Rituparna Chaki

Orcid: 0000-0003-1060-5778

According to our database1, Rituparna Chaki authored at least 73 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Correlating contexts and NFR conflicts from event logs.
Softw. Syst. Model., December, 2023

An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems.
J. Supercomput., June, 2023

An Approach Toward Congestion Management for Improved Emergency Vehicle Management in Intelligent Urban Traffic Network.
Proceedings of the Computer Information Systems and Industrial Management, 2023

2022
A Patient-Centric Nurse Scheduling Algorithm.
SN Comput. Sci., 2022

Sea lion attacking-based deer hunting optimization algorithm for dynamic nurse scheduling in health care sector contribution of hybrid algorithm in cloud.
Concurr. Comput. Pract. Exp., 2022

An Efficient Data Distribution Strategy for Distributed Graph Processing System.
Proceedings of the Computer Information Systems and Industrial Management, 2022

A Look into the Vulnerability of Voice Assisted IoT.
Proceedings of the Computer Information Systems and Industrial Management, 2022

2021
VADiRSYRem: VANET-Based Diagnosis and Response System for Remote Locality.
SN Comput. Sci., 2021

NFR-aware prioritization of software requirements.
Syst. Eng., 2021

An efficient brain tumor image classifier by combining multi-pathway cascaded deep neural network and handcrafted features in MR images.
Medical Biol. Eng. Comput., 2021

Requirement-oriented risk management for incremental software development.
Innov. Syst. Softw. Eng., 2021

Verifiability in Systems and Data Engineering: Preface by the Special Issue Editors.
Innov. Syst. Softw. Eng., 2021

Data mining-based hierarchical transaction model for multi-level consistency management in large-scale replicated databases.
Comput. Stand. Interfaces, 2021

CARO: A Conflict-Aware Requirement Ordering Tool for DevOps.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

A Novel Proposal of Using NLP to Analyze IoT Apps Towards Securing User Data.
Proceedings of the Computer Information Systems and Industrial Management, 2021

2020
An efficient method for PET image denoising by combining multi-scale transform and non-local means.
Multim. Tools Appl., 2020

A Study on Energy-Efficient Routing Protocols for Wireless Sensor Networks.
Proceedings of the Advanced Computing and Systems for Security, 2020

2019
Cluster Based Framework for Alleviating Buffer Based Congestion for Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Dynamic Scheduling of Traffic Signal (DSTS) Management in Urban Area Network.
Proceedings of the Computer Information Systems and Industrial Management, 2019

ZoBe: Zone-Oriented Bandwidth Estimator for Efficient IoT Networks.
Proceedings of the Advanced Computing and Systems for Security, 2019

A Multi-class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolutional Neural Network.
Proceedings of the Advanced Computing and Systems for Security, 2019

2018
An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare.
Int. J. Softw. Eng. Knowl. Eng., 2018

Congestion Control for IoT Using Channel Trust Based Approach.
Proceedings of the Computer Information Systems and Industrial Management, 2018

Disaster Management System Using Vehicular Ad Hoc Networks.
Proceedings of the Advanced Computing and Systems for Security, 2018

2017
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
Cluster-based energy-aware routing scheme (CBEARS) for wireless sensor network.
Int. J. Sens. Networks, 2016

Context and Trust Aware Workflow Oriented Access Framework.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Hierarchical Data Aggregation Based Routing for Wireless Sensor Networks.
Proceedings of the Computational Collective Intelligence - 8th International Conference, 2016

Checkpoint based multi-version concurrency control mechanism for remote healthcare system.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Towards Generating a Unique Signature for Remote User by Keystrokes Dynamics.
Proceedings of the Computer Information Systems and Industrial Management, 2016

A Heuristic Framework for Priority Based Nurse Scheduling.
Proceedings of the Advanced Computing and Systems for Security, 2016

Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory.
Proceedings of the Advanced Computing and Systems for Security, 2016

2015
A new concurrency control mechanism for multi-threaded environment using transactional memory.
J. Supercomput., 2015

U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device.
Proceedings of the Computer Information Systems and Industrial Management, 2015

Implementing Software Transactional Memory Using STM Haskell.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

The Design of Hierarchical Routing Protocol for Wireless Sensor Network.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

Securing Service in Remote Healthcare.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2014
Comparative Performance Analysis of AESCRT Using NS2.
Proceedings of the 2014 International Conference on Information Technology, 2014

A New Contention Management Technique for Obstruction Free Transactional Memory.
Proceedings of the Computer Information Systems and Industrial Management, 2014

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud.
Proceedings of the Computer Information Systems and Industrial Management, 2014

Trust-Based Routing for Vehicular Ad Hoc Network.
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014

2013
Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2013

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Application of Data mining in Protein sequence Classification
CoRR, 2012

AMC Model for Denial of Sleep Attack Detection
CoRR, 2012

A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network
CoRR, 2012

Sleep Deprivation Attack Detection in Wireless Sensor Network
CoRR, 2012

A survey of data mining applications in water quality management.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks.
Proceedings of the Computer Information Systems and Industrial Management, 2012

A Cryptographic Approach towards Black Hole Attack Detection.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

A Brief Review of Data Mining Application Involving Protein Sequence Classification.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

MERCC: Multiple Events Routing with Congestion Control for WSN.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Lightweight Hierarchical Model for HWSNET
CoRR, 2011

SRCHS - A Stable Reliable Cluster Head Selection Protocol.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

A Novel Power-Balanced Routing Scheme for WSN.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Handling Write Lock Assignment in Cloud Computing Environment.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

VAMI - A Novel Architecture for Vehicular Ambient Intelligent System.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
BHIDS: a new, cluster based algorithm for black hole IDS.
Secur. Commun. Networks, 2010

A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks
CoRR, 2010

Intrusion detection: Ad-hoc networks to ambient intelligence framework.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

MALBACO - a new Multi-Agent Load Balanced Ant Colony Optimization Algorithm for MANETs.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

2008
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

2005
A new scalable optimal topology for multi-hop optical networks.
Comput. Commun., 2005

2003
A New Logical Topology Based on Barrel Shifter Network over an All Optical Network.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2000
A New Scalable Topology for Multihop Optical Networks.
Proceedings of the Advances in Computing Science, 2000

A New Multihop Logical Topology for Reliable Broadband Communication.
Proceedings of the Advances in Computing Science, 2000


  Loading...