


default search action
Apurva Kumar
Person information
- affiliation: IBM India Research Lab
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Mika Silvola, Ravi Singla, Hao Su, Lars Pedersen, Ashwin Gumaste, Walid Wakim, Rajan Rao, Dan Nielsen, Dean Humphreys, Angelito Fortes, Léon Zheng, Apurva Kumar, Chuck Tato:
Replacing OTN Core Networks with Packet Networks: Demonstration of 100Gb/s OTU4s over 400Gb/s Private Line Emulation (PLE) in Packet Networks. GLOBECOM 2024: 4400-4405 - 2020
- [b1]Stefan Gruner, Apurva Kumar, Tom Maibaum, Markus Roggenbach
:
On the Construction of Engineering Handbooks - with an Illustration from the Railway Safety Domain. Springer Briefs in Computer Science, Springer 2020, ISBN 978-3-030-44647-5, pp. 3-78
2010 – 2019
- 2019
- [c18]Jinsae Jung, Jaeun Park, Apurva Kumar:
A Verification Framework of Neural Processing Unit for Super Resolution. MTV 2019: 13-17 - 2018
- [c17]Kumar Bhaskaran, Peter Ilfrich, Dain Liffman, Christian Vecchiola, Praveen Jayachandran, Apurva Kumar, Fabian Lim, Karthik Nandakumar, Zhengquan Qin, Venkatraman Ramakrishna, Ernie G. S. Teo, Chun Hui Suen:
Double-Blind Consent-Driven Data Sharing on Blockchain. IC2E 2018: 385-391 - 2015
- [c16]Stefan Gruner, Apurva Kumar, Tom Maibaum:
Towards a Body of Knowledge in Formal Methods for the Railway Domain: Identification of Settled Knowledge. FTSCS 2015: 87-102 - 2014
- [c15]Apurva Kumar:
A Lightweight Formal Approach for Analyzing Security of Web Protocols. RAID 2014: 192-211 - 2012
- [c14]Apurva Kumar:
Using automated model analysis for reasoning about security of web protocols. ACSAC 2012: 289-298 - [c13]Apurva Kumar:
Managing trust and secrecy in identity management clouds. CCSW 2012: 113-124 - [c12]Aditya Deshpande, Siddharth Choudhary, P. J. Narayanan, Krishna Kumar Singh, Kaustav Kundu, Aditya Singh, Apurva Kumar:
Geometry directed browser for personal photographs. ICVGIP 2012: 2 - [c11]Venkatraman Ramakrishna, Apurva Kumar, Sougata Mukherjea
:
Privacy Preserving Social Mobile Applications. MobiQuitous 2012: 89-102 - [c10]Apurva Kumar:
A Belief Logic for Analyzing Security of Web Protocols. TRUST 2012: 239-254 - 2011
- [c9]Apurva Kumar:
Model Driven Security Analysis of IDaaS Protocols. ICSOC 2011: 312-327
2000 – 2009
- 2008
- [c8]Apurva Kumar:
Integrated Security Context Management of Web Components and Services in Federated Identity Environments. ICSOC 2008: 565-571 - 2007
- [c7]Apurva Kumar:
Efficient Filter Based Replication for LDAP Directories. ICDE 2007: 1373-1375 - 2005
- [c6]Apurva Kumar:
Filter Based Directory Replication: Algorithms and Performance. ICDCS 2005: 586-595 - [c5]Apurva Kumar:
Filter Based Directory Replication and Caching: Algorithms and Performance. ICDE 2005: 326-327 - 2003
- [c4]Apurva Kumar, Rajeev Gupta:
Edge Caching for Directory Based Web Applications. WCW 2003: 39-56 - 2001
- [j1]Apurva Kumar, Lakshmi Ramachandran, Rajeev Shorey:
Performance of network formation and scheduling algorithms in the Bluetooth wireless ad-hoc network. J. High Speed Networks 10(1): 59-76 (2001) - [c3]Indraneel Chakraborty
, Abhishek Kashyap, Apurva Kumar, Anupam Rastogi, Huzur Saran, Rajeev Shorey
:
MAC scheduling policies with reduced power consumption and bounded packet delays for centrally controlled TDD wireless networks. ICC 2001: 1980-1984 - [c2]Apurva Kumar, Rajeev Gupta:
Capacity evaluation of frequency hopping based ad-hoc systems. SIGMETRICS/Performance 2001: 133-142 - 2000
- [c1]Apurva Kumar, M. N. Umesh, Rajesh Jha:
Mobility modeling of rush hour traffic for location area design in cellular networks. WOWMOM 2000: 48-54
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-11 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint