A heuristic based approach for freight path generation in a mixed traffic rail network Submitted by manojiitbpowai on Wed, 05/25/2022 - 16:20 Read more about A heuristic based approach for freight path generation in a mixed traffic rail networkLog in to post comments
Data-Driven treatment policies for Dialysis patients Submitted by manojiitbpowai on Wed, 05/25/2022 - 16:08 Read more about Data-Driven treatment policies for Dialysis patientsLog in to post comments
Port selection for optimal charging/discharging and external communication in single-integrator graphs networks Submitted by manojiitbpowai on Wed, 05/25/2022 - 16:02 Read more about Port selection for optimal charging/discharging and external communication in single-integrator graphs networksLog in to post comments
Threat Detection and Response in Linux Endpoints Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:55 Read more about Threat Detection and Response in Linux EndpointsLog in to post comments
Evading Malware Analysis Using Reverse Execution Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:52 Read more about Evading Malware Analysis Using Reverse ExecutionLog in to post comments
Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:44 Read more about Exploiting Side Information for Improved Online Learning Algorithms in Wireless NetworksLog in to post comments
Exploiting Side Information for Intelligent and Reconfigurable PHY: Experiments on LTE Transceivers Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:42 Read more about Exploiting Side Information for Intelligent and Reconfigurable PHY: Experiments on LTE TransceiversLog in to post comments
Multi-player age-of-information bandits: A trekking approach Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:41 Read more about Multi-player age-of-information bandits: A trekking approachLog in to post comments
Revenue sharing on the Internet: A case for going soft on neutrality regulations Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:37 Read more about Revenue sharing on the Internet: A case for going soft on neutrality regulationsLog in to post comments
Monitoring COVID Hotspots Using Telecom Data: Voronoi Tessellations for Marking Buffer Zones Submitted by debamita.ghosh on Wed, 05/25/2022 - 15:35 Read more about Monitoring COVID Hotspots Using Telecom Data: Voronoi Tessellations for Marking Buffer ZonesLog in to post comments