Zobrazeno 1 - 10
of 1 800
pro vyhledávání: '"Chakraborty, A."'
Autor:
Sourav Kanti Addya, Sajal K. Das, Soumya K. Ghosh, Bishakh Chandra Ghosh, Sandip Chakraborty, Anurag Satpathy
Publikováno v:
IEEE Transactions on Cloud Computing. 11:956-970
Applications hosted in commercial clouds are typically multi-tier and comprise multiple tightly coupled virtual machines (VMs). Service providers (SPs) cater to the users using VM instances with different configurations and pricing depending on the l
Publikováno v:
Materials Today: Proceedings. 80:3757-3761
The excellent way to enhance the lives of the people with disabilities is technology. There have been several avenues of research that has opened the room after the advent of Artificial Intelligence. The Lives of people with disabilities can be impro
Publikováno v:
IEEE Transactions on Software Engineering. 48:3280-3296
Automated detection of software vulnerabilities is a fundamental problem in software security. Existing program analysis techniques either suffer from high false positives or false negatives. Recent progress in Deep Learning (DL) has resulted in a su
Publikováno v:
IEEE Embedded Systems Letters. 14:71-74
Publikováno v:
IEEE Transactions on Mobile Computing. 21:1779-1797
Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most existing prot
Publikováno v:
The Journal of Supercomputing. 78:6788-6816
Autor:
Abdulrahman Alaql, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque, Saranyu Chattopadhyay
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:854-867
The security of hardware intellectual properties (IPs) has become a significant concern, as the opportunity for piracy, reverse engineering, and malicious modification is increasing. Hardware obfuscation has been studied as a potent method to protect
Publikováno v:
IEEE Internet of Things Journal. 9:2614-2626
Password is one of the most well-known authentication methods in accessing many Internet of Things (IoT) devices. The usage of passwords, however, inherits several drawbacks and emerging vulnerabilities in the IoT platform. However, many solutions ha
Publikováno v:
IEEE Transactions on Vehicular Technology. 71:1820-1831
Autor:
Matthew Henderson, Kathryn M. Denize, Pranesh Chakraborty, Malia S.Q. Murphy, Robin Ducharme, Monica Lamoureux, Julian Little, Humphrey Mwape, Bellington Vwalika, Anisur Rahman, Kumanan Wilson, Joan T. Price, Patrick Musonda, A. K. Azad Chowdhury, Brieanne Olibris, Beth K. Potter, A. Brianne Bota, Steven Hawken, Lindsay A. Wilson, Katelyn J. Rittenhouse, Jesmin Pervin, Wei Cheng, Jeffrey S. A. Stringer
Background Accurate estimates of gestational age (GA) at birth are important for preterm birth surveillance but can be challenging to obtain in low income countries. Our objective was to develop machine learning models to accurately estimate GA short
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b1b23e463a0309cfb72f31fbdd7a0bdb