Manish Jain

Orcid: 0000-0002-3535-0030

According to our database1, Manish Jain authored at least 81 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Stable Cluster Head Selection Method for Maximal Throughput and Lifetime of Homogeneous Wireless Sensor Network.
SN Comput. Sci., 2024

2023
Expanding impact of mobile health programs: SAHELI for maternal and child care.
AI Mag., December, 2023

Addressing an open problem of Choudhury et al. "Fuzzy Sets Syst. 8 (2013), 84-97".
J. Intell. Fuzzy Syst., 2023

Equitable Restless Multi-Armed Bandits: A General Framework Inspired By Digital Health.
CoRR, 2023

Indexability is Not Enough for Whittle: Improved, Near-Optimal Algorithms for Restless Bandits.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Increasing Impact of Mobile Health Programs: SAHELI for Maternal and Child Care.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Novel Image Super-Resolution Reconstruction Framework Using the AI Technique of Dual Generator Generative Adversarial Network (GAN).
J. Univers. Comput. Sci., 2022

Twister: Construction and structural relaxation of commensurate moiré superlattices.
Comput. Phys. Commun., 2022

2021
Using AntiPatterns to avoid MLOps Mistakes.
CoRR, 2021

A Novel Minimax Algorithm for Multi-channel Active Noise Control System.
Proceedings of the 12th International Symposium on Image and Signal Processing and Analysis, 2021

2020
Variance based sensitivity analysis and statistical optimization of design and operating parameters of spiral wound pervaporation modules for thiophene removal from FCC gasoline.
Comput. Chem. Eng., 2020

2019
Aspect-Oriented Approach for Testing Software Applications and Automatic Aspect Creation.
Int. J. Softw. Eng. Knowl. Eng., 2019

2018
CoFFEE: Corrections For Formation Energy and Eigenvalues for charged defect simulations.
Comput. Phys. Commun., 2018

PASTA: Python Algorithms for Searching Transition stAtes.
Comput. Phys. Commun., 2018

An SVD Based Approach for Spoken Language Identification.
Proceedings of the 2018 International Conference on Signal Processing and Communications (SPCOM), 2018

2017
Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory.
Comput. Phys. Commun., 2017

2016
Heterogeneous 3-D circuits: Integrating free-space optics with CMOS.
Microelectron. J., 2016

Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Modeling HTTP/2 Speed from HTTP/1 Traces.
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016

2015
Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system.
Auton. Agents Multi Agent Syst., 2015

The Importance of Being Isolated: An Empirical Study on Chromium Reviews.
Proceedings of the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Information Disclosure as a Means to Security.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Computational Game Theory for Security and Sustainability.
J. Inf. Process., 2014

Reports of the 2014 AAAI Spring Symposium Series.
AI Mag., 2014

Dynamic allocation of security resources for protecting public events.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Game-Theoretic Resource Allocation for Protecting Large Public Events.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Security Games Applied to Real-World: Research Contributions and Challenges.
Proceedings of the Moving Target Defense II, 2013

A Unique Coupled Common Fixed Point Theorem for Symmetric (φ, ψ)-Contractive Mappings in Ordered G-Metric Spaces with Applications.
J. Appl. Math., 2013

Mitigating multi-path fading in a mobile mesh network.
Ad Hoc Networks, 2013

Efficiently Solving Joint Activity Based Security Games.
Proceedings of the IJCAI 2013, 2013

Security scheduling for real-world networks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
A Tri-Modal 20-Gbps/Link Differential/DDR3/GDDR5 Memory Interface.
IEEE J. Solid State Circuits, 2012

A 12.8-Gb/s/link Tri-Modal Single-Ended Memory Interface.
IEEE J. Solid State Circuits, 2012

Coupled Fixed Point Theorems for a Pair of Weakly Compatible Maps along with <i>CLRg</i> Property in Fuzzy Metric Spaces.
J. Appl. Math., 2012

BerkeleyGW: A massively parallel computer package for the calculation of the quasiparticle and optical properties of materials and nanostructures.
Comput. Phys. Commun., 2012

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety.
AI Mag., 2012

Reports of the AAAI 2012 Spring Symposia.
AI Mag., 2012

Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Game-theoretic resource allocation for malicious packet detection in computer networks.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

A Study of Phase Transitions in Security Games.
Proceedings of the Game Theory for Security, 2012

The Deployment-to-Saturation Ratio in Security Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Distributed on-Line Multi-Agent Optimization under Uncertainty: Balancing Exploration and Exploitation.
Adv. Complex Syst., 2011

Parameter Estimation and Tracking in Physical Layer Network Coding.
Proceedings of the Global Communications Conference, 2011

An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface.
Proceedings of the 2011 IEEE Custom Integrated Circuits Conference, 2011

A double oracle algorithm for zero-sum security games on graphs.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Securing networks using game theory: algorithms and applications.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Game Theory and Human Behavior: Challenges in Security and Sustainability.
Proceedings of the Algorithmic Decision Theory - Second International Conference, 2011

Mixed-Initiative Optimization in Security Games: A Preliminary Report.
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011

Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

Addressing Execution and Observation Error in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010

Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition.
Artif. Intell., 2010

An intra-chip free-space optical interconnect.
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010

A Case for WiFi Relay: Improving VoIP Quality for WiFi Users.
Proceedings of IEEE International Conference on Communications, 2010

Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications.
Proceedings of the Global Communications Conference, 2010

When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Security Games with Arbitrary Schedules: A Branch and Price Approach.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Security applications: lessons of real-world deployment.
SIGecom Exch., 2009

Using Game Theory for Los Angeles Airport Security.
AI Mag., 2009

Reduction of Current Mismatch in PLL Charge Pump.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2009

DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks.
Proceedings of the IJCAI 2009, 2009

Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Computing optimal randomized resource allocations for massive security games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Bayesian stackelberg games and their application for security at Los Angeles international airport.
SIGecom Exch., 2008

On the collision of compressible vortex ring with wall.
J. Vis., 2008

Path selection using available bandwidth estimation in overlay-based video streaming.
Comput. Networks, 2008

Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

On <i>k</i>-optimal distributed constraint optimization algorithms: new bounds and algorithms.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

ARMOR Security for Los Angeles International Airport.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
Efficient first-principles calculations of the electronic structure of periodic systems.
Comput. Phys. Commun., 2007

A 2.5Gbps Quad CMOS Transceiver Cell Using Regulated Supply Low Jitter PLL.
Proceedings of the 20th International Conference on VLSI Design (VLSI Design 2007), 2007

Towards simulating billions of agents in thousands of seconds.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

2006
QoS-Guaranteed Path Selection Algorithm for Service Composition.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

2005
End-to-end estimation of the available bandwidth variation range.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

2004
Effects of Interrupt Coalescence on Network Measurements.
Proceedings of the Passive and Active Network Measurement, 5th International Workshop, 2004

Ten fallacies and pitfalls on end-to-end available bandwidth estimation.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

OnlineEducator 2.0: A Complete ITPlatform to Create, Administer, Analyze, and Transmit Online Exams.
Proceedings of the 7th IASTED International Conference on Computers and Advanced Technology in Education, 2004

2003
End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput.
IEEE/ACM Trans. Netw., 2003

Socket Buffer Auto-Sizing for High-Performance Data Transfers.
J. Grid Comput., 2003


  Loading...