Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Parallel Pollard's Rho Algorithm, , , , , , and . CoRR, (2013)Parallelization of Pollard's Rho Integer factorization algorithm., , , , , , , , and . CCSEIT, page 43-46. ACM, (2012)"Maya"- A Conversational Shopping Assistant for Fashion at Myntra., , , , , and . WSDM, page 1178-1179. ACM, (2024)Enabling Hyper-Personalisation: Automated Ad Creative Generation and Ranking for Fashion e-Commerce., , , and . CoRR, (2019)Perceptual video hashing based on the Achlioptas's random projections., and . NCVPRIPG, page 1-4. IEEE, (2013)Detection of Malicious Video Modifications using Perceptual Video Hashing., and . ICCCS, page 1-5. IEEE, (2020)Design and Analysis of a New Loadless 4T SRAM Cell in Deep Submicron CMOS Technologies., , and . ICETET, page 155-161. IEEE Computer Society, (2009)Monitoring Edge-Geodetic Sets in Graphs: Extremal Graphs, Bounds, Complexity., , , , , and . CALDAM, volume 14508 of Lecture Notes in Computer Science, page 29-43. Springer, (2024)Quantification of alarm chatter based on run length distributions., , , , and . CDC, page 6809-6814. IEEE, (2010)Social Secret Sharing for Resource Management in Cloud. CoRR, (2013)