Smriti Kumar Sinha

According to our database1, Smriti Kumar Sinha authored at least 15 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Finite State Transducer Based Morphological Analyzer of Maithili Language.
CoRR, 2020

2015
Formal concept analysis: current trends and directions.
Artif. Intell. Rev., 2015

2014
A New Pattern-Based Flexible Approach for Maintaining a Constrained Workflow.
Int. J. Softw. Eng. Knowl. Eng., 2014

Morphological Analysis of the Bishnupriya Manipuri Language Using Finite State Transducers.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014

2013
Development and Transcription of Assamese Speech Corpus.
CoRR, 2013

Towards The Development of a Bishnupriya Manipuri Corpus.
CoRR, 2013

2010
Synchronization of Authorization Flow with Work Object Flow in a Document Production Workflow Using XACML and BPEL.
Proceedings of the Information and Communication Technologies - International Conference, 2010

A New Trust Model Based on Time Series Prediction and Markov Model.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Extra-Tree: A model to organize execution traces of Web services.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

A new trust model using Hidden Markov Model based mixture of experts.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Security and Dependability Solutions for Web Services and Workflows.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

SERENITY in e-Business and Smart Item Scenarios.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

A Pattern-Based General Security Framework: An eBusiness Case Study.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
A formal solution to rewriting attacks on SOAP messages.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security Pattern Lattice: A Formal Model to Organize Security Patterns.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008


  Loading...