default search action
BibTeX records: Rakesh M. Verma
@inproceedings{DBLP:conf/case-ws/QachfarTV24, author = {Fatima Zahra Qachfar and Bryan Tuck and Rakesh M. Verma}, editor = {Ali H{\"{u}}rriyetoglu and Hristo Tanev and Surendrabikram Thapa and G{\"{o}}k{\c{c}}e Uludogan}, title = {DetectiveReDASers at HSD-2Lang 2024: {A} New Pooling Strategy with Cross-lingual Augmentation and Ensembling for Hate Speech Detection in Low-resource Languages}, booktitle = {Proceedings of the 7th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text, {CASE} 2024, St. Julians, Malta, March 22, 2024}, pages = {199--204}, publisher = {Association for Computational Linguistics}, year = {2024}, url = {https://aclanthology.org/2024.case-1.28}, timestamp = {Tue, 02 Apr 2024 16:32:10 +0200}, biburl = {https://dblp.org/rec/conf/case-ws/QachfarTV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BoumberTVQ24, author = {Dainis Boumber and Bryan E. Tuck and Rakesh M. Verma and Fatima Zahra Qachfar}, editor = {Hongxin Hu and Andrew H. Sung and Rakesh M. Verma}, title = {LLMs for Explainable Few-shot Deception Detection}, booktitle = {Proceedings of the 10th {ACM} International Workshop on Security and Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024}, pages = {37--47}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643651.3659898}, doi = {10.1145/3643651.3659898}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BoumberTVQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HanksKNV24, author = {Casey Hanks and Shanina Ko and Emily Nguyen and Rakesh M. Verma}, editor = {Hongxin Hu and Andrew H. Sung and Rakesh M. Verma}, title = {Domain Independent Deception Detection: Feature Sets, {LIWC} Efficacy, and Synthetic Data Challenges}, booktitle = {Proceedings of the 10th {ACM} International Workshop on Security and Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024}, pages = {59--68}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643651.3659895}, doi = {10.1145/3643651.3659895}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HanksKNV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coling/BoumberQV24, author = {Dainis Boumber and Fatima Zahra Qachfar and Rakesh M. Verma}, editor = {Nicoletta Calzolari and Min{-}Yen Kan and V{\'{e}}ronique Hoste and Alessandro Lenci and Sakriani Sakti and Nianwen Xue}, title = {Domain-Agnostic Adapter Architecture for Deception Detection: Extensive Evaluations with the DIFrauD Benchmark}, booktitle = {Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation, {LREC/COLING} 2024, 20-25 May, 2024, Torino, Italy}, pages = {5260--5274}, publisher = {{ELRA} and {ICCL}}, year = {2024}, url = {https://aclanthology.org/2024.lrec-main.468}, timestamp = {Thu, 23 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coling/BoumberQV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/QachfarV24, author = {Fatima Zahra Qachfar and Rakesh M. Verma}, editor = {Anna Lisa Ferrara and Ram Krishnan}, title = {All Your LLMs Belong to Us: Experiments with a New Extortion Phishing Dataset}, booktitle = {Data and Applications Security and Privacy {XXXVIII} - 38th Annual {IFIP} {WG} 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14901}, pages = {241--258}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-65172-4\_15}, doi = {10.1007/978-3-031-65172-4\_15}, timestamp = {Tue, 30 Jul 2024 21:29:14 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/QachfarV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ida/DangV24, author = {Vu Minh Hoang Dang and Rakesh M. Verma}, editor = {Ioanna Miliou and Nico Piatkowski and Panagiotis Papapetrou}, title = {Data Quality in {NLP:} Metrics and a Comprehensive Taxonomy}, booktitle = {Advances in Intelligent Data Analysis {XXII} - 22nd International Symposium on Intelligent Data Analysis, {IDA} 2024, Stockholm, Sweden, April 24-26, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14641}, pages = {217--229}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58547-0\_18}, doi = {10.1007/978-3-031-58547-0\_18}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ida/DangV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/BoumberVQ24, author = {Dainis Boumber and Rakesh M. Verma and Fatima Zahra Qachfar}, editor = {Shashi Shekhar and Vagelis Papalexakis and Jing Gao and Zhe Jiang and Matteo Riondato}, title = {Blue Sky: Multilingual, Multimodal Domain Independent Deception Detection}, booktitle = {Proceedings of the 2024 {SIAM} International Conference on Data Mining, {SDM} 2024, Houston, TX, USA, April 18-20, 2024}, pages = {396--399}, publisher = {{SIAM}}, year = {2024}, url = {https://doi.org/10.1137/1.9781611978032.46}, doi = {10.1137/1.9781611978032.46}, timestamp = {Wed, 03 Jul 2024 17:08:12 +0200}, biburl = {https://dblp.org/rec/conf/sdm/BoumberVQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2024iwspa, editor = {Hongxin Hu and Andrew H. Sung and Rakesh M. Verma}, title = {Proceedings of the 10th {ACM} International Workshop on Security and Privacy Analytics, {IWSPA} 2024, Porto, Portugal, 21 June 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643651}, doi = {10.1145/3643651}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2024iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-01019, author = {Rakesh M. Verma and Nachum Dershowitz and Victor Zeng and Dainis Boumber and Xuting Liu}, title = {Domain-Independent Deception: {A} New Taxonomy and Linguistic Analysis}, journal = {CoRR}, volume = {abs/2402.01019}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01019}, doi = {10.48550/ARXIV.2402.01019}, eprinttype = {arXiv}, eprint = {2402.01019}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-01019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03171, author = {Fatima Zahra Qachfar and Rakesh M. Verma}, title = {Homograph Attacks on Maghreb Sentiment Analyzers}, journal = {CoRR}, volume = {abs/2402.03171}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03171}, doi = {10.48550/ARXIV.2402.03171}, eprinttype = {arXiv}, eprint = {2402.03171}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-03920, author = {Dainis Boumber and Rakesh M. Verma and Fatima Zahra Qachfar}, title = {A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection}, journal = {CoRR}, volume = {abs/2405.03920}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.03920}, doi = {10.48550/ARXIV.2405.03920}, eprinttype = {arXiv}, eprint = {2405.03920}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-03920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-17967, author = {Bryan E. Tuck and Rakesh M. Verma}, title = {Unmasking the Imposters: In-Domain Detection of Human vs. Machine-Generated Tweets}, journal = {CoRR}, volume = {abs/2406.17967}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.17967}, doi = {10.48550/ARXIV.2406.17967}, eprinttype = {arXiv}, eprint = {2406.17967}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-17967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-12026, author = {Rakesh M. Verma and Nachum Dershowitz}, title = {The Pitfalls of Publishing in the Age of LLMs: Strange and Surprising Adventures with a High-Impact {NLP} Journal}, journal = {CoRR}, volume = {abs/2407.12026}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.12026}, doi = {10.48550/ARXIV.2407.12026}, eprinttype = {arXiv}, eprint = {2407.12026}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-12026.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DershowitzV23, author = {Nachum Dershowitz and Rakesh M. Verma}, title = {Rebutting Rebuttals}, journal = {Commun. {ACM}}, volume = {66}, number = {9}, pages = {35--41}, year = {2023}, url = {https://doi.org/10.1145/3584664}, doi = {10.1145/3584664}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/DershowitzV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nle/KarimiSV23, author = {Samaneh Karimi and Azadeh Shakery and Rakesh M. Verma}, title = {Enhancement of Twitter event detection using news streams}, journal = {Nat. Lang. Eng.}, volume = {29}, number = {2}, pages = {181--200}, year = {2023}, url = {https://doi.org/10.1017/S1351324921000462}, doi = {10.1017/S1351324921000462}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nle/KarimiSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BakiV23, author = {Shahryar Baki and Rakesh M. Verma}, title = {Sixteen Years of Phishing User Studies: What Have We Learned?