Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/acss:"
@proceedings{DBLP:conf/acss/2020-1, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-15-5747-7}, doi = {10.1007/978-981-15-5747-7}, isbn = {978-981-15-5746-0}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/AdhikaryGC20, author = {Sriyanjana Adhikary and Biswajit Ghosh and Sankhayan Choudhury}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {QoS Enhancement in {WBAN} with Twin Coordinators}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {85--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_6}, doi = {10.1007/978-981-15-5747-7\_6}, timestamp = {Fri, 06 Nov 2020 10:41:29 +0100}, biburl = {https://dblp.org/rec/conf/acss/AdhikaryGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BamrahG20, author = {Inderjeet Singh Bamrah and Akshay Girdhar}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Citizen-Centred Sentiment Analysis Towards India's Critically Endangered Avian and Mammalian Species}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {79--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_7}, doi = {10.1007/978-981-15-2930-6\_7}, timestamp = {Sat, 07 Nov 2020 01:35:01 +0100}, biburl = {https://dblp.org/rec/conf/acss/BamrahG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BanikBN20, author = {Debapriya Banik and Debotosh Bhattacharjee and Mita Nasipuri}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Multi-Scale Patch-Based Deep Learning System for Polyp Segmentation}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {109--119}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_9}, doi = {10.1007/978-981-15-2930-6\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BanikBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacharyaR0C20, author = {Munmun Bhattacharya and Sandip Roy and Soumya Banerjee and Samiran Chattopadhyay}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {17--30}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_2}, doi = {10.1007/978-981-15-5747-7\_2}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BhattacharyaR0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeCP20, author = {Joydeep Chatterjee and Semanti Chakraborty and Kanik Palodhi}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Novel Automated Blood Cell Counting Method Based on Deconvolution and Convolution and Its Application to Neural Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {67--78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_6}, doi = {10.1007/978-981-15-2930-6\_6}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasguptaDKP020, author = {Srirupa Dasgupta and Arpita Das and Abhinandan Khan and Rajat Kumar Pal and Goutam Saha}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Biomarker Gene Identification Using a Quantum Inspired Clustering Approach}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {43--56}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_4}, doi = {10.1007/978-981-15-2930-6\_4}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/DasguptaDKP020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DeyBN20, author = {Ratnadeep Dey and Debotosh Bhattacharjee and Mita Nasipuri}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Object Detection in Rainy Condition from Video Using {YOLO} Based Deep Learning Model}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {121--131}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_10}, doi = {10.1007/978-981-15-2930-6\_10}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/DeyBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GuanR20, author = {Chaowen Guan and Kenneth W. Regan}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A New Graph Polynomial and Generalized Tutte-Grothendieck Invariant from Quantum Circuits}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {3--16}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_1}, doi = {10.1007/978-981-15-5747-7\_1}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/GuanR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KarSR20, author = {Udit Narayana Kar and Debarshi Kumar Sanyal and Monideepa Roy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Distributed Power Control Scheme for Device-to-Device Communication in Cellular Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {99--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_7}, doi = {10.1007/978-981-15-5747-7\_7}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/KarSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MajumdarPD020, author = {Srijoni Majumdar and Shakti Papdeja and Partha Pratim Das and Soumya K. Ghosh}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Comment-Mine - {A} Semantic Search Approach to Program Comprehension from Code Comments}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {29--42}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_3}, doi = {10.1007/978-981-15-2930-6\_3}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MajumdarPD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MishraB20, author = {Sanjukta Mishra and Minakshi Banerjee}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Automatic Caption Generation of Retinal Diseases with Self-trained {RNN} Merge Model}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {1--10}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_1}, doi = {10.1007/978-981-15-2930-6\_1}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MishraB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MukundRS20, author = {Madhavan Mukund and Ranjal Gautham Shenoy and S. P. Suresh}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Bounded Version Vectors Using Mazurkiewicz Traces}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {31--42}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_3}, doi = {10.1007/978-981-15-5747-7\_3}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MukundRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PaulSC20, author = {Arati Paul and Putul Sahoo and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Dimensionality Reduction of Hyperspectral Images: {A} Data-Driven Approach for Band Selection}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {11--27}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_2}, doi = {10.1007/978-981-15-2930-6\_2}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/PaulSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RapantSGV20, author = {Luk{\'{a}}s Rapant and Daniela Szturcov{\'{a}} and Martin Golasowski and David Vojtek}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Methodology for Generating Synthetic Time-Dependant Probabilistic Speed Profiles}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {95--108}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_8}, doi = {10.1007/978-981-15-2930-6\_8}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/RapantSGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SahaC20, author = {Soumyabrata Saha and Rituparna Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Study on Energy-Efficient Routing Protocols for Wireless Sensor Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {125--143}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_9}, doi = {10.1007/978-981-15-5747-7\_9}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/SahaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SalviaCFS20, author = {Rocco Salvia and Agostino Cortesi and Pietro Ferrara and Fausto Spoto}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Intents Analysis of Android Apps for Confidentiality Leakage Detection}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {43--65}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_4}, doi = {10.1007/978-981-15-5747-7\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/SalviaCFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SamantaS20, author = {Ashis Kumar Samanta and Bidyut Biman Sarkar}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {An Application of Block Chain in Examination System, {A} Case Study}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {109--124}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_8}, doi = {10.1007/978-981-15-5747-7\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SamantaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SarkarAC20, author = {Saikat Sarkar and Sazid Ali and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Shot Classification and Replay Detection in Broadcast Soccer Video}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {57--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_5}, doi = {10.1007/978-981-15-2930-6\_5}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SarkarAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/Szymkowski0S20, author = {Lukasz Szymkowski and Khalid Saeed and Piotr Szymkowski}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Visualization of the Evacuation Process Including People with Heart Diseases}, booktitle = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, pages = {133--142}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6\_11}, doi = {10.1007/978-981-15-2930-6\_11}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/Szymkowski0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SzymkowskiM020, author = {Maciej Szymkowski and Patryk Milewski and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Fingerprint and Keystroke Dynamics Fusion in Multimodal Biometrics System}, booktitle = {Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1178}, pages = {67--82}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5747-7\_5}, doi = {10.1007/978-981-15-5747-7\_5}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/SzymkowskiM020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2019-1, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-13-8962-7}, doi = {10.1007/978-981-13-8962-7}, isbn = {978-981-13-8961-0}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2019-2, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-13-8969-6}, doi = {10.1007/978-981-13-8969-6}, isbn = {978-981-13-8968-9}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2020-2, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2020, Kolkata, India, February 28-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1136}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-2930-6}, doi = {10.1007/978-981-15-2930-6}, isbn = {978-981-15-2929-0}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BalBSC19, author = {Abhishek Bal and Minakshi Banerjee and Punit Sharma and Rituparna Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Multi-class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolutional Neural Network}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {93--111}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_6}, doi = {10.1007/978-981-13-8969-6\_6}, timestamp = {Fri, 30 Aug 2019 10:38:11 +0200}, biburl = {https://dblp.org/rec/conf/acss/BalBSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BanerjeeD19, author = {Arindam Banerjee and Debesh Kumar Das}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Arithmetic Circuits Using Reversible Logic: {A} Survey Report}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {99--110}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_8}, doi = {10.1007/978-981-13-8962-7\_8}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BanerjeeD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyCC19, author = {Manali Chakraborty and Shalini Chakraborty and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Architectural Design-Based Compliance Verification for IoT-Enabled Secure Advanced Metering Infrastructure in Smart Grid}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {35--55}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_3}, doi = {10.1007/978-981-13-8969-6\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyCP19, author = {Maumita Chakraborty and Sumon Chowdhury and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Generation of Simple, Connected, Non-isomorphic Random Graphs}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {69--77}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_6}, doi = {10.1007/978-981-13-8962-7\_6}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DebCRPB19, author = {Novarun Deb and Nabendu Chaki and Mandira Roy and Surochita Pal and Ankita Bhaumik}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Extracting Business Compliant Finite State Models from {I} * Models}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {39--52}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_4}, doi = {10.1007/978-981-13-8962-7\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/DebCRPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshDMC19, author = {Mrityunjay Ghosh and Nivedita Dey and Debdeep Mitra and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {2D Qubit Placement of Quantum Circuits Using {LONGPATH}}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {127--141}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_8}, doi = {10.1007/978-981-13-8969-6\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshDMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GiriDN19, author = {Arindam Giri and Subrata Dutta and Sarmistha Neogy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Fuzzy Logic-Based Range-Free Localization for Wireless Sensor Networks in Agriculture}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {3--12}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_1}, doi = {10.1007/978-981-13-8962-7\_1}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GiriDN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KhanSS19, author = {Gitosree Khan and Anirban Sarkar and Sabnam Sengupta}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Behavioral Analysis of Service Composition Patterns in {ECBS} Using Petri-Net-Based Approach}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {53--66}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_5}, doi = {10.1007/978-981-13-8962-7\_5}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KhanSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KunduMBM19, author = {Anindita Kundu and Shaunak Mukherjee and Ashmi Banerjee and Subhashis Majumder}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {End-User Position-Driven Small Base Station Placement for Indoor Communication}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {13--25}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_2}, doi = {10.1007/978-981-13-8962-7\_2}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/KunduMBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KusmierczykSZS19, author = {Aleksander Kusmierczyk and Martyna Slawinska and Kornel Zaba and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Biometric Fusion System Using Face and Voice Recognition - {A} Comparison Approach: Biometric Fusion System Using Face and Voice Characteristics}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {71--89}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_5}, doi = {10.1007/978-981-13-8969-6\_5}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KusmierczykSZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MajiDC19, author = {Raghunath Maji and Souvick Das and Rituparna Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {ZoBe: Zone-Oriented Bandwidth Estimator for Efficient IoT Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {27--36}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_3}, doi = {10.1007/978-981-13-8962-7\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MajiDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MandalDBMP19, author = {Tarak Nath Mandal and Kaushik Dey and Ankita Dutta Banik and Ranjan Mehera and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Bottleneck Crosstalk Minimization in Three-Layer Channel Routing}, booktitle = {Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {995}, pages = {79--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8962-7\_7}, doi = {10.1007/978-981-13-8962-7\_7}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MandalDBMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MannaSM19, author = {Asmita Manna and Anirban Sengupta and Chandan Mazumdar}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Quantitative Methodology for Business Process-Based Data Privacy Risk Computation}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {17--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_2}, doi = {10.1007/978-981-13-8969-6\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MannaSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/NesaB19, author = {Nashreen Nesa and Indrajit Banerjee}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {3--16}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_1}, doi = {10.1007/978-981-13-8969-6\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/NesaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PoddarWRB19, author = {Sudip Poddar and Robert Wille and Hafizur Rahaman and Bhargab B. Bhattacharya}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic Biochips}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {159--165}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_10}, doi = {10.1007/978-981-13-8969-6\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PoddarWRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RoyBB19, author = {Pushpita Roy and Ansuman Banerjee and Bhargab B. Bhattacharya}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Debugging Errors in Microfluidic Executions}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {143--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_9}, doi = {10.1007/978-981-13-8969-6\_9}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RoyBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SinhaSB19, author = {Aniruddha Sinha and Sanjoy Kumar Saha and Anupam Basu}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Determining Perceptual Similarity Among Readers Based on Eyegaze Dynamics}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {113--124}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_7}, doi = {10.1007/978-981-13-8969-6\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SinhaSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/Szymkowski019, author = {Maciej Szymkowski and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Novel Approach to Human Recognition Based on Finger Geometry}, booktitle = {Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, {ACSS} 2019, Kolkata, India, 12-13 March, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {996}, pages = {57--69}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-8969-6\_4}, doi = {10.1007/978-981-13-8969-6\_4}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/Szymkowski019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2018-1, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-3250-0}, doi = {10.1007/978-981-13-3250-0}, isbn = {978-981-13-3249-4}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2018-2, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-3702-4}, doi = {10.1007/978-981-13-3702-4}, isbn = {978-981-13-3701-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BanerjeeBS18, author = {Shreya Banerjee and Shruti Bajpai and Anirban Sarkar}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Constraint Specification for Service-Oriented Architecture}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {143--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_11}, doi = {10.1007/978-981-13-3250-0\_11}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BanerjeeBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BaraiDDBN18, author = {Bidhan Barai and Debayan Das and Nibaran Das and Subhadip Basu and Mita Nasipuri}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {VQ/GMM-Based Speaker Identification with Emphasis on Language Dependency}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {125--141}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_8}, doi = {10.1007/978-981-13-3702-4\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BaraiDDBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BiswasBMSC18, author = {Tanmay Biswas and Shuvadeep Bhattacharjee and Sudhindu Bikash Mandal and Debasri Saha and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {FPGA-Based Novel Speech Enhancement System Using Microphone Activity Detector}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {117--127}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_9}, doi = {10.1007/978-981-13-3250-0\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BiswasBMSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/CaiazzaWC18, author = {Gianluca Caiazza and Ruffin White and Agostino Cortesi}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Enhancing Security in {ROS}}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {3--15}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_1}, doi = {10.1007/978-981-13-3702-4\_1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/CaiazzaWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeCD18, author = {Nachiketa Chatterjee and Amlan Chakrabarti and Partha Pratim Das}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Software Regression and Migration Assistance Using Dynamic Instrumentation}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {159--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_12}, doi = {10.1007/978-981-13-3250-0\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeS18, author = {Moumita Chatterjee and S. K. Setua}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Gossip-Based Real-Time Task Scheduling Using Expander Graph}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {3--14}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_1}, doi = {10.1007/978-981-13-3250-0\_1}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasGuptaCC18, author = {Suparna DasGupta and Sankhayan Choudhury and Rituparna Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Disaster Management System Using Vehicular Ad Hoc Networks}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {93--107}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_6}, doi = {10.1007/978-981-13-3702-4\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DasGuptaCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DeyBC18, author = {Ayan Dey and Sukriti Bhattacharya and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Byte Label Malware Classification Using Image Entropy}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {17--29}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_2}, doi = {10.1007/978-981-13-3702-4\_2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/DeyBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DuttaBNP18, author = {Koushik Dutta and Debotosh Bhattacharjee and Mita Nasipuri and Anik Poddar}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {3D Face Recognition Based on Volumetric Representation of Range Image}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {175--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_11}, doi = {10.1007/978-981-13-3702-4\_11}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DuttaBNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshP18, author = {Sumonta Ghosh and Anita Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Exact Algorithm for L(2, 1) Labeling of Cartesian Product Between Complete Bipartite Graph and Path}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {15--26}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_2}, doi = {10.1007/978-981-13-3250-0\_2}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/JainGK18, author = {Priyank Jain and Manasi Gyanchandani and Nilay Khare}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Big Data Security and Privacy: New Proposed Model of Big Data with Secured {MR} Layer}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {31--53}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_3}, doi = {10.1007/978-981-13-3702-4\_3}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/JainGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KaurSAK18, author = {Simranjit Kaur and Sukhwinder Singh and Priti Arun and Damanjeet Kaur}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Analysis of Resting State {EEG} Signals of Adults with Attention-Deficit Hyperactivity Disorder}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {61--72}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_5}, doi = {10.1007/978-981-13-3250-0\_5}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KaurSAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KavithaB18, author = {R. Kavitha and Sumitra Binu}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Ambient Monitoring in Smart Home for Independent Living}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {57--74}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_4}, doi = {10.1007/978-981-13-3702-4\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KavithaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/Lupinska-Dubicka18, author = {Anna Lupinska{-}Dubicka and Marek Tabedzki and Marcin Adamski and Mariusz Rybnik and Miroslaw Omieljanowicz and Andrzej Omieljanowicz and Maciej Szymkowski and Marek Gruszewski and Adam Klimowicz and Grzegorz Rubin and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {The Conceptual Approach of System for Automatic Vehicle Accident Detection and Searching for Life Signs of Casualties}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {75--91}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_5}, doi = {10.1007/978-981-13-3702-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/Lupinska-Dubicka18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MukherjeeMCK18, author = {Aradhita Mukherjee and Sudip Mondal and Nabendu Chaki and Sunirmal Khatua}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Naive Bayes and Decision Tree Classifier for Streaming Data Using HBase}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {105--116}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_8}, doi = {10.1007/978-981-13-3250-0\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MukherjeeMCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/NammousS18, author = {Mohammad K. Nammous and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Natural Language Processing: Speaker, Language, and Gender Identification with {LSTM}}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {143--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_9}, doi = {10.1007/978-981-13-3702-4\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/NammousS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PramanikBBN18, author = {Sourav Pramanik and Debapriya Banik and Debotosh Bhattacharjee and Mita Nasipuri}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Computer-Aided Hybrid Framework for Early Diagnosis of Breast Cancer}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {111--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_7}, doi = {10.1007/978-981-13-3702-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PramanikBBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PtosekS18, author = {V{\'{\i}}t Ptosek and Katerina Slaninov{\'{a}}}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Multi-node Approach for Map Data Processing}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {91--104}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_7}, doi = {10.1007/978-981-13-3250-0\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PtosekS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RoyB18, author = {Hiranmoy Roy and Debotosh Bhattacharjee}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Heterogeneous Face Matching Using Robust Binary Pattern of Local Quotient: {RBPLQ}}, booktitle = {Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {883}, pages = {159--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3702-4\_10}, doi = {10.1007/978-981-13-3702-4\_10}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RoyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SenKD18, author = {Biplab Kanti Sen and Sunirmal Khatua and Rajib Kumar Das}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Optimal Mapping of Applications on Data Centers in Sensor-Cloud Environment}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {131--142}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_10}, doi = {10.1007/978-981-13-3250-0\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SenKD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SinghSGC18, author = {Jaskirat Singh and Sukhwinder Singh and Savita Gupta and Bir Singh Chavan}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Analysis of Stimuli Discrimination in Indian Patients with Chronic Schizophrenia}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {49--59}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_4}, doi = {10.1007/978-981-13-3250-0\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SinghSGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SinhaCKS18, author = {Aniruddha Sinha and Rikayan Chaki and Bikram De Kumar and Sanjoy Kumar Saha}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Readability Analysis of Textual Content Using Eye Tracking}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {73--88}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_6}, doi = {10.1007/978-981-13-3250-0\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SinhaCKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SzymkowskiS18, author = {Piotr Szymkowski and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Extraction and Classification of Blood Vessel Minutiae in the Image of a Diseased Human Retina}, booktitle = {Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2018, Kolkata, India, February 9-11, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {897}, pages = {27--45}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3250-0\_3}, doi = {10.1007/978-981-13-3250-0\_3}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SzymkowskiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2016-1, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-3409-1}, doi = {10.1007/978-981-10-3409-1}, isbn = {978-981-10-3408-4}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2016-2, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-3391-9}, doi = {10.1007/978-981-10-3391-9}, isbn = {978-981-10-3390-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BanerjeeMS16, author = {Supriyo Banerjee and Biswajit Maiti and Banani Saha}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Analysis of Eavesdropping in {QKD} with Qutrit Photon States}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {161--171}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_11}, doi = {10.1007/978-981-10-3409-1\_11}, timestamp = {Thu, 15 Aug 2019 09:49:05 +0200}, biburl = {https://dblp.org/rec/conf/acss/BanerjeeMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacharyaC16, author = {Adrija Bhattacharya and Sankhayan Choudhury}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Service Provisioning in Cloud: {A} Systematic Survey}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {37--63}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_3}, doi = {10.1007/978-981-10-3391-9\_3}, timestamp = {Fri, 27 Dec 2019 21:20:31 +0100}, biburl = {https://dblp.org/rec/conf/acss/BhattacharyaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacherjeeKR16, author = {Srimoyee Bhattacherjee and Sunirmal Khatua and Sarbani Roy}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Review on Energy Efficient Resource Management Strategies for Cloud}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {3--15}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_1}, doi = {10.1007/978-981-10-3391-9\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BhattacherjeeKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BihariT16, author = {Anand Bihari and Sudhakar Tripathi}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A New Method for Key Author Analysis in Research Professionals' Collaboration Network}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {133--143}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_9}, doi = {10.1007/978-981-10-3409-1\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BihariT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyMP16, author = {Maumita Chakraborty and Ranjan Mehera and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Divide-and-Conquer Algorithm for All Spanning Tree Generation}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {19--36}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_2}, doi = {10.1007/978-981-10-3409-1\_2}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyMSD16, author = {Sanjay Chakraborty and Sudhindu Bikash Mandal and Soharab Hossain Shaikh and Lopamudra Dey}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Ternary Quantum Circuit for Color Image Representation}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {95--108}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_6}, doi = {10.1007/978-981-10-3391-9\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyMSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeBD16, author = {Nachiketa Chatterjee and Saakallya Biswas and Partha Pratim Das}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Software Energy Estimation to Improve Power Efficiency of Embedded System}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {79--92}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_5}, doi = {10.1007/978-981-10-3391-9\_5}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasGCC16, author = {Amit Kumar Das and Saptarsi Goswami and Basabi Chakraborty and Amlan Chakrabarti}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Graph-Theoretic Approach for Visualization of Data Set Feature Association}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {109--124}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_7}, doi = {10.1007/978-981-10-3391-9\_7}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/DasGCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DeyBJMP16, author = {Debanjali Dey and Ambar Bandyopadhyay and Sunanda Jana and Arnab Kumar Maji and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Novel Image Steganographic Scheme Using 8 {\textbackslash}times 8 Sudoku Puzzle}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {85--100}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_6}, doi = {10.1007/978-981-10-3409-1\_6}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DeyBJMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshCC16, author = {Ammlan Ghosh and Rituparna Chaki and Nabendu Chaki}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Abort-Free {STM:} {A} Non-blocking Concurrency Control Approach Using Software Transactional Memory}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {53--71}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_4}, doi = {10.1007/978-981-10-3409-1\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/GhoshCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GolasowskiMS16, author = {Martin Golasowski and Jan Martinovic and Katerina Slaninov{\'{a}}}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Comparison of K-means Clustering Initialization Approaches with Brute-Force Initialization}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {103--114}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_7}, doi = {10.1007/978-981-10-3409-1\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GolasowskiMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/HanzelkaD16, author = {Jir{\'{\i}} Hanzelka and Jiri Dvorsk{\'{y}}}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Flexible Neural Trees - Parallel Learning on {HPC}}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {67--77}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_4}, doi = {10.1007/978-981-10-3391-9\_4}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/HanzelkaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/HanzelkaSSMD16, author = {Jir{\'{\i}} Hanzelka and Robert Skopal and Katerina Slaninov{\'{a}} and Jan Martinovic and Jiri Dvorsk{\'{y}}}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Graph Problems Performance Comparison Using Intel Xeon and Intel Xeon-Phi}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {73--83}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_5}, doi = {10.1007/978-981-10-3409-1\_5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/HanzelkaSSMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KhanSS16, author = {Gitosree Khan and Sabnam Sengupta and Anirban Sarkar}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Modeling and Analysis of Enterprise Cloud Bus Using a Petri Net Based Approach}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {17--36}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_2}, doi = {10.1007/978-981-10-3391-9\_2}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KhanSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/NandaS16, author = {Aparajita Nanda and Pankaj Kumar Sa}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Single-Shot Person Re-identification by Spectral Matching of Symmetry-Driven Local Features}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {147--159}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_10}, doi = {10.1007/978-981-10-3409-1\_10}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/NandaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PanasiukD016, author = {Piotr Panasiuk and Marcin Dabrowski and Khalid Saeed}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Keystroke Dynamics and Face Image Fusion as a Method of Identification Accuracy Improvement}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {187--196}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_13}, doi = {10.1007/978-981-10-3409-1\_13}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PanasiukD016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RaychaudhuriMCB16, author = {Amlan Raychaudhuri and Satyabrata Maity and Amlan Chakrabarti and Debotosh Bhattacharjee}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Novel Approach for Human Silhouette Extraction from Video Data}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {125--135}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_8}, doi = {10.1007/978-981-10-3391-9\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RaychaudhuriMCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RoySS16, author = {Santanu Roy and Bibekananda Shit and Soumya Sen}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Association Based Multi-attribute Analysis to Construct Materialized View}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {115--131}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_8}, doi = {10.1007/978-981-10-3409-1\_8}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RoySS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SahaCBN16, author = {Sovan Saha and Piyali Chatterjee and Subhadip Basu and Mita Nasipuri}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Functional Group Prediction of Un-annotated Protein by Exploiting Its Neighborhood Analysis in Saccharomyces Cerevisiae Protein Interaction Network}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {165--177}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_11}, doi = {10.1007/978-981-10-3391-9\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SahaCBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/Sanyal16, author = {Arpita Sanyal (Bhaduri) and Amit Saha and Bipulan Gain and Sudhindu Bikash Mandal}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Circuit Synthesis of Marked Clique Problem using Quantum Walk}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {37--51}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_3}, doi = {10.1007/978-981-10-3409-1\_3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/Sanyal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SarkarCS16, author = {Paramita Sarkar and Rituparna Chaki and Ditipriya Sinha}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {A Heuristic Framework for Priority Based Nurse Scheduling}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {3--18}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_1}, doi = {10.1007/978-981-10-3409-1\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SarkarCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SenS016, author = {Shibaprasad Sen and Ram Sarkar and Kaushik Roy}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {An Approach to Stroke-Based Online Handwritten Bangla Character Recognition}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {153--163}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_10}, doi = {10.1007/978-981-10-3391-9\_10}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SenS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SinghSN16, author = {Pawan Kumar Singh and Ram Sarkar and Mita Nasipuri}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Statistical Textural Features for Text-Line Level Handwritten Indic Script Identification}, booktitle = {Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {568}, pages = {139--151}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3391-9\_9}, doi = {10.1007/978-981-10-3391-9\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SinghSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SomPD16, author = {Sukalyan Som and Sarbani Palit and Kashinath Dey}, editor = {Rituparna Chaki and Khalid Saeed and Agostino Cortesi and Nabendu Chaki}, title = {Evaluating the Performance of a Chaos Based Partial Image Encryption Scheme}, booktitle = {Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, {ACSS} 2016, August 12-14, 2016, Kolkata, India}, series = {Advances in Intelligent Systems and Computing}, volume = {567}, pages = {173--185}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-3409-1\_12}, doi = {10.1007/978-981-10-3409-1\_12}, timestamp = {Thu, 15 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SomPD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2015-1, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-81-322-2650-5}, doi = {10.1007/978-81-322-2650-5}, isbn = {978-81-322-2648-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2015-2, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-81-322-2653-6}, doi = {10.1007/978-81-322-2653-6}, isbn = {978-81-322-2651-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/AhujaJSH15, author = {Bharat Kumar Ahuja and Angshuman Jana and Ankit Swarnkar and Raju Halder}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {On Preventing {SQL} Injection Attacks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {49--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_4}, doi = {10.1007/978-81-322-2650-5\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/AhujaJSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/AkhterTKBK15, author = {Nazneen Akhter and Sumegh Tharewal and Vijay Kale and Ashish Bhalerao and K. V. Kale}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {15--29}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_2}, doi = {10.1007/978-81-322-2650-5\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/AkhterTKBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BabuNP15, author = {Erukala Suresh Babu and C. Nagaraju and Munaga H. M. Krishna Prasad}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {123--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_9}, doi = {10.1007/978-81-322-2650-5\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BabuNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BagchiBN15, author = {Parama Bagchi and Debotosh Bhattacharjee and Mita Nasipuri}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Registration of Range Images Using a Novel Technique of Centroid Alignment}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {81--89}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_6}, doi = {10.1007/978-81-322-2653-6\_6}, timestamp = {Fri, 27 Dec 2019 21:20:31 +0100}, biburl = {https://dblp.org/rec/conf/acss/BagchiBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacharyaGDC15, author = {Adrija Bhattacharya and Smita Ghosh and Debarun Das and Sankhayan Choudhury}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A New Service Discovery Approach for Community-Based Web}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {139--151}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_10}, doi = {10.1007/978-81-322-2653-6\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BhattacharyaGDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattasaliCCS15, author = {Tapalina Bhattasali and Rituparna Chaki and Nabendu Chaki and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Securing Service in Remote Healthcare}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {65--84}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_5}, doi = {10.1007/978-81-322-2650-5\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BhattasaliCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BinuRM15, author = {Sumitra Binu and Pethuru Raj and Mohammed Misbahuddin}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {183--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_12}, doi = {10.1007/978-81-322-2650-5\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BinuRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BuczkowskiS15, author = {Mateusz Buczkowski and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Fusion-Based Noisy Image Segmentation Method}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {21--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_2}, doi = {10.1007/978-81-322-2653-6\_2}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BuczkowskiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyC15, author = {Manali Chakraborty and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {173--188}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_12}, doi = {10.1007/978-81-322-2653-6\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChakrabortyGDNP15, author = {Arpan Chakraborty and Joydeb Ghosh and Piyali Datta and Ankita Nandy and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Anomaly Detection and Three Anomalous Coins Problem}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {303--320}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_20}, doi = {10.1007/978-81-322-2653-6\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChakrabortyGDNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeTD15, author = {Nachiketa Chatterjee and Saurabh Singh Thakur and Partha Pratim Das}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Resource Management in Native Languages Using Dynamic Binary Instrumentation {(PIN)}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {107--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_8}, doi = {10.1007/978-81-322-2653-6\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasCD15, author = {Ayan Kumar Das and Rituparna Chaki and Kashi Nath Dey}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {The Design of Hierarchical Routing Protocol for Wireless Sensor Network}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {223--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_14}, doi = {10.1007/978-81-322-2650-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DasCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GaikwadGM15, author = {Santosh Gaikwad and Bharti Gawali and Suresh Mehrotra}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Design and Development of Marathi Speech Interface System}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_1}, doi = {10.1007/978-81-322-2653-6\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GaikwadGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshC15, author = {Ammlan Ghosh and Rituparna Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Implementing Software Transactional Memory Using {STM} Haskell}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {235--248}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_16}, doi = {10.1007/978-81-322-2653-6\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshDN15, author = {Kaushik Ghosh and Pradip Kumar Das and Sarmistha Neogy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {{KPS:} {A} Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {203--221}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_13}, doi = {10.1007/978-81-322-2650-5\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GoyalK15, author = {Raman Kumar Goyal and Sakshi Kaushal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Network Selection Using {AHP} for Fast Moving Vehicles in Heterogeneous Networks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {235--243}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_15}, doi = {10.1007/978-81-322-2650-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GoyalK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/HalderOPR15, author = {Chayan Halder and Sk Md Obaidullah and Jaya Paul and Kaushik Roy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Writer Verification on Bangla Handwritten Characters}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {53--68}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_4}, doi = {10.1007/978-81-322-2653-6\_4}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/HalderOPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KanrarCC15, author = {Sukhendu Kanrar and Samiran Chattopadhyay and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {201--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_14}, doi = {10.1007/978-81-322-2653-6\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KanrarCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MajiJP15, author = {Arnab Kumar Maji and Sunanda Jana and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Comprehensive Sudoku Instance Generator}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {215--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_15}, doi = {10.1007/978-81-322-2653-6\_15}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MajiJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MajumderCGC15, author = {Ayan Majumder and Moumita Chakraborty and Krishnendu Guha and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {CAD-Based Analysis of Power Distribution Network for {SOC} Design}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {189--198}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_13}, doi = {10.1007/978-81-322-2653-6\_13}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MajumderCGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MandalSP15, author = {Sudip Mandal and Goutam Saha and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {87--99}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_6}, doi = {10.1007/978-81-322-2650-5\_6}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MandalSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MeheraDCP15, author = {Ranjan Mehera and Piyali Datta and Arpan Chakraborty and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {An Algorithm to Solve 3D Guard Zone Computation Problem}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {271--288}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_18}, doi = {10.1007/978-81-322-2653-6\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MeheraDCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MohanrajVKN15, author = {V. Mohanraj and Vaidehi V. and Ranajith Kumar and R. Nakkeeran}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform {(DPSIFT)}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {69--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_5}, doi = {10.1007/978-81-322-2653-6\_5}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MohanrajVKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MukherjeeM15, author = {Debashis Mukherjee and Rajib Mall}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {An Investigation into Effective Test Coverage}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {93--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_7}, doi = {10.1007/978-81-322-2653-6\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MukherjeeM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MukherjeeSKC15, author = {Jhilam Mukherjee and Soharab Hossain Shaikh and Madhuchanda Kar and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {159--179}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_11}, doi = {10.1007/978-81-322-2650-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MukherjeeSKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ObaidullahHDR15, author = {Sk Md Obaidullah and Chayan Halder and Nibaran Das and Kaushik Roy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {An Approach for Automatic Indic Script Identification from Handwritten Document Images}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {37--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_3}, doi = {10.1007/978-81-322-2653-6\_3}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ObaidullahHDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/OrczykP15, author = {Tomasz Orczyk and Piotr Porwik}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Liver Fibrosis Diagnosis Support System Using Machine Learning Methods}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {111--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_8}, doi = {10.1007/978-81-322-2650-5\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/OrczykP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PrasadR15, author = {K. Rajendra Prasad and B. Eswara Reddy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Context-Aware Graph-Based Visualized Clustering Approach {(CAVCA)}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {247--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_16}, doi = {10.1007/978-81-322-2650-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PrasadR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RaghavendraD15, author = {N. Sujay Raghavendra and Paresh Chandra Deka}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Multistep Ahead Groundwater Level Time-Series Forecasting Using Gaussian Process Regression and {ANFIS}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {289--302}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_19}, doi = {10.1007/978-81-322-2653-6\_19}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RaghavendraD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RaniKH15, author = {Sapana Rani and Preeti Kachhap and Raju Halder}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Data-Flow Analysis-Based Approach of Database Watermarking}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {153--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_11}, doi = {10.1007/978-81-322-2653-6\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RaniKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RoyDC15, author = {Bibhash Roy and Ranjan Dasgupta and Nabendu Chaki}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Study on Software Risk Management Strategies and Mapping with {SDLC}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {121--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_9}, doi = {10.1007/978-81-322-2653-6\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/RoyDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/RoyDG15, author = {Debasish Roy and Surjya Sikha Das and Swarup Ghosh}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Comparative Analysis of Genetic Algorithm and Classical Algorithms in Fractional Programming}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {249--270}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_17}, doi = {10.1007/978-81-322-2653-6\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/RoyDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SahaNC15, author = {Manas Saha and Mrinal Kanti Naskar and B. N. Chatterji}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {101--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_7}, doi = {10.1007/978-81-322-2650-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SahaNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SenGC15, author = {Soumya Sen and Partha Ghosh and Agostino Cortesi}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Materialized View Construction Using Linearizable Nonlinear Regression}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {261--276}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_17}, doi = {10.1007/978-81-322-2650-5\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SenGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/WesolowskiP15, author = {Tomasz Emanuel Wesolowski and Piotr Porwik}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Computer User Profiling Based on Keystroke Analysis}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {3--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_1}, doi = {10.1007/978-81-322-2650-5\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/WesolowskiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/YadavB15, author = {Rohit Kumar Yadav and Haider Banka}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {145--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_10}, doi = {10.1007/978-81-322-2650-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/YadavB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ZamanDG15, author = {J. K. M. Sadique Uz Zaman and Sankhanil Dey and Ranjan Ghosh}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(7\({}^{\mbox{3}}\))}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {31--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_3}, doi = {10.1007/978-81-322-2650-5\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ZamanDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2014-1, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-1985-9}, doi = {10.1007/978-81-322-1985-9}, isbn = {978-81-322-1984-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2014-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acss/2014-2, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-1988-0}, doi = {10.1007/978-81-322-1988-0}, isbn = {978-81-322-1987-3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2014-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BanerjeeB14, author = {Ritwik Banerjee and Chandan Kumar Bhattacharyya}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Power Optimized Real Time Communication Through the Mobile Sink in WSNs}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {153--166}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_11}, doi = {10.1007/978-81-322-1985-9\_11}, timestamp = {Fri, 27 Dec 2019 21:20:31 +0100}, biburl = {https://dblp.org/rec/conf/acss/BanerjeeB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BartochaSWS14, author = {Anna Bartocha and Emil Saeed and Piotr Wachulec and Khalid Saeed}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Retinal Feature Extraction with the Influence of Its Diseases on the Results}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {37--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_3}, doi = {10.1007/978-81-322-1985-9\_3}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BartochaSWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacharyaC14, author = {Adrija Bhattacharya and Sankhayan Choudhury}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Non-functional Property Aware Brokerage Approach for Cloud Service Discovery}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {3--15}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_1}, doi = {10.1007/978-81-322-1988-0\_1}, timestamp = {Fri, 27 Dec 2019 21:20:31 +0100}, biburl = {https://dblp.org/rec/conf/acss/BhattacharyaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattacharyaC14a, author = {Adrija Bhattacharya and Sankhayan Choudhury}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Service Insurance: {A} New Approach in Cloud Brokerage}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {39--52}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_3}, doi = {10.1007/978-81-322-1988-0\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BhattacharyaC14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BuczkowskiSTWK14, author = {Mateusz Buczkowski and Khalid Saeed and Jacek Tarasiuk and Sebastian Wronski and Joanna Kosior}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An Approach for Micro-Tomography Obtained Medical Image Segmentation}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {85--102}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_7}, doi = {10.1007/978-81-322-1985-9\_7}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BuczkowskiSTWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ChatterjeeNB14, author = {Mousam Chatterjee and Arnab Nandi and Banani Basu}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Performance of Incremental Redundancy-Based Data Transmission in Randomly Deployed Wireless Sensor Network}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {167--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_12}, doi = {10.1007/978-81-322-1985-9\_12}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ChatterjeeNB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasGuptaC14, author = {Suparna DasGupta and Rituparna Chaki}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Trust-Based Routing for Vehicular Ad Hoc Network}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {187--202}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_13}, doi = {10.1007/978-81-322-1985-9\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DasGuptaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DattaGSR14, author = {Kamalika Datta and Alhaad Gokhale and Indranil Sengupta and Hafizur Rahaman}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated Annealing}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {131--144}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_8}, doi = {10.1007/978-81-322-1988-0\_8}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DattaGSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DhalCDP14, author = {Debasis Dhal and Arpan Chakrabarty and Piyali Datta and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {A New Move Toward Parallel Assay Operations in a Restricted Sized Chip in Digital Microfluidics}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {157--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_10}, doi = {10.1007/978-81-322-1988-0\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DhalCDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshBN14, author = {Pramit Ghosh and Debotosh Bhattacharjee and Mita Nasipuri}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An Automatic Non-invasive System for Diagnosis of Tuberculosis}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {59--70}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_5}, doi = {10.1007/978-81-322-1985-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshDN14, author = {Kaushik Ghosh and Pradip K. Das and Sarmistha Neogy}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Effect of Source Selection, Deployment Pattern, and Data Forwarding Technique on the Lifetime of Data Aggregating Multi-sink Wireless Sensor Network}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {137--152}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_10}, doi = {10.1007/978-81-322-1985-9\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KararB14, author = {Sandip Karar and Abhirup Das Barman}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An Overlay Cognitive Radio Model Exploiting the Polarization Diversity and Relay Cooperation}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {125--136}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_9}, doi = {10.1007/978-81-322-1985-9\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/KararB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KosiorSB14, author = {Joanna Kosior and Khalid Saeed and Mateusz Buczkowski}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An Algorithm for Extracting Feature from Human Lips}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {3--23}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_1}, doi = {10.1007/978-81-322-1985-9\_1}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/KosiorSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/KunduCL14, author = {Raka Kundu and Amlan Chakrabarti and Prasanna Kumar Lenka}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Automated Vertebral Segmentation from {CT} Images for Computation of Lumbolumbar Angle}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {71--83}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_6}, doi = {10.1007/978-81-322-1985-9\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/KunduCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MajiP14, author = {Arnab Kumar Maji and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {109--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_7}, doi = {10.1007/978-81-322-1988-0\_7}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MajiP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MandalSC14, author = {Amit Kr Mandal and Anirban Sarkar and Nabendu Chaki}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Flexible Cloud Architecture for Healthcare Applications}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {103--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_8}, doi = {10.1007/978-81-322-1985-9\_8}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MandalSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MeheraCDP14, author = {Ranjan Mehera and Arpan Chakrabarty and Piyali Datta and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {183--209}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_11}, doi = {10.1007/978-81-322-1988-0\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MeheraCDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MishraCC14, author = {Rakesh Kumar Mishra and Nabendu Chaki and Sankhayan Choudhury}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Study on Handover Mechanism in Cellular Network: An Experimental Approach}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {203--212}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_14}, doi = {10.1007/978-81-322-1985-9\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/MishraCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SahaCPGC14, author = {Ankita Saha and Atrayee Chatterjee and Nabanita Pal and Ammlan Ghosh and Nabendu Chaki}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {A Lightweight Implementation of Obstruction-Free Software Transactional Memory}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {67--84}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_5}, doi = {10.1007/978-81-322-1988-0\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/SahaCPGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SauP14, author = {Swagata Saha Sau and Rajat Kumar Pal}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {An Efficient Algorithm for Reducing Wire Length in Three-Layer Channel Routing}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {145--156}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_9}, doi = {10.1007/978-81-322-1988-0\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SauP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SealGBNG14, author = {Ayan Seal and Suranjan Ganguly and Debotosh Bhattacharjee and Mita Nasipuri and Consuelo Gonzalo{-}Mart{\'{\i}}n}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Feature Selection using Particle Swarm Optimization for Thermal Face Recognition}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {25--35}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_2}, doi = {10.1007/978-81-322-1985-9\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/SealGBNG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SenguptaD14, author = {Souvik Sengupta and Ranjan Dasgupta}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Using Semiformal and Formal Methods in Software Design: An Integrated Approach for Intelligent Learning Management System}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {53--65}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_4}, doi = {10.1007/978-81-322-1988-0\_4}, timestamp = {Mon, 28 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SenguptaD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SomPDSSS14, author = {Sukalyan Som and Sarbani Palit and Kashinath Dey and Dipabali Sarkar and Jayeeta Sarkar and Kheyali Sarkar}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {17--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_2}, doi = {10.1007/978-81-322-1988-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SomPDSSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/WachulecSBS14, author = {Piotr Wachulec and Emil Saeed and Anna Bartocha and Khalid Saeed}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Iris Feature Extraction with the Influence of Its Diseases on the Results}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One}, pages = {49--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1985-9\_4}, doi = {10.1007/978-81-322-1985-9\_4}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/WachulecSBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ZamanG14, author = {J. K. M. Sadique Uz Zaman and Ranjan Ghosh}, editor = {Rituparna Chaki and Khalid Saeed and Sankhayan Choudhury and Nabendu Chaki}, title = {Multiplicative Polynomial Inverse Over GF(7\({}^{\mbox{3}}\)): Crisis of {EEA} and Its Solution}, booktitle = {Applied Computation and Security Systems - {ACSS} 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two}, pages = {87--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-81-322-1988-0\_6}, doi = {10.1007/978-81-322-1988-0\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ZamanG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.