Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rajdeep Singh
@article{DBLP:journals/ijpr/SinghB20, author = {Rajdeep Singh and Neeraj Bhanot}, title = {An integrated {DEMATEL-MMDE-ISM} based approach for analysing the barriers of IoT implementation in the manufacturing industry}, journal = {Int. J. Prod. Res.}, volume = {58}, number = {8}, pages = {2454--2476}, year = {2020}, url = {https://doi.org/10.1080/00207543.2019.1675915}, doi = {10.1080/00207543.2019.1675915}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpr/SinghB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07646, author = {Alexander Kott and Ryan Thomas and Martin Drasar and Markus Kont and Alexander Poylisher and Benjamin A. Blakely and Paul Th{\'{e}}ron and Nathaniel Evans and Nandi Leslie and Rajdeep Singh and Maria Rigaki and Shanchieh Jay Yang and Beno{\^{\i}}t Leblanc and Paul Losiewicz and Sylvain Hourlier and Misty K. Blowers and Hugh Harney and Gregory Wehner and Alessandro Guarino and Jana Kom{\'{a}}rkov{\'{a}} and James Rowell}, title = {Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization {(NATO)} Research Group {IST-152-RTG}}, journal = {CoRR}, volume = {abs/1804.07646}, year = {2018}, url = {http://arxiv.org/abs/1804.07646}, eprinttype = {arXiv}, eprint = {1804.07646}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07646.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/KaurS14b, author = {Prabhleen Kaur and Rajdeep Singh}, title = {{TDEC:} Threshold-sensitive deterministic energy efficient clustering protocol for Wireless Sensor Networks}, booktitle = {2014 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014}, pages = {1670--1676}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICACCI.2014.6968431}, doi = {10.1109/ICACCI.2014.6968431}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icacci/KaurS14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/KeharS14, author = {Vinay Kehar and Rajdeep Singh}, title = {Evaluating the performance of reactive {I-LEACH}}, booktitle = {2014 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014}, pages = {2105--2109}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICACCI.2014.6968338}, doi = {10.1109/ICACCI.2014.6968338}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icacci/KeharS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/KaurS14c, author = {Prabhleen Kaur and Rajdeep Singh}, title = {{DDEC:} Distance based deterministic energy efficient clustering protocol for wireless sensor networks}, booktitle = {2014 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2014, Delhi, India, September 24-27, 2014}, pages = {2168--2173}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICACCI.2014.6968375}, doi = {10.1109/ICACCI.2014.6968375}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icacci/KaurS14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/allerton/SinghA12, author = {Rajdeep Singh and Kartik B. Ariyur}, title = {Quantifying the security of physical facilities: {A} game theoretic framework}, booktitle = {50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Allerton Park {\&} Retreat Center, Monticello, IL, USA, October 1-5, 2012}, pages = {1368--1373}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/Allerton.2012.6483377}, doi = {10.1109/ALLERTON.2012.6483377}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/allerton/SinghA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/KottSMM11, author = {Alexander Kott and Rajdeep Singh and William M. McEneaney and Wes Milks}, title = {Hypothesis-driven information fusion in adversarial, deceptive environments}, journal = {Inf. Fusion}, volume = {12}, number = {2}, pages = {131--144}, year = {2011}, url = {https://doi.org/10.1016/j.inffus.2010.09.001}, doi = {10.1016/J.INFFUS.2010.09.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/KottSMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsima/LawsonSHAM11, author = {Jamie Lawson and Rajdeep Singh and Michael Hultner and Kartik B. Ariyur and Lockheed Martin}, editor = {Gabriel Jakobson and Mica R. Endsley and Mitch Kokar}, title = {Deception Robust Control for automated cyber defense resource allocation}, booktitle = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2011, Miami, FL, USA, February 21-24, 2011}, pages = {56--59}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COGSIMA.2011.5753754}, doi = {10.1109/COGSIMA.2011.5753754}, timestamp = {Wed, 30 Sep 2020 08:40:10 +0200}, biburl = {https://dblp.org/rec/conf/cogsima/LawsonSHAM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/KrishnanSCS07, author = {K. Murali Krishnan and Rajdeep Singh and L. Sunil Chandran and Priti Shankar}, title = {A Combinatorial Family of Near Regular {LDPC} Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {761--765}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557316}, doi = {10.1109/ISIT.2007.4557316}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/KrishnanSCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0609146, author = {K. Murali Krishnan and Rajdeep Singh and L. Sunil Chandran and Priti Shankar}, title = {A Combinatorial Family of Near Regular {LDPC} Codes}, journal = {CoRR}, volume = {abs/cs/0609146}, year = {2006}, url = {http://arxiv.org/abs/cs/0609146}, eprinttype = {arXiv}, eprint = {cs/0609146}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0609146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/McEneaneyS04, author = {William M. McEneaney and Rajdeep Singh}, title = {Exploitation of an opponent's imperfect information in a stochastic game with autonomous vehicle application}, booktitle = {43rd {IEEE} Conference on Decision and Control, {CDC} 2004, Nassau, Bahamas, December 14-17, 2004}, pages = {4839--4843}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CDC.2004.1429560}, doi = {10.1109/CDC.2004.1429560}, timestamp = {Fri, 04 Mar 2022 13:24:31 +0100}, biburl = {https://dblp.org/rec/conf/cdc/McEneaneyS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.