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1200--1212}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3151103}, doi = {10.1109/TDSC.2022.3151103}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BakiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GholampourV23, author = {Parisa Mehdi Gholampour and Rakesh M. Verma}, editor = {David J. Marchette and Andrew H. Sung and Rakesh M. Verma}, title = {Adversarial Robustness of Phishing Email Detection Models}, booktitle = {Proceedings of the 9th {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023}, pages = {67--76}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579987.3586567}, doi = {10.1145/3579987.3586567}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GholampourV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semeval/QachfarV23, author = {Fatima Zahra Qachfar and Rakesh M. Verma}, editor = {Atul Kr. Ojha and A. Seza Dogru{\"{o}}z and Giovanni Da San Martino and Harish Tayyar Madabushi and Ritesh Kumar and Elisa Sartori}, title = {ReDASPersuasion at SemEval-2023 Task 3: Persuasion Detection using Multilingual Transformers and Language Agnostic Features}, booktitle = {Proceedings of the The 17th International Workshop on Semantic Evaluation, SemEval@ACL 2023, Toronto, Canada, 13-14 July 2023}, pages = {2124--2132}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.semeval-1.293}, doi = {10.18653/V1/2023.SEMEVAL-1.293}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/semeval/QachfarV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wanlp/TuckQBV23, author = {Bryan Tuck and Fatima Zahra Qachfar and Dainis Boumber and Rakesh M. Verma}, editor = {Hassan Sawaf and Samhaa R. El{-}Beltagy and Wajdi Zaghouani and Walid Magdy and Ahmed Abdelali and Nadi Tomeh and Ibrahim Abu Farha and Nizar Habash and Salam Khalifa and Amr Keleg and Hatem Haddad and Imed Zitouni and Khalil Mrini and Rawan N. Al{-}Matham}, title = {DetectiveRedasers at ArAIEval Shared Task: Leveraging Transformer Ensembles for Arabic Deception Detection}, booktitle = {Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023}, pages = {494--501}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.arabicnlp-1.45}, doi = {10.18653/V1/2023.ARABICNLP-1.45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wanlp/TuckQBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wanlp/QachfarV23, author = {Fatima Zahra Qachfar and Rakesh M. Verma}, editor = {Hassan Sawaf and Samhaa R. El{-}Beltagy and Wajdi Zaghouani and Walid Magdy and Ahmed Abdelali and Nadi Tomeh and Ibrahim Abu Farha and Nizar Habash and Salam Khalifa and Amr Keleg and Hatem Haddad and Imed Zitouni and Khalil Mrini and Rawan N. Al{-}Matham}, title = {ReDASPersuasion at ArAIEval Shared Task: Multilingual and Monolingual Models For Arabic Persuasion Detection}, booktitle = {Proceedings of ArabicNLP 2023, Singapore (Hybrid), December 7, 2023}, pages = {549--557}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.arabicnlp-1.54}, doi = {10.18653/V1/2023.ARABICNLP-1.54}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wanlp/QachfarV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2023iwspa, editor = {David J. Marchette and Andrew H. Sung and Rakesh M. Verma}, title = {Proceedings of the 9th {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579987}, doi = {10.1145/3579987}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2023iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhouV22, author = {Xin Zhou and Rakesh M. Verma}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Vulnerability Detection via Multimodal Learning: Datasets and Analysis}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1225--1227}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527288}, doi = {10.1145/3488932.3527288}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhouV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdc/HanksV22, author = {Casey Hanks and Rakesh M. Verma}, title = {Data Quality and Linguistic Cues for Domain-independent Deception Detection}, booktitle = {{IEEE/ACM} International Conference on Big Data Computing, Applications and Technologies, {BDCAT} 2022, Vancouver, WA, USA, December 6-9, 2022}, pages = {248--258}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BDCAT56447.2022.00042}, doi = {10.1109/BDCAT56447.2022.00042}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdc/HanksV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/QachfarVM22, author = {Fatima Zahra Qachfar and Rakesh M. Verma and Arjun Mukherjee}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Leveraging Synthetic Data and {PU} Learning For Phishing Email Detection}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {29--40}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511524}, doi = {10.1145/3508398.3511524}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/QachfarVM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZengLV22, author = {Victor Zeng and Xuting Liu and Rakesh M. Verma}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Does Deception Leave a Content Independent Stylistic Trace?}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {349--351}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3519358}, doi = {10.1145/3508398.3519358}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZengLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZhouV22, author = {Xin Zhou and Rakesh M. Verma}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Software Vulnerability Detection via Multimodal Deep Learning}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {85--103}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_5}, doi = {10.1007/978-3-031-29504-1\_5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ZhouV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2022, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398}, doi = {10.1145/3508398}, isbn = {978-1-4503-9220-4}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2022iwspa, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548}, doi = {10.1145/3510548}, isbn = {978-1-4503-9230-3}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2022iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01738, author = {Rakesh M. Verma and Nachum Dershowitz and Victor Zeng and Xuting Liu}, title = {Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate}, journal = {CoRR}, volume = {abs/2207.01738}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01738}, doi = {10.48550/ARXIV.2207.01738}, eprinttype = {arXiv}, eprint = {2207.01738}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01738.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jis/KarimiSV21, author = {Samaneh Karimi and Azadeh Shakery and Rakesh M. Verma}, title = {Online news media website ranking using user-generated content}, journal = {J. Inf. Sci.}, volume = {47}, number = {3}, year = {2021}, url = {https://doi.org/10.1177/0165551519894928}, doi = {10.1177/0165551519894928}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jis/KarimiSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecir/HatuaMV21, author = {Amartya Hatua and Arjun Mukherjee and Rakesh M. Verma}, editor = {Fabio Saracco and Marco Viviani}, title = {On the Feasibility of Using GANs for Claim Verification- Experiments and Analysis}, booktitle = {Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval {(ROMCIR} 2021) co-located with 43rd European Conference on Information Retrieval {(ECIR} 2021), Lucca, Italy (On-line), April 1, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2838}, pages = {35--46}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2838/paper4.pdf}, timestamp = {Mon, 21 Aug 2023 07:59:10 +0200}, biburl = {https://dblp.org/rec/conf/ecir/HatuaMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ranlp/HatuaMV21, author = {Amartya Hatua and Arjun Mukherjee and Rakesh M. Verma}, editor = {Galia Angelova and Maria Kunilovskaya and Ruslan Mitkov and Ivelina Nikolova{-}Koleva}, title = {Claim Verification Using a Multi-GAN Based Model}, booktitle = {Proceedings of the International Conference on Recent Advances in Natural Language Processing {(RANLP} 2021), Held Online, 1-3 September, 2021}, pages = {494--503}, publisher = {{INCOMA} Ltd.}, year = {2021}, url = {https://aclanthology.org/2021.ranlp-1.56}, timestamp = {Mon, 13 Nov 2023 12:27:35 +0100}, biburl = {https://dblp.org/rec/conf/ranlp/HatuaMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/Verma21, author = {Rakesh M. Verma}, editor = {Mark Sherriff and Laurence D. Merkle and Pamela A. Cutter and Alvaro E. Monge and Judithe Sheard}, title = {Capacity Expansion in Cybersecurity: Challenges and Prospects}, booktitle = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021}, pages = {1277}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3408877.3439634}, doi = {10.1145/3408877.3439634}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/Verma21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/VermaPG21, author = {Rakesh M. Verma and Rangarajan Ray Parthasarathy and Lila Ghemri}, editor = {Mark Sherriff and Laurence D. Merkle and Pamela A. Cutter and Alvaro E. Monge and Judithe Sheard}, title = {What is the Security Mindset? Can it be Developed?}, booktitle = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021}, pages = {1361}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3408877.3439528}, doi = {10.1145/3408877.3439528}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/VermaPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2021, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337}, doi = {10.1145/3422337}, isbn = {978-1-4503-8143-7}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08001, author = {Amartya Hatua and Arjun Mukherjee and Rakesh M. Verma}, title = {Claim Verification using a Multi-GAN based Model}, journal = {CoRR}, volume = {abs/2103.08001}, year = {2021}, url = {https://arxiv.org/abs/2103.08001}, eprinttype = {arXiv}, eprint = {2103.08001}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-04661, author = {Shahryar Baki and Rakesh M. Verma}, title = {Sixteen Years of Phishing User Studies: What Have We Learned?}, journal = {CoRR}, volume = {abs/2109.04661}, year = {2021}, url = {https://arxiv.org/abs/2109.04661}, eprinttype = {arXiv}, eprint = {2109.04661}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-04661.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AassalBDV20, author = {Ayman El Aassal and Shahryar Baki and Avisha Das and Rakesh M. Verma}, title = {An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs}, journal = {{IEEE} Access}, volume = {8}, pages = {22170--22192}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2969780}, doi = {10.1109/ACCESS.2020.2969780}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AassalBDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DasV20, author = {Avisha Das and Rakesh M. Verma}, title = {Can Machines Tell Stories? {A} Comparative Study of Deep Neural Language Models and Metrics}, journal = {{IEEE} Access}, volume = {8}, pages = {181258--181292}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3023421}, doi = {10.1109/ACCESS.2020.3023421}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DasV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/DasBAVD20, author = {Avisha Das and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Arthur Dunbar}, title = {SoK: {A} Comprehensive Reexamination of Phishing Research From the Security Perspective}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {671--708}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2957750}, doi = {10.1109/COMST.2019.2957750}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/DasBAVD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BakiVG20, author = {Shahryar Baki and Rakesh M. Verma and Omprakash Gnawali}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {236--247}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384753}, doi = {10.1145/3320269.3384753}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BakiVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZengZBV20, author = {Victor Zeng and Xin Zhou and Shahryar Baki and Rakesh M. Verma}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {PhishBench 2.0: {A} Versatile and Extendable Benchmarking Framework for Phishing}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2077--2079}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3420017}, doi = {10.1145/3372297.3420017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZengZBV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LeeV20, author = {Daniel Lee and Rakesh M. Verma}, editor = {Rakesh M. Verma and Latifur Khan and Chilukuri K. Mohan}, title = {Adversarial Machine Learning for Text}, booktitle = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020}, pages = {33--34}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375708.3380551}, doi = {10.1145/3375708.3380551}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LeeV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZengBAVMD20, author = {Victor Zeng and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Luis Felipe Teixeira De Moraes and Avisha Das}, editor = {Rakesh M. Verma and Latifur Khan and Chilukuri K. Mohan}, title = {Diverse Datasets and a Customizable Benchmarking Framework for Phishing}, booktitle = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020}, pages = {35--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375708.3380313}, doi = {10.1145/3375708.3380313}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZengBAVMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BertinoSSV20, author = {Elisa Bertino and Anoop Singhal and Srivathsan Srinivasagopalan and Rakesh M. Verma}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Developing {A} Compelling Vision for Winning the Cybersecurity Arms Race}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {220--222}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3379538}, doi = {10.1145/3374664.3379538}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BertinoSSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ZhouV20, author = {Xin Zhou and Rakesh M. Verma}, title = {Phishing Sites Detection from a Web Developer's Perspective Using Machine Learning}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64536}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ZhouV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/Verma20, author = {Rakesh M. Verma}, editor = {Jian Zhang and Mark Sherriff and Sarah Heckman and Pamela A. Cutter and Alvaro E. Monge}, title = {Poster: {A} Modular and Innovative Security Analytics Course}, booktitle = {Proceedings of the 51st {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2020, Portland, OR, USA, March 11-14, 2020}, pages = {1352}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3328778.3372649}, doi = {10.1145/3328778.3372649}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/Verma20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2020iwspa, editor = {Rakesh M. Verma and Latifur Khan and Chilukuri K. Mohan}, title = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375708}, doi = {10.1145/3375708}, isbn = {978-1-4503-7115-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2020iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-13499, author = {Shahryar Baki and Rakesh M. Verma and Arjun Mukherjee and Omprakash Gnawali}, title = {Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack}, journal = {CoRR}, volume = {abs/2006.13499}, year = {2020}, url = {https://arxiv.org/abs/2006.13499}, eprinttype = {arXiv}, eprint = {2006.13499}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-13499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-07403, author = {Avisha Das and Rakesh M. Verma}, title = {Modeling Coherency in Generated Emails by Leveraging Deep Neural Learners}, journal = {CoRR}, volume = {abs/2007.07403}, year = {2020}, url = {https://arxiv.org/abs/2007.07403}, eprinttype = {arXiv}, eprint = {2007.07403}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-07403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00140, author = {Daniel Lee and Rakesh M. Verma and Avisha Das and Arjun Mukherjee}, title = {Experiments in Extractive Summarization: Integer Linear Programming, Term/Sentence Scoring, and Title-driven Models}, journal = {CoRR}, volume = {abs/2008.00140}, year = {2020}, url = {https://arxiv.org/abs/2008.00140}, eprinttype = {arXiv}, eprint = {2008.00140}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00140.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShermanDBCSVVOG19, author = {Alan T. Sherman and Josiah Dykstra and Gregory V. Bard and Ankur Chattopadhyay and Filipo Sharevski and Rakesh M. Verma and Ryan Vrecenar and Linda Oliva and Enis Golaszewski and Dhananjay S. Phatak and Travis Scheponik and Geoffrey L. Herman and Dong San Choi and Spencer E. Offenberger and Peter Peterson}, title = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {77--83}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2929812}, doi = {10.1109/MSEC.2019.2929812}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ShermanDBCSVVOG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VermaZF19, author = {Rakesh M. Verma and Victor Zeng and Houtan Faridi}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Data Quality for Security Challenges: Case Studies of Phishing, Malware and Intrusion Detection Datasets}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2605--2607}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363267}, doi = {10.1145/3319535.3363267}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VermaZF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/FaridiSV19, author = {Houtan Faridi and Srivathsan Srinivasagopalan and Rakesh M. Verma}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Parameter Tuning and Confidence Limits of Malware Clustering}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {169--171}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3302385}, doi = {10.1145/3292006.3302385}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/FaridiSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09286, author = {Alan T. Sherman and Linda Oliva and Enis Golaszewski and Dhananjay S. Phatak and Travis Scheponik and Geoffrey L. Herman and Dong San Choi and Spencer E. Offenberger and Peter Peterson and Josiah Dykstra and Gregory V. Bard and Ankur Chattopadhyay and Filipo Sharevski and Rakesh M. Verma and Ryan Vrecenar}, title = {The {CATS} Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories}, journal = {CoRR}, volume = {abs/1901.09286}, year = {2019}, url = {http://arxiv.org/abs/1901.09286}, eprinttype = {arXiv}, eprint = {1901.09286}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10607, author = {Rakesh M. Verma and Samaneh Karimi and Daniel Lee and Omprakash Gnawali and Azadeh Shakery}, title = {Newswire versus Social Media for Disaster Response and Recovery}, journal = {CoRR}, volume = {abs/1906.10607}, year = {2019}, url = {http://arxiv.org/abs/1906.10607}, eprinttype = {arXiv}, eprint = {1906.10607}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-06893, author = {Avisha Das and Rakesh M. Verma}, title = {Automated email Generation for Targeted Attacks using Natural Language}, journal = {CoRR}, volume = {abs/1908.06893}, year = {2019}, url = {http://arxiv.org/abs/1908.06893}, eprinttype = {arXiv}, eprint = {1908.06893}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-06893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-12441, author = {Samaneh Karimi and Azadeh Shakery and Rakesh M. Verma}, title = {Online News Media Website Ranking Using User Generated Content}, journal = {CoRR}, volume = {abs/1910.12441}, year = {2019}, url = {http://arxiv.org/abs/1910.12441}, eprinttype = {arXiv}, eprint = {1910.12441}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-12441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-00953, author = {Avisha Das and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Arthur Dunbar}, title = {{SOK:} {A} Comprehensive Reexamination of Phishing Research from the Security Perspective}, journal = {CoRR}, volume = {abs/1911.00953}, year = {2019}, url = {http://arxiv.org/abs/1911.00953}, eprinttype = {arXiv}, eprint = {1911.00953}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-00953.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/MoraesBVL18, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, title = {Identifying reference spans: topic modeling and word embeddings help {IR}}, journal = {Int. J. Digit. Libr.}, volume = {19}, number = {2-3}, pages = {191--202}, year = {2018}, url = {https://doi.org/10.1007/s00799-017-0220-z}, doi = {10.1007/S00799-017-0220-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/MoraesBVL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scientometrics/KarimiMDSV18, author = {Samaneh Karimi and Luis F. T. Moraes and Avisha Das and Azadeh Shakery and Rakesh M. Verma}, title = {Citance-based retrieval and summarization using {IR} and machine learning}, journal = {Scientometrics}, volume = {116}, number = {2}, pages = {1331--1366}, year = {2018}, url = {https://doi.org/10.1007/s11192-018-2785-8}, doi = {10.1007/S11192-018-2785-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scientometrics/KarimiMDSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChernisV18, author = {Boris Chernis and Rakesh M. Verma}, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {Machine Learning Methods for Software Vulnerability Detection}, booktitle = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {31--39}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180445.3180453}, doi = {10.1145/3180445.3180453}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChernisV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Verma18, author = {Rakesh M. Verma}, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {Security Analytics: Adapting Data Science for Security Challenges}, booktitle = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {40--41}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180445.3180456}, doi = {10.1145/3180445.3180456}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Verma18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/EgoziV18, author = {Gal Egozi and Rakesh M. Verma}, editor = {Hanghang Tong and Zhenhui Jessie Li and Feida Zhu and Jeffrey Yu}, title = {Phishing Email Detection Using Robust {NLP} Techniques}, booktitle = {2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018}, pages = {7--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDMW.2018.00009}, doi = {10.1109/ICDMW.2018.00009}, timestamp = {Thu, 14 Nov 2019 15:37:05 +0100}, biburl = {https://dblp.org/rec/conf/icdm/EgoziV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/FaridiSV18, author = {Houtan Faridi and Srivathsan Srinivasagopalan and Rakesh M. Verma}, editor = {Hanghang Tong and Zhenhui Jessie Li and Feida Zhu and Jeffrey Yu}, title = {Performance Evaluation of Features and Clustering Algorithms for Malware}, booktitle = {2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018}, pages = {13--22}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDMW.2018.00010}, doi = {10.1109/ICDMW.2018.00010}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/FaridiSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/MoraesDKV18, author = {Luis F. T. De Moraes and Avisha Das and Samaneh Karimi and Rakesh M. Verma}, editor = {Philipp Mayr and Muthu Kumar Chandrasekaran and Kokil Jaidka}, title = {University of Houston @ CL-SciSumm 2018}, booktitle = {Proceedings of the 3rd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2018) co-located with the 41st International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2018), Ann Arbor, USA, July 12, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2132}, pages = {142--149}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2132/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:16 +0100}, biburl = {https://dblp.org/rec/conf/sigir/MoraesDKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2018iwspa, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3180445}, timestamp = {Mon, 19 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2018iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cys/VermaL17, author = {Rakesh M. Verma and Daniel Lee}, title = {Extractive Summarization: Limits, Compression, Generalized Model and Heuristics}, journal = {Computaci{\'{o}}n y Sistemas}, volume = {21}, number = {4}, year = {2017}, url = {https://doi.org/10.13053/cys-21-4-2855}, doi = {10.13053/CYS-21-4-2855}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cys/VermaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ShermanDCCMOSTV17, author = {Alan T. Sherman and Melissa Dark and Agnes H. Chan and Rylan Chong and Thomas H. Morris and Linda Oliva and John A. Springer and Bhavani Thuraisingham and Christopher Vatcher and Rakesh M. Verma and Susanne Wetzel}, title = {INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {4}, pages = {72--78}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3151327}, doi = {10.1109/MSP.2017.3151327}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ShermanDCCMOSTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/RadcliffeMV17, author = {Nicholas R. Radcliffe and Luis F. T. Moraes and Rakesh M. Verma}, title = {Uniqueness of Normal Forms for Shallow Term Rewrite Systems}, journal = {{ACM} Trans. Comput. Log.}, volume = {18}, number = {2}, pages = {17:1--17:20}, year = {2017}, url = {https://doi.org/10.1145/3060144}, doi = {10.1145/3060144}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/RadcliffeMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BakiVMG17, author = {Shahryar Baki and Rakesh M. Verma and Arjun Mukherjee and Omprakash Gnawali}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {469--482}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053037}, doi = {10.1145/3052973.3053037}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BakiVMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VermaD17, author = {Rakesh M. Verma and Avisha Das}, editor = {Rakesh M. Verma and Bhavani Thuraisingham}, title = {What's in a {URL:} Fast Feature Extraction and Malicious {URL} Detection}, booktitle = {Proceedings of the 3rd {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {55--63}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041008.3041016}, doi = {10.1145/3041008.3041016}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/VermaD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VermaA17, author = {Rakesh M. Verma and Ayman El Aassal}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {155--157}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029842}, doi = {10.1145/3029806.3029842}, timestamp = {Wed, 16 Sep 2020 11:48:10 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/VermaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eacl/VuppuluriBNV17, author = {Vasanthi Vuppuluri and Shahryar Baki and An Nguyen and Rakesh M. Verma}, editor = {Andre Martins and Anselmo Pe{\~{n}}as}, title = {{ICE:} Idiom and Collocation Extractor for Research and Education}, booktitle = {Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, {EACL} 2017, Valencia, Spain, April 3-7, 2017, Software Demonstrations}, pages = {108--111}, publisher = {Association for Computational Linguistics}, year = {2017}, url = {https://doi.org/10.18653/v1/e17-3027}, doi = {10.18653/V1/E17-3027}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eacl/VuppuluriBNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/KarimiMDV17, author = {Samaneh Karimi and Luis F. T. Moraes and Avisha Das and Rakesh M. Verma}, editor = {Kokil Jaidka and Muthu Kumar Chandrasekaran and Min{-}Yen Kan}, title = {University of Houston @ CL-SciSumm 2017: Positional language Models, Structural Correspondence Learning and Textual Entailment}, booktitle = {Proceedings of the Computational Linguistics Scientific Summarization Shared Task (CL-SciSumm 2017) organized as a part of the 2nd Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL} 2017) and co-located with the 40th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval {(SIGIR} 2017), Tokyo, Japan, August 11, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2002}, pages = {73--85}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2002/uhclscisumm2017.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:17 +0100}, biburl = {https://dblp.org/rec/conf/sigir/KarimiMDV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2017iwspa, editor = {Rakesh M. Verma and Bhavani Thuraisingham}, title = {Proceedings of the 3rd {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041008}, doi = {10.1145/3041008}, isbn = {978-1-4503-4909-3}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2017iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShermanDCCMOSTV17, author = {Alan T. Sherman and Melissa Dark and Agnes H. Chan and Rylan Chong and Thomas H. Morris and Linda Oliva and John A. Springer and Bhavani Thuraisingham and Christopher Vatcher and Rakesh M. Verma and Susanne Wetzel}, title = {The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research}, journal = {CoRR}, volume = {abs/1703.08859}, year = {2017}, url = {http://arxiv.org/abs/1703.08859}, eprinttype = {arXiv}, eprint = {1703.08859}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShermanDCCMOSTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VermaL17, author = {Rakesh M. Verma and Daniel Lee}, title = {Extractive Summarization: Limits, Compression, Generalized Model and Heuristics}, journal = {CoRR}, volume = {abs/1704.05550}, year = {2017}, url = {http://arxiv.org/abs/1704.05550}, eprinttype = {arXiv}, eprint = {1704.05550}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VermaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02989, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, title = {Identifying Reference Spans: Topic Modeling and Word Embeddings help {IR}}, journal = {CoRR}, volume = {abs/1708.02989}, year = {2017}, url = {http://arxiv.org/abs/1708.02989}, eprinttype = {arXiv}, eprint = {1708.02989}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicling/VermaVNMMBA16, author = {Rakesh M. Verma and Vasanthi Vuppuluri and An Nguyen and Arjun Mukherjee and Ghita Mammar and Shahryar Baki and Reed Armstrong}, editor = {Alexander F. Gelbukh}, title = {Mining the Web for Collocations: {IR} Models of Term Associations}, booktitle = {Computational Linguistics and Intelligent Text Processing - 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9623}, pages = {177--194}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-75477-2\_11}, doi = {10.1007/978-3-319-75477-2\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/cicling/VermaVNMMBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcdl/MoraesBVL16, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, editor = {Guillaume Cabanac and Muthu Kumar Chandrasekaran and Ingo Frommholz and Kokil Jaidka and Min{-}Yen Kan and Philipp Mayr and Dietmar Wolfram}, title = {University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity}, booktitle = {Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)} co-located with the Joint Conference on Digital Libraries 2016 {(JCDL} 2016), Newark, NJ, USA, June 23, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1610}, pages = {113--121}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1610/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/jcdl/MoraesBVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2016iwspa, editor = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch}, title = {Proceedings of the 2016 {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2875475}, isbn = {978-1-4503-4077-9}, timestamp = {Tue, 15 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2016iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RadcliffeMV16, author = {Nicholas R. Radcliffe and Luis F. T. Moraes and Rakesh M. Verma}, title = {Uniqueness of Normal Forms for Shallow Term Rewrite Systems}, journal = {CoRR}, volume = {abs/1607.00431}, year = {2016}, url = {http://arxiv.org/abs/1607.00431}, eprinttype = {arXiv}, eprint = {1607.00431}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RadcliffeMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/VermaKMLS15, author = {Rakesh M. Verma and Murat Kantarcioglu and David J. Marchette and Ernst L. Leiss and Thamar Solorio}, title = {Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {6}, pages = {60--65}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.121}, doi = {10.1109/MSP.2015.121}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/VermaKMLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/ShashidharKV15, author = {Narasimha K. Shashidhar and Chadi Kari and Rakesh M. Verma}, title = {The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks}, journal = {J. Sens. Actuator Networks}, volume = {4}, number = {4}, pages = {378--409}, year = {2015}, url = {https://doi.org/10.3390/jsan4040378}, doi = {10.3390/JSAN4040378}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/ShashidharKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChanCKLSTV15, author = {Wenyaw Chan and George Cybenko and Murat Kantarcioglu and Ernst L. Leiss and Thamar Solorio and Bhavani Thuraisingham and Rakesh M. Verma}, editor = {Stephen Huang and Rakesh M. Verma}, title = {Panel: Essential Data Analytics Knowledge forCyber-security Professionals and Students}, booktitle = {Proceedings of the 2015 {ACM} International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015}, pages = {55--57}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2713579.2713590}, doi = {10.1145/2713579.2713590}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChanCKLSTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VermaD15, author = {Rakesh M. Verma and Keith Dyer}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {On the Character of Phishing URLs: Accurate and Robust Statistical Learning Classifiers}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {111--122}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699115}, doi = {10.1145/2699026.2699115}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/VermaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/TunaJVDSV15, author = {Tayfun Tuna and Mahima Joshi and Varun Varghese and Rucha Deshpande and Jaspal Subhlok and Rakesh M. Verma}, title = {Topic based segmentation of classroom videos}, booktitle = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FIE.2015.7344336}, doi = {10.1109/FIE.2015.7344336}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/TunaJVDSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/GaoDKKXRVS15, author = {Zhimin Gao and Nicholas DeSalvo and Pham Dang Khoa and Seung{-}Hun Kim and Lei Xu and Won Woo Ro and Rakesh M. Verma and Weidong Shi}, title = {Integrity Protection for Big Data Processing with Dynamic Redundancy Computation}, booktitle = {2015 {IEEE} International Conference on Autonomic Computing, Grenoble, France, July 7-10, 2015}, pages = {159--160}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICAC.2015.34}, doi = {10.1109/ICAC.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/GaoDKKXRVS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ranlp/VermaV15, author = {Rakesh M. Verma and Vasanthi Vuppuluri}, editor = {Galia Angelova and Kalina Bontcheva and Ruslan Mitkov}, title = {A New Approach for Idiom Identification Using Meanings and the Web}, booktitle = {Recent Advances in Natural Language Processing, {RANLP} 2015, 7-9 September, 2015, Hissar, Bulgaria}, pages = {681--687}, publisher = {{RANLP} 2015 Organising Committee / {ACL}}, year = {2015}, url = {https://aclanthology.org/R15-1087/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ranlp/VermaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VermaR15, author = {Rakesh M. Verma and Nirmala Rai}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Phish-IDetector: Message-Id Based Automatic Phishing Detection}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {427--434}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005574304270434}, doi = {10.5220/0005574304270434}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VermaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2015iwspa, editor = {Stephen Huang and Rakesh M. Verma}, title = {Proceedings of the 2015 {ACM} International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2713579}, isbn = {978-1-4503-3341-2}, timestamp = {Tue, 15 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2015iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ThakurV14, author = {Tanmay Thakur and Rakesh M. Verma}, editor = {Atul Prakash and Rudrapatna K. Shyamasundar}, title = {Catching Classical and Hijack-Based Phishing Attacks}, booktitle = {Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {318--337}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13841-1\_18}, doi = {10.1007/978-3-319-13841-1\_18}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ThakurV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/VermaH13, author = {Rakesh M. Verma and Nabil Hossain}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {Semantic Feature Selection for Text with Application to Phishing Email Detection}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {455--468}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_27}, doi = {10.1007/978-3-319-12160-4\_27}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/VermaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/VermaB13, author = {Rakesh M. Verma and Bailey E. Basile}, title = {Modeling and analysis of LEAP, a key management protocol for wireless sensor networks}, booktitle = {10th Annual {IEEE} International Conference on Sensing, Communications and Networking, {SECON} 2013, New Orleans, LA, USA, 24-27 June, 2013}, pages = {65--67}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SAHCN.2013.6644961}, doi = {10.1109/SAHCN.2013.6644961}, timestamp = {Fri, 30 Apr 2021 18:08:41 +0200}, biburl = {https://dblp.org/rec/conf/secon/VermaB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VermaSH12, author = {Rakesh M. Verma and Narasimha K. Shashidhar and Nabil Hossain}, title = {Two-Pronged Phish Snagging}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {174--179}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.51}, doi = {10.1109/ARES.2012.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/VermaSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicling/BarreraV12, author = {Araly Barrera and Rakesh M. Verma}, editor = {Alexander F. Gelbukh}, title = {Combining Syntax and Semantics for Automatic Extractive Single-Document Summarization}, booktitle = {Computational Linguistics and Intelligent Text Processing - 13th International Conference, CICLing 2012, New Delhi, India, March 11-17, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7182}, pages = {366--377}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28601-8\_31}, doi = {10.1007/978-3-642-28601-8\_31}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/cicling/BarreraV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VermaSH12, author = {Rakesh M. Verma and Narasimha K. Shashidhar and Nabil Hossain}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Detecting Phishing Emails the Natural Language Way}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {824--841}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_47}, doi = {10.1007/978-3-642-33167-1\_47}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/VermaSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BarreraV11, author = {Araly Barrera and Rakesh M. Verma}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Automated extractive single-document summarization: beating the baselines with a new approach}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {268--269}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982247}, doi = {10.1145/1982185.1982247}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/BarreraV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/VermaG11, author = {Rakesh M. Verma and Wei Guo}, editor = {Franz Baader and Barbara Morawska and Jan Otop}, title = {Does Unification Help in Normalization?}, booktitle = {Proceedings of the 25th International Workshop on Unification, {UNIF} 2011, Wroclaw, Poland, July 31, 2011}, pages = {52--58}, year = {2011}, url = {https://www.irif.fr/\%7Etreinen/unif/past/unif11/unif11-proceedings.pdf\#page=58}, timestamp = {Mon, 23 Oct 2023 15:28:12 +0200}, biburl = {https://dblp.org/rec/conf/unif/VermaG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tac/BarreraVV11, author = {Araly Barrera and Rakesh M. Verma and Ryan Vincent}, title = {SemQuest: University of Houston's Semantics-based Question Answering System}, booktitle = {Proceedings of the Fourth Text Analysis Conference, {TAC} 2011, Gaithersburg, Maryland, USA, November 14-15, 2011}, publisher = {{NIST}}, year = {2011}, url = {https://tac.nist.gov/publications/2011/participant.papers/txsumm.proceedings.pdf}, timestamp = {Tue, 20 Aug 2019 13:25:15 +0200}, biburl = {https://dblp.org/rec/conf/tac/BarreraVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZinnV10, author = {Julian Zinn and Rakesh M. Verma}, title = {A polynomial algorithm for uniqueness of normal forms of linear shallow term rewrite systems}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {6}, pages = {459--485}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0133-1}, doi = {10.1007/S00200-010-0133-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/ZinnV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/RadcliffeV10, author = {Nicholas R. Radcliffe and Rakesh M. Verma}, editor = {Kamal Lodaya and Meena Mahajan}, title = {Uniqueness of Normal Forms is Decidable for Shallow Term Rewrite Systems}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2010, December 15-18, 2010, Chennai, India}, series = {LIPIcs}, volume = {8}, pages = {284--295}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2010}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2010.284}, doi = {10.4230/LIPICS.FSTTCS.2010.284}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/RadcliffeV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BlackshearV10, author = {Sam Blackshear and Rakesh M. Verma}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {{R-LEAP+:} randomizing {LEAP+} key distribution to resist replay and jamming attacks}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1985--1992}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774507}, doi = {10.1145/1774088.1774507}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/BlackshearV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tac/BarreraV10, author = {Araly Barrera and Rakesh M. Verma}, title = {A Ranking-based Approach for Multiple-document Information Extraction}, booktitle = {Proceedings of the Third Text Analysis Conference, {TAC} 2010, Gaithersburg, Maryland, USA, November 15-16, 2010}, publisher = {{NIST}}, year = {2010}, url = {https://tac.nist.gov/publications/2010/participant.papers/txsumm.proceedings.pdf}, timestamp = {Tue, 20 Aug 2019 13:25:20 +0200}, biburl = {https://dblp.org/rec/conf/tac/BarreraV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Verma09, author = {Rakesh M. Verma}, title = {Complexity of Normal Form Properties and Reductions for Term Rewriting Problems Complexity of Normal Form Properties and Reductions for Term Rewriting Problems}, journal = {Fundam. Informaticae}, volume = {92}, number = {1-2}, pages = {145--168}, year = {2009}, url = {https://doi.org/10.3233/FI-2009-0070}, doi = {10.3233/FI-2009-0070}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Verma09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangV09, author = {Zhiyao Liang and Rakesh M. Verma}, editor = {Atul Prakash and Indranil Gupta}, title = {Correcting and Improving the {NP} Proof for Cryptographic Protocol Insecurity}, booktitle = {Information Systems Security, 5th International Conference, {ICISS} 2009, Kolkata, India, December 14-18, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5905}, pages = {101--116}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10772-6\_9}, doi = {10.1007/978-3-642-10772-6\_9}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiangV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiangV08, author = {Zhiyao Liang and Rakesh M. Verma}, title = {Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1067--1074}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.198}, doi = {10.1109/ARES.2008.198}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LiangV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/ChenVMC08, author = {Ping Chen and Rakesh M. Verma and Janet C. Meininger and Wenyaw Chan}, editor = {David Wilson and H. Chad Lane}, title = {Semantic Analysis of Association Rules}, booktitle = {Proceedings of the Twenty-First International Florida Artificial Intelligence Research Society Conference, May 15-17, 2008, Coconut Grove, Florida, {USA}}, pages = {270--275}, publisher = {{AAAI} Press}, year = {2008}, url = {http://www.aaai.org/Library/FLAIRS/2008/flairs08-068.php}, timestamp = {Wed, 26 Oct 2022 08:35:23 +0200}, biburl = {https://dblp.org/rec/conf/flairs/ChenVMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiangV08, author = {Zhiyao Liang and Rakesh M. Verma}, editor = {R. Sekar and Arun K. Pujari}, title = {Complexity of Checking Freshness of Cryptographic Protocols}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {86--101}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_6}, doi = {10.1007/978-3-540-89862-7\_6}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/LiangV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YuV08, author = {Wenshan Yu and Rakesh M. Verma}, editor = {Roger L. Wainwright and Hisham Haddad}, title = {Visualization of rule-based programming}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, pages = {1258--1259}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1363686.1363976}, doi = {10.1145/1363686.1363976}, timestamp = {Tue, 06 Nov 2018 11:06:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/YuV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Verma12, author = {Rakesh M. Verma}, editor = {G{\"{u}}nter Kniesel and Jorge Sousa Pinto}, title = {New Undecidability Results for Properties of Term Rewrite Systems}, booktitle = {Ninth International Workshop on Rule-Based Programming, {RULE} 2008, Hagenberg, Austria, July 14-18, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {290}, pages = {69--85}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2012.11.012}, doi = {10.1016/J.ENTCS.2012.11.012}, timestamp = {Fri, 25 Nov 2022 14:52:44 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Verma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tac/VermaKC08, author = {Rakesh M. Verma and David Kent and Ping Chen}, title = {Semantic Multi-Document Update Summarization Techniques}, booktitle = {Proceedings of the First Text Analysis Conference, {TAC} 2008, Gaithersburg, Maryland, USA, November 17-19, 2008}, publisher = {{NIST}}, year = {2008}, url = {https://tac.nist.gov/publications/2008/participant.papers/txsumm.proceedings.pdf}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tac/VermaKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/ChenV06, author = {Ping Chen and Rakesh M. Verma}, title = {A Query-Based Medical Information Summarization System Using Ontology Knowledge}, booktitle = {19th {IEEE} International Symposium on Computer-Based Medical Systems {(CBMS} 2006), 22-23 June 2006, Salt Lake City, Utah, {USA}}, pages = {37--42}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CBMS.2006.25}, doi = {10.1109/CBMS.2006.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbms/ChenV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/ArmoniRVV06, author = {Michal Armoni and Susan H. Rodger and Moshe Y. Vardi and Rakesh M. Verma}, editor = {Doug Baldwin and Paul T. Tymann and Susan M. Haller and Ingrid Russell}, title = {Automata theory: its relevance to computer science students and course contents}, booktitle = {Proceedings of the 37th {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2006, Houston, Texas, USA, March 3-5, 2006}, pages = {197--198}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1121341.1121403}, doi = {10.1145/1121341.1121403}, timestamp = {Wed, 10 Mar 2021 13:04:38 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/ArmoniRVV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/VermaH05, author = {Rakesh M. Verma and Ara Hayrapetyan}, title = {A new decidability technique for ground term rewriting systems with applications}, journal = {{ACM} Trans. Comput. Log.}, volume = {6}, number = {1}, pages = {102--123}, year = {2005}, url = {https://doi.org/10.1145/1042038.1042042}, doi = {10.1145/1042038.1042042}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/VermaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/Verma05, author = {Rakesh M. Verma}, editor = {Jos{\'{e}} C. Cunha and William M. Fleischman and Viera K. Proulx and Jo{\~{a}}o Louren{\c{c}}o}, title = {A visual and interactive automata theory course emphasizing breadth of automata}, booktitle = {Proceedings of the 10th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2005, Caparica, Portugal, June 27-29, 2005}, pages = {325--329}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1067445.1067535}, doi = {10.1145/1067445.1067535}, timestamp = {Wed, 10 Mar 2021 13:17:16 +0100}, biburl = {https://dblp.org/rec/conf/iticse/Verma05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/GodoyTV04, author = {Guillem Godoy and Ashish Tiwari and Rakesh M. Verma}, title = {Characterizing Confluence by Rewrite Closure and Right Ground Term Rewrite Systems}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {15}, number = {1}, pages = {13--36}, year = {2004}, url = {https://doi.org/10.1007/s00200-004-0148-6}, doi = {10.1007/S00200-004-0148-6}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/GodoyTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apal/GodoyTV04, author = {Guillem Godoy and Ashish Tiwari and Rakesh M. Verma}, title = {Deciding confluence of certain term rewriting systems in polynomial time}, journal = {Ann. Pure Appl. Log.}, volume = {130}, number = {1-3}, pages = {33--59}, year = {2004}, url = {https://doi.org/10.1016/j.apal.2004.04.005}, doi = {10.1016/J.APAL.2004.04.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apal/GodoyTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/LuttikRV04, author = {Bas Luttik and Piet Rodenburg and Rakesh M. Verma}, title = {Remarks on Thatte's transformation of term rewriting systems}, journal = {Inf. Comput.}, volume = {195}, number = {1-2}, pages = {66--87}, year = {2004}, url = {https://doi.org/10.1016/j.ic.2003.09.006}, doi = {10.1016/J.IC.2003.09.006}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/LuttikRV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/GodoyTV03, author = {Guillem Godoy and Ashish Tiwari and Rakesh M. Verma}, editor = {Helmut Alt and Michel Habib}, title = {On the Confluence of Linear Shallow Term Rewrite Systems}, booktitle = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2607}, pages = {85--96}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36494-3\_9}, doi = {10.1007/3-540-36494-3\_9}, timestamp = {Thu, 14 Oct 2021 10:38:16 +0200}, biburl = {https://dblp.org/rec/conf/stacs/GodoyTV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Verma02, author = {Rakesh M. Verma}, title = {Algorithms and reductions for rewriting problems {II}}, journal = {Inf. Process. Lett.}, volume = {84}, number = {4}, pages = {227--233}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(02)00395-2}, doi = {10.1016/S0020-0190(02)00395-2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/Verma02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/VermaB02, author = {Rakesh M. Verma and Sanjiv Behl}, editor = {Kalervo J{\"{a}}rvelin and Micheline Beaulieu and Ricardo A. Baeza{-}Yates and Sung{-}Hyon Myaeng}, title = {K-tree/forest: efficient indexes for boolean queries}, booktitle = {{SIGIR} 2002: Proceedings of the 25th Annual International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, August 11-15, 2002, Tampere, Finland}, pages = {433--434}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/564376.564480}, doi = {10.1145/564376.564480}, timestamp = {Wed, 07 Nov 2018 14:52:44 +0100}, biburl = {https://dblp.org/rec/conf/sigir/VermaB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/VermaH02, author = {Rakesh M. Verma and Sarah Hwang}, editor = {James Harland}, title = {On the Structure of Counterexamples to Symmetric Orderings for BDD's}, booktitle = {Computing: the Australasian Theory Symposium, {CATS} 2002, Melbourne, Australia}, series = {Electronic Notes in Theoretical Computer Science}, volume = {61}, pages = {84--100}, publisher = {Elsevier}, year = {2002}, url = {https://doi.org/10.1016/S1571-0661(04)00307-X}, doi = {10.1016/S1571-0661(04)00307-X}, timestamp = {Fri, 11 Nov 2022 16:14:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/VermaH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/VermaRL01, author = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch and Denis Lugiez}, title = {Algorithms and Reductions for Rewriting Problems}, journal = {Fundam. Informaticae}, volume = {46}, number = {3}, pages = {257--276}, year = {2001}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi46-3-05}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/VermaRL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adc/BehlV01, author = {Sanjiv Behl and Rakesh M. Verma}, editor = {Maria E. Orlowska and John F. Roddick}, title = {Efficient declustering techniques for temporal access structures}, booktitle = {Twelfth Australasian Database Conference, ADC2001, Bond University, Queensland, Australia, January 29 - February 1, 2001}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ADC.2001.904469}, doi = {10.1109/ADC.2001.904469}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adc/BehlV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclp/BasuMRRV01, author = {Samik Basu and Madhavan Mukund and C. R. Ramakrishnan and I. V. Ramakrishnan and Rakesh M. Verma}, editor = {Philippe Codognet}, title = {Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming}, booktitle = {Logic Programming, 17th International Conference, {ICLP} 2001, Paphos, Cyprus, November 26 - December 1, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2237}, pages = {166--180}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45635-X\_19}, doi = {10.1007/3-540-45635-X\_19}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclp/BasuMRRV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/tcs/BrandV01, author = {Mark van den Brand and Rakesh M. Verma}, editor = {Mark van den Brand and Rakesh M. Verma}, title = {{RULE2001} - Foreword}, booktitle = {Second International Workshop on Rule-Based Programming, {RULE} 2001, Satellite Event of {PLI} 2001, Firenze, Italy, September 4, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {59}, number = {4}, pages = {425--426}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(05)80559-6}, doi = {10.1016/S1571-0661(05)80559-6}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BrandV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rule/2001, editor = {Mark van den Brand and Rakesh M. Verma}, title = {Second International Workshop on Rule-Based Programming, {RULE} 2001, Satellite Event of {PLI} 2001, Firenze, Italy, September 4, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {59}, number = {4}, publisher = {Elsevier}, year = {2001}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/59/issue/4}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rule/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-LO-0010034, author = {Rakesh M. Verma}, title = {Static Analysis Techniques for Equational Logic Programming}, journal = {CoRR}, volume = {cs.LO/0010034}, year = {2000}, url = {https://arxiv.org/abs/cs/0010034}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-LO-0010034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/VarmanV99, author = {Peter J. Varman and Rakesh M. Verma}, title = {Tight Bounds for Prefetching and Buffer Management Algorithms for Parallel {I/O} Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {10}, number = {12}, pages = {1262--1275}, year = {1999}, url = {https://doi.org/10.1109/71.819948}, doi = {10.1109/71.819948}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/VarmanV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/VermaS99, author = {Rakesh M. Verma and Shalitha Senanayake}, editor = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {L\({}^{\mbox{arrow}}\)R\({}^{\mbox{2}}\): {A} Laboratory fro Rapid Term Graph Rewriting}, booktitle = {Rewriting Techniques and Applications, 10th International Conference, RTA-99, Trento, Italy, July 2-4, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1631}, pages = {252--255}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48685-2\_21}, doi = {10.1007/3-540-48685-2\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/VermaS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/NarendranRV98, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch and Rakesh M. Verma}, editor = {Georg Gottlob and Etienne Grandjean and Katrin Seyr}, title = {{RPO} Constraint Solving Is in {NP}}, booktitle = {Computer Science Logic, 12th International Workshop, {CSL} '98, Annual Conference of the EACSL, Brno, Czech Republic, August 24-28, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1584}, pages = {385--398}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10703163\_26}, doi = {10.1007/10703163\_26}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csl/NarendranRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/VermaRL98, author = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch and Denis Lugiez}, editor = {Tobias Nipkow}, title = {Algorithms and Reductions for Rewriting Problems}, booktitle = {Rewriting Techniques and Applications, 9th International Conference, RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1379}, pages = {166--180}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0052369}, doi = {10.1007/BFB0052369}, timestamp = {Sat, 05 Sep 2020 18:07:52 +0200}, biburl = {https://dblp.org/rec/conf/rta/VermaRL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HuangLV97, author = {Shou{-}Hsuan Stephen Huang and Hongfei Liu and Rakesh M. Verma}, title = {On Embedding Rectangular Meshes into Rectangular Meshes of Smaller Aspect Ratio}, journal = {Inf. Process. Lett.}, volume = {63}, number = {3}, pages = {123--129}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00114-2}, doi = {10.1016/S0020-0190(97)00114-2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HuangLV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Verma97, author = {Rakesh M. Verma}, title = {General Techniques for Analyzing Recursive Algorithms with Applications}, journal = {{SIAM} J. Comput.}, volume = {26}, number = {2}, pages = {568--581}, year = {1997}, url = {https://doi.org/10.1137/S0097539792240583}, doi = {10.1137/S0097539792240583}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/Verma97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/VarmanV97, author = {Peter J. Varman and Rakesh M. Verma}, title = {An Efficient Multiversion Access STructure}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {3}, pages = {391--409}, year = {1997}, url = {https://doi.org/10.1109/69.599929}, doi = {10.1109/69.599929}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/VarmanV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/Verma97, author = {Rakesh M. Verma}, editor = {Bogdan S. Chlebus and Ludwik Czaja}, title = {Unique Normal Forms for Nonlinear Term Rewriting Systems: Root Overlaps}, booktitle = {Fundamentals of Computation Theory, 11th International Symposium, {FCT} '97, Krak{\'{o}}w, Poland, September 1-3, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1279}, pages = {452--462}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0036206}, doi = {10.1007/BFB0036206}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/Verma97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/HuangLV96, author = {Shou{-}Hsuan Stephen Huang and Hongfei Liu and Rakesh M. Verma}, title = {A New Combinatorial Approach to Optimal Embeddings of Rectangles}, journal = {Algorithmica}, volume = {16}, number = {2}, pages = {161--180}, year = {1996}, url = {https://doi.org/10.1007/BF01940645}, doi = {10.1007/BF01940645}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/HuangLV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/VarmanV96, author = {Peter J. Varman and Rakesh M. Verma}, editor = {Vijay Chandru and V. Vinay}, title = {Tight Bounds for Prefetching and Buffer Management Algorithms for Parallel {I/O} Systems}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 16th Conference, Hyderabad, India, December 18-20, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1180}, pages = {200--211}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62034-6\_50}, doi = {10.1007/3-540-62034-6\_50}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/VarmanV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/Verma95, author = {Rakesh M. Verma}, title = {A Theory of Using History for Equational Systems with Applications}, journal = {J. {ACM}}, volume = {42}, number = {5}, pages = {984--1020}, year = {1995}, url = {https://doi.org/10.1145/210118.210130}, doi = {10.1145/210118.210130}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/Verma95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Verma95, author = {Rakesh M. Verma}, title = {Transformations and Confluence for Rewrite Systems}, journal = {Theor. Comput. Sci.}, volume = {152}, number = {2}, pages = {269--283}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00255-0}, doi = {10.1016/0304-3975(94)00255-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Verma95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/Verma95, author = {Rakesh M. Verma}, title = {Unique Normal Forms and Confluence of Rewrite Systems: Persistence}, booktitle = {Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, {IJCAI} 95, Montr{\'{e}}al Qu{\'{e}}bec, Canada, August 20-25 1995, 2 Volumes}, pages = {362--370}, publisher = {Morgan Kaufmann}, year = {1995}, url = {http://ijcai.org/Proceedings/95-1/Papers/048.pdf}, timestamp = {Tue, 20 Aug 2019 16:17:30 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/Verma95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/Verma94, author = {Rakesh M. Verma}, title = {A General Method and a Master Theorem for Divide-and-Conquer Recurrences with Applications}, journal = {J. Algorithms}, volume = {16}, number = {1}, pages = {67--79}, year = {1994}, url = {https://doi.org/10.1006/jagm.1994.1004}, doi = {10.1006/JAGM.1994.1004}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jal/Verma94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/HuangLV94, author = {Shou{-}Hsuan Stephen Huang and Hongfei Liu and Rakesh M. Verma}, editor = {Howard Jay Siegel}, title = {A New Combinatorial Approach to Optimal Embeddings of Rectangles}, booktitle = {Proceedings of the 8th International Symposium on Parallel Processing, Canc{\'{u}}n, Mexico, April 1994}, pages = {715--722}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/IPPS.1994.288225}, doi = {10.1109/IPPS.1994.288225}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/HuangLV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/HuangLV93, author = {Shou{-}Hsuan Stephen Huang and Hongfei Liu and Rakesh M. Verma}, editor = {Salim Hariri and P. Bruce Berra}, title = {On Embeddings of Rectangles into Optimal Squares}, booktitle = {Proceedings of the 1993 International Conference on Parallel Processing, Syracuse University, NY, USA, August 16-20, 1993. Volume {III:} Algorithms {\&} Applications}, pages = {73--76}, publisher = {{CRC} Press}, year = {1993}, url = {https://doi.org/10.1109/ICPP.1993.123}, doi = {10.1109/ICPP.1993.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/HuangLV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Verma93, author = {Rakesh M. Verma}, editor = {Claude Kirchner}, title = {Smaran: {A} Congruence-Closure Based System for Equational Computations}, booktitle = {Rewriting Techniques and Applications, 5th International Conference, RTA-93, Montreal, Canada, June 16-18, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {690}, pages = {457--461}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-3-662-21551-7\_37}, doi = {10.1007/978-3-662-21551-7\_37}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/Verma93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/VermaR92, author = {Rakesh M. Verma and I. V. Ramakrishnan}, title = {Tight Complexity Bounds for Term Matching Problems}, journal = {Inf. Comput.}, volume = {101}, number = {1}, pages = {33--69}, year = {1992}, url = {https://doi.org/10.1016/0890-5401(92)90075-Q}, doi = {10.1016/0890-5401(92)90075-Q}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/VermaR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Verma92, author = {Rakesh M. Verma}, title = {Strings, Trees, and Patterns}, journal = {Inf. Process. Lett.}, volume = {41}, number = {3}, pages = {157--161}, year = {1992}, url = {https://doi.org/10.1016/0020-0190(92)90046-X}, doi = {10.1016/0020-0190(92)90046-X}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/Verma92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Verma91, author = {Rakesh M. Verma}, title = {A Theory of Using History for Equational Systems with Applications (Extended Abstract)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {348--357}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185390}, doi = {10.1109/SFCS.1991.185390}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Verma91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/VermaR90, author = {Rakesh M. Verma and I. V. Ramakrishnan}, editor = {Mike Paterson}, title = {Nonoblivious Normalization Algorithms for Nonlinear Rewrite Systems}, booktitle = {Automata, Languages and Programming, 17th International Colloquium, ICALP90, Warwick University, England, UK, July 16-20, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {443}, pages = {370--385}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0032045}, doi = {10.1007/BFB0032045}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/VermaR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/RameschVKR89, author = {R. Ramesh and Rakesh M. Verma and Krishnaprasad Thirunarayan and I. V. Ramakrishnan}, title = {Term Matching on Parallel Computers}, journal = {J. Log. Program.}, volume = {6}, number = {3}, pages = {213--228}, year = {1989}, url = {https://doi.org/10.1016/0743-1066(89)90014-9}, doi = {10.1016/0743-1066(89)90014-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/RameschVKR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/VermaR89, author = {Rakesh M. Verma and Steven W. Reyner}, title = {An Analysis of a Good Algorithm for the Subtree Problem, Corrected}, journal = {{SIAM} J. Comput.}, volume = {18}, number = {5}, pages = {906--908}, year = {1989}, url = {https://doi.org/10.1137/0218062}, doi = {10.1137/0218062}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/VermaR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/VermaR89, author = {Rakesh M. Verma and I. V. Ramakrishnan}, editor = {Burkhard Monien and Robert