default search action
A. K. Bhattacharjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Bhagwan N. Bathe, Bharti Hariramani, A. K. Bhattacharjee, S. V. Kulgod:
Analysis of Diagonal Constants for Extension of Salsa to 64 Bit. J. Hardw. Syst. Secur. 3(1): 94-102 (2019) - 2017
- [c23]Bhagwan N. Bathe, Bharti Hariramani, A. K. Bhattacharjee, S. V. Kulgod:
Analysis of Diagonal Constants in Salsa. SPACE 2017: 93-110 - [c22]Monika Santra, Sateesh K. Peddoju, A. K. Bhattacharjee, Arindam Khan:
Design and Analysis of a Modified Remote Attestation Protocol. TrustCom/BigDataSE/ICESS 2017: 578-585 - 2015
- [c21]Toshanlal Meenpal, A. K. Bhattacharjee:
Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. ICISS 2015: 463-479 - 2014
- [c20]Hemangi Gawand, A. K. Bhattacharjee, Kallol Roy:
Real time jitters and cyber physical system. ICACCI 2014: 2004-2008 - 2013
- [c19]Amol Wakankar, Arindam Khan, G. Aravamuthan, A. K. Bhattacharjee:
Experience with testing and rigorous program analysis for qualification of RTOS. ISEC 2013: 83-89 - 2012
- [j5]Shaik Madhar Saheb, A. K. Bhattacharjee, Dharmasa Hemadrasa, Rajib Kar:
Enhanced hybrid coordination function controlled channel access-based adaptive scheduler for delay sensitive traffic in ieee 802.11e networks. IET Networks 1(4): 281-288 (2012) - [c18]Dheeraj Gupta, P. S. Joshi, A. K. Bhattacharjee, R. S. Mundada:
IDS alerts classification using knowledge-based evaluation. COMSNETS 2012: 1-8 - [c17]Deepika Dutta Mishra, C. S. R. C. Murthy, Kislay Bhatt, A. K. Bhattacharjee, R. S. Mundada:
Development and performance analysis of HPC based framework for cryptanalytic attacks. CUBE 2012: 789-794 - [c16]Anirban Roy Choudhury, A. K. Bhattacharjee:
RED: a tool for runtime error detection in C programs using abstract interpretation. ISEC 2012: 37-40 - 2011
- [c15]Pratibha Sawhney, G. Ganesh, A. K. Bhattacharjee:
Automatic Construction of Runtime Monitors for FPGA Based Designs. ISED 2011: 164-169 - [p1]Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma:
Classifying Host Anomalies: Using Ontology in Information Security Monitoring. Cyber Security, Cyber Crime and Cyber Forensics 2011: 70-86 - 2010
- [c14]Rajib Kar, Vikas Maheshwari, Md. Maqbool, Ashish Kumar Mal, A. K. Bhattacharjee:
A Closed Form Slew Evaluation Approach Using Burr's Distribution Function for High Speed On-Chip RC Interconnects. BAIP 2010: 71-75 - [c13]Shaik Madhar Saheb, A. K. Bhattacharjee, Athinayaranan Vallavaraj:
An Enhanced HCCA Based Adaptive Scheduler for Multimedia Traffic in IEEE 802.11e Wireless LAN. ICWN 2010: 446-453
2000 – 2009
- 2009
- [j4]Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee:
Design methodology for battery powered embedded systems - In safety critical application. Comput. Stand. Interfaces 31(2): 499-503 (2009) - [j3]A. K. Bhattacharjee, R. K. Shyamasundar:
Activity Diagrams : A Formal Framework to Model Business Processes and Code Generation. J. Object Technol. 8(1): 189-220 (2009) - [c12]Durbadal Mandal, A. K. Bhattacharjee, Sakti Prasad Ghoshal:
Comparative Optimal Designs of Non-Uniformly Excited Concentric Circular Antenna Array Using Evolutionary Optimization Techniques. ICETET 2009: 619-624 - [c11]Joydeb Roychoudhury, Tribeni Prasad Banerjee, Hema Gurung, A. K. Bhattacharjee, Swagatam Das:
Real Time State of Charge Prediction using Kalman Filter. NaBIC 2009: 1190-1194 - [c10]Durbadal Mandal, A. K. Bhattacharjee, Sakti Prasad Ghoshal:
Application of Bio-inspired Optimization Technique for Finding the Optimal Set of Concentric Circular Antenna Array. NaBIC 2009: 1247-1252 - 2008
- [c9]A. K. Bhattacharjee, R. K. Shyamasundar:
ScriptOrc: A Specification Language for Web Service Choreography. APSCC 2008: 1089-1096 - [c8]Rajib Kar, Anuran Chattaraj, Aniruddha Chandra, Ashis Kumar Mal, A. K. Bhattacharjee:
Delay Estimation for On-Chip VLSI Interconnect using Weibull Distribution Function. ICIIS 2008: 1-3 - [c7]A. K. Bhattacharjee, R. K. Shyamasundar:
Choreography = Orchestration with Scripts + Conversations. ICWS 2008: 824-827 - 2007
- [c6]Ajith K. John, Babita Sharma, A. K. Bhattacharjee, S. D. Dhodapkar, S. Ramesh:
Detection of Runtime Errors in MISRA C Programs: A Deductive Approach. SAFECOMP 2007: 491-504 - 2005
- [c5]A. K. Bhattacharjee, R. K. Shyamasundar:
Validated Code Generation for Activity Diagrams. ICDCIT 2005: 508-521 - 2003
- [c4]Asif Iqbal, A. K. Bhattacharjee, S. D. Dhodapkar, S. Ramesh:
Visual Modeling and Verification of Distributed Reactive Systems. SAFECOMP 2003: 22-34 - 2001
- [j2]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems. Reliab. Eng. Syst. Saf. 71(3): 299-310 (2001) - [j1]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems: [Reliability Engineering and System Safety, 71(3), 2001, 299-310]. Reliab. Eng. Syst. Saf. 72(2): 223 (2001) - 2000
- [c3]A. K. Bhattacharjee, Gopa Sen, S. D. Dhodapkar, Kundapur Karunakar, Basant Rajan, R. K. Shyamasundar:
A System for Object Code Validation. FTRTFT 2000: 152-169
1990 – 1999
- 1999
- [c2]Sanjit A. Seshia, R. K. Shyamasundar, A. K. Bhattacharjee, S. D. Dhodapkar:
A Translation of Statecharts to Esterel. World Congress on Formal Methods 1999: 983-1007 - [c1]A. K. Bhattacharjee, S. D. Dhodapkar, Sanjit A. Seshia, R. K. Shyamasundar:
A Graphical Environment for the Specification and Verification of Reactive Systems. SAFECOMP 1999: 431-444
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint