Nabendu Chaki
Orcid: 0000-0003-3242-680XAffiliations:
- University of Calcutta, Kolkata, India
According to our database1,
Nabendu Chaki
authored at least 152 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Syst. Eng., January, 2024
SCARS: Suturing wounds due to conflicts between non-functional requirements in autonomous and robotic systems.
Softw. Pract. Exp., 2024
J. Syst. Softw., 2024
TiMePReSt: Time and Memory Efficient Pipeline Parallel DNN Training with Removed Staleness.
CoRR, 2024
Proceedings of the Computer Information Systems and Industrial Management, 2024
2023
Softw. Syst. Model., December, 2023
IEEE Trans. Software Eng., July, 2023
An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems.
J. Supercomput., June, 2023
Innov. Syst. Softw. Eng., March, 2023
An Annexure to the Paper "Driving the Technology Value Stream by Analyzing App Reviews".
CoRR, 2023
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023
A Two-Hop Neighborhood Based Berserk Detection Algorithm for Probabilistic Model of Consensus in Distributed Ledger Systems.
Proceedings of the Computational Collective Intelligence - 15th International Conference, 2023
Proceedings of the Computer Information Systems and Industrial Management, 2023
2022
Band selection using spectral and spatial information in particle swarm optimization for hyperspectral image classification.
Soft Comput., 2022
Wavelet enabled convolutional autoencoder based deep neural network for hyperspectral image denoising.
Multim. Tools Appl., 2022
Proceedings of the Computer Information Systems and Industrial Management, 2022
2021
SN Comput. Sci., 2021
Neural Comput. Appl., 2021
Innov. Syst. Softw. Eng., 2021
Innov. Syst. Softw. Eng., 2021
Dimensionality reduction of hyperspectral image using signal entropy and spatial information in genetic algorithm with discrete wavelet transformation.
Evol. Intell., 2021
Data mining-based hierarchical transaction model for multi-level consistency management in large-scale replicated databases.
Comput. Stand. Interfaces, 2021
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Proceedings of the Computer Information Systems and Industrial Management, 2021
Quantified Analysis of Security Issues and Its Mitigation in Blockchain Using Game Theory.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2021
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2021
2020
Trans. Comput. Sci., 2020
SN Comput. Sci., 2020
A Granular Level Feature Extraction Approach to Construct HR Image for Forensic Biometrics Using Small Training DataSet.
IEEE Access, 2020
A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.
Proceedings of the Distributed Computing and Internet Technology, 2020
Proceedings of the 16th European Dependable Computing Conference, 2020
Proceedings of the Computer Information Systems and Industrial Management, 2020
Dimensionality Reduction of Hyperspectral Images: A Data-Driven Approach for Band Selection.
Proceedings of the Advanced Computing and Systems for Security, 2020
2019
AFSCR: Annotation of Functional Satisfaction Conditions and their Reconciliation within i* models.
CoRR, 2019
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
Proceedings of the Advanced Computing and Systems for Security, 2019
Architectural Design-Based Compliance Verification for IoT-Enabled Secure Advanced Metering Infrastructure in Smart Grid.
Proceedings of the Advanced Computing and Systems for Security, 2019
2018
Trans. Comput. Sci., 2018
An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare.
Int. J. Softw. Eng. Knowl. Eng., 2018
Stochastic modelling and pilot data analysis towards provisioning of ambulance for handling emergency.
Int. J. Adv. Intell. Paradigms, 2018
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
Proceedings of the Advanced Computing and Systems for Security, 2018
Proceedings of the Advanced Computing and Systems for Security, 2018
2017
Innov. Syst. Softw. Eng., 2017
Innov. Syst. Softw. Eng., 2017
Innov. Syst. Softw. Eng., 2017
Proceedings of the Conceptual Modeling - 36th International Conference, 2017
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid.
Proceedings of the Computer Information Systems and Industrial Management, 2017
Proceedings of the Advanced Topics in Intelligent Information and Database Systems,, 2017
2016
Innov. Syst. Softw. Eng., 2016
Personal Health Record Management System Using Hadoop Framework: An Application for Smarter Health Care.
Proceedings of the Soft Computing Applications, 2016
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the First Workshop on IoT-enabled Healthcare and Wellness Technologies and Systems, 2016
Poster: Exploring Security as a Service for IoT Enabled Remote Application Framework.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the IEEE International Conference on Industrial Technology, 2016
A Framework towards Generating Effective Business Process Model by Goal based Pruning.
Proceedings of the International Conference on Informatics and Analytics, 2016
Proceedings of the Computational Collective Intelligence - 8th International Conference, 2016
Checkpoint based multi-version concurrency control mechanism for remote healthcare system.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Proceedings of the Computer Information Systems and Industrial Management, 2016
Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory.
Proceedings of the Advanced Computing and Systems for Security, 2016
2015
A new concurrency control mechanism for multi-threaded environment using transactional memory.
J. Supercomput., 2015
Int. J. Comput. Vis. Robotics, 2015
Using i<sup>∗</sup> model towards ontology integration and completeness checking in enterprise systems requirement hierarchy.
Proceedings of the 2015 IEEE International Model-Driven Requirements Engineering Workshop, 2015
Can #Twitter_Trends Predict Election Results? Evidence from 2014 Indian General Election.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Business Process Generation by Leveraging Complete Search over a Space of Activities and Process Goals.
Proceedings of the CLOSER 2015, 2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device.
Proceedings of the Computer Information Systems and Industrial Management, 2015
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
"NeSen" - a tool for measuring link quality and stability of heterogenous cellular network.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015
2014
Studies in Computational Intelligence 560, Springer, ISBN: 978-81-322-1907-1, 2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-07386-6, 2014
CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks.
Secur. Commun. Networks, 2014
Dynamic discovery of query path on the lattice of cuboids using hierarchical data granularity and storage hierarchy.
J. Comput. Sci., 2014
Generic organization of semi-structured data.
Comput. Syst. Sci. Eng., 2014
A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud.
Proceedings of the Computer Information Systems and Industrial Management, 2014
Proceedings of the Computer Information Systems and Industrial Management, 2014
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014
Proceedings of the Applied Computation and Security Systems - ACSS 2014, 2014
2013
A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems.
J. Netw. Syst. Manag., 2013
Proceedings of the 44th Internationel Symposium on Robotics, 2013
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013
Proceedings of the Distributed Computing and Internet Technology, 2013
Modeling the Bullwhip Effect in a Multi-Stage Multi-Tier Retail Network by Generalized Stochastic Petri Nets.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013
Proceedings of the Computer Information Systems and Industrial Management, 2013
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things.
Proceedings of the Computer Information Systems and Industrial Management, 2013
2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012
Proceedings of the Computer Information Systems and Industrial Management, 2012
Proceedings of the Computer Information Systems and Industrial Management, 2012
Proceedings of the Computer Information Systems and Industrial Management, 2012
2011
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
CoRR, 2011
CoRR, 2011
Proceedings of the International Conference on Recent Trends in Information Systems, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
On Creation of Reference Image for Quantitative Evaluation of Image Thresholding Method.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011
2010
Secur. Commun. Networks, 2010
FAPP: A New Fairness Algorithm for Priority Process Mutual Exclusion in Distributed Systems.
J. Networks, 2010
J. Convergence Inf. Technol., 2010
A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks
CoRR, 2010
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010
Business-Object Oriented Requirements Analysis Framework for Data Warehouses.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010
Object relational implementation of Graph based conceptual level Multidimensional Data Model.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
LAR<sup>2</sup>P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
2009
Object Specification Language for Graph Based Conceptual level Multidimensional Data Model.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009
Proceedings of the First International Conference on Networks and Communications, 2009
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009
Modeling & Analysis of Transaction Management for Distributed Database Environment using Petri Nets.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
A Link-failure Resilient Token based Mutual Exclusion Algorithm for Directed Graph Topology.
Proceedings of the 7th International Symposium on Parallel and Distributed Computing (ISPDC 2008), 2008
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008
2007
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007
2006
Performance analysis of multistage interconnection networks with a new high-level net model.
J. Syst. Archit., 2006
J. Comput. Sci. Technol., 2006
Modified Raymond's Algorithm for Priority (MRA-P) Based Mutual Exclusion in Distributed Systems.
Proceedings of the Distributed Computing and Internet Technology, 2006
2003
Proceedings of the 14th IEEE International Workshop on Rapid System Prototyping (RSP 2003), 2003
Proceedings of the 14th IEEE International Workshop on Rapid System Prototyping (RSP 2003), 2003
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003
2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
2000
Conceptual Level Graph Theoretic Design and Development of Complex Information System.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000
1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997