Остановите войну!
for scientists:
default search action
Rajeev Agrawal
- > Home > Persons > Rajeev Agrawal
Publications
- 2022
- [j36]Mehedi Hassan, Md. Enamul Haque, Mehmet Engin Tozal, Vijay Raghavan, Rajeev Agrawal:
Intrusion Detection Using Payload Embeddings. IEEE Access 10: 4015-4030 (2022) - 2019
- [c63]James R. Ezick, Ben Parsons, William Glodek, Tom Henretty, Muthu Manikandan Baskaran, Richard Lethin, John Feo, Tai-Ching Tuan, Christopher J. Coley, Leslie Leonard, Rajeev Agrawal:
Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale. HPEC 2019: 1-7 - 2018
- [c58]Sambit Bhattacharya, Rajeev Agrawal, Neal Wagner:
Application of deep learning and geo-knowledge bases to scene understanding. MEDES 2018: 74-79 - [r2]Yolanda S. Baker, Michelle Donnell, Charles Mainhart, Rajeev Agrawal:
Privacy Issues for SNS and Mobile SNS. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2016
- [c54]David Freet, Rajeev Agrawal:
An overview of architectural and security considerations for named data networking (NDN). MEDES 2016: 52-57 - [e1]Richard Chbeir, Rajeev Agrawal, Ismaïl Biskri:
Proceedings of the 8th International Conference on Management of Digital EcoSystems, MEDES 2016, Biarritz, France, November 1-4, 2016. ACM 2016, ISBN 978-1-4503-4267-4 [contents] - 2015
- [c48]Jeffrey Anu, Rajeev Agrawal, Cameron Seay, Sambit Bhattacharya:
Smart Grid Security Risks. ITNG 2015: 485-489 - [c47]Cameron Seay, Rajeev Agrawal, Anirudh Kadadi, Yannick Barel:
Using Hadoop on the Mainframe: A Big Solution for the Challenges of Big Data. ITNG 2015: 765-769 - [c44]David Freet, Rajeev Agrawal, Sherin John, Jessie J. Walker:
Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS. MEDES 2015: 148-155 - [c43]Rajeev Agrawal, Anirudh Kadadi, Xiangfeng Dai, Frédéric Andrès:
Challenges and opportunities with big data visualization. MEDES 2015: 169-173 - 2014
- [c38]Yolanda S. Baker, Rajeev Agrawal, James A. Foster, Daniel Beck, Gerry V. Dozier:
Detecting bacterial vaginosis using machine learning. ACM Southeast Regional Conference 2014: 46:1-46:4 - [c36]Rajeev Agrawal, Ashiq Imran, Cameron Seay, Jessie J. Walker:
A layer based architecture for provenance in big data. IEEE BigData 2014: 1-7 - [c35]Ashiq Imran, Rajeev Agrawal, Jessie J. Walker, Anthony Gomes:
A layer based architecture for provenance in big data. IEEE BigData 2014: 29-31 - [c34]Anirudh Kadadi, Rajeev Agrawal, Christopher Nyamful, Rahman Atiq:
Challenges of data integration and interoperability in big data. IEEE BigData 2014: 38-40 - [c33]Yolanda S. Baker, Rajeev Agrawal, James A. Foster, Daniel Beck, Gerry V. Dozier:
Applying machine learning techniques in detecting Bacterial Vaginosis. ICMLC 2014: 241-246 - [r1]Yolanda S. Baker, Michelle Donnell, Charles Mainhart, Rajeev Agrawal:
Privacy Issues for SNS and Mobile SNS. Encyclopedia of Social Network Analysis and Mining 2014: 1340-1345 - 2013
- [c28]Sambit Bhattacharya, Bogdan D. Czejdo, Rakesh Malhotra, Nicolas Perez, Rajeev Agrawal:
Agent Based Modeling of Moving Point Objects in Geospatial Data. COM.Geo 2013: 132-133 - [c27]Sambit Bhattacharya, Bogdan D. Czejdo, Rakesh Malhotra, Nicolas Perez, Rajeev Agrawal:
Characterization of Moving Point Objects in Geospatial Data. COM.Geo 2013: 151 - [c25]Yolanda S. Baker, Rajeev Agrawal, Sambit Bhattacharya:
Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT). ISI 2013: 10-12 - [c24]Venkat N. Gudivada, Rajeev Agrawal, Chunbo Chu:
Online Teaching and Learning Strategies for Programming-intensive Courses. ITNG 2013: 781-782 - [c23]Muhammad Suleiman, Rajeev Agrawal, William I. Grosky, Frédéric Andrès:
A generic data driven approach for Medicaid fraud detection. MEDES 2013: 233-234 - [i1]Rajeev Agrawal, Muhammad Suleiman, Cameron Seay, Clay Gloster:
Dynamic Disease Forecast Network Using Family Medical History. ICHI 2013: 486 - 2012
- [j16]Rajeev Agrawal, Naser El-Bathy, Cameron Seay:
Medicaid fraud detection using data broker services. SIGHIT Rec. 2(1): 25 (2012) - 2010
- [c17]Rajeev Agrawal, Changhua Wu, William I. Grosky, Farshad Fotouhi:
Bayesian Framework for Automatic Image Annotation Using Visual Keywords. UCMA 2010: 142-157 - 2007
- [c14]Rajeev Agrawal, Changhua Wu, William I. Grosky, Farshad Fotouhi:
Image Clustering Using Visual and Text Keywords. CIRA 2007: 49-54 - [c13]Rajeev Agrawal, William I. Grosky, Farshad Fotouhi:
Ranking Privacy Policy. ICDE Workshops 2007: 192-197 - 2006
- [c8]Rajeev Agrawal, William I. Grosky, Farshad Fotouhi:
Image Retrieval Using Multimodal Keywords. ISM 2006: 817-822 - [c7]Rajeev Agrawal, C.-H. Wu, William I. Grosky, Farshad Fotouhi:
Diffusion maps-based image clustering. IWRIDL 2006: 9 - [c6]Rajeev Agrawal, William I. Grosky, Farshad Fotouhi:
Image Clustering Using Multimodal Keywords. SAMT 2006: 113-123
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint