Vikram Singh

According to our database1, Vikram Singh authored at least 23 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Impact of wall modeling on kinetic energy stability for the compressible Navier-Stokes equations.
CoRR, 2021

2020
Workshops are now required to be conducted remotely: is this a bad thing?
Interactions, 2020

Visual Task Characterization for Exploratory Search.
Int. J. Inf. Syst. Soc. Chang., 2020

2019
Improving Result Diversity Using Query Term Proximity in Exploratory Search.
Proceedings of the Big Data Analytics - 7th International Conference, 2019

2017
A benchmarking model for Indian service industries using MICMAC and WISM approach.
Int. J. Syst. Assur. Eng. Manag., 2017

Evaluation of benchmarking attribute for service quality using multi attitude decision making approach.
Int. J. Syst. Assur. Eng. Manag., 2017

Evaluation of a Directive-Based GPU Programming Approach for High-Order Unstructured Mesh Computational Fluid Dynamics.
Proceedings of the Platform for Advanced Scientific Computing Conference, 2017

Query Morphing: A Proximity-Based Approach for Data Exploration and Query Reformulation.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2017

2016
Distributed Query Processing Plans generation using Teacher Learner Based Optimization.
CoRR, 2016

Learning to Identify Subjective Sentences.
Proceedings of the 13th International Conference on Natural Language Processing, 2016

2015
Weighted ISM approach to interface amongst the barriers of benchmarking in Indian service industries.
Int. J. Adv. Oper. Manag., 2015

Even More Practical Key Exchanges for the Internet using Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

A Practical Key Exchange for the Internet using Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

Multi-objective Parametric Query Optimization for Distributed Database Systems.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2014
Improved Timing Attacks on ECDSA.
IACR Cryptol. ePrint Arch., 2014

A Security Proof of KCDSA using an extended Random Oracle Model.
IACR Cryptol. ePrint Arch., 2014

Analysis of resonance based Wireless Power Transmission using circuit theory approach.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Provable Security Proofs and their Interpretation in the Real World.
IACR Cryptol. ePrint Arch., 2013

2011
Identification of Attributes of TQM in an Educational Institute: A System Model.
Int. J. Serv. Sci. Manag. Eng. Technol., 2011

2010
Stochastic synchronization of circadian rhythms.
J. Syst. Sci. Complex., 2010

Integrating User's Domain Knowledge with Association Rule Mining
CoRR, 2010

Generating Distributed Query Processing Plans Using Genetic Algorithm.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

2009
Evaluation of Potential of Innovations: A DEA-Based Application to U.S. Photovoltaic Industry.
IEEE Trans. Engineering Management, 2009


  Loading...