Search

Your search keyword '"Sural, Shamik"' showing total 529 results

Search Constraints

Start Over You searched for: Author "Sural, Shamik" Remove constraint Author: "Sural, Shamik"
529 results on '"Sural, Shamik"'

Search Results

1. Unlocking Efficiency: Adaptive Masking for Gene Transformer Models

2. BOXREC: Recommending a Box of Preferred Outfits in Online Shopping

3. Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems

4. Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains

5. A Graph-Based Framework for ABAC Policy Enforcement and Analysis

6. Knowledge-Aware Neural Networks for Medical Forum Question Classification

7. An Integrated Approach for Improving Brand Consistency of Web Content: Modeling, Analysis and Recommendation

8. Tabular Structure Detection from Document Images for Resource Constrained Devices Using A Row Based Similarity Measure

10. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain

11. Decentralized Authorization in Web Services Using Public Blockchain

14. Anveshak - A Groundtruth Generation Tool for Foreground Regions of Document Images

16. Security Analysis of Unified Access Control Policies

18. Policy Reconciliation and Migration in Attribute Based Access Control

19. VisMAP: Visual Mining of Attribute-Based Access Control Policies

20. Towards an Aspect-Based Ranking Model for Clinical Trial Search

23. Enabling the Deployment of ABAC Policies in RBAC Systems

24. One for the Road: Recommending Male Street Attire

25. Policy Engineering in RBAC and ABAC

31. EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart

32. SPODS: A Dataset of Color-Official Documents and Detection of Logo, Stamp, and Signature

33. Text and Non-text Separation in Scanned Color-Official Documents

34. Preventing Unauthorized Data Flows

40. Deciphering Text from Touchscreen Key Taps

41. Efficiently Supporting Attribute-Based Access Control in Linux

46. Enhancing the Security of Image CAPTCHAs Through Noise Addition

47. Role Mining in the Presence of Separation of Duty Constraints

48. Enforcing Separation of Duty in Attribute Based Access Control Systems

49. Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing

50. Migrating from DAC to RBAC

Catalog

Books, media, physical & digital resources