Nabendu Chaki

Orcid: 0000-0003-3242-680X

Affiliations:
  • University of Calcutta, Kolkata, India


According to our database1, Nabendu Chaki authored at least 152 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Minimising conflicts among run-time non-functional requirements within DevOps.
Syst. Eng., January, 2024

SCARS: Suturing wounds due to conflicts between non-functional requirements in autonomous and robotic systems.
Softw. Pract. Exp., 2024

Extracting goal models from natural language requirement specifications.
J. Syst. Softw., 2024

TiMePReSt: Time and Memory Efficient Pipeline Parallel DNN Training with Removed Staleness.
CoRR, 2024

Using Game Theory to Secure Smart Contracts in Blockchain.
Proceedings of the Computer Information Systems and Industrial Management, 2024

2023
Correlating contexts and NFR conflicts from event logs.
Softw. Syst. Model., December, 2023

Driving the Technology Value Stream by Analyzing App Reviews.
IEEE Trans. Software Eng., July, 2023

An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems.
J. Supercomput., June, 2023

An enumerated analysis of NoSQL data models using statistical tools.
Innov. Syst. Softw. Eng., March, 2023

An Annexure to the Paper "Driving the Technology Value Stream by Analyzing App Reviews".
CoRR, 2023

Zero-shot Learning for Named Entity Recognition in Software Specification Documents.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

A Two-Hop Neighborhood Based Berserk Detection Algorithm for Probabilistic Model of Consensus in Distributed Ledger Systems.
Proceedings of the Computational Collective Intelligence - 15th International Conference, 2023

A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications.
Proceedings of the Computer Information Systems and Industrial Management, 2023

2022
Band selection using spectral and spatial information in particle swarm optimization for hyperspectral image classification.
Soft Comput., 2022

Wavelet enabled convolutional autoencoder based deep neural network for hyperspectral image denoising.
Multim. Tools Appl., 2022

An Efficient Data Distribution Strategy for Distributed Graph Processing System.
Proceedings of the Computer Information Systems and Industrial Management, 2022

2021
Sentence Embedding Models for Similarity Detection of Software Requirements.
SN Comput. Sci., 2021

NFR-aware prioritization of software requirements.
Syst. Eng., 2021

SSNET: an improved deep hybrid network for hyperspectral image classification.
Neural Comput. Appl., 2021

Requirement-oriented risk management for incremental software development.
Innov. Syst. Softw. Eng., 2021

Verifiability in Systems and Data Engineering: Preface by the Special Issue Editors.
Innov. Syst. Softw. Eng., 2021

Dimensionality reduction of hyperspectral image using signal entropy and spatial information in genetic algorithm with discrete wavelet transformation.
Evol. Intell., 2021

Data mining-based hierarchical transaction model for multi-level consistency management in large-scale replicated databases.
Comput. Stand. Interfaces, 2021

CARO: A Conflict-Aware Requirement Ordering Tool for DevOps.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

ALEA: An Anonymous Leader Election Algorithm for Synchronous Distributed Systems.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

ToMAL: Token-Based Fair Mutual Exclusion Algorithm.
Proceedings of the Computer Information Systems and Industrial Management, 2021

Quantified Analysis of Security Issues and Its Mitigation in Blockchain Using Game Theory.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2021

Single Failure Recovery in Distributed Social Network.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2021

2020
A Deployment Framework for Ensuring Business Compliance Using Goal Models.
Trans. Comput. Sci., 2020

Neutrosophic Set-Based Caries Lesion Detection Method to Avoid Perception Error.
SN Comput. Sci., 2020

A robust software watermarking framework using shellcode.
Multim. Tools Appl., 2020

A Granular Level Feature Extraction Approach to Construct HR Image for Forensic Biometrics Using Small Training DataSet.
IEEE Access, 2020

A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.
Proceedings of the Distributed Computing and Internet Technology, 2020

Generation of Safety and Liveness Complaint Automata from Goal Model Specifications.
Proceedings of the 16th European Dependable Computing Conference, 2020

Event Ordering Using Graphical Notation for Event-B Models.
Proceedings of the Computer Information Systems and Industrial Management, 2020

Dimensionality Reduction of Hyperspectral Images: A Data-Driven Approach for Band Selection.
Proceedings of the Advanced Computing and Systems for Security, 2020

2019
AFSCR: Annotation of Functional Satisfaction Conditions and their Reconciliation within i* models.
CoRR, 2019

CARGo: A Prototype for Contextual Annotation and Reconciliation of Goal Models.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Things as a Service: Service model for IoT.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Tweeting in Support of LGBT?: A Deep Learning Approach.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

Shellmark: A Robust Software Watermarking Tool.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

An Addressing Scheme for Massive Sensor Networks.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Extracting Business Compliant Finite State Models from I ^* Models.
Proceedings of the Advanced Computing and Systems for Security, 2019

Architectural Design-Based Compliance Verification for IoT-Enabled Secure Advanced Metering Infrastructure in Smart Grid.
Proceedings of the Advanced Computing and Systems for Security, 2019

2018
Minimizing Aliasing Effects Using Faster Super Resolution Technique on Text Images.
Trans. Comput. Sci., 2018

An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare.
Int. J. Softw. Eng. Knowl. Eng., 2018

Stochastic modelling and pilot data analysis towards provisioning of ambulance for handling emergency.
Int. J. Adv. Intell. Paradigms, 2018

Node localization for indoor tracking using artificial neural network.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018

Naive Bayes and Decision Tree Classifier for Streaming Data Using HBase.
Proceedings of the Advanced Computing and Systems for Security, 2018

Byte Label Malware Classification Using Image Entropy.
Proceedings of the Advanced Computing and Systems for Security, 2018

2017
Introduction to special issue on 'intelligent computing and adaptive systems'.
Innov. Syst. Softw. Eng., 2017

TelePatch: a middle layer for screening device fragmentation.
Innov. Syst. Softw. Eng., 2017

A framework for business process modeling by QoS-based pruning.
Innov. Syst. Softw. Eng., 2017

Partial silhouette-based gait recognition.
Int. J. Biom., 2017

Mining Goal Refinement Patterns: Distilling Know-How from Data.
Proceedings of the Conceptual Modeling - 36th International Conference, 2017

POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid.
Proceedings of the Computer Information Systems and Industrial Management, 2017

Measuring the Effectiveness of Knowledge Driven Web Applications.
Proceedings of the Advanced Topics in Intelligent Information and Database Systems,, 2017

2016
Extracting finite state models from i<sup>*</sup> models.
J. Syst. Softw., 2016

A uniform representation of multi-variant data in intensive-query databases.
Innov. Syst. Softw. Eng., 2016

Personal Health Record Management System Using Hadoop Framework: An Application for Smarter Health Care.
Proceedings of the Soft Computing Applications, 2016

Context and Trust Aware Workflow Oriented Access Framework.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

i*ToNuSMV: A Prototype for Enabling Model Checking of i* Models.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Heterogeneous Services in Layered Framework of IoT Enabled Assisted Living.
Proceedings of the First Workshop on IoT-enabled Healthcare and Wellness Technologies and Systems, 2016

Poster: Exploring Security as a Service for IoT Enabled Remote Application Framework.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

ROLAP based data warehouse schema to XML schema conversion.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

A Framework towards Generating Effective Business Process Model by Goal based Pruning.
Proceedings of the International Conference on Informatics and Analytics, 2016

Hierarchical Data Aggregation Based Routing for Wireless Sensor Networks.
Proceedings of the Computational Collective Intelligence - 8th International Conference, 2016

Checkpoint based multi-version concurrency control mechanism for remote healthcare system.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Information Density Based Image Binarization for Text Document Containing Graphics.
Proceedings of the Computer Information Systems and Industrial Management, 2016

Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory.
Proceedings of the Advanced Computing and Systems for Security, 2016

2015
A new concurrency control mechanism for multi-threaded environment using transactional memory.
J. Supercomput., 2015

On creation of reference image for degraded documents binarisation.
Int. J. Comput. Vis. Robotics, 2015

Extracting State Transition Models from i* Models.
CoRR, 2015

Using i<sup>∗</sup> model towards ontology integration and completeness checking in enterprise systems requirement hierarchy.
Proceedings of the 2015 IEEE International Model-Driven Requirements Engineering Workshop, 2015

Can #Twitter_Trends Predict Election Results? Evidence from 2014 Indian General Election.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Business Process Generation by Leveraging Complete Search over a Space of Activities and Process Goals.
Proceedings of the CLOSER 2015, 2015

Policy-Based Slicing of Hibernate Query Language.
Proceedings of the Computer Information Systems and Industrial Management, 2015

Person Identification Technique Using RGB Based Dental Images.
Proceedings of the Computer Information Systems and Industrial Management, 2015

U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device.
Proceedings of the Computer Information Systems and Industrial Management, 2015

A Study on Software Risk Management Strategies and Mapping with SDLC.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

Securing Service in Remote Healthcare.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

"NeSen" - a tool for measuring link quality and stability of heterogenous cellular network.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
Exploring Image Binarization Techniques
Studies in Computational Intelligence 560, Springer, ISBN: 978-81-322-1907-1, 2014

Moving Object Detection Using Background Subtraction
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07386-6, 2014

CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks.
Secur. Commun. Networks, 2014

Dynamic discovery of query path on the lattice of cuboids using hierarchical data granularity and storage hierarchy.
J. Comput. Sci., 2014

Generic organization of semi-structured data.
Comput. Syst. Sci. Eng., 2014

A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud.
Proceedings of the Computer Information Systems and Industrial Management, 2014

Agent-Based Context Management for Service-Oriented Environments.
Proceedings of the Computer Information Systems and Industrial Management, 2014

A Lightweight Implementation of Obstruction-Free Software Transactional Memory.
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014

Study on Handover Mechanism in Cellular Network: An Experimental Approach.
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014

Flexible Cloud Architecture for Healthcare Applications.
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014

2013
A new image binarization method using iterative partitioning.
Mach. Vis. Appl., 2013

A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems.
J. Netw. Syst. Manag., 2013

Static analysis techniques for robotics software verification.
Proceedings of the 44th Internationel Symposium on Robotics, 2013

Dynamic query path selection from lattice of cuboids using memory hierarchy.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Design of a New OFTM Algorithm towards Abort-Free Execution.
Proceedings of the Distributed Computing and Internet Technology, 2013

Modeling the Bullwhip Effect in a Multi-Stage Multi-Tier Retail Network by Generalized Stochastic Petri Nets.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013

Bengali Printed Character Recognition - A New Approach.
Proceedings of the Computer Information Systems and Industrial Management, 2013

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Learners' Quanta based Design of a Learning Management System
CoRR, 2012

Sustainable peer-based structure for content delivery networks.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

DFRS: a domain-based framework for representing semi-structured data.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A New Scale for Attribute Dependency in Large Database Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2012

TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks.
Proceedings of the Computer Information Systems and Industrial Management, 2012

ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2011
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
CoRR, 2011

Quality Evaluation of Conceptual Level Object Multidimensional Data Model
CoRR, 2011

Modeling Smart Grid using Generalized Stochastic Petri Net
CoRR, 2011

QoS Routing using OLSR with Optimization for Flooding
CoRR, 2011

A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
CoRR, 2011

Image binarization using iterative partitioning: A global thresholding approach.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

A new agent based security framework for collaborative cloud environment.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Agent Based Approach for Radio Resource Optimization for Cellular Networks.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

A Survey on the Semi-Structured Data Models.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Distributed framework for tele health monitoring system.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

Optimizing mobile terminal equipment for video-medic services.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
BHIDS: a new, cluster based algorithm for black hole IDS.
Secur. Commun. Networks, 2010

FAPP: A New Fairness Algorithm for Priority Process Mutual Exclusion in Distributed Systems.
J. Networks, 2010

Virtual Data Warehouse Modeling Using Petri Nets for Distributed Decision Making.
J. Convergence Inf. Technol., 2010

A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks
CoRR, 2010

E<sup>2</sup>IRP: A New Energy Efficient Integrated Routing Protocol for MANET.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010

Business-Object Oriented Requirements Analysis Framework for Data Warehouses.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Object relational implementation of Graph based conceptual level Multidimensional Data Model.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

A comprehensive review on wormhole attacks in MANET.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

On recognition of spoken Bengali numerals.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

LAR<sup>2</sup>P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Object Specification Language for Graph Based Conceptual level Multidimensional Data Model.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

PhishNet: Enhancing the Security Aspect of IMS Users.
Proceedings of the First International Conference on Networks and Communications, 2009

Data Diverse Fault Tolerant Architecture for Component based Systems.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A View-based Approach for Recognition of Bengali Printed Characters.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

Modeling & Analysis of Transaction Management for Distributed Database Environment using Petri Nets.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

A study on QoS issues for mobile ad-hoc networks.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
A Link-failure Resilient Token based Mutual Exclusion Algorithm for Directed Graph Topology.
Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC 2008), 2008

HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

2006
Performance analysis of multistage interconnection networks with a new high-level net model.
J. Syst. Archit., 2006

GDM: A New Graph Based Data Model Using Functional Abstractionx.
J. Comput. Sci. Technol., 2006

Modified Raymond's Algorithm for Priority (MRA-P) Based Mutual Exclusion in Distributed Systems.
Proceedings of the Distributed Computing and Internet Technology, 2006

2003
Evaluation of Middleware Architectures in Achieving System Interoperability.
Proceedings of the 14th IEEE International Workshop on Rapid System Prototyping (RSP 2003), 2003

Comparative Rapid Prototyping, A Case Study.
Proceedings of the 14th IEEE International Workshop on Rapid System Prototyping (RSP 2003), 2003

A New Logical Topology Based on Barrel Shifter Network over an All Optical Network.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2001
Graph Object Oriented Model and Query Language: A Semi-Structured Approach.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Conceptual Level Graph Theoretic Design and Development of Complex Information System.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

1997
Permutation Mapping for MIN Using High Level Net Models.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997


  Loading...