Abhishek Singh

According to our database1, Abhishek Singh authored at least 74 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
SPX64: A Scratchpad Memory for General-purpose Microprocessors.
ACM Trans. Archit. Code Optim., 2021

An In-Memory Analog Computing Co-Processor for Energy-Efficient CNN Inference on Mobile Devices.
CoRR, 2021

Intent Classification from Code Mixed Input for Virtual Assistants.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021

Conformance testing of ARINC 653 compliance for a safety critical RTOS using UPPAAL model checker.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Blockchain Based Accounts Payable Platform for Goods Trade.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Development of MEC system for indigenous 5G Test-Bed.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Fuzzy-based approach to incorporate spatial constraints in possibilistic c-means algorithm for remotely sensed imagery.
Int. J. Intell. Inf. Database Syst., 2020

Parzen Window Approximation on Riemannian Manifold.
CoRR, 2020

PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation.
CoRR, 2020

Voice@SRIB at SemEval-2020 Task [9, 12]: Sentiment and Offensiveness detection in Social Media.
CoRR, 2020

Voice@SRIB at SemEval-2020 Tasks 9 and 12: Stacked Ensemblingmethod for Sentiment and Offensiveness detection in Social Media.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

Multi-RAT multi-connectivity active steering antenna technology for IoT, Wi-Fi, LTE, and 5G.
Proceedings of the 2020 IEEE Radio and Wireless Symposium, 2020

Minimizing Execution Duration in the Presence of Learning-Enabled Components.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Blockchain Based e-Invoicing Platform for Global Trade.
Proceedings of the IEEE International Conference on Blockchain, 2020

Blockchain-Based Platform for Trusted Collaborations on Data and AI Models.
Proceedings of the IEEE International Conference on Blockchain, 2020

The Tipping Point In Social Networks: Investigating the Mechanism Behind Viral Information Spreading.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

On Using Composite Word Embeddings To Improve Biomedical Term Similarity.
Proceedings of the 20th IEEE International Conference on Bioinformatics and Bioengineering, 2020

Classification of Imbalanced Data Using Decision Tree and Bayesian Classifier.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation.
Proceedings of the 3rd Clinical Natural Language Processing Workshop, 2020

2019
Uniprocessor scheduling of real-time synchronous dataflow tasks.
Real Time Syst., 2019

A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues.
J. Netw. Comput. Appl., 2019

Extended Karush-Kuhn-Tucker condition for constrained interval optimization problems and its application in support vector machines.
Inf. Sci., 2019

Energy efficient resource management techniques in cloud environment for web-based community by machine learning: a survey.
Int. J. Web Based Communities, 2019

NASIB: Neural Architecture Search withIn Budget.
CoRR, 2019

Crew Planning for Commuter Rail Operations, a Case Study on Mumbai, India.
Proceedings of the Operations Research Proceedings 2019, 2019

Incorporating Emoji Descriptions Improves Tweet Classification.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

Static Analysis for Detecting High-Level Races in RTOS Kernels.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

Ownership Preserving AI Market Places Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

MIGAN: Malware Image Synthesis Using GANs.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Neural Architecture Construction using EnvelopeNets.
CoRR, 2018

Resource Fairness and Prioritization of Transactions in Permissioned Blockchain Systems (Industry Track).
Proceedings of the 19th International Middleware Conference, 2018

Detection of Rare Genetic Diseases using Facial 2D Images with Transfer Learning.
Proceedings of the 8th International Symposium on Embedded Computing and System Design, 2018

When and Where?: Behavior Dominant Location Forecasting with Micro-Blog Streams.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Formal Verification of Datarace in Safety Critical ARINC653 compliant RTOS.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
A Systematic Framework to Optimize Launch Times of Web Apps.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Global EDF-Based Scheduling of Multiple Independent Synchronous Dataflow Graphs.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Applying Real-Time Scheduling Theory to the Synchronous Data Flow Model of Computation.
Proceedings of the 29th Euromicro Conference on Real-Time Systems, 2017

POSTER: Improving Anonymity of Services Deployed Over Tor by Changing Guard Selection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Certificate Transparency with Enhancements and Short Proofs.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Framework to Improve the Web Application Launch Time.
Proceedings of the 2016 IEEE International Conference on Mobile Services, MS 2016, San Francisco, CA, USA, June 27, 2016

Ranking Summaries for Informativeness and Coherence without Reference Summaries.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

Load Balancing among Wide-Area SDN Controllers.
Proceedings of the 2016 International Conference on Information Technology, 2016

2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wirel. Pers. Commun., 2015

Demo: A Smart Framework for IoT Analytic Workflow Development.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

ConfValley: a systematic configuration validation framework for cloud services.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
The C-loss function for pattern classification.
Pattern Recognit., 2014

2013
Caching reverse-geocoded locations on smartphones.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
A variational approach for optimizing quadratic mutual information for medical image registration.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Information theoretic learning with adaptive kernels.
Signal Process., 2011

2010
Semantic-less coordination of power management and application performance.
ACM SIGOPS Oper. Syst. Rev., 2010

A loss function for classification based on a robust similarity metric.
Proceedings of the International Joint Conference on Neural Networks, 2010

Hidden Markov Models for modeling blood pressure data to predict acute hypotension.
Proceedings of the IEEE International Conference on Acoustics, 2010

A closed form recursive solution for Maximum Correntropy training.
Proceedings of the IEEE International Conference on Acoustics, 2010

Kernel width adaptation in information theoretic cost functions.
Proceedings of the IEEE International Conference on Acoustics, 2010

Algorithms for Entropy and Correntropy Adaptation with Applications to Linear Systems.
Proceedings of the Information Theoretic Learning, 2010

2009
Identifying Malicious Code Through Reverse Engineering
Advances in Information Security 44, Springer, ISBN: 978-0-387-09824-1, 2009

TransCPN - Software Tool for Transformation of Colored Petri Nets.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Using Correntropy as a cost function in linear adaptive filters.
Proceedings of the International Joint Conference on Neural Networks, 2009

Efficient Learning of Finite Mixture Densities Using Mutual Information.
Proceedings of the Seventh International Conference on Advances in Pattern Recognition, 2009

Resource management for isolation enhanced cloud services.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Generating hypotheses from the web.
Proceedings of the 17th International Conference on World Wide Web, 2008

A Sampling-Resampling Based Bayesian Learning Approach for Object Tracking.
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008

A Bayesian Learning Based Approach for Clustering of Satellite Images.
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008

Background Subtraction in Videos using Bayesian Learning with Motion Information.
Proceedings of the British Machine Vision Conference 2008, Leeds, UK, September 2008, 2008

Vulnerability Analysis and Defense for the Internet
Advances in Information Security 37, Springer, ISBN: 978-0-387-74389-9, 2008

2007
On the Use of Lexeme Features for Writer Verification.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

Co-Scheduling Variable Execution Time Requirement Real-Time Tasks and Non Real-Time Tasks.
Proceedings of the 19th Euromicro Conference on Real-Time Systems, 2007

2004
Developing Surrogate Simulation Models for Computationally Intensive Real World Application.
Proceedings of the MAICS 2004, 2004

Context Free Grammar for the Generation of One Time Authentication Identity.
Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004

2003
Malicious ICMP Tunneling: Defense against the Vulnerability.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Grammar based off line generation of disposable credit card numbers.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Compiler optimizations for Java aglets in distributed data intensive applications.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Modified Linkage Learning Genetic Algorithm For Difficult Non-stationary Problems.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

A Formal Service Specification for IIOP based on ISO/IEC 14752.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002


  Loading...