


Остановите войну!
for scientists:
Setareh Rafatirad
Person information

- affiliation: George Mason University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Abhijitt Dhavlle
, Setareh Rafatirad
, Khaled N. Khasawneh
, Houman Homayoun
, Sai Manoj Pudukotai Dinakarrao
:
Imitating Functional Operations for Mitigating Side-Channel Leakage. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4): 868-881 (2022) - [c67]Abhijitt Dhavlle, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
CR-Spectre: Defense-Aware ROP Injected Code-Reuse Based Dynamic Spectre. DATE 2022: 508-513 - [c66]Wooyoung Chung, Xiyu Zhang, Zunaira Ahmad, Hossein Sayadi, Setareh Rafatirad:
Machine Learning to the Rescue: ML-Assisted Framework for Equity-Driven Education. EDUCON 2022: 1254-1263 - [c65]Sanket Shukla, Gaurav Kolhe, Houman Homayoun, Setareh Rafatirad, Sai Manoj P. D.:
RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks. ACM Great Lakes Symposium on VLSI 2022: 153-157 - [c64]Kevin Immanuel Gubbi, Sayed Aresh Beheshti-Shirazi, Tyler David Sheaves, Soheil Salehi, Sai Manoj P. D., Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
Survey of Machine Learning for Electronic Design Automation. ACM Great Lakes Symposium on VLSI 2022: 513-518 - 2021
- [j13]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun:
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach. Cryptogr. 5(4): 28 (2021) - [j12]Han Wang
, Hossein Sayadi
, Sai Manoj Pudukotai Dinakarrao, Avesta Sasan
, Setareh Rafatirad
, Houman Homayoun
:
Enabling Micro AI for Securing Edge Devices at Hardware Level. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(4): 803-815 (2021) - [j11]Zhiqian Chen, Lei Zhang, Gaurav Kolhe, Hadi Mardani Kamali, Setareh Rafatirad, Sai Manoj Pudukotai Dinakarrao, Houman Homayoun, Chang-Tien Lu, Liang Zhao:
Deep Graph Learning for Circuit Deobfuscation. Frontiers Big Data 4: 608286 (2021) - [j10]Hosein Mohammadi Makrani, Hossein Sayadi, Najmeh Nazari, Sai Manoj Pudukotai Dinakarrao, Avesta Sasan, Tinoosh Mohsenin, Setareh Rafatirad, Houman Homayoun:
Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment. ACM Trans. Model. Perform. Evaluation Comput. Syst. 5(4): 18:1-18:24 (2021) - [c63]Sreenitha Kasarapu, Rakibul Hassan, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Demography-aware COVID-19 Confinement with Game Theory. AICAS 2021: 1-4 - [c62]Han Wang, Soheil Salehi, Hossein Sayadi, Avesta Sasan, Tinoosh Mohsenin, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Evaluation of Machine Learning-based Detection against Side-Channel Attacks on Autonomous Vehicle. AICAS 2021: 1-4 - [c61]Gaurav Kolhe, Soheil Salehi, Tyler David Sheaves, Houman Homayoun, Setareh Rafatirad, Sai Manoj P. D., Avesta Sasan:
Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks. DAC 2021: 229-234 - [c60]Sanket Shukla, Sai Manoj P. D., Gaurav Kolhe, Setareh Rafatirad:
On-device Malware Detection using Performance-Aware and Robust Collaborative Learning. DAC 2021: 967-972 - [c59]Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
A Cognitive SAT to SAT-Hard Clause Translation-based Logic Obfuscation. DATE 2021: 1172-1177 - [c58]Abhijitt Dhavlle, Sanket Shukla, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
HMD-Hardener: Adversarially Robust and Efficient Hardware-Assisted Runtime Malware Detection. DATE 2021: 1769-1774 - [c57]Neha Nagarkar, Khaled N. Khasawneh, Setareh Rafatirad, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering. ACM Great Lakes Symposium on VLSI 2021: 195-200 - [c56]Rakibul Hassan, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Performance-aware Malware Epidemic Confinement in Large-Scale IoT Networks. ICC 2021: 1-6 - [c55]Najmeh Nazari Bavarsad, Hosein Mohammadi Makrani, Hossein Sayadi, Lawrence Landis, Setareh Rafatirad, Houman Homayoun:
HosNa: A DPC++ Benchmark Suite for Heterogeneous Architectures. ICCD 2021: 509-516 - [c54]Han Wang, Hossein Sayadi, Avesta Sasan, Sai Manoj P. D., Setareh Rafatirad, Houman Homayoun:
Machine Learning-Assisted Website Fingerprinting Attacks with Side-Channel Information: A Comprehensive Analysis and Characterization. ISQED 2021: 79-84 - [c53]Charan Bandi, Soheil Salehi, Rakibul Hassan, Sai Manoj P. D., Houman Homayoun, Setareh Rafatirad:
Ontology-Driven Framework for Trend Analysis of Vulnerabilities and Impacts in IoT Hardware. ICSC 2021: 211-214 - [c52]Abhijitt Dhavlle, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Power Swapper: Approximate Functional Block Assisted Cryptosystem Security. SoCC 2021: 101-105 - [i4]Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun:
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks. CoRR abs/2110.00846 (2021) - 2020
- [j9]Sai Manoj Pudukotai Dinakarrao
, Xiaojie Guo
, Hossein Sayadi
, Cameron Nowzari
, Avesta Sasan
, Setareh Rafatirad
, Liang Zhao
, Houman Homayoun
:
Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics. IEEE Access 8: 138508-138528 (2020) - [c51]Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Chang-Tien Lu, Sai Manoj P. D., Houman Homayoun, Liang Zhao:
Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning. DATE 2020: 358-363 - [c50]Han Wang, Hossein Sayadi, Tinoosh Mohsenin, Liang Zhao, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis. DATE 2020: 1414-1419 - [c49]Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Jessica Lin, Houman Homayoun:
StealthMiner: Specialized Time Series Machine Learning for Run-Time Stealthy Malware Detection based on Microarchitectural Features. ACM Great Lakes Symposium on VLSI 2020: 175-180 - [c48]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Tinoosh Mohsenin, Houman Homayoun:
Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks. ACM Great Lakes Symposium on VLSI 2020: 181-186 - [c47]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Hybrid-Shield: Accurate and Efficient Cross-Layer Countermeasure for Run-Time Detection and Mitigation of Cache-Based Side-Channel Attacks. ICCAD 2020: 36:1-36:9 - [c46]Han Wang, Hossein Sayadi, Gaurav Kolhe, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks. ICCD 2020: 648-655 - [c45]Han Wang, Hossein Sayadi, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
HybriDG: Hybrid Dynamic Time Warping and Gaussian Distribution Model for Detecting Emerging Zero-Day Microarchitectural Side-Channel Attacks. ICMLA 2020: 604-611 - [c44]Han Wang, Hossein Sayadi, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
SCARF: Detecting Side-Channel Attacks at Real-time using Low-level Hardware Features. IOLTS 2020: 1-6 - [c43]Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
:
SATConda: SAT to SAT-Hard Clause Translator. ISQED 2020: 155-160 - [c42]Abhijitt Dhavlle, Raj Mehta, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
:
Entropy-Shield: Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks. ISQED 2020: 161-166 - [c41]Maryam Heidari, Setareh Rafatirad:
Bidirectional Transformer based on online Text-based information to Implement Convolutional Neural Network Model For Secure Business Investment. ISTAS 2020: 322-329 - [c40]Hossein Sayadi, Han Wang, Tahereh Miari, Hosein Mohammadi Makrani, Mehrdad Aliasgari, Setareh Rafatirad, Houman Homayoun:
Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures. MWSCAS 2020: 949-952 - [c39]Maryam Heidari, Setareh Rafatirad:
Using Transfer Learning Approach to Implement Convolutional Neural Network model to Recommend Airline Tickets by Using Online Reviews. SMAP 2020: 1-6 - [c38]Maryam Heidari, Setareh Rafatirad:
Semantic Convolutional Neural Network model for Safe Business Investment by Using BERT. SNAMS 2020: 1-6 - [i3]Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
Deep Multi-attributed Graph Translation with Node-Edge Co-evolution. CoRR abs/2003.09945 (2020)
2010 – 2019
- 2019
- [j8]Maria Malik, Katayoun Neshatpour, Setareh Rafatirad, Rajiv V. Joshi, Tinoosh Mohsenin, Hassan Ghasemzadeh, Houman Homayoun:
Big vs little core for energy-efficient Hadoop computing. J. Parallel Distributed Comput. 129: 110-124 (2019) - [c37]Hosein Mohammadi Makrani, Hossein Sayadi, Tinoosh Mohsenin, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
XPPE: cross-platform performance estimation of hardware accelerators using machine learning. ASP-DAC 2019: 727-732 - [c36]Abhijitt Dhavlle, Sahil Bhat, Setareh Rafatirad, Houman Homayoun, Sai Manoj P. D.:
Sequence-Crafter: Side-Channel Entropy Minimization to Thwart Timing-based Side-Channel Attacks. CASES (work in progress) 2019: 1-2 - [c35]Rakibul Hassan, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao:
SAT to SAT-Hard Clause Translator. CASES (work in progress) 2019: 1-2 - [c34]Sanket Shukla, Gaurav Kolhe, Sai Manoj P. D., Setareh Rafatirad:
MicroArchitectural Events and Image Processing-based Hybrid Approach for Robust Malware Detection. CASES (work in progress) 2019: 1-2 - [c33]Sai Manoj Pudukotai Dinakarrao
, Sairaj Amberkar, Sahil Bhat, Abhijitt Dhavlle, Hossein Sayadi, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
Adversarial Attack on Microarchitectural Events based Malware Detectors. DAC 2019: 164 - [c32]Hossein Sayadi, Hosein Mohammadi Makrani, Sai Manoj Pudukotai Dinakarrao
, Tinoosh Mohsenin, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. DATE 2019: 728-733 - [c31]Sai Manoj Pudukotai Dinakarrao
, Hossein Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun:
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. DATE 2019: 776-781 - [c30]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao
, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. FPL 2019: 397-403 - [c29]Mahmoud Namazi, Hosein Mohammadi Makrani, Zhi Tian, Setareh Rafatirad, Mohamad Hosein Akbari, Avesta Sasan, Houman Homayoun:
Mitigating the Performance and Quality of Parallelized Compressive Sensing Reconstruction Using Image Stitching. ACM Great Lakes Symposium on VLSI 2019: 219-224 - [c28]Gaurav Kolhe, Sai Manoj P. D., Setareh Rafatirad, Hamid Mahmoodi, Avesta Sasan, Houman Homayoun:
On Custom LUT-based Obfuscation. ACM Great Lakes Symposium on VLSI 2019: 477-482 - [c27]Gaurav Kolhe, Hadi Mardani Kamali, Miklesh Naicker, Tyler David Sheaves, Hamid Mahmoodi, Sai Manoj P. D.
, Houman Homayoun, Setareh Rafatirad, Avesta Sasan:
Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality. ICCAD 2019: 1-8 - [c26]Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
:
Deep Multi-attributed Graph Translation with Node-Edge Co-Evolution. ICDM 2019: 250-259 - [c25]Sanket Shukla, Gaurav Kolhe, Sai Manoj P. D., Setareh Rafatirad:
RNN-Based Classifier to Detect Stealthy Malware using Localized Features and Complex Symbolic Sequence. ICMLA 2019: 406-409 - [c24]Han Wang, Setareh Rafatirad, Houman Homayoun:
A+ Tuning: Architecture+Application Auto-Tuning for In-Memory Data-Processing Frameworks. ICPADS 2019: 163-166 - [c23]Maria Malik, Hassan Ghasemzadeh, Tinoosh Mohsenin, Rosario Cammarota, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
ECoST: Energy-Efficient Co-Locating and Self-Tuning MapReduce Applications. ICPP 2019: 7:1-7:11 - [c22]Sanket Shukla, Gaurav Kolhe, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad:
Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier. ICTAI 2019: 590-597 - [i2]Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu:
Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning. CoRR abs/1902.05357 (2019) - [i1]Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad:
Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design. CoRR abs/1907.12952 (2019) - 2018
- [j7]Katayoun Neshatpour
, Maria Malik, Avesta Sasan, Setareh Rafatirad, Tinoosh Mohsenin, Hassan Ghasemzadeh, Houman Homayoun:
Energy-efficient acceleration of MapReduce applications using FPGAs. J. Parallel Distributed Comput. 119: 1-17 (2018) - [j6]Maria Malik
, Katayoun Neshatpour
, Setareh Rafatirad, Houman Homayoun:
Hadoop Workloads Characterization for Performance and Energy Efficiency Optimizations on Microservers. IEEE Trans. Multi Scale Comput. Syst. 4(3): 355-368 (2018) - [j5]Katayoun Neshatpour
, Maria Malik
, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Hardware Accelerated Mappers for Hadoop MapReduce Streaming. IEEE Trans. Multi Scale Comput. Syst. 4(4): 734-748 (2018) - [j4]Ted Winograd, Gaurav Shenoy, Hassan Salmani, Hamid Mahmoodi
, Setareh Rafatirad, Houman Homayoun:
Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering. ACM Trans. Design Autom. Electr. Syst. 23(6): 76:1-76:21 (2018) - [j3]Abhimanyu Chopra, Hakan Aydin, Setareh Rafatirad, Houman Homayoun:
Optimal Allocation of Computation and Communication in an IoT Network. ACM Trans. Design Autom. Electr. Syst. 23(6): 78:1-78:22 (2018) - [j2]Maria Malik
, Setareh Rafatirad, Houman Homayoun:
System and Architecture Level Characterization of Big Data Applications on Big and Little Core Server Architectures. ACM Trans. Model. Perform. Evaluation Comput. Syst. 3(3): 14:1-14:32 (2018) - [c21]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj P. D.
, Setareh Rafatirad, Houman Homayoun:
Compressive Sensing on Storage Data: An Effective Solution to Alleviate I/0 Bottleneck in Data- Intensive Workloads. ASAP 2018: 1-8 - [c20]Ferdinand Brasser, Lucas Davi, Abhijitt Dhavlle, Tommaso Frassetto, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Ahmad-Reza Sadeghi, Avesta Sasan, Hossein Sayadi, Shaza Zeitouni, Houman Homayoun:
Advances and throwbacks in hardware-assisted security: special session. CASES 2018: 15:1-15:10 - [c19]Hosein Mohammadi Makrani, Setareh Rafatirad, Amir Houmansadr, Houman Homayoun:
Main-Memory Requirements of Big Data Applications on Commodity Server Platform. CCGrid 2018: 653-660 - [c18]Hossein Sayadi, Sai Manoj P. D.
, Amir Houmansadr, Setareh Rafatirad, Houman Homayoun:
Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning. CF 2018: 212-215 - [c17]Hosein Mohammadi Makrani, Hossein Sayadi, Devang Motwani, Han Wang, Setareh Rafatirad, Houman Homayoun:
Energy-aware and Machine Learning-based Resource Provisioning of In-Memory Analytics on Cloud. SoCC 2018: 517 - [c16]Hossein Sayadi, Nisarg Patel, Sai Manoj P. D.
, Avesta Sasan, Setareh Rafatirad, Houman Homayoun:
Ensemble learning for effective run-time hardware-based malware detection: a comprehensive analysis and classification. DAC 2018: 1:1-1:6 - [c15]Katayoun Neshatpour, Hosein Mohammadi Makrani, Avesta Sasan, Hassan Ghasemzadeh, Setareh Rafatirad, Houman Homayoun:
Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce. FCCM 2018: 221 - [c14]Sai Manoj P. D., Sairaj Amberkar, Setareh Rafatirad, Houman Homayoun:
Efficient utilization of adversarial training towards robust machine learners and its analysis. ICCAD 2018: 78 - [c13]Hosein Mohammadi Makrani, Hossein Sayadi, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun:
A comprehensive memory analysis of data intensive workloads on server class architecture. MEMSYS 2018: 19-30 - [c12]Katayoun Neshatpour, Hosein Mohammadi Makrani, Avesta Sasan, Hassan Ghasemzadeh, Setareh Rafatirad, Houman Homayoun:
Architectural considerations for FPGA acceleration of machine learning applications in MapReduce. SAMOS 2018: 89-96 - [c11]Hossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao
, Setareh Rafatirad, Houman Homayoun:
Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. TrustCom/BigDataSE 2018: 1685-1688 - 2017
- [c10]Hosein Mohammadi Makrani, Shahab Tabatabaei, Setareh Rafatirad, Houman Homayoun:
Understanding the role of memory subsystem on performance and energy-efficiency of Hadoop applications. IGSC 2017: 1-6 - 2016
- [c9]Katayoun Neshatpour, Arezou Koohi, Farnoud Farahmand, Rajiv V. Joshi, Setareh Rafatirad, Avesta Sasan, Houman Homayoun:
Big biomedical image processing hardware acceleration: A case study for K-means and image filtering. ISCAS 2016: 1134-1137 - [c8]Maria Malik, Avesta Sasan, Rajiv V. Joshi, Setareh Rafatirah, Houman Homayoun:
Characterizing Hadoop applications on microservers for performance and energy efficiency optimizations. ISPASS 2016: 153-154 - 2015
- [c7]Maria Malik, Setareh Rafatirah, Avesta Sasan, Houman Homayoun:
System and architecture level characterization of big data applications on big and little core server architectures. IEEE BigData 2015: 85-94 - 2013
- [c6]Setareh Rafatirad, Ramesh C. Jain, Kathryn B. Laskey:
Context-Based Event Ontology Extension in Multimedia Applications. ICSC 2013: 278-285 - [c5]Setareh Rafatirad, Kathryn B. Laskey, Paulo Cesar G. da Costa:
Context Correlation Using Probabilistic Semantics. STIDS 2013: 2-9 - [c4]Setareh Rafatirad, Kathryn B. Laskey:
Transforming Personal Artifacts into Probabilistic Narratives. UAI Application Workshops 2013: 29-38 - 2011
- [j1]WeiQi Yan, Declan F. Kieran, Setareh Rafatirad, Ramesh C. Jain:
A comprehensive study of visual event computing. Multim. Tools Appl. 55(3): 443-481 (2011) - [c3]Setareh Rafatirad, Ramesh C. Jain:
Contextual Augmentation of Ontology for Recognizing Sub-events. ICSC 2011: 546-553
2000 – 2009
- 2009
- [c2]Setareh Rafatirad, Amarnath Gupta, Ramesh C. Jain:
Event composition operators: ECO. EIMM@MM 2009: 65-72 - [c1]Amarnath Gupta, Setareh Rafatirad, Mingyan Gao, Ramesh C. Jain:
MEDIALIFE: from images to a life chronicle. SIGMOD Conference 2009: 1119-1122
Coauthor Index
aka: Sai Manoj P. D.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-07 01:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint