407 results on '"Jaggi A"'
Search Results
2. Energy Storage System Analysis Based on State of Charge for Hybrid Electric Vehicle
3. Computationally Efficient Codes for Adversarial Binary-Erasure Channels
4. Identifying Anti-Social Activities in Surveillance Monitoring Applications using Deep-CNN based Algorithms
5. On the Capacity of Additive AVCs with Feedback
6. New Results on AVCs with Omniscient and Myopic Adversaries
7. The Capacity of Causal Adversarial Channels
8. On the Capacity of Additive AVCs with Feedback
9. New Results on AVCs with Omniscient and Myopic Adversaries
10. Identification of chemical entities from prescribed drugs for ovarian cancer by text mining of medical records
11. Identification of chemical entities from prescribed drugs for ovarian cancer by text mining of medical records
12. Faster Parallel Training of Word Embeddings
13. Microscopic Model-Based RL Approaches for Traffic Signal Control Generalize Better than Model-Free RL Approaches
14. Tight List-Sizes for Oblivious AVCs under Constraints
15. Semantic Perturbations with Normalizing Flows for Improved Generalization
16. Microscopic Model-Based RL Approaches for Traffic Signal Control Generalize Better than Model-Free RL Approaches
17. Quadratically Constrained Myopic Adversarial Channels.
18. Network Coding with Myopic Adversaries
19. Tight List-Sizes for Oblivious AVCs under Constraints
20. Symmetrizability for Myopic AVCs
21. Quadratically Constrained Two-way Adversarial Channels
22. Empirical Properties of Good Channel Codes
23. Communication Efficient Secret Sharing in the Presence of Malicious Adversary
24. Controller Design and Robust Performance Analysis of Magnetic Levitation System
25. Empirical Properties of Good Channel Codes
26. Symmetrizability for Myopic AVCs
27. Communication Efficient Secret Sharing in the Presence of Malicious Adversary
28. Quadratically Constrained Two-way Adversarial Channels
29. Generalized List Decoding
30. On Linear Learning with Manycore Processors
31. Handwritten Digit Recognition Using Machine Learning: A Review
32. Undetectable Radios: Covert Communication under Spectral Mask Constraints
33. Shared Randomness in Arbitrarily Varying Channels
34. The Interplay of Causality and Myopia in Adversarial Channel Models
35. When are large codes possible for AVCs?
36. ESA SnowLab Project: 4 Years Of Wide Band Scatterometer Measurements Of Seasonal Snow
37. Higher-Order Sliding-Mode Observer Based Robust Controller Design for Four-Tank Coupled System
38. Robust Controller Design and Performance Analysis of Four-Tank Coupled System
39. Design and Simulation of Autonomous Fire Fighting Robots for Forests
40. On the Rate Distortion Function of Arbitrarily Varying Remote Sources
41. Covert Communication Over Adversarially Jammed Channels.
42. Multipath Stealth Communication with Jammers
43. Secure Adaptive Group Testing
44. EMI shielding for DSRC Electronic Toll Collection using grid based Carbon fiber /epoxy composites
45. Handwritten Digit Recognition Using Machine Learning: A Review
46. Shared Randomness in Arbitrarily Varying Channels
47. When are large codes possible for AVCs?
48. The Interplay of Causality and Myopia in Adversarial Channel Models
49. ESA SnowLab Project: 4 Years Of Wide Band Scatterometer Measurements Of Seasonal Snow
50. Undetectable Radios: Covert Communication under Spectral Mask Constraints
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.