Vikram Singh

According to our database1, Vikram Singh authored at least 23 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Impact of wall modeling on kinetic energy stability for the compressible Navier-Stokes equations.
CoRR, 2021

Workshops are now required to be conducted remotely: is this a bad thing?
Interactions, 2020

Visual Task Characterization for Exploratory Search.
Int. J. Inf. Syst. Soc. Chang., 2020

Improving Result Diversity Using Query Term Proximity in Exploratory Search.
Proceedings of the Big Data Analytics - 7th International Conference, 2019

A benchmarking model for Indian service industries using MICMAC and WISM approach.
Int. J. Syst. Assur. Eng. Manag., 2017

Evaluation of benchmarking attribute for service quality using multi attitude decision making approach.
Int. J. Syst. Assur. Eng. Manag., 2017

Evaluation of a Directive-Based GPU Programming Approach for High-Order Unstructured Mesh Computational Fluid Dynamics.
Proceedings of the Platform for Advanced Scientific Computing Conference, 2017

Query Morphing: A Proximity-Based Approach for Data Exploration and Query Reformulation.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2017

Distributed Query Processing Plans generation using Teacher Learner Based Optimization.
CoRR, 2016

Learning to Identify Subjective Sentences.
Proceedings of the 13th International Conference on Natural Language Processing, 2016

Weighted ISM approach to interface amongst the barriers of benchmarking in Indian service industries.
Int. J. Adv. Oper. Manag., 2015

Even More Practical Key Exchanges for the Internet using Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

A Practical Key Exchange for the Internet using Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

Multi-objective Parametric Query Optimization for Distributed Database Systems.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Improved Timing Attacks on ECDSA.
IACR Cryptol. ePrint Arch., 2014

A Security Proof of KCDSA using an extended Random Oracle Model.
IACR Cryptol. ePrint Arch., 2014

Analysis of resonance based Wireless Power Transmission using circuit theory approach.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Provable Security Proofs and their Interpretation in the Real World.
IACR Cryptol. ePrint Arch., 2013

Identification of Attributes of TQM in an Educational Institute: A System Model.
Int. J. Serv. Sci. Manag. Eng. Technol., 2011

Stochastic synchronization of circadian rhythms.
J. Syst. Sci. Complex., 2010

Integrating User's Domain Knowledge with Association Rule Mining
CoRR, 2010

Generating Distributed Query Processing Plans Using Genetic Algorithm.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

Evaluation of Potential of Innovations: A DEA-Based Application to U.S. Photovoltaic Industry.
IEEE Trans. Engineering Management, 2009