Sudip Saha
Sudip Saha
Facebook Inc.
Verified email at - Homepage
Cited by
Cited by
Approximation algorithms for reducing the spectral radius to control epidemic spread
S Saha, A Adiga, BA Prakash, AKS Vullikanti
Proceedings of the 2015 SIAM International Conference on Data Mining, 568-576, 2015
DNS for massive-scale command and control
K Xu, P Butler, S Saha, D Yao
IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013
A study on knowledge and practice of mothers regarding infant feeding and nutritional status of under-five children attending immunization clinic of a medical college
S Chatterjee, S Saha
Internet J Nutrition and Wellness 5 (1), 1-9, 2008
Near-Optimal Algorithms for Controlling Propagation at Group Scale on Networks
Y Zhang, A Adiga, S Saha, A Vullikanti, BA Prakash
IEEE Transactions on Knowledge and Data Engineering 28 (12), 3339--3352, 2016
Planning and response in the aftermath of a large crisis: An agent-based informatics framework
C Barrett, K Bisset, S Chandan, J Chen, Y Chungbaek, S Eubank, ...
2013 Winter Simulations Conference (WSC), 1515-1526, 2013
Ormeloxifene: A selective estrogen receptor modulator for treatment of dysfunctional menorrhagia
SC Biswas, SK Saha, TS Bag, SC Ghosh Roy, AC Roy, SP Kabiraj
J Obstet Gynecol Ind 54 (1), 56-59, 2004
Human initiated cascading failures in societal infrastructures
C Barrett, K Channakeshava, F Huang, J Kim, A Marathe, MV Marathe, ...
PloS one 7 (10), e45406, 2012
Accessory breast in the perineum
S Basu, T Bag, SK Saha, PC Biswas
Tropical doctor 33 (4), 245-245, 2003
A biologically inspired password authentication system
D Dasgupta, S Saha
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
Equilibria in epidemic containment games
S Saha, A Adiga, A Vullikanti
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
Modeling the interaction between emergency communications and behavior in the aftermath of a disaster
S Chandan, S Saha, C Barrett, S Eubank, A Marathe, M Marathe, ...
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013
Integrated multi-network modeling environment for spectrum management
R Beckman, K Channakeshava, F Huang, J Kim, A Marathe, M Marathe, ...
IEEE Journal on Selected Areas in Communications 31 (6), 1158-1168, 2013
An approach for human identification based on time and frequency domain features extracted from ECG signals
SA Fattah, ASMM Jameel, R Goswami, SK Saha, N Syed, S Akter, ...
TENCON 2011-2011 IEEE Region 10 Conference, 259-263, 2011
Password security through negative filtering
D Dasgupta, S Saha
2010 international conference on emerging security technologies, 83-89, 2010
Modeling cellular network traffic with mobile call graph constraints
J Kim, VSA Kumar, A Marathe, G Pei, S Saha, BSP Subbiah
Proceedings of the 2011 Winter Simulation Conference (WSC), 3165-3177, 2011
Time trends in ectopic pregnancy over a decade--a retrospective hospital-based study.
TS Bag, DP Saha, N Dasgupta, M Sarkar, SK Mandal, T Mondal, SK Saha
Journal of the Indian Medical Association 109 (10), 727-729, 2011
Quantifying mixed uncertainties in cyber attacker payoffs
R Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, M Oster, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
Designing of a air-conditioning system using fuzzy logic with advantage of energy saving
S Saha, SK Saha, IS Iqbal, AK Kundu, MDTH Khan, SK Pramanik
2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014
Identifying vulnerabilities and hardening attack graphs for networked systems
S Saha, AKS Vullikanti, S Halappanavar, Mahantesh, Chatterjee
2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016
Phenolic content and in vitro antioxidant potential of selected medicinal plants of Bangladesh
AH Zulfiker, D Ahmed, MB Alam, MR Saha, SK Saha, MI Khalil, TM Menon, ...
Journal of Pharmacy Research 2011, 1991-8, 2011
The system can't perform the operation now. Try again later.
Articles 1–20