default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2024
- Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments. Clust. Comput. 27(8): 11427-11454 (2024) - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
A Fault-tolerant model for tuple space coordination in distributed environments. Concurr. Comput. Pract. Exp. 36(1) (2024) - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault-tolerance approaches for distributed and cloud computing environments: A systematic review, taxonomy and future directions. Concurr. Comput. Pract. Exp. 36(13) (2024) - Medha Bhindwar, Vaibhav Varshney, Suresh Kumarasamy, Manish Dev Shrimali, Awadhesh Prasad:
Role of UPOs in Characterizing the Hidden Attractors: A Comparison with Self-Excited Attractors. Int. J. Bifurc. Chaos 34(8): 2430016:1-2430016:17 (2024) - Ankur Sisodia, Swati Vishnoi, Sachin Upadhyay, Jayati Krishna Goswami, Medha Khenwar, Ajay Kumar Yadav:
Enhancing energy efficiency: a protocol assessment in multi-hop mesh-based IOUT networks. Multim. Tools Appl. 83(37): 84999-85026 (2024) - Hadi Hosseini, Medha Kumar, Sanjukta Roy:
The Degree of Fairness in Efficient House Allocation. ECAI 2024: 3636-3643 - Avishek Lahiri, Pratyay Sarkar, Medha Sen, Debarshi Kumar Sanyal, Imon Mukherjee:
Few-TK: A Dataset for Few-shot Scientific Typed Keyphrase Recognition. NAACL-HLT (Findings) 2024: 4011-4025 - Hadi Hosseini, Medha Kumar, Sanjukta Roy:
The Degree of Fairness in Efficient House Allocation. CoRR abs/2407.04664 (2024) - Vibhor Agarwal, Yiqiao Jin, Mohit Chandra, Munmun De Choudhury, Srijan Kumar, Nishanth Sastry:
MedHalu: Hallucinations in Responses to Healthcare Queries by Large Language Models. CoRR abs/2409.19492 (2024) - 2023
- Avinash Anand, Arnav Goel, Medha Hira, Snehal Buldeo, Jatin Kumar, Astha Verma, Rushali Gupta, Rajiv Ratn Shah:
SciPhyRAG - Retrieval Augmentation to Improve LLMs on Physics Q &A. BDA 2023: 50-63 - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault Tolerance of Deadline Constrained Tasks based on Load Balancing in Cloud Computing. ICCCNT 2023: 1-6 - Surbhi Bharti, Prerna Jha, Medha Arora, Ashwni Kumar:
Speech Enhancement And Noise Reduction In Forensic Applications. O-COCOSDA 2023: 1-5 - 2022
- Asmaa O. Mohammed, Adem Kiliçman, Mohamed M. Awad, Arjun K. Rathie, Medhat Ahmed Rakha:
Another Method for Proving Certain Reduction Formulas for the Humbert Function ψ2 Due to Brychkov et al. with an Application. Symmetry 14(5): 868 (2022) - Medha, Jitender Kumar Chhabra, Dinesh Kumar:
Improved Feature Fusion by Branched 1-D CNN for Speech Emotion Recognition. ICONIP (7) 2022: 175-186 - 2021
- Budhi Veera Bharath Chandra, Chigurupati Naveen, Mahapatra Medha Sampath Kumar, Madhavarapu Srinivasa Sai Bhargav, S. S. Poorna, K. Anuraj:
A Comparative Study of Drowsiness Detection From Eeg Signals Using Pretrained CNN Models. ICCCNT 2021: 1-3 - 2020
- Darshan Vishwasrao Medhane, Arun Kumar Sangaiah, M. Shamim Hossain, Ghulam Muhammad, Jin Wang:
Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach. IEEE Internet Things J. 7(7): 6143-6149 (2020) - Medha Kumar, Varun Dutt:
Understanding Decisions in Collective Risk Social Dilemma Games Using Reinforcement Learning. IEEE Trans. Cogn. Dev. Syst. 12(4): 824-840 (2020) - Arun Kumar Sangaiah, Darshan Vishwasrao Medhane, Gui-Bin Bian, Ahmed Ghoneim, Mubarak Alrashoud, M. Shamim Hossain:
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System. IEEE Trans. Ind. Informatics 16(5): 3322-3329 (2020) - Shubham Sahai, Medha Atre, Shubham Sharma, Rahul Gupta, Sandeep K. Shukla:
Verity: Blockchain Based Framework to Detect Insider Attacks in DBMS. Blockchain 2020: 26-35 - 2019
- Arun Kumar Sangaiah, Darshan Vishwasrao Medhane, Tao Han, M. Shamim Hossain, Ghulam Muhammad:
Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics. IEEE Trans. Ind. Informatics 15(7): 4189-4196 (2019) - Medha Kumar, Kapil Agrawal, Varun Dutt:
Modeling Decisions in Collective Risk Social Dilemma Games for Climate Change Using Reinforcement Learning. CogSIMA 2019: 26-33 - Shubham S. Srivastava, Medha Atre, Shubham Sharma, Rahul Gupta, Sandeep K. Shukla:
Verity: Blockchains to Detect Insider Attacks in DBMS. CoRR abs/1901.00228 (2019) - Akash Jain, Manish Kumar, Rithvik Patibandla, Balamurugan R, Naveen Chandra R, Abhinav Arora, Akash K. Singh, Varun Pawar, Aditya Rai, Medha Agarwal, Priank Prasad, Vandit Sanadhya, Inshu Namdev, Nilay Shah, Saksham Mittal, Ayush Gupta, Naman Agarwal, Mangal Kothari:
Design and Development of Underwater Vehicle: ANAHITA. CoRR abs/1903.00494 (2019) - 2018
- Darshan Vishwasrao Medhane, Arun Kumar Sangaiah:
PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications. IEEE Trans. Emerg. Top. Comput. Intell. 2(3): 194-203 (2018) - 2017
- Darshan Vishwasrao Medhane, Arun Kumar Sangaiah:
Search space-based multi-objective optimization evolutionary algorithm. Comput. Electr. Eng. 58: 126-143 (2017) - Darshan Vishwasrao Medhane, Arun Kumar Sangaiah:
ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications. IEEE Trans. Sustain. Comput. 2(2): 49-61 (2017) - 2016
- Darshan Vishwasrao Medhane, Arun Kumar Sangaiah:
Source node position confidentiality aspects in wireless networks: an extended review. Int. J. High Perform. Syst. Archit. 6(2): 61-81 (2016) - 2015
- Ramy Medhat, Borzoo Bonakdarpour, Deepak Kumar, Sebastian Fischmeister:
Runtime Monitoring of Cyber-Physical Systems Under Timing and Memory Constraints. ACM Trans. Embed. Comput. Syst. 14(4): 79:1-79:29 (2015) - 2014
- Ramy Medhat, Deepak Kumar, Borzoo Bonakdarpour, Sebastian Fischmeister:
Sacrificing a little space can significantly improve monitoring of time-sensitive cyber-physical systems. ICCPS 2014: 115-126 - Sameer Sahasrabudhe, Nitin Ayer, Pooja Bhawar, Ruchi Chaurasia, Arpana Swarnkar, Himalini Sharma, Medha Srivastava, Rakshita Vijay, Ravikumar Jogu, Sumanth Kumar Mora:
Netra3D: Android Application with Affordances of Tablet Computers. T4E 2014: 182-188
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-09 08:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint