Piyush Bansal

According to our database1, Piyush Bansal authored at least 15 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Shallow Parsing Pipeline - Hindi-English Code-Mixed Social Media Text.
Proceedings of the NAACL HLT 2016, 2016

Active Content-Based Crowdsourcing Task Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Towards Semantic Retrieval of Hashtags in Microblogs.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Towards Deep Semantic Analysis of Hashtags.
Proceedings of the Advances in Information Retrieval, 2015

2014
CharBoxes: a system for automatic discovery of character infoboxes from books.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

2013
Allowing Multiple Rounds in the Shared Whiteboard Model: Some More Impossibility Results.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
A New Look at Composition of Authenticated Byzantine Generals
CoRR, 2012

2011
Byzantine Agreement Using Partial Authentication.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Privacy Preserving Outlier Detection Using Locality Sensitive Hashing.
Proceedings of the Data Mining Workshops (ICDMW), 2011

LSH based outlier detection and its application in distributed setting.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2009
Brief announcement: topology knowledge affects probabilistic reliable communication.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Brief announcement: global consistency can be easier than point-to-point communication.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots.
Proceedings of the The Forth International Conference on Availability, 2009

2008
How Far Must You See To Hear Reliably.
IACR Cryptol. ePrint Arch., 2008

Authenticated Byzantine Generals in Dual Failure Model.
IACR Cryptol. ePrint Arch., 2008


  Loading...