Scientific results reported by the researchers in reputed venues

Follow


Submissions from 2018

Bi-cooperative network games: A link-based allocation rule, Surajit Borkotokey, Loyimee Gogoi, and Diganta Mukherjee

Characterization of non-commutative free Gaussian variables, Arup Bose, Apratim Dey, and Wiktor Ejsmont

Privacy protection measures for randomized response surveys on stigmatizing continuous variables, Mausumi Bose and Kajal Dihidar

Near-factorial experiments in nested row–column designs regulating efficiencies, Mausumi Bose and Rahul Mukerjee

Far-wake flows downstream of cylinders: A novel generalized similarity method, Sujit K. Bose and Subhasish Dey

A note on bi-contractive projections on spaces of vector valued continuous functions, Fernanda Botelho and T. S.S.R.K. Rao

Spillovers between Bitcoin and other assets during bear and bull markets, Elie Bouri, Mahamitra Das, Rangan Gupta, and David Roubaud

Corrigendum to: TECHNOLOGY TRANSFER IN A STACKELBERG STRUCTURE: LICENSING CONTRACTS AND WELFARE (The Manchester School, (2005), 73, 1, (1-28), 10.1111/j.1467-9957.2005.00421.x), Jiyun Cao and Tarun Kabiraj

Higher Education and Prosperity: From Catholic Missionaries to Luminosity in India, Amparo Castelló-Climent, Latika Chaudhary, and Abhiroop Mukhopadhyay

New robust statistical procedures for the polytomous logistic regression models, Elena Castilla, Abhik Ghosh, Nirian Martin, and Leandro Pardo

Is the first-past-the-post necessarily the first?, Arijit Chakrabarty

Asymptotic behaviour of high Gaussian minima, Arijit Chakrabarty and Gennady Samorodnitsky

A Framework for the Simultaneous Measurement of Spatial Variation and Temporal Movement in Prices in a Heterogeneous Country: The Dynamic Household Regional Product Dummy Model, Manisha Chakrabarty, Amita Majumder, and Ranjan Ray

TriviA and uTriviA: two fast and secure authenticated encryption schemes, Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, and Mridul Nandi

On the optimality of non-linear computations for symmetric key primitives, Avik Chakraborti, Nilanjan Datta, and Mridul Nandi

Beetle family of lightweight and secure authenticated encryption ciphers, Avik Chakraborti, Nilanjan Datta, Mridul Nandi, and Kan Yasuda

LOOP Descriptor: Local Optimal-Oriented Pattern, Tapabrata Chakraborti, Brendan McCane, Steven Mills, and Umapada Pal

Neighborhood rough filter and intuitionistic entropy in unsupervised tracking, Debarati Bhunia Chakraborty and Sankar K. Pal

Preface, Debrup Chakraborty and Tetsu Iwata

Disk encryption: do we need to preserve length?, Debrup Chakraborty, Cuauhtemoc Mancillas López, and Palash Sarkar

Frame selection for OCR from video stream of book flipping, Dibyayan Chakraborty, Partha Pratim Roy, Rajkumar Saini, Jose M. Alvarez, and Umapada Pal

Gelfand–Kirillov dimension of some simple unitarizable modules, Partha Sarathi Chakraborty and Bipul Saurabh

Rational homotopy of maps between certain complex Grassmann manifolds, Prateep Chakraborty and Shreedevi K. Masuti

Simultaneous variable weighting and determining the number of clusters—A weighted Gaussian means algorithm, Saptarshi Chakraborty and Swagatam Das

Helly-Type Theorems in Property Testing, Sourav Chakraborty, Rameshwar Pratap, Sasanka Roy, and Shubhangi Saraf