default search action
Rituparna Chaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Abhishek Bal, Minakshi Banerjee, Rituparna Chaki, Punit Sharma:
A robust ischemic stroke lesion segmentation technique using two-pathway 3D deep neural network in MR images. Multim. Tools Appl. 83(14): 41485-41524 (2024) - [j17]Mandira Roy, Raunak Bag, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki:
SCARS: Suturing wounds due to conflicts between non-functional requirements in autonomous and robotic systems. Softw. Pract. Exp. 54(5): 759-795 (2024) - 2023
- [j16]Mandira Roy, Souvick Das, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki:
Correlating contexts and NFR conflicts from event logs. Softw. Syst. Model. 22(6): 1987-2010 (2023) - [j15]Aradhita Mukherjee, Rituparna Chaki, Nabendu Chaki:
An unsupervised learning-guided multi-node failure-recovery model for distributed graph processing systems. J. Supercomput. 79(9): 9383-9408 (2023) - [c51]Abantika Choudhury, Suparna Das Gupta, Rituparna Chaki:
An Approach Toward Congestion Management for Improved Emergency Vehicle Management in Intelligent Urban Traffic Network. CISIM 2023: 354-369 - 2022
- [j14]Paramita Sarkar, Ayush Aryan, Rituparna Chaki:
Sea lion attacking-based deer hunting optimization algorithm for dynamic nurse scheduling in health care sector contribution of hybrid algorithm in cloud. Concurr. Comput. Pract. Exp. 34(25) (2022) - [j13]Paramita Sarkar, Rituparna Chaki, Agostino Cortesi:
A Patient-Centric Nurse Scheduling Algorithm. SN Comput. Sci. 3(1): 7 (2022) - [c50]Raghunath Maji, Atreyee Biswas, Rituparna Chaki:
A Look into the Vulnerability of Voice Assisted IoT. CISIM 2022: 49-62 - [c49]Aradhita Mukherjee, Rituparna Chaki, Nabendu Chaki:
An Efficient Data Distribution Strategy for Distributed Graph Processing System. CISIM 2022: 360-373 - 2021
- [j12]Aradhita Mukherjee, Rituparna Chaki, Nabendu Chaki:
Data mining-based hierarchical transaction model for multi-level consistency management in large-scale replicated databases. Comput. Stand. Interfaces 74: 103485 (2021) - [j11]Agostino Cortesi, Nabendu Chaki, Rituparna Chaki:
Verifiability in Systems and Data Engineering: Preface by the Special Issue Editors. Innov. Syst. Softw. Eng. 17(3): 185-186 (2021) - [j10]Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki:
Requirement-oriented risk management for incremental software development. Innov. Syst. Softw. Eng. 17(3): 187-204 (2021) - [j9]Abhishek Bal, Minakshi Banerjee, Rituparna Chaki, Punit Sharma:
An efficient brain tumor image classifier by combining multi-pathway cascaded deep neural network and handcrafted features in MR images. Medical Biol. Eng. Comput. 59(7): 1495-1527 (2021) - [j8]Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki:
NFR-aware prioritization of software requirements. Syst. Eng. 24(3): 158-176 (2021) - [j7]Suparna DasGupta, Sankhayan Choudhury, Rituparna Chaki:
VADiRSYRem: VANET-Based Diagnosis and Response System for Remote Locality. SN Comput. Sci. 2(1): 41 (2021) - [c48]Raghunath Maji, Atreyee Biswas, Rituparna Chaki:
A Novel Proposal of Using NLP to Analyze IoT Apps Towards Securing User Data. CISIM 2021: 156-168 - [c47]Mandira Roy, Novarun Deb, Agostino Cortesi, Rituparna Chaki, Nabendu Chaki:
CARO: A Conflict-Aware Requirement Ordering Tool for DevOps. RE 2021: 442-443 - [e15]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Eleven, 7th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2020, Kolkata, India, February 28-29, 2020. Advances in Intelligent Systems and Computing 1178, Springer 2021, ISBN 978-981-15-5746-0 [contents] - 2020
- [j6]Abhishek Bal, Minakshi Banerjee, Rituparna Chaki, Punit Sharma:
An efficient method for PET image denoising by combining multi-scale transform and non-local means. Multim. Tools Appl. 79(39-40): 29087-29120 (2020) - [c46]Soumyabrata Saha, Rituparna Chaki:
A Study on Energy-Efficient Routing Protocols for Wireless Sensor Networks. ACSS (1) 2020: 125-143 - [e14]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Nine, 6th International Doctoral Symposium on Applied Computation and Security, ACSS 2019, Kolkata, India, 12-13 March, 2019. Advances in Intelligent Systems and Computing 995, Springer 2020, ISBN 978-981-13-8961-0 [contents] - [e13]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Ten, 6th International Doctoral Symposium on Applied Computation and Security, ACSS 2019, Kolkata, India, 12-13 March, 2019. Advances in Intelligent Systems and Computing 996, Springer 2020, ISBN 978-981-13-8968-9 [contents] - [e12]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Twelve, 7th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2020, Kolkata, India, February 28-29, 2020. Advances in Intelligent Systems and Computing 1136, Springer 2020, ISBN 978-981-15-2929-0 [contents]
2010 – 2019
- 2019
- [c45]Raghunath Maji, Souvick Das, Rituparna Chaki:
ZoBe: Zone-Oriented Bandwidth Estimator for Efficient IoT Networks. ACSS (1) 2019: 27-36 - [c44]Abhishek Bal, Minakshi Banerjee, Punit Sharma, Rituparna Chaki:
A Multi-class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolutional Neural Network. ACSS (2) 2019: 93-111 - [c43]Abantika Choudhury, Uma Bhattacharya, Rituparna Chaki:
Dynamic Scheduling of Traffic Signal (DSTS) Management in Urban Area Network. CISIM 2019: 132-143 - [c42]Soumyabrata Saha, Rituparna Chaki:
Cluster Based Framework for Alleviating Buffer Based Congestion for Wireless Sensor Network. CISIM 2019: 176-190 - [e11]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Eight, Fifth International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2018, Kolkata, India, February 9-11, 2018. Advances in Intelligent Systems and Computing 883, Springer 2019, ISBN 978-981-13-3701-7 [contents] - [e10]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2018, Kolkata, India, February 9-11, 2018. Advances in Intelligent Systems and Computing 897, Springer 2019, ISBN 978-981-13-3249-4 [contents] - [e9]Khalid Saeed, Rituparna Chaki, Valentina Janev:
Computer Information Systems and Industrial Management - 18th International Conference, CISIM 2019, Belgrade, Serbia, September 19-21, 2019, Proceedings. Lecture Notes in Computer Science 11703, Springer 2019, ISBN 978-3-030-28956-0 [contents] - 2018
- [j5]Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki, Khalid Saeed:
An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare. Int. J. Softw. Eng. Knowl. Eng. 28(6): 781-810 (2018) - [c41]Suparna DasGupta, Sankhayan Choudhury, Rituparna Chaki:
Disaster Management System Using Vehicular Ad Hoc Networks. ACSS (2) 2018: 93-107 - [c40]Moumita Poddar, Rituparna Chaki, Debdutta Pal:
Congestion Control for IoT Using Channel Trust Based Approach. CISIM 2018: 392-404 - 2017
- [c39]Ayan Kumar Das, Rituparna Chaki:
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network. CISIM 2017: 290-302 - [e8]Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Three, Third International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2016, August 12-14, 2016, Kolkata, India. Advances in Intelligent Systems and Computing 567, 2017, ISBN 978-981-10-3408-4 [contents] - [e7]Rituparna Chaki, Khalid Saeed, Agostino Cortesi, Nabendu Chaki:
Advanced Computing and Systems for Security - Volume Four, Third International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2016, August 12-14, 2016, Kolkata, India. Advances in Intelligent Systems and Computing 568, 2017, ISBN 978-981-10-3390-2 [contents] - [e6]Khalid Saeed, Wladyslaw Homenda, Rituparna Chaki:
Computer Information Systems and Industrial Management - 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings. Lecture Notes in Computer Science 10244, Springer 2017, ISBN 978-3-319-59104-9 [contents] - 2016
- [j4]Ayan Kumar Das, Rituparna Chaki, Kashi Nath Dey:
Cluster-based energy-aware routing scheme (CBEARS) for wireless sensor network. Int. J. Sens. Networks 21(4): 262-272 (2016) - [c38]Paramita Sarkar, Rituparna Chaki, Ditipriya Sinha:
A Heuristic Framework for Priority Based Nurse Scheduling. ACSS (1) 2016: 3-18 - [c37]Ammlan Ghosh, Rituparna Chaki, Nabendu Chaki:
Abort-Free STM: A Non-blocking Concurrency Control Approach Using Software Transactional Memory. ACSS (1) 2016: 53-71 - [c36]Puja Mukherjee, Rituparna Chaki:
Towards Generating a Unique Signature for Remote User by Keystrokes Dynamics. CISIM 2016: 661-671 - [c35]Ammlan Ghosh, Rituparna Chaki, Nabendu Chaki:
Checkpoint based multi-version concurrency control mechanism for remote healthcare system. ICACCI 2016: 382-389 - [c34]Soumyabrata Saha, Rituparna Chaki, Nabendu Chaki:
Hierarchical Data Aggregation Based Routing for Wireless Sensor Networks. ICCCI (2) 2016: 168-179 - [c33]Tapalina Bhattasali, Nabendu Chaki, Rituparna Chaki, Khalid Saeed:
Context and Trust Aware Workflow Oriented Access Framework. SEKE 2016: 93-98 - [e5]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1. Advances in Intelligent Systems and Computing 395, Springer 2016, ISBN 978-81-322-2648-2 [contents] - [e4]Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2. Advances in Intelligent Systems and Computing 396, Springer 2016, ISBN 978-81-322-2651-2 [contents] - 2015
- [j3]Ammlan Ghosh, Rituparna Chaki, Nabendu Chaki:
A new concurrency control mechanism for multi-threaded environment using transactional memory. J. Supercomput. 71(11): 4095-4115 (2015) - [c32]Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki, Khalid Saeed:
Securing Service in Remote Healthcare. ACSS (1) 2015: 65-84 - [c31]Ayan Kumar Das, Rituparna Chaki, Kashi Nath Dey:
The Design of Hierarchical Routing Protocol for Wireless Sensor Network. ACSS (1) 2015: 223-233 - [c30]Ammlan Ghosh, Rituparna Chaki:
Implementing Software Transactional Memory Using STM Haskell. ACSS (1) 2015: 235-248 - [c29]Tapalina Bhattasali, Nabendu Chaki, Khalid Saeed, Rituparna Chaki:
U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device. CISIM 2015: 219-230 - [e3]Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki:
Applied Computation and Security Systems - ACSS 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume One. Springer 2015, ISBN 978-81-322-1984-2 [contents] - [e2]Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki:
Applied Computation and Security Systems - ACSS 2014 - 1st International Doctoral Symposium on Applied Computation and Security Systems (ACSS), April, 18-20, 2014, Kolkata, India, Proceedings, Volume Two. Springer 2015, ISBN 978-81-322-1987-3 [contents] - 2014
- [c28]Suparna DasGupta, Rituparna Chaki:
Trust-Based Routing for Vehicular Ad Hoc Network. ACSS (1) 2014: 187-202 - [c27]Ammlan Ghosh, Anubhab Sahin, Anirban Silsarma, Rituparna Chaki:
A New Contention Management Technique for Obstruction Free Transactional Memory. CISIM 2014: 11-22 - [c26]Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki:
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud. CISIM 2014: 112-121 - [c25]Ditipriya Sinha, Rituparna Chaki:
Comparative Performance Analysis of AESCRT Using NS2. ICIT 2014: 35-40 - [i8]Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki:
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things. CoRR abs/1406.4941 (2014) - 2013
- [c24]Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki:
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things. CISIM 2013: 206-217 - [c23]Ayan Kumar Das, Rituparna Chaki, Atreyee Biswas:
Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network. CISIM 2013: 289-300 - [e1]Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Slawomir T. Wierzchon:
Computer Information Systems and Industrial Management - 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings. Lecture Notes in Computer Science 8104, Springer 2013, ISBN 978-3-642-40924-0 [contents] - 2012
- [c22]Shanta Mandal, Rituparna Chaki:
A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. ACITY (1) 2012: 263-271 - [c21]Pratima Sarkar, Rituparna Chaki:
A Cryptographic Approach towards Black Hole Attack Detection. ACITY (1) 2012: 273-278 - [c20]Suprativ Saha, Rituparna Chaki:
A Brief Review of Data Mining Application Involving Protein Sequence Classification. ACITY (2) 2012: 469-477 - [c19]Ayan Kumar Das, Rituparna Chaki:
MERCC: Multiple Events Routing with Congestion Control for WSN. ACITY (1) 2012: 691-698 - [c18]Soumyabrata Saha, Rituparna Chaki:
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks. CISIM 2012: 361-373 - [c17]Prasun Dutta, Rituparna Chaki:
A survey of data mining applications in water quality management. CUBE 2012: 470-475 - [i7]Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal:
Sleep Deprivation Attack Detection in Wireless Sensor Network. CoRR abs/1203.0231 (2012) - [i6]Tapalina Bhattasali, Rituparna Chaki:
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network. CoRR abs/1203.0240 (2012) - [i5]Tapalina Bhattasali, Rituparna Chaki:
AMC Model for Denial of Sleep Attack Detection. CoRR abs/1203.1777 (2012) - [i4]Suprativ Saha, Rituparna Chaki:
Application of Data mining in Protein sequence Classification. CoRR abs/1211.4654 (2012) - [i3]Suprativ Saha, Rituparna Chaki:
A Brief Review of Data Mining Application Involving Protein Sequence Classification. CoRR abs/1211.4866 (2012) - 2011
- [c16]Anupam Saha, Rituparna Chaki:
VAMI - A Novel Architecture for Vehicular Ambient Intelligent System. CISIM 2011: 55-64 - [c15]Debdutta Barman Roy, Rituparna Chaki:
MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection System. CISIM 2011: 85-94 - [c14]Sangeeta Sen, Rituparna Chaki:
Handling Write Lock Assignment in Cloud Computing Environment. CISIM 2011: 221-230 - [c13]Debdutta Barman Roy, Rituparna Chaki:
Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile Agent. WiMo/CoNeCo 2011: 14-23 - [c12]Ayan Kumar Das, Rituparna Chaki:
A Novel Power-Balanced Routing Scheme for WSN. WiMo/CoNeCo 2011: 24-34 - [c11]Ditipriya Sinha, Rituparna Chaki:
SRCHS - A Stable Reliable Cluster Head Selection Protocol. WiMo/CoNeCo 2011: 35-44 - [i2]Tapalina Bhattasali, Rituparna Chaki:
Lightweight Hierarchical Model for HWSNET. CoRR abs/1111.1933 (2011) - 2010
- [j2]Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
BHIDS: a new, cluster based algorithm for black hole IDS. Secur. Commun. Networks 3(2-3): 278-288 (2010) - [c10]Rituparna Chaki:
Intrusion detection: Ad-hoc networks to ambient intelligence framework. CISIM 2010: 7-12 - [i1]Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks. CoRR abs/1004.0587 (2010)
2000 – 2009
- 2009
- [c9]Ditipriya Sinha, Rituparna Chaki:
MALBACO - a new Multi-Agent Load Balanced Ant Colony Optimization Algorithm for MANETs. NaBIC 2009: 861-865 - [c8]Suparna DasGupta, Rituparna Chaki:
AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks. NetCoM 2009: 88-92 - 2008
- [c7]Soma Saha, Rituparna Chaki, Nabendu Chaki:
A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks. CISIM 2008: 103-108 - [c6]Poly Sen, Nabendu Chaki, Rituparna Chaki:
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks. CISIM 2008: 121-126 - 2007
- [c5]Rituparna Chaki, Nabendu Chaki:
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. CISIM 2007: 179-184 - [c4]Nabendu Chaki, Rituparna Chaki:
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks. CISIM 2007: 185-190 - 2005
- [j1]Uma Bhattacharya, Rituparna Chaki:
A new scalable optimal topology for multi-hop optical networks. Comput. Commun. 28(5): 557-570 (2005) - 2003
- [c3]Nabendu Chaki, Rituparna Chaki, Bhaskar Saha, T. Chattopadhyay:
A New Logical Topology Based on Barrel Shifter Network over an All Optical Network. LCN 2003: 283-284 - 2000
- [c2]U. Bhattacharya, Rituparna Chaki:
A New Multihop Logical Topology for Reliable Broadband Communication. ASIAN 2000: 255-262 - [c1]U. Bhattacharya, Rituparna Chaki:
A New Scalable Topology for Multihop Optical Networks. ASIAN 2000: 263-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint