Samiran Chattopadhyay

Orcid: 0000-0002-8929-9605

According to our database1, Samiran Chattopadhyay authored at least 167 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment.
SN Comput. Sci., March, 2024

A cross-layer fragmentation approach to video streaming over mobile ad-hoc network using BATMAN-Adv.
Multim. Tools Appl., March, 2024

Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment.
Secur. Priv., 2024

Transfer Learning and Transformer Architecture for Financial Sentiment Analysis.
CoRR, 2024

Analysis of Multidomain Abstractive Summarization Using Salience Allocation.
CoRR, 2024

Coalition Formation for Task Allocation Using Multiple Distance Metrics (Student Abstract).
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Dec-Safe: Dynamic Decision Generation Mechanism for Delivering Safety Services in Vehicular Networks.
IEEE Trans. Veh. Technol., December, 2023

Mobility Management in 5G and Beyond: A Novel Smart Handover With Adaptive Time-to-Trigger and Hysteresis Margin.
IEEE Trans. Mob. Comput., October, 2023

Achieving Energy Efficiency and Impact of SAR in a WBAN Through Optimal Placement of the Relay Node.
Wirel. Pers. Commun., June, 2023

Smart Assistance to Reduce the Fear of Falling in Parkinson Patients Using IoT.
Wirel. Pers. Commun., May, 2023

Research Highlight Generation with ELMo Contextual Embeddings.
Scalable Comput. Pract. Exp., April, 2023

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023

Generative AI for Software Metadata: Overview of the Information Retrieval in Software Engineering Track at FIRE 2023.
CoRR, 2023

An Analysis of Abstractive Text Summarization Using Pre-trained Models.
CoRR, 2023

An Evaluation of Non-Contrastive Self-Supervised Learning for Federated Medical Image Analysis.
CoRR, 2023

Abstractive Text Summarization using Attentive GRU based Encoder-Decoder.
CoRR, 2023

Generation of Highlights From Research Papers Using Pointer-Generator Networks and SciBERT Embeddings.
IEEE Access, 2023

A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023

Exploring Self-Supervised Representation Learning for Low-Resource Medical Image Analysis.
Proceedings of the IEEE International Conference on Image Processing, 2023

Edge Intelligence-Based Safety-as-a-Service Platform for Social IoV Environment.
Proceedings of the IEEE International Conference on Communications, 2023

Abstractive Summarization of Scientific Documents: Models and Evaluation Techniques.
Proceedings of the 15th Annual Meeting of the Forum for Information Retrieval Evaluation, 2023

Efficiency of Large Language Models to scale up Ground Truth: Overview of the IRSE Track at Forum for Information Retrieval 2023.
Proceedings of the 15th Annual Meeting of the Forum for Information Retrieval Evaluation, 2023

Generative AI for Software Metadata: Overview of the Information Retrieval in Software Engineering Track at FIRE 2023.
Proceedings of the Working Notes of FIRE 2023, 2023

ExpresSense: Exploring a Standalone Smartphone to Sense Engagement of Users from Facial Expressions Using Acoustic Sensing.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
IEEE 802.11ac performance dataset.
Dataset, May, 2022

Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy.
J. Supercomput., 2022

SmartCon: Deep Probabilistic Learning-Based Intelligent Link-Configuration in Narrowband-IoT Toward 5G and B5G.
IEEE Trans. Cogn. Commun. Netw., 2022

A blockchain-based approach to secure electronic health records using fuzzy commitment scheme.
Secur. Priv., 2022

Bifurcating Cognitive Attention from Visual Concentration: Utilizing Cooperative Audiovisual Sensing for Demarcating Inattentive Online Meeting Participants.
Proc. ACM Hum. Comput. Interact., 2022

SHUBHCHINTAK.
Multim. Tools Appl., 2022

Reliable routing in Wireless Body Area Network using optimum number of relay nodes for enhancing network lifetime.
J. Ambient Intell. Smart Environ., 2022

Intra WBAN routing using Zipf's law and intelligent transmission power switching approach (ZITA).
J. Ambient Intell. Humaniz. Comput., 2022

DDoS attack resisting authentication protocol for mobile based online social network applications.
J. Inf. Secur. Appl., 2022

A framework for neighbourhood configuration to improve the KNN based imputation algorithms on microarray gene expression data.
Int. J. Bioinform. Res. Appl., 2022

Minimizing the Energy Consumption of WSN Using Noble SMOWA-GA Algorithm.
Int. J. Appl. Metaheuristic Comput., 2022

ConvAE-LSTM: Convolutional Autoencoder Long Short-Term Memory Network for Smartphone-Based Human Activity Recognition.
IEEE Access, 2022

A Survey of VANET/V2X Routing From the Perspective of Non-Learning- and Learning-Based Approaches.
IEEE Access, 2022

An Effective Low-Dimensional Software Code Representation using BERT and ELMo.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Improving Performance of High Throughput Wireless Access Networks - An Experience in Learning.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

Can we predict useful comments in source codes? - Analysis of findings from Information Retrieval in Software Engineering Track @ FIRE 2022.
Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation, 2022

Overview of the IRSE track at FIRE 2022: Information Retrieval in Software Engineering.
Proceedings of the Working Notes of FIRE 2022, 2022

Named Entity Recognition Based Automatic Generation of Research Highlights.
Proceedings of the Third Workshop on Scholarly Document Processing, 2022

2021
A Double Threshold-Based Power-Aware Honey Bee Cloud Load Balancing Algorithm.
SN Comput. Sci., 2021

An ensemble machine learning model based on multiple filtering and supervised attribute clustering algorithm for classifying cancer samples.
PeerJ Comput. Sci., 2021

Development of Energy Efficient and Optimized Coverage Area Network Configuration to Achieve Reliable WSN Network Using Meta-Heuristic Approaches.
Int. J. Appl. Metaheuristic Comput., 2021

SmartCon: Deep Probabilistic Learning Based Intelligent Link-Configuration in Narrowband-IoT Towards 5G and B5G.
CoRR, 2021

Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021

An efficient clustering with robust outlier mitigation for Wi-Fi fingerprint based indoor positioning.
Appl. Soft Comput., 2021

Optimization and estimation of reliability indices and cost of Power Distribution System of an urban area by a noble fuzzy-hybrid algorithm.
Appl. Soft Comput., 2021

Identification of Abnormal Movements in Infants: A Deep Neural Network for Body Part-Based Prediction of Cerebral Palsy.
IEEE Access, 2021

Exploratory Analysis of Nose-gesture for Smartphone Aided Typing for Users with Clinical Conditions.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Nosype: A Novel Nose-tip Tracking-based Text Entry System for Smartphone Users with Clinical Disabilities for Touch-based Typing.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021

Automatic Generation of Research Highlights from Scientific Abstracts.
Proceedings of the 2nd Workshop on Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE 2021) co-located with JCDL 2021, 2021

Automatic Recognition of Learning Resource Category in a Digital Library.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2021

2020
A Deep Probabilistic Control Machinery for Auto-Configuration of WiFi Link Parameters.
IEEE Trans. Wirel. Commun., 2020

An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020

Gestatten: Estimation of User's Attention in Mobile MOOCs From Eye Gaze and Gaze Gesture Tracking.
Proc. ACM Hum. Comput. Interact., 2020

Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

Performance analysis of an efficient object-based schema oriented data storage system handling health data.
Innov. Syst. Softw. Eng., 2020

An online learning approach for auto link-Configuration in IEEE 802.11ac wireless networks.
Comput. Networks, 2020

Novel AP association and fair channel access in high throughput WLAN for energy efficiency.
Ad Hoc Networks, 2020

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications.
IEEE Access, 2020

Author Name Disambiguation in PubMed using Ensemble-Based Classification Algorithms.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020

Segmenting Scientific Abstracts into Discourse Categories: A Deep Learning-Based Approach for Sparse Labeled Data.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020

SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11ac.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks.
Proceedings of the Advanced Computing and Systems for Security, 2020

Dynamic Relay Selection using a Greedy Cluster Strategy.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Energy Efficient Routing Protocol for Ambient Assisted Living Environment.
Wirel. Pers. Commun., 2019

Intelligent MU-MIMO User Selection With Dynamic Link Adaptation in IEEE 802.11ax.
IEEE Trans. Wirel. Commun., 2019

Steady-State Analysis of Buffer Occupancy for Different Forwarding Strategies in Mobile Opportunistic Network.
IEEE Trans. Veh. Technol., 2019

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

Minimization of reliability indices and cost of power distribution systems in urban areas using an efficient hybrid meta-heuristic algorithm.
Soft Comput., 2019

Enhancing access to scholarly publications with surrogate resources.
Scientometrics, 2019

A survey of issues and solutions of health data management systems.
Innov. Syst. Softw. Eng., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

Storage and Bandwidth Optimized Reliable Distributed Data Allocation Algorithm.
Int. J. Ambient Comput. Intell., 2019

A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme.
IEEE Access, 2019

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019

Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

Learning Based Adaptive Fair QoS in IEEE 802.11ac Access Networks.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Performance of Random Access Games over an IEEE 802.11ac Testbed.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

A scattering and repulsive swarm intelligence algorithm for solving global optimization problems.
Knowl. Based Syst., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

A Reference Architecture for Context-Aware Intelligent Traffic Management Platforms.
Int. J. Electron. Gov. Res., 2018

On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud.
Int. J. Cloud Appl. Comput., 2018

An efficient fine-grained access control scheme for hierarchical wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

A Metadata Extractor for Books in a Digital Library.
Proceedings of the Maturity and Innovation in Digital Libraries, 2018

A learning-based dynamic clustering for coordinated multi-point (CoMP) operation with carrier aggregation in LTE-advanced.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

An Intrusion Detection Approach Based On Analysis Of Cluster Heterogeneity.
Proceedings of the International Conference on Information Technology, 2018

DRSQ - A Dynamic Resource Service Quality Based Load Balancing Algorithm.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

Design and Implementation of an Improved Data Warehouse on Clinical Data.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

LDA Topic Modeling Based Dataset Dependency Matrix Prediction.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Two Phased Routing Protocol Incorporating Distributed Genetic Algorithm and Gradient Based Heuristic in Clustered WSN.
Wirel. Pers. Commun., 2017

A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata.
J. Ind. Inf. Integr., 2017

Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements over Transport/Application Layer Protocols - A Survey.
CoRR, 2017

Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements on Transport and Application Protocols - A Survey.
IEEE Commun. Surv. Tutorials, 2017

A Survey of Topology-Transparent Scheduling Schemes in Multi-Hop Packet Radio Networks.
IEEE Commun. Surv. Tutorials, 2017

SmartLA: Reinforcement learning-based link adaptation for high throughput wireless access networks.
Comput. Commun., 2017

A lightweight QRS detector for single lead ECG signals using a max-min difference algorithm.
Comput. Methods Programs Biomed., 2017

A novel secure key-exchange protocol using biometrics of the sender and receiver.
Comput. Electr. Eng., 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Mobile enabled content adaptation system for PDF documents.
Proceedings of the 11th International Conference on Software, 2017

IEEE 802.11ac Link Adaptation Under Mobility.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Supporting Throughput Fairness in IEEE 802.11ac Dynamic Bandwidth Channel Access: A Hybrid Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

IEEE 802.11ac DBCA: A Tug of War between Channel Utilization and Fairness.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Comparative Analysis of Structured and Un-Structured Databases.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

A Storage Model for Handling Big Data Variety.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

SysML Based Conceptual ETL Process Modeling.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

A Novel Intelligent Modeling of Storage and Bandwidth Constraints in Distributed Storage Allocation.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network.
J. Comput. Networks Commun., 2016

A novel distance-based iterative sequential KNN algorithm for estimation of missing values in microarray gene expression data.
Int. J. Bioinform. Res. Appl., 2016

Multi-cloud scenario based QoS enhancing virtual resource brokering.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Channel Access Fairness in IEEE 802.11ac: A Retrospective Analysis and Protocol Enhancement.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based Approach.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Game-theoretic wireless CSMA MAC protocols: Measurements from an indoor testbed.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Improved abnormality detection from raw ECG signals using feature enhancement.
Proceedings of the 12th International Conference on Natural Computation, 2016

A new routing protocol for WBAN to enhance energy consumption and network lifetime.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

CrowdAP: Crowdsourcing driven AP coordination for improving energy efficiency in wireless access networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A biometrics-based robust and secure user authentication protocol for e-healthcare service.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Object based schema oriented data storage system for supporting heterogeneous data.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Performance modeling and analysis of high throughput wireless media access with QoS in noisy channel for different traffic conditions.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
An Analysis of Equal Length Cellular Automata (ELCA) Generating Linear Rules for Applications in Distributed Computing.
J. Cell. Autom., 2015

Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model.
Int. J. Distributed Sens. Networks, 2015

Approach to cryptographic key generation from fingerprint biometrics.
Int. J. Biom., 2015

Fingerprint-based crypto-biometric system for network security.
EURASIP J. Inf. Secur., 2015

A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

Dynamic link adaptation for High Throughput wireless access networks.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

Decision making in assessment of RRAP of WSN using fuzzy-hybrid approach.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
An efficient GA-PSO approach for solving mixed-integer nonlinear programming problem in reliability optimization.
Swarm Evol. Comput., 2014

Optimal gateway selection in sensor-cloud framework for health monitoring.
IET Wirel. Sens. Syst., 2014

Understanding the Mechanics of Some Localized Protocols by Theory of Complex Networks.
CoRR, 2014

An Approach to Cryptographic Key Exchange Using Fingerprint.
Proceedings of the Security in Computing and Communications, 2014

An approach to cryptographic key distribution through fingerprint based key distribution center.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Recovering a game model from an optimal channel access scheme for WLANs.
Telecommun. Syst., 2013

A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems.
J. Netw. Syst. Manag., 2013

Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks.
CoRR, 2013

A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2013

A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix.
Proceedings of the Computer Information Systems and Industrial Management, 2012

Effectiveness of Different Partition Based Clustering Algorithms for Estimation of Missing Values in Microarray Gene Expression Data.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks.
J. Comput. Networks Commun., 2011

2010
Designing Energy-Efficient Topologies for Wireless Sensor Network: Neural Approach.
Int. J. Distributed Sens. Networks, 2010

Maximum lifetime broadcasting in cooperative multi-hop wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks
CoRR, 2010

Congestion Games in Wireless Channels with Multipacket Reception Capability.
Proceedings of the Information and Communication Technologies - International Conference, 2010

2008
Performance Improvement of Wireless MAC Using Non-Cooperative Games.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Energy-Efficient Broadcasting in Wireless Ad Hoc Networks Using Directional Antennas.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Game-Theoretic Modeling and Optimization of Contention-Prone Medium Access Phase in IEEE 802.16/WiMAX Networks.
Proceedings of the 2008 Third International Conference on Broadband Communications, 2008

2007
Energy-Aware Virtual Backbone Tree for Efficient Routing in Wireless Sensor Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

2005
A Novel Approach for an Extendible Middleware Satisfying Adaptability & Interoperability Needs of Multimedia Applications in Mobile Environments.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

2004
A Wrapper-based Object Caching in CORBA.
Proceedings of the 2nd International Conference Computing, 2004

An Approach Towards a Wrapper-based Architecture for Mapping COM Servers in MOF Framework.
Proceedings of the 2nd International Conference Computing, 2004

2002
Expressing Constraint Models in Object Oriented Data Using UML and ODL.
Proceedings of the Distributed Computing, 2002

1994
Reconstruction of a digital circle.
Pattern Recognit., 1994

1992
Estimation of the original length of a straight line segment from its digitization in three dimensions.
Pattern Recognit., 1992

Parameter estimation and reconstruction of digital conics in normal positions.
CVGIP Graph. Model. Image Process., 1992

1991
A new method of analysis for discrete straight lines.
Pattern Recognit. Lett., 1991

Counting thin and bushy triangulations of convex polygons.
Pattern Recognit. Lett., 1991

1990
The K-dense corridor problems.
Pattern Recognit. Lett., 1990


  Loading...