2012
top
  • C. Rupani, S. Jadhav, M. Belliappa, S. Deka, R. Panday, V. Patni, N. Behl, S. Sahai, M. Natu, V. Sadaphal, Analytics-led Approach for Performance and Capacity Management of Enterprise Systems (Best Paper Award), In Proceedings of TACTICS, TCS Technical Architects Conference, New Delhi, India, May 2012.
pdf
  • P. Unde, H. Vin, M. Natu, V. Kulkarni, D. Thomas, S. Vasudevan, A. Dhongade, C. Jog, S. Sahai, R. Pathak, Architecting the Database Access for a IT Infrastructure and Data Center Monitoring tool, In Proceedings of International Workshop on Spatio Temporal data Integration and Retrieval (STIR), colocated with ICDE, Washington DC, USA, Apr. 2012.
pdf
  • S. Deshpande, R. Srivastava, S. Pawar, S. Bhat, G. Palshikar, iTAG: Analytics for Talent Acquisition, In Proceedings of TCS Technical Architects' Conference, TACTiCS, 2012, Apr. 2012.
pdf
  • V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, R. Motwani, Distributed Data for Secure Database Services, Transactions on Data Privacy, 5 (1), Apr. 2012, pages 253-272.
pdf
  • V. K. Mohan Raj, R. Shriram, A Study on Server Sleep Mode Transition to Reduce Power Consumption in Virtualized Environment, In Proceedings of COMSNETS E6 Workshop, Jan. 2012.
  • V. Sadaphal, M. Natu, H. Vin, P. Shenoy, Varanus: More-With-Less Fault Localization in Data Centers (Best Paper Award), In Proceedings of International Conference on COMmunication Systems and NETworkS (COMSNETS), Bangalore, India, Jan. 2012.
pdf
  • S. Pawar, R. Srivastava, G. Palshikar, Automatic Gazette Creation for Named Entity Recognition and Application to Resume Processing, In Proceedings of ACM COMPUTE 2012 Conference, Pune, India, Jan. 2012.
pdf
  • M. Natu, G. Palshikar, Interesting Subset Discovery and its Application on Service Processes, Book chapter in "Data Mining for service", Springer-Verlag series of Studies in Computational Intelligence (SCI) 2012.
pdf
  • G. Palshikar, Techniques for Named Entity Recognition: A Survey 2012.
pdf
  • V. Banahatti, M. Shukla, S. Lodha, S. Chamarty, SafePass, In Proceedings of 8th TCS Technical Architects’ Global Conference (TACTiCS) 2012.
pdf
  • M. Gharote, R. Patil, S. Lodha, Trainees Assighment Problem in Information Technology (IT) Service Organizations, In Proceedings of 4th International Conference on Applied Operations Research (ICAOR) 2012, pages 46-53.
pdf
  • S. Jadhav, P. Unde, V. K. Mohan Raj, M. Gharote, H. Vin, Software Version Optimization for End User Computing, In Proceedings of 8th TCS Technical Architects’ Global Conference (TACTiCS) (Poster Presentation) 2012.
pdf
  • S. Lodha, N. Patwardhan, A. Roy, S. Sundaram, D. Thomas, Data Privacy using Masketeer, In Proceedings of 9th International Colloquium on Theoretical Aspects of Computing, LNCS 7521 2012, pages 151-158.
pdf
  • D. Thomas, S. Lodha, M. Gharote, Excel Solvers for the Travelling Salesman Problem, In Proceedings of 8th TCS Technical Architects’ Global Conference (TACTiCS), 2012 2012.
pdf
  • A. Ukil, S. Bandyopadhyay, J. Joseph, V. Banahatti, S. Lodha, Negotiation Based Privacy Preservation Scheme in Internet of Things Platform, In Proceedings of 1st International Conference on Security of Internet of Things (SecurIT) 2012.
pdf
2011
top
  • R. Agrawal, V. Sadaphal, Batch systems: Optimal scheduling and processor optimization, In Proceedings of 18th International Conference on High Performance Computing (HiPC 2011), Bangalore, India, Dec. 2011.
pdf
  • A. Aluri, M. Natu, Determining Causal Relationships amongst Data Using Bayesian Networks, In Proceedings of 18th International Conference on High Performance Computing (HiPC 2011), Bangalore, India, Dec. 2011.
pdf
  • A. Kumar, R. Ghosh, M. Natu, Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks, In Proceedings of 18th International Conference on High Performance Computing (HiPC 2011), Bangalore, India, Dec. 2011.
pdf
  • V. Sadaphal, M. Natu, H. Vin, P. Shenoy, If-What Analysis for Data Center Transformations, In Proceedings of Middleware, Lisbon, Dec. 2011.
pdf
  • R. Singh, p. Shenoy, M. Natu, V. Sadaphal, H. Vin, Predico: A System for What-if Analysis in Complex Data Center Applications, In Proceedings of Middleware, Lisbon, Dec. 2011.
pdf
  • Z. Wang, S. Karande, H. Sadjadpour, J. Garcia-Luna-Aceves, On the Multicast Capacity of Wireless Ad Hoc Networks with Network Coding, Journal of Communication and Networks, Oct. 2011.
pdf
  • R. Srivastava, G. Palshikar, RINX: Information Extraction, Search and Insights from Resumes, In Proceedings of TCS Technical Architects' Conf., (TACTiCS 2011), Thiruvanthapuram, India, Apr. 2011.
pdf
  • V. Saradhi, G. Palshikar, Employee Churn Prediction, Expert Systems and Applications, 38 (3), Mar. 2011.
pdf
  • G. Palshikar, S. Deshpande, G. Athiappan, Combining Summaries using Unsupervised Rank Aggregation, In Proceedings of Int. Conference on Intelligent Text Processing and Computational Linguistics (CICLing 2012), New Delhi, 11-17 March, 2011, LNCS 7182, Mar. 2011, pages 378-389.
pdf
  • S. Karande, Z. Wang, H. Sadjadpour, J. Garcia-Luna-Aceves, Multicast throughput order of network coding in wireless ad-hoc networks, IEEE Transactions on Communications, Feb. 2011.
pdf
  • M. Natu, V. Sadaphal, S. Patil, A. Mehrotra, Mining Frequent Subgraphs to Extract Communication Patterns in Data-Centres, In Proceedings of International Conference on Distributed Compoting and Networks, ICDCN, Bangalore, Jan. 2011.
pdf
  • D. Jeswani, A. Kesharwani, S. Chaudhari, V. Sadaphal, R. Ghosh, Efficient Target Tracking through Binary-Detection in Sparsely Deployed WSN, In Proceedings of third International Conference on COMmunication Systems and NETworkS (COMSNETS) 2011, Bangalore, India, Jan. 2011.
pdf
  • V. K. Mohan Raj, R. Shriram, Power Aware Provisioning in Cloud Computing Environment, In Proceedings of IEEE International Conference on Computer, Communication and Electrical Technology 2011.
  • V. K. Mohan Raj, R. Shriram, Improving Energy efficiency using request tracing as a tool in a Multi-tier Virtualized Environment, In Proceedings of Third IEEE International Conference on Advanced computing 2011.
  • G. Palshikar, H. Vin, V. Saradhi, M. Mudassar, Discovering Experts, Experienced Persons and Specialists for IT Infrastructure Support, Service Science journal, 3 (1) 2011.
pdf
  • P. Desnoyers, T. Wood, P. Shenoy, S. Patil, H. Vin, Modellus: Automated Modeling of Complex Data Center Applications, ACM Transactions on the Web 2011.
  • R. Krishna, S. Nanda, A. Kulkarni, S. Patil, A partial Granger causality based method for analysis of parameter interactions in bioreactors, Computers & Chemical Engineering, 35 (1) 2011, pages 121-126.
  • J. Augustine, Q. Han, P. Loden, S. Lodha, Tight Analysis of Shortest Path Convergecast in Wireless Sensor Networks, In Proceedings of 17th Computing: the Australasian Theory Symposium (CATS) 2011.
pdf
  • V. Ganapathy, D. Thomas, T. Feder, H. Garcia-Molina, R. Motwani, Distributed Data for Secure Database Services, In Proceedings of 4th International Workshop on Privacy and Anonymity in the Information Society (PAIS), 2011. Also presented in 7th World TCS Technical Architects’ Conference (TACTiCS) - Global 2011.
pdf
2010
top
  • M. Natu, G. Palshikar, Interesting Subset Discovery and its Application on Service Processes, In Proceedings of Workshop on Data Mining for Service, collocated with IEEE International Conference on Data Mining, Sydney, Australia, Dec. 2010.
pdf
  • G. Palshikar, H. Vin, M. Mudassar, M. Natu, Domain-driven Data Mining for IT Infrastructure Support, In Proceedings of Workshop on Domain Driven Data Management, collocated with IEEE International Conference on Data Mining, Sydney, Australia, Dec. 2010.
pdf
  • S. Sahai, M. Natu, V. Sadaphal, Analyzing Periodically Occurring Patterns in Time Series, In Proceedings of International Confernce on Management of Data (COMAD), Nagpur, India, Dec. 2010.
pdf
  • R. Patil, A. Kumat, K. Bulbule, M. Natu, Defending DDoS Attacks Using Traffic Differentiation and Distributed Deployment, In Proceedings of International Conference on High Performance Computing, Student Research Symposium, Goa, India, Dec. 2010.
pdf
  • D. Jeswani, R. Ghosh, M. Natu, Adaptive Monitoring: A Hybrid Appraoch to Monitoring using Probing, In Proceedings of International Conference on High Performance Computing, Student Research Symposium, Goa, India, Dec. 2010.
pdf
  • A. Kesharwani, V. Sadaphal, M. Natu, Empowering Bus Transportation System Using Wireless Sensor Networks, In Proceedings of Adaptive Monitoring: A Hybrid Appraoch to Monitoring using Probing, Dec. 2010.
pdf
  • M. Gharote, S. Lodha, ExBOS – Excel Based Optimization Software Framework, In Proceedings of 14th Annual International Conference of the Society of Operations Management (SOM), Mumbai, Dec. 2010.
pdf
  • S. Patil, S. Roy, J. Augustine, A. Redlich, A. Deshpande, M. Gharote, S. Lodha, A. Mehrotra, H. Vin, Minimizing Testing Overheads in Database Migration Lifecycle, In Proceedings of 16th International Conference on Management of Data (COMAD), Nagpur, India, Dec. 2010.
pdf
  • V. Sadaphal, B. Jain, Impact of Colinearity of Sensors Selected for Location Estimation, In Proceedings of 17th International Conference on High Performance Computing (HiPC 2010), Goa, India, Dec. 2010.
pdf
  • D. Jeswani, A. Kesharwani, S. Chaudhari, R. Ghosh, V. Sadaphal, Entry-Exit Based Target Tracking using Non-Overlapping Sensor Deployment, In Proceedings of 17th International Conference on High Performance Computing (HiPC 2010), Goa, India, Dec. 2010.
pdf
  • A. Kher, A. Khatavkar, S. Bamb, V. Sadaphal, Efficient Algorithms to Compute Sleep Schedules and Minimum Delay Routes in Sensor Networks, In Proceedings of 17th International Conference on High Performance Computing (HiPC 2010), Goa, India, Dec. 2010.
pdf
  • K. Misra, S. Karande, H. Radha, Maximal recovery network coding under topology constraint, IEEE Transactions on Information Theory, Dec. 2010.
  • M. Ahmed, S. Das, S. Lodha, Approximation Algorithms for Shortest Descending Paths in Terrains, Journal of Discrete Algorithms, 8 (2), Jun. 2010, pages 214-230.
pdf
  • J. Augustine, B. Putnam, S. Roy, Largest Empty Circle Centered on a Query Line, Journal of Discrete Algorithms, 8 (2), Jun. 2010, pages 143-153.
pdf
  • J. Ramanand, K. Bhavsar, N. Pedanekar, 'Wishful Thinking - Finding suggestions and ’buy’ wishes from product reviews, In Proceedings of NAACL HLT 2010 Workshop on Computational Approaches to Analysis and Generation of Emotion in Text, Los Angeles, California, Jun. 2010, pages 54-61.
  • N. Pedanekar, V. Balaraman, Wizdom Tree: Smart Search and Dictionary Generation, In Proceedings of Cognizant Technology Conference, Chennai, Jun. 2010.
  • D. Jeswani, N. Korde, D. Patil, M. Natu, J. Augustine, Probe Station Selection Algorithms for Fault Management in Computer Networks, In Proceedings of International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, Jan. 2010.
pdf
  • M. Natu, S. Patil, V. Sadaphal, H. Vin, Automated Debugging of SLO Violations in Enterprise Systems, In Proceedings of International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, Jan. 2010.
  • S. Patil, G. Aphale, A. Mehrotra, H. Vin, R. Kelkar, Run-time Dependency Tracking in Data Centers, In Proceedings of COMPUTE 2010, Bangalore, India, Jan. 2010.
  • V. Banahatti, S. Iyengar, S. Lodha, High Utility Data Generation Using DataXplod , In Proceedings of 6th World TCS Technical Architects’ Conference organized by TCS (TACTiCS) - Global (Best Paper Award in TACTiCS-West) 2010.
pdf
  • A. Gajendragadkar, S. Sundaram, HIPAA Compliant Wi-Fi Deployment, In Proceedings of 6th World TCS Technical Architects’ Conference organized by TCS (TACTiCS) - West 2010.
pdf
  • N. Patwardhan, V. Banahatti, K. Dhamelia, R. Mann, A. Roy, S. Lodha, Integrated Offline-Online Masking Solution for Enterprise, In Proceedings of 6th World TCS Technical Architects’ Conference organized by TCS (TACTiCS) – West 2010.
pdf
  • G. Palshikar, A. Ahuja, H. Vin, Utilization Analysis of Servers in a Data Centre, In Proceedings of ICDEM 2010 2010.
  • M. Gharote, S. Lodha, A Systematic Approach to Team Building for Software Projects, In Proceedings of Operations Research 2010 conference, Munich, Germany 2010.
pdf
  • V. K. Mohan Raj, Y. Singh, . Jithendiran, S. Rao, Load Balancing based on Electrical Power, In Proceedings of 24th National Convention of Computer Engineers and National Seminar on Green Computing, Institution of Engineers 2010.
  • S. Deshpande, G. Palshikar, G. Athiappan, An Unsupervised Approach to Sentence Classification, In Proceedings of Int. Conf. on Management of Data (COMAD 2010), Nagpur, 2010, Allied PublishersPvt. Ltd. 2010, pages 88-99.
pdf
  • G. Das, A. Mukhopadhyay, S. Nandy, S. Patil, S. Rao, Computing the straight skeletons of a monotone polygon in O(n log n) time, In Proceedings of 22nd Canadian Conference on Computational Geometry (CCCG) 2010.
  • S. Patil, V. Sadaphal, M. Natu, H. Vin, Proactive Management of Data-centers using Automated As-Is Analysis, In Proceedings of TACTiCS, TCS Technical Architects’ Conference, India (West) 2010.
2009
top
  • T. Ratnaparkhe, S. Natekar, S. Chandan, V. Sadaphal, Dominating Set based Selection of Time Synchronizing Nodes in Sensor Network, In Proceedings of Student Research Symposium, International Conference on High Performance Computing (HiPC), Cochi, India, Dec. 2009.
  • D. Jeswani, N. Korde, D. Patil, M. Natu, J. Augustine, Probe Station Selection for Robust Network Monitoring, In Proceedings of Student Research Symposium, International Conference on High Performance Computing (HiPC), Cochi, India (Best Paper Award), Dec. 2009.
pdf
  • S. Sahai, M. Natu, M. Jain, A Self-Adaptive Spike Detection Algorithm with Application in Performance and Capacity Management, In Proceedings of International Conference on Management of Data (COMAD), Mysore, India, Dec. 2009.
  • V. Sadaphal, B. Jain, The Role of Colinearity of Sensors in Target Localization using Distance Measurements, In Proceedings of ACM MSWiM, Oct. 2009.
  • P. Lam, J. Mitchell, S. Sundaram, A formalization of HIPAA for a Message Passing System, In Proceedings of TRUSTBUS '09 the 6th International Conference on Trust, Privacy & Security in Digital Business, Linz, Austria, LNCS 5695, Sep. 2009, pages 73-85.
pdf
  • M. Panduranga Rao, Computational Lower Bounds Using Diagonalization (Part I) - Languages, Turing Machines and Complexity Classes, Resonance, 14 (7), Jul. 2009, pages 682-690.
pdf
  • G. Palshikar, Simple Algorithms for Peak Detection in Time-Series, In Proceedings of 1st IIMA International Conference on Advanced Data Analysis, Business Analytics and Intelligence, Ahmedabad, India, Jun. 2009.
pdf
  • C. Deshpande, S. Lodha, A. Sreenivas, S. Tiwari, Cutting Regression Testing Costs Without Compromising Quality, The TACTiCS Journal, 1, Apr. 2009, pages 17-21.
pdf
  • G. Palshikar, Fault Localization in Power Distribution Networks using Operative Diagnosis, The TACTiCS Journal (published by TCS), Apr. 2009, pages 30-35.
pdf
  • G. Palshikar, S. Deshpande, S. Bhat, QUEST: Discovering Insights from Survey Responses, In Proceedings of TCS Technical Architects’ Conference (TACTiCS 2009), Apr. 2009.
pdf
  • E. Cecchet, M. Natu, V. Sadaphal, P. Shenoy, H. Vin, Performance Debugging in Data Centers: Doing More with Less, In Proceedings of International Conference on Communication Systems and Networks (COMSNETS’09), Bangalore, 2009.
pdf
  • V. Sadaphal, B. Jain, Tracking mobile target using selected sensors, In Proceedings of COMSNETS 2009, Bangalore, India, 2009.
pdf
  • V. Banahatti, S. Lodha, SafeMask (Best Paper Award), In Proceedings of 5th World TCS Technical Architects’ Global Conference organized by TCS (TACTiCS), Pune 2009.
pdf
  • D. Bardhan, S. Roy, S. Das, Guard Placement Problem under L-Visibility, International Journal of Computational Geometry and Applications, 19 (4) 2009, pages 357-370.
pdf
  • M. Gharote, S. Lodha, P. Barar, Y. Thakoor, "Optimal Allocation" of ILP Trainees, In Proceedings of 5th World TCS Technical Architects’ Global Conference organized by TCS (TACTiCS), Pune 2009.
pdf
  • S. Roy, S. Bhattacharjee, S. Das, S. Nandy, A New Fast Heuristic for Labeling Points, Information Processing Letters, 109 (10) 2009, pages 478-484.
pdf
  • S. Roy, A. Karmakar, S. Das, S. Nandy, Constrained Minimum Enclosing Circle with Center on a Query Line Segment, Computational Geometry Theory and Applications, 42 2009, pages 632-638.
pdf
  • V. K. Mohan Raj, Y. Singh, S. Rao, Power Minimizer Model for Server Clusters, In Proceedings of Poster, i-CARE, IBM Research Labs Academia Research Exchange Programme 2009.
2008
top
  • M. Gharote, S. Lodha, A. Deshpande, N. Kantharia, Y. Wadademar, A. Rao, Automated Telescope Scheduling, In Proceedings of Low Frequency Radio Universe Conference (LFRU), Pune, Dec. 2008.
pdf
  • M. Gharote, S. Sahay, B. Ingole, N. Sonawane, V. Vijay, Comparison and Evaluation of the Product Supply-Chain of Global Steel Enterprises, In Proceedings of 12th Annual Conference of the Society of Operations Management, IIT Kanpur, Dec. 2008.
pdf
  • M. Panduranga Rao, A. Ahuja, S. Iyengar, K. Iyer, R. Khade, S. Lodha, D. Mehta, B. Nagy, A Minimum Variance Method for Problems in Radio Antenna Placement, In Proceedings of Low Frequency Radio Universe Conference (LFRU), Dec. 2008.
pdf
  • S. Ganesh, M. Natu, A. Sethi, R. Gopaul, R. Hardy, Design Approaches for Stealthy Probing Mechanisms in Battlefield Networks, In Proceedings of IEEE Military Communications Conference, San Diego, CA, Nov. 2008.
pdf
  • V. Mahajan, M. Natu, A. Sethi, Analysis of Wormhole Intrusion Attacks in MANETs, In Proceedings of IEEE Military Communications Conference, San Diego, CA, Nov. 2008.
pdf
  • M. Gharote, A. Deshpande, Optimization of Integrated Forward and Reverse Supply Chain, In Proceedings of 18th Triennial Conference of the International Federation of Operational Research Societies (IFORS),Johannesburg, South Africa, Jul. 2008.
pdf
  • M. Natu, A. Sethi, Using Temporal Correlation for Fault Localization in Dynamically Changing Networks, International Journal of Network Management, 18 (4), Jul. 2008, pages 303-316.
pdf
  • C. Chao, M. Natu, A. Sethi, Call Forwarding-Based Active Probing for POTS Fault Isolation, Journal of Network and Systems Management, 16 (2), Jun. 2008, pages 145-162.
pdf
  • S. Agarwal, V. Saradhi, H. Karnick, Kernel-based On-line Machine Learning and Support Vector Reduction, Neurocomputing, 71 (7), May 2008, pages 1230-1237.
  • V. Sadaphal, B. Jain, Random and Periodic Sleep Schedules for Target Detection in Sensor Network, Springer Journal of Computer Science and Technology, 23 (3), May 2008.
  • G. Palshikar, M. Apte, Collusion Set Detection using Graph Clustering, Data Mining and Knowledge Discovery (Springer), 16 (2), Apr. 2008, pages 135-164.
pdf
  • M. Natu, A. Sethi, Application of Adaptive Probing for Fault Diagnosis in Computer Networks, In Proceedings of IEEE/ IFIP Network Operations and Management Symposium, Salvador, Brazil, Apr. 2008.
pdf
  • M. Natu, G. Palshikar, Discovering Interesting Subsets using Statistical Analysis, In Proceedings of International Conference on Management of Data (COMAD2008), 2008.
pdf
  • G. Palshikar, S. Deshpande, S. Pandit, Extracting Competitor Intelligence from News Items, In Proceedings of TCS Technical Architects' Conference, (TACTiCS 2008), Thiruvanthapuram, India, 2008.
  • A. Patel, M. Sarda, R. Kelkar, Virtualizing Enterprise Applications, In Proceedings of TACTiCS 2008, 2008.
  • M. Natu, A. Sethi, Probe Station Placement for Robust Monitoring of Networks, Journal of Network and Systems Management, 16 (4), 2008, pages 351-374.
pdf
  • M. Natu, A. Sethi, Using Temporal Correlation for Fault Localization in Dynamically Changing Networks, International Journal of Network Management, 18 (4), 2008, pages 303-316.
pdf
  • M. Natu, A. Sethi, E. Loyd, Efficient Probe Selection Algorithms for Fault Diagnosis., Telecommunications Systems Journal, 37, 2008, pages 109-125.
pdf
  • M. Natu, A. Sethi, Application of Adaptive Probing for Fault Diagnosis in Computer Networks (Best Ph.D. Research Award), In Proceedings of IEEE/ IFIP Network Operations and Management Symposium, Salvador, Brazil, , 2008.
pdf
  • M. Natu, Application of of Adaptive Probing for Fault Diagnosis in Computer Networks, Ph.D. Dissertation, University of Delaware, DE, USA,, 2008.
  • V. Sadaphal, B. Jain, Tracking target using sensor networks: target detection and route activation under energy constraints, In Proceedings of COMSWARE 2008, Bangalore, India, 2008.
pdf
  • V. Sadaphal, B. Jain, Random and Periodic sleep schedules for target detection in sensor networks, Springer Journal of Computer Science and Technology, 2008, 2008.
pdf
  • V. Vijaya Saradhi, H. Karnick, P. Mitra, Topic Distillation using Support Vector Data Description, In Proceedings of COMAD, 2008.
  • V. Vijaya Saradhi, H. Karnick, On the Stability and Bias-Variance Analysis of Sparse SVMs, 2008.
  • M. Meshram, A. Kulkarni, S. Lele, V. Jayaraman, B. Kulkarni, Optimal Xylanase production using Penicilium Janthinellum NCIM 1169: A model based approach, Biochemical Engineering Journal, 40 (2), 2008, pages 348-356.
  • K. Patil, A. Kulkarni, Kernel Enabled Methods for Subspace Regression and Efficient Control, "International Journal of Modeling, Identification and Control", 4 (3), 2008.
  • S. Angadi, A. Kulkarni, Nonlinear signal analysis to understand the dynamics of the protein sequences, European Physical Journal Special Topics, 164, 2008, pages 141-155.
  • S. Angadi, V. Banahatti, S. Chaudhury, A. Chauhan, H. Hayatnagarkar, S. Mittal, R. R, P. Ramakumar, N. Rao, H. Vin, Automating Change Detection and Impact Analysis, In Proceedings of 4th World TCS Technical Architects’ Global Conference organized by TCS (TACTiCS), Thiruvananthapuram, India, 2008.
pdf
  • J. Augustine, S. Irani, C. Swamy, Optimal Power-Down Strategies, SIAM Journal on Computing, 37 (5), 2008, pages 1499-1516.
pdf
  • P. Bose, S. Langerman, S. Roy, Smallest Enclosing Circle Centered on a Query Line Segment, In Proceedings of Canadian Conference on Computational Geometry (CCCG), 2008, pages 167-170.
pdf
  • G. Das, S. Roy, S. Das, S. Nandy, Variations of Base Station Placement Problem on the Boundary of a Convex Region, International Journal of Foundations of Computer Science, 19, 2008, pages 405-427.
  • C. Deshpande, S. Tiwari, S. Lodha, Cutting Regression Testing Costs Without Compromising Quality, In Proceedings of 4th Annual World TCS Technical Architects’ Conference (TACTiCS), 2008, pages 164-168.
pdf
  • A. Karmakar, S. Roy, S. Das, Fast Computation of Smallest Enclosing Circle with Center on a Query Line Segment, Information Processing Letters, 108, 2008, pages 339-422.
pdf
  • A. Karmakar, S. Roy, S. Das, Guarding Exterior Region of a Simple Polygon, In Proceedings of Workshop on Algorithms and Computation (WALCOM), 2008, pages 100-110.
  • S. Patil, A. Deshpande, M. Gharote, A. Mehtrota, H. Vin, Optimizing Database Migrations, In Proceedings of 4th World TCS Technical Architects’ Global Conference organized by TCS (TACTiCS), 2008.
pdf
  • M. Panduranga Rao, Interference Automata, 2008, pages 89-103.
pdf
  • S. Roy, D. Bardhan, S. Das, Base Station Placement on Boundary of a Convex Polygon, "Journal of Parallel and Distributed Computing,", 68, 2008, pages 263-275.
pdf
  • S. Sundaram, A. Behal, S. Nguyen, J. Mitchel, HIPAA Compliance Checker, In Proceedings of 5th World TCS Technical Architects’ North America Conference organized by TCS (TACTiCS NA), Phoenix, USA, 2008.
pdf
  • M. Panduranga Rao, Generalized Counters and Reversal Complexity, International Journal of Foundations of Computer Science, 19 (6) 2008, pages 1403-1412.
pdf
  • M. Panduranga Rao, V. Vinay, Quantum Finite Automata and Weighted Automata, Journal of Automata, Languages and Combinatorics, 13 (2) 2008, pages 125-139.
pdf
  • M. Natu, A. Sethi, Probe station placement for robust monitoring of networks, Journal of Network and Systems Management, 16 (4) 2008, pages 351-374.
pdf
  • V. Sadaphal, B. Jain, Target using Sensor Networks: Target Detection and Route Activation under Energy Constraints, In Proceedings of COMSWARE 2008, Bangalore, India 2008.
2007
top
  • G. Palshikar, Keyword Extraction from Single Document using Centrality Measures, In Proceedings of 2nd International Conference Pattern Recognition and Machine Intelligence (PReMI 2007), Kolkata, India, Dec. 2007, pages 503-510.
  • G. Palshikar, Representation and Execution of Graph Grammar in Prolog, In Proceedings of 23rd International Conference on Logic Programming (ICLP 2007), Porto, Portugal, LNCS 4670, Springer, Sep. 2007, pages 442-443.
  • S. Lodha, D. Thomas, Probabilistic Anonymity, In Proceedings of 1st ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD (PinKDD ‘07), Aug. 2007, pages 56-79.
pdf
  • G. Palshikar, M. Kale, M. Apte, Association Rules Mining using Heavy Itemsets, Data and Knowledge Engineering (Elsevier-Science), 61 (1), Apr. 2007, pages 93-113.
pdf
  • C. Anantaram, A Framework to specify Declarative Rules on Objects, Attributes and Associations in the object model, "Journal of Object Technology, ETH Swiss Federal Institute of Technology (to appear)", Jan. 2007.
  • P. Railkar, A. Nagpal, Multilayered feed forward Artificial Neural Network model for classification of clouds and weather prediction from Microwave Satellite Data, In Proceedings of In Proceedings of SEDS (Students for Exploration and Development of Space) International Conference (SEDSIC) 2007- VIT Vellore, India, 2007, 2007.
  • P. Railkar, A. Nagpal, Automation of Business Process Composition in Semantic Web Environment, In Proceedings of Second National Conference on Emerging Trends in IT 2007 - Baramati, India, 2007, 2007.
  • S. Patil, H. Vin, A. Deshpande, A. Mehrotra, M. Gharote, Optimizing Database Migrations, In Proceedings of TACTiCS 2007, 2007.
  • P. Desnoyers, T. Wood, P. Shenoy, S. Patil, H. Vin, Modellus: Automated Modeling of Complex Data Center Applications, Technical Report TR31-07, 2007.
pdf
  • K. Patil, A. Kulkarni, A Simple Visualization Technique to Understand the System Dynamics in Bioreactors, Biotechnology Progress, 23 (5), 2007, pages 1100-1105.
  • S. Aravamuthan, S. Lodha, The Average Transmission Overhead for Broadcast Encryption, Journal of Mathematical Cryptology, 1 (4), 2007, pages 373-384.
pdf
  • A. Barth, J. Mitchell, A. Datta, S. Sundaram, Privacy and Utility in Business Processes, In Proceedings of 20th IEEE Computer Security Foundations Symposium (CSF’07), 2007, pages 279-294.
pdf
  • A. Karmakar, S. Roy, S. Das, Fast Computation of Smallest Enclosing Circle with Center on a Query Line Segment, In Proceedings of Canadian Conference on Computational Geometry (CCCG), 2007, pages 273-276.
pdf
  • S. Lodha, Data Masking, In Research by Design: Innovation and TCS, 2007, pages 100-106.
pdf
  • S. Roy, S. Lodha, S. Das, A. Maheshwari, Approximate Shortest Descent Path on a Terrain, In Proceedings of Canadian Conference on Computational Geometry (CCCG), 2007, pages 189-192.
pdf
  • M. Gharote, N. Hemachandra, N. Rangaraj, Periodic Review for Reverse Logistics with Remanufacturing, Stocking and Disposal, Technology, Operations and Management, 1 2007, pages 27-36.
pdf
2006
top
  • B. Csaba, S. Lodha, Randomized Online Algorithm for the k-Server Problem on a Line, Random Structures and Algorithms, 29 (1), Aug. 2006, pages 82-104.
pdf
  • N. Goyal, S. Lodha, M. Muthukrishnan, The Graham-Knowlton Problem Revisited, "Theory of Computing Systems, ", 39 (3), Jun. 2006, pages 399-412.
pdf
  • S. Aravamuthan, S. Lodha, Coloring Codes for Hats-on-a-line, The Electronic Journal of Combinatorics, 13 (1), Mar. 2006.
pdf
  • G. Palshikar, R. Kelkar, Anomaly Detection in Labeled Data, In Proceedings of International Conference on Management of Data (COMAD 2006), New Delhi, India, 2006.
  • S. Idicula-Thomas, A. Kulkarni, S. Lele, B. Kulkarni, V. Jayaraman, P. V. Balaji, A support vector machine-based method for predicting the propensity of a protein to be soluble or to form inclusion body on overexpression in Escherichia coli, Bioinformatics, 22, 2006, pages 278-284.
  • H. Vin, N. Pedanekar, A. Chauhan, V. Banahatti, Systematic Evolution of IT PlCants: The Sense-Understand-Respond (SURe) Way, In Proceedings of Systematic Evolution of IT PlCants: The Sense-Understand-Respond (SURe) Way,Hyderabad, India, 2006.
pdf
2005
top
  • A. Bijral, G. Palshikar, Mining Interesting Temporal Patterns: An Information Theoretic Approach, In Proceedings of 2nd Indian International Conference on Artificial Intelligence (IICAI-2005), Pune, India, Dec. 2005, pages 1377-+1389.
  • G. Palshikar, M. Apte, Collusion Set Detection Using Graph Clustering, In Proceedings of International Conference on Management of Data (COMAD 2005b), Hyderabad, India, Allied Publishers, Dec. 2005, pages 101-112.
  • G. Palshikar, Distance-based Outliers in Sequences, In Proceedings of Second International Conference on Distributed Computing and Internet Technology (ICDCIT 2005),Bhubaneswar, India, Dec. 2005, pages 547-552.
  • M. Kale, G. Palshikar, S. Chhajed, L. Deshpande, Data Mining over Textual Data, In Proceedings of TCS Technical Architects’ Conference (TACTiCS 2005), Tata Consultancy Services, Hyderabad, India, Dec. 2005.
  • C. Anantaram, S. Bhat, A text-based conversational interface for menu-driven applications, using semantic-web technology, In Proceedings of TACTiCS – TCS Technical Architects’ Conference’05, Tata Consultancy Services Limited, Hyderabad, Dec. 2005.
  • G. Palshikar, Satisfying the Satisfiability Problem, C/C++ Users’ Journal, Sep. 2005, pages 20-24.
  • M. Mudassar, Target Location and Identity Estimation and Fusion Using Disparate Sensor Data, In Proceedings of AIAA Guidance,Navigation, and Control Conference and Exhibit, San Francisco, California, Aug. 2005.
  • C. Anantaram, Processing and Reasoning over large Text and Numeric data sets in C4I2 domain, In Proceedings of Closed Door Seminar on Developing C4I2 Capabilities and Embedded Systems, Confederation of Indian Industry, New Delhi, Jun. 2005.
  • G. Palshikar, M. Kale, M. Apte, Association Rules Mining using Heavy Itemsets, In Proceedings of International Conference Management of Data (COMAD 2005), Goa, India, Computer Society of India, Jan. 2005, pages 148-155.
  • G. Palshikar, P. Bhaduri, Verification of Scenario-based Specifications using Templates, Electronic Notes in Theoretical Computer Science (ENTCS), 118, 2005, pages 37-55.
  • A. Kulkarni, V. Jayaraman, B. Kulkarni, Knowledge incorporated support vector machines to detect faults in Tennessee Eastman Process, Computers and Chemical Engineering, 29 (10), 2005, pages 2128-2133.
  • R. , A. Kulkarni, V. Jayaraman, B. Kulkarni, Modeling Structure Property Relationships with Kernel Recursive Least Squares, Internet Electronic Journal of Molecular Design, 4, 2005, pages 381-392.
  • S. Aravamuthan, S. Lodha, Optimal Subset Cover for Broadcast Encryption, In Proceedings of 6th International Conference on Cryptology in India (INDOCRYPT), 2005, pages 221-231.
pdf
  • V. Banahatti, Network Security: A Proactive Approach in a Multidisciplinary Environment, In Proceedings of International Conference on Multidisciplinary Aspects of Engineering Organized by IEEE and COEP, Pune, India, 2005.
pdf
  • M. Ganapathy, S. Lodha, Search Locally to Arrange Cyclically, In Proceedings of 2nd Brazilian Symposium on Graphs, Algorithms and Combinatorics (GRACO), 2005, pages 187-193.
pdf
  • S. Lodha, S. Sundaram, Data Privacy, In Proceedings of 2nd World TCS Technical Architects' Conference (TACTiCS), Hyderabad, 2005.
pdf
  • M. Gharote, A. Deshpande, Optimal Remanufacturing Strategies in Reverse Logistics, In Proceedings of 2nd World TCS Technical Architects’ Global Conference organized by TCS (TACTiCS) 2005.
pdf