default search action
Soumik Ghosh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Adam Bouland, Bill Fefferman, Soumik Ghosh, Tony Metger, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Public-Key Pseudoentanglement and the Hardness of Learning Ground State Entanglement Structure. CCC 2024: 21:1-21:23 - [c14]Scott Aaronson, Adam Bouland, Bill Fefferman, Soumik Ghosh, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Quantum Pseudoentanglement. ITCS 2024: 2:1-2:21 - [i8]Akshay Bansal, Ian George, Soumik Ghosh, Jamie Sikora, Alice Zheng:
Online learning of a panoply of quantum objects. CoRR abs/2406.04245 (2024) - [i7]Bill Fefferman, Soumik Ghosh, Wei Zhan:
Anti-Concentration for the Unitary Haar Measure and Applications to Random Quantum Circuits. CoRR abs/2407.19561 (2024) - [i6]Bill Fefferman, Soumik Ghosh, Wei Zhan:
Anti-Concentration for the Unitary Haar Measure and Applications to Random Quantum Circuits. Electron. Colloquium Comput. Complex. TR24 (2024) - 2023
- [j7]Soumik Ghosh, John Watrous:
Complexity Limitations on One-turn Quantum Refereed Games. Theory Comput. Syst. 67(2): 383-412 (2023) - [j6]Sohom Roy, Soumik Ghosh, Chandan Giri, Dipak K. Kole, Dhrubasish Sarkar:
Mining the Human Networks and Identification of Group Activities Using the Crime Scraping Engine. SN Comput. Sci. 4(5): 533 (2023) - [c13]Aaditya Bhatia, Austin Davis, Soumik Ghosh, Gita Sukthankar:
Generally Genius: A Generals.io Agent Development and Data Collection Framework. AIIDE 2023: 400-406 - [i5]Bill Fefferman, Soumik Ghosh, Michael J. Gullans, Kohdai Kuroiwa, Kunal Sharma:
Effect of non-unital noise on random circuit sampling. CoRR abs/2306.16659 (2023) - [i4]Adam Bouland, Bill Fefferman, Soumik Ghosh, Tony Metger, Umesh V. Vazirani, Chenyi Zhang, Zixin Zhou:
Public-key pseudoentanglement and the hardness of learning ground state entanglement structure. CoRR abs/2311.12017 (2023) - 2022
- [j5]Pratyusa Mukherjee, Hitendra Garg, Chittaranjan Pradhan, Soumik Ghosh, Subrata Chowdhury, Gautam Srivastava:
Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach. Sensors 22(19): 7332 (2022) - [i3]Adam Bouland, Bill Fefferman, Soumik Ghosh, Umesh V. Vazirani, Zixin Zhou:
Quantum Pseudoentanglement. CoRR abs/2211.00747 (2022) - [i2]Soumik Ghosh, Abhinav Deshpande, Dominik Hangleiter, Alexey V. Gorshkov, Bill Fefferman:
Sharp complexity phase transitions generated by entanglement. CoRR abs/2212.10582 (2022) - 2020
- [c12]James Tuttle, Yinlin Chen, Tingting Jiang, Lee Hunter, Andrea Waldren, Soumik Ghosh, William A. Ingram:
Multi-tenancy Cloud Access and Preservation: Virginia Tech Digital Libraries Platform. JCDL 2020: 557-558 - [i1]Soumik Ghosh, John Watrous:
Complexity limitations on one-turn quantum refereed games. CoRR abs/2002.01509 (2020)
2010 – 2019
- 2019
- [j4]Soumik Ghosh, Arnab Adhikary, Goutam Paul:
Revisiting integer factorization using closed timelike curves. Quantum Inf. Process. 18(1): 30 (2019) - 2018
- [j3]Soumik Ghosh, Arnab Adhikary, Goutam Paul:
Quantum signaling to the past using P-CTCS. Quantum Inf. Comput. 18(11&12): 965-974 (2018) - 2015
- [c11]Soumik Ghosh, Gaurang Naik, Animesh Kumar, Abhay Karandikar:
OpenPAWS: An open source PAWS and UHF TV White Space database implementation for India. NCC 2015: 1-6 - 2012
- [j2]Adam Wade Lewis, Nian-Feng Tzeng, Soumik Ghosh:
Runtime energy consumption estimation for server workloads based on chaotic time-series approximation. ACM Trans. Archit. Code Optim. 9(3): 15:1-15:26 (2012) - 2011
- [j1]Sherine Abdelhak, Rabi S. Chaudhuri, Chandra Sekhar Gurram, Soumik Ghosh, Magdy A. Bayoumi:
Energy-Aware Distributed QR Decomposition on Wireless Sensor Nodes. Comput. J. 54(3): 373-391 (2011) - [c10]Sherine Abdelhak, Chandra Sekhar Gurram, Jared Tessier, Soumik Ghosh, Magdy A. Bayoumi:
ETSSI: Energy-based Task Scheduling Simulator for wireless sensor networks. ISCAS 2011: 2821-2824 - 2010
- [c9]Soumik Ghosh, Jared Tessier, Magdy A. Bayoumi:
ASPEN: An Asynchronous Signal Processor for Energy Efficient Sensor Nodes. ICECS 2010: 268-272
2000 – 2009
- 2009
- [c8]Milad Ghantous, Soumik Ghosh, Magdy A. Bayoumi:
A multi-modal automatic image registration technique based on complex wavelets. ICIP 2009: 173-176 - [c7]Mayssaa Al Najjar, Soumik Ghosh, Magdy A. Bayoumi:
Robust object tracking using correspondence voting for smart surveillance visual sensing nodes. ICIP 2009: 1133-1136 - [c6]Mayssaa Al Najjar, Soumik Ghosh, Magdy A. Bayoumi:
A Hybrid Adaptive Scheme based on Selective Gaussian Modeling for Real-time Object Detection. ISCAS 2009: 936-939 - 2008
- [c5]Milad Ghantous, Soumik Ghosh, Magdy A. Bayoumi:
A gradient-based hybrid image fusion scheme using object extraction. ICIP 2008: 1300-1303 - [c4]Abhijit Sil, Eswar Prasad Kolli, Soumik Ghosh, Magdy A. Bayoumi:
High speed single-ended pseudo differential current sense amplifier for SRAM cell. ISCAS 2008: 3330-3333 - [c3]Adam Wade Lewis, Soumik Ghosh, Nian-Feng Tzeng:
Run-time Energy Consumption Estimation Based on Workload in Server Systems. HotPower 2008 - 2007
- [c2]Abu Baker, Soumik Ghosh, Ashok Kumar, Magdy A. Bayoumi, Rafic A. Ayoubi:
Design and Realization of Analog Phi-Function for LDPC Decoder. ISCAS 2007: 1661-1664 - 2005
- [c1]Soumik Ghosh, Soujanya Venigalla, Magdy A. Bayoumi:
Design and Implementaion of a 2D-DCT Architecture Using Coefficient Distributed Arithmetic. ISVLSI 2005: 162-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint