default search action
BibTeX records: Asha Rao
@article{DBLP:journals/corr/abs-2403-14872, author = {Tracy Tam and Asha Rao and Joanne L. Hall}, title = {Structuring the Chaos: Enabling Small Business Cyber-Security Risks {\&} Assets Modelling with a {UML} Class Model}, journal = {CoRR}, volume = {abs/2403.14872}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.14872}, doi = {10.48550/ARXIV.2403.14872}, eprinttype = {arXiv}, eprint = {2403.14872}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-14872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-05895, author = {Joanne L. Hall and Asha Rao}, title = {Gender of Recruiter Makes a Difference: {A} study into Cybersecurity Graduate Recruitment}, journal = {CoRR}, volume = {abs/2408.05895}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.05895}, doi = {10.48550/ARXIV.2408.05895}, eprinttype = {arXiv}, eprint = {2408.05895}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-05895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DonovanRUY23, author = {Diane M. Donovan and Asha Rao and Elif {\"{U}}sk{\"{u}}pl{\"{u}} and Emine Sule Yazici}, title = {{QC-LDPC} Codes From Difference Matrices and Difference Covering Arrays}, journal = {{IEEE} Access}, volume = {11}, pages = {52141--52157}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3279327}, doi = {10.1109/ACCESS.2023.3279327}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DonovanRUY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejcon/KayasthaKPR23, author = {Sharmila Kayastha and Jayantha Katupitiya and Garth Pearce and Asha Rao}, title = {Comparative study of post-impact motion control of a flexible arm space robot}, journal = {Eur. J. Control}, volume = {69}, pages = {100738}, year = {2023}, url = {https://doi.org/10.1016/j.ejcon.2022.100738}, doi = {10.1016/J.EJCON.2022.100738}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejcon/KayasthaKPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/PoulterDKPRR23, author = {Hope Poulter and Logan Diebold and Sean Kelly and Samuel Pakalapati and Asha Rao and Edgar Rojas{-}Mu{\~{n}}oz}, title = {Cell Tour: Learning About the Cellular Membrane Using Virtual Reality}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2023, College Station, TX, USA, October 18-21, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FIE58773.2023.10343291}, doi = {10.1109/FIE58773.2023.10343291}, timestamp = {Tue, 23 Jan 2024 20:30:54 +0100}, biburl = {https://dblp.org/rec/conf/fie/PoulterDKPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhanRCP23, author = {Muhammad Nauman Khan and Asha Rao and Seyit Camtepe and Josef Pieprzyk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Classical to Post-Quantum Secure {ABE-IBE} Proxy Re-Encryption Scheme}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {85--98}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012078200003555}, doi = {10.5220/0012078200003555}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KhanRCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-13941, author = {Sevvandi Kandanaarachchi and Mahdi Abolghasemi and Hideya Ochiai and Asha Rao}, title = {Detecting inner-LAN anomalies using hierarchical forecasting}, journal = {CoRR}, volume = {abs/2304.13941}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.13941}, doi = {10.48550/ARXIV.2304.13941}, eprinttype = {arXiv}, eprint = {2304.13941}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-13941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/Kandanaarachchi22, author = {Sevvandi Kandanaarachchi and Hideya Ochiai and Asha Rao}, title = {Honeyboost: Boosting honeypot performance with data fusion and anomaly detection}, journal = {Expert Syst. Appl.}, volume = {201}, pages = {117073}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117073}, doi = {10.1016/J.ESWA.2022.117073}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/Kandanaarachchi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00563, author = {Diane M. Donovan and Asha Rao and Elif {\"{U}}sk{\"{u}}pl{\"{u}} and Emine Sule Yazici}, title = {{QC-LDPC} Codes from Difference Matrices and Difference Covering Arrays}, journal = {CoRR}, volume = {abs/2205.00563}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00563}, doi = {10.48550/ARXIV.2205.00563}, eprinttype = {arXiv}, eprint = {2205.00563}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TamRH21, author = {Tracy Tam and Asha Rao and Joanne L. Hall}, title = {The good, the bad and the missing: {A} Narrative review of cyber-security implications for australian small businesses}, journal = {Comput. Secur.}, volume = {109}, pages = {102385}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102385}, doi = {10.1016/J.COSE.2021.102385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TamRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dgov/TamRH21, author = {Tracy Tam and Asha Rao and Joanne L. Hall}, title = {The Invisible {COVID-19} Small Business Risks: Dealing with the Cyber-Security Aftermath}, journal = {Digit. Gov. Res. Pract.}, volume = {2}, number = {2}, pages = {23:1--23:8}, year = {2021}, url = {https://doi.org/10.1145/3436807}, doi = {10.1145/3436807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dgov/TamRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KhanRC21, author = {Muhammad Nauman Khan and Asha Rao and Seyit Camtepe}, title = {Lightweight Cryptographic Protocols for IoT-Constrained Devices: {A} Survey}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {4132--4156}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3026493}, doi = {10.1109/JIOT.2020.3026493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KhanRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-02526, author = {Sevvandi Kandanaarachchi and Hideya Ochiai and Asha Rao}, title = {Honeyboost: Boosting honeypot performance with data fusion and anomaly detection}, journal = {CoRR}, volume = {abs/2105.02526}, year = {2021}, url = {https://arxiv.org/abs/2105.02526}, eprinttype = {arXiv}, eprint = {2105.02526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-02526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-00733, author = {Tracy Tam and Asha Rao and Joanne L. Hall}, title = {The Good, The Bad and The Missing: {A} Narrative Review of Cyber-security Implications for Australian Small Businesses}, journal = {CoRR}, volume = {abs/2109.00733}, year = {2021}, url = {https://arxiv.org/abs/2109.00733}, eprinttype = {arXiv}, eprint = {2109.00733}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-00733.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/educon/HallR20, author = {Joanne L. Hall and Asha Rao}, title = {Non-Technical skills needed by cyber security graduates}, booktitle = {2020 {IEEE} Global Engineering Education Conference, {EDUCON} 2020, Porto, Portugal, April 27-30, 2020}, pages = {354--358}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EDUCON45650.2020.9125105}, doi = {10.1109/EDUCON45650.2020.9125105}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/educon/HallR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bullica/AlvarezGGHR17, author = {V. Alvarez and F{\'{e}}lix Gudiel and Mar{\'{\i}}a{-}Bel{\'{e}}n G{\"{u}}emes and Kathy J. Horadam and Asha Rao}, title = {Diagram versus bundle equivalence for {\(\mathbb{Z}\)}\({}_{\mbox{t}}\) {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{2}}\)\({}^{\mbox{2}}\)-cocyclic Hadamard matrices}, journal = {Bull. {ICA}}, volume = {81}, pages = {63--77}, year = {2017}, url = {https://luca-giuzzi.unibs.it/ICA/Volumes/81/Reprints/BICA16R1-Reprint.pdf}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bullica/AlvarezGGHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DonovanRY17, author = {Diane M. Donovan and Asha Rao and Emine Sule Yazici}, title = {High Rate {LDPC} Codes from Difference Covering Arrays}, journal = {CoRR}, volume = {abs/1701.05686}, year = {2017}, url = {http://arxiv.org/abs/1701.05686}, eprinttype = {arXiv}, eprint = {1701.05686}, timestamp = {Mon, 07 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/DonovanRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gc/DemirkaleDHKR16, author = {Fatih Demirkale and Diane M. Donovan and Joanne L. Hall and Abdollah Khodkar and Asha Rao}, title = {Difference Covering Arrays and Pseudo-Orthogonal Latin Squares}, journal = {Graphs Comb.}, volume = {32}, number = {4}, pages = {1353--1374}, year = {2016}, url = {https://doi.org/10.1007/s00373-015-1649-8}, doi = {10.1007/S00373-015-1649-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gc/DemirkaleDHKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexnetworks/CoxHR16, author = {Scott Cox and Kathy J. Horadam and Asha Rao}, editor = {Hocine Cherifi and Sabrina Gaito and Walter Quattrociocchi and Alessandra Sala}, title = {The spread of ideas in a weighted threshold network}, booktitle = {Complex Networks {\&} Their Applications {V} - Proceedings of the 5th International Workshop on Complex Networks and their Applications {(COMPLEX} {NETWORKS} 2016), Milan, Italy, November 30 - December 2, 2016}, series = {Studies in Computational Intelligence}, volume = {693}, pages = {437--447}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50901-3\_35}, doi = {10.1007/978-3-319-50901-3\_35}, timestamp = {Fri, 09 Apr 2021 18:42:17 +0200}, biburl = {https://dblp.org/rec/conf/complexnetworks/CoxHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexnetworks/LiebigKR16, author = {Jessica Liebig and Mohammad Adib Khairuddin and Asha Rao}, editor = {Hocine Cherifi and Sabrina Gaito and Walter Quattrociocchi and Alessandra Sala}, title = {Online election campaigning: Identifying political parties using likes and comments}, booktitle = {Complex Networks {\&} Their Applications {V} - Proceedings of the 5th International Workshop on Complex Networks and their Applications {(COMPLEX} {NETWORKS} 2016), Milan, Italy, November 30 - December 2, 2016}, series = {Studies in Computational Intelligence}, volume = {693}, pages = {619--630}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-50901-3\_49}, doi = {10.1007/978-3-319-50901-3\_49}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/complexnetworks/LiebigKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SunVBR16, author = {Li Sun and Steven Versteeg and Serdar Boztas and Asha Rao}, title = {Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study}, journal = {CoRR}, volume = {abs/1609.06676}, year = {2016}, url = {http://arxiv.org/abs/1609.06676}, eprinttype = {arXiv}, eprint = {1609.06676}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SunVBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MagalingamDR15, author = {Pritheega Magalingam and Stephen Davis and Asha Rao}, title = {Using shortest path to discover criminal community}, journal = {Digit. Investig.}, volume = {15}, pages = {1--17}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.08.002}, doi = {10.1016/J.DIIN.2015.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MagalingamDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/WilliamsBR15, author = {Mani Williams and Jane Burry and Asha Rao}, title = {Graph mining indoor tracking data for social interaction analysis}, booktitle = {2015 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2015, St. Louis, MO, USA, March 23-27, 2015}, pages = {2--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PERCOMW.2015.7133984}, doi = {10.1109/PERCOMW.2015.7133984}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/WilliamsBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/WilliamsBRW15, author = {Mani Williams and Jane Burry and Asha Rao and Nathan Williams}, editor = {Holly Samuelson and Shajay Bhooshan and Rhys Goldstein}, title = {A system for tracking and visualizing social interactions in a collaborative work environment}, booktitle = {Proceedings of the Symposium on Simulation for Architecture {\&} Urban Design, SimAUD 2015, part of the 2015 Spring Simulation Multiconference, SpringSim '15, Alexandria, VA, USA, April 12-15, 2015}, pages = {1--4}, publisher = {{SCS/ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2873022}, timestamp = {Thu, 07 Apr 2016 15:18:23 +0200}, biburl = {https://dblp.org/rec/conf/springsim/WilliamsBRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiebigR15, author = {Jessica Liebig and Asha Rao}, title = {Predicting Item Popularity: Analysing Local Clustering Behaviour of Users}, journal = {CoRR}, volume = {abs/1503.04404}, year = {2015}, url = {http://arxiv.org/abs/1503.04404}, eprinttype = {arXiv}, eprint = {1503.04404}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiebigR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MagalingamRD15, author = {Pritheega Magalingam and Asha Rao and Stephen Davis}, title = {Identifying a Criminal's Network of Trust}, journal = {CoRR}, volume = {abs/1503.04896}, year = {2015}, url = {http://arxiv.org/abs/1503.04896}, eprinttype = {arXiv}, eprint = {1503.04896}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MagalingamRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MagalingamDR15, author = {Pritheega Magalingam and Stephen Davis and Asha Rao}, title = {Using shortest path to discover criminal community}, journal = {CoRR}, volume = {abs/1503.06289}, year = {2015}, url = {http://arxiv.org/abs/1503.06289}, eprinttype = {arXiv}, eprint = {1503.06289}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MagalingamDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MagalingamDR15a, author = {Pritheega Magalingam and Stephen Davis and Asha Rao}, title = {Ranking the Importance Level of Intermediaries to a Criminal using a Reliance Measure}, journal = {CoRR}, volume = {abs/1506.06221}, year = {2015}, url = {http://arxiv.org/abs/1506.06221}, eprinttype = {arXiv}, eprint = {1506.06221}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MagalingamDR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiebigR15a, author = {Jessica Liebig and Asha Rao}, title = {A fast and simple method of extracting the backbone of one-mode projections: An aid in the detection of communities}, journal = {CoRR}, volume = {abs/1512.01883}, year = {2015}, url = {http://arxiv.org/abs/1512.01883}, eprinttype = {arXiv}, eprint = {1512.01883}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiebigR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/MagalingamRD14, author = {Pritheega Magalingam and Asha Rao and Stephen Davis}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Identifying a Criminal's Network of Trust}, booktitle = {Tenth International Conference on Signal-Image Technology and Internet-Based Systems, {SITIS} 2014, Marrakech, Morocco, November 23-27, 2014}, pages = {309--316}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SITIS.2014.64}, doi = {10.1109/SITIS.2014.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/MagalingamRD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/LiebigR14, author = {Jessica Liebig and Asha Rao}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient}, booktitle = {Tenth International Conference on Signal-Image Technology and Internet-Based Systems, {SITIS} 2014, Marrakech, Morocco, November 23-27, 2014}, pages = {323--330}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SITIS.2014.15}, doi = {10.1109/SITIS.2014.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/LiebigR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiebigR14, author = {Jessica Liebig and Asha Rao}, title = {A Clustering Coefficient to Identify Important Nodes in Bipartite Networks}, journal = {CoRR}, volume = {abs/1406.5814}, year = {2014}, url = {http://arxiv.org/abs/1406.5814}, eprinttype = {arXiv}, eprint = {1406.5814}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiebigR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajc/Rao13, author = {Asha Rao}, title = {Kathy Horadam: sixty}, journal = {Australas. {J} Comb.}, volume = {55}, pages = {3--4}, year = {2013}, url = {http://ajc.maths.uq.edu.au/pdf/55/ajc\_v55\_p003.pdf}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajc/Rao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HallRG13, author = {Joanne L. Hall and Asha Rao and Stephen M. Gagola III}, title = {A Family of Alltop Functions that are EA-Inequivalent to the Cubic Function}, journal = {{IEEE} Trans. Commun.}, volume = {61}, number = {11}, pages = {4722--4727}, year = {2013}, url = {https://doi.org/10.1109/TCOMM.2013.091813.130127}, doi = {10.1109/TCOMM.2013.091813.130127}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/HallRG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/JeffersHCRB13, author = {Jason Jeffers and Kathy J. Horadam and C. J. Carstens and Asha Rao and Serdar Boztas}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Influence Neighbourhoods in CiteSeer: {A} Case Study}, booktitle = {Ninth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5, 2013}, pages = {612--618}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SITIS.2013.100}, doi = {10.1109/SITIS.2013.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/JeffersHCRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HallRD12, author = {Joanne L. Hall and Asha Rao and Diane M. Donovan}, title = {Planar difference functions}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {1082--1086}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6283019}, doi = {10.1109/ISIT.2012.6283019}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/HallRD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-3310, author = {Joanne L. Hall and Asha Rao and Diane M. Donovan}, title = {Planar Difference Functions}, journal = {CoRR}, volume = {abs/1205.3310}, year = {2012}, url = {http://arxiv.org/abs/1205.3310}, eprinttype = {arXiv}, eprint = {1205.3310}, timestamp = {Mon, 07 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-3310.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RaoDH10, author = {Asha Rao and Diane M. Donovan and Joanne L. Hall}, title = {Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power - {MOLS} and MUBs in odd prime power dimensions}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {221--231}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0027-x}, doi = {10.1007/S12095-010-0027-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RaoDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/RaoP10, author = {Asha Rao and Nimalsiri Pinnawala}, title = {A family of two-weight irreducible cyclic codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {56}, number = {6}, pages = {2568--2570}, year = {2010}, url = {https://doi.org/10.1109/TIT.2010.2046201}, doi = {10.1109/TIT.2010.2046201}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/RaoP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/EmburyR07, author = {P. Embury and Asha Rao}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {A Path to Hadamard Matrices}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {281--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_33}, doi = {10.1007/978-3-540-77224-8\_33}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/EmburyR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/PinnawalaRG07, author = {Nimalsiri Pinnawala and Asha Rao and T. Aaron Gulliver}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over \emph{GF} {(} \emph{p} , 2)}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {311--320}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_36}, doi = {10.1007/978-3-540-77224-8\_36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/PinnawalaRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/McNicolBR06, author = {Simon McNicol and Serdar Boztas and Asha Rao}, editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli}, title = {Traitor Tracing Against Powerful Attacks Using Combinatorial Designs}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3857}, pages = {215--224}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11617983\_21}, doi = {10.1007/11617983\_21}, timestamp = {Thu, 10 Sep 2020 17:39:08 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/McNicolBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HoradamR06, author = {Kathy J. Horadam and Asha Rao}, title = {Fourier Transforms from a Weighted Trace Map}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1080--1084}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261950}, doi = {10.1109/ISIT.2006.261950}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HoradamR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RaoP05, author = {Asha Rao and Nimalsiri Pinnawala}, title = {New linear codes over Z\({}_{\mbox{ps}}\) via the trace map}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {124--126}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523306}, doi = {10.1109/ISIT.2005.1523306}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/RaoP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/McNicolBR05, author = {Simon McNicol and Serdar Boztas and Asha Rao}, title = {Traitor tracing against powerful attacks}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1878--1882}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523671}, doi = {10.1109/ISIT.2005.1523671}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/McNicolBR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PinnawalaR04, author = {Nimalsiri Pinnawala and Asha Rao}, title = {Cocyclic Simplex Codes of Type alpha Over mmb Z\({}_{\mbox{4}}\) and mmb Z\({}_{\mbox{2}}\)\({}^{\mbox{s}}\)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {9}, pages = {2165--2169}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.833354}, doi = {10.1109/TIT.2004.833354}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PinnawalaR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/ChuaR04, author = {Josel{\'{\i}}to J. Chua and Asha Rao}, editor = {Masumi Ishikawa and Shuji Hashimoto and Marcin Paprzycki and Emilia I. Barakova and Kaori Yoshida and Mario K{\"{o}}ppen and David W. Corne and Ajith Abraham}, title = {An Image-Guided Heuristic for Planning an Exhaustive Enumeration}, booktitle = {4th International Conference on Hybrid Intelligent Systems {(HIS} 2004), 5-8 December 2004, Kitakyushu, Japan}, pages = {136--141}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICHIS.2004.23}, doi = {10.1109/ICHIS.2004.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/ChuaR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/CribbR03, author = {Tom Cribb and Asha Rao}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {An Information Security Management Model}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2}, pages = {654--657}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/CribbR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.