborative representation of image patches (GP-CRC), Tapabrata Chakraborti, Brendan McCane, Steven Mills, and Umapada Pal

A Hybrid Model for End to End Online Handwriting Recognition, Partha Sarathi Mukherjee, Bappaditya Chakraborty, Ujjwal Bhattacharya, and Swapan Kumar Parui

Algorithm for finding influential user: Based on user's information diffusion region, Amrita Namtirtha, Shaswat Gupta, Animesh Dutta, Biswanath Dutta, and Frans Coenen

A method to reduce resources for quantum error correction, Ritajit Majumdar, Saikat Basu, and Susmita Sur-Kolay

A modified rough-fuzzy clustering algorithm with spatial information for HEp-2 cell image segmentation, Shaswati Roy and Pradipta Maji

An analytical framework for throughput analysis of real time applications in ALL-IP networks, Shankar K. Ghosh and Sasthi C. Ghosh

An automatic student verification system utilising off-line Thai name components, Hemmaphan Suwanwiwat, Abhijit Das, Miguel A. Ferrer, Umapada Pal, and Michael Blumenstein

An efficient approach for load balancing in vehicular ad-hoc networks, Shubham Agarwal, Avirup Das, and Nabanita Das

An efficient disjunctive query enabled ranked searchable encryption scheme, Shahzaib Tahir, Sushmita Ruj, and Muttukrishnan Rajarajan

An efficient lightweight stream cipher algorithm for wireless networks, Soumyadev Maity, Koushik Sinha, and Bhabani P. Sinha

An empirical study on performance of branch predictors with varying storage budgets, Moumita Das, Ansuman Banerjee, and Bhaskar Sardar

An ensemble of condition based classifiers for indoor localization, Dip Ghosh, Priya Roy, Chandreyee Chowdhury, and Sanghamitra Bandyopadhyay

A new approach for root-causing attacks on digital microfluidic devices, Pushpita Roy and Ansuman Banerjee

A new combined approach for inference in high-dimensional regression models with correlated variables, Niharika Gauraha and Swapan Parui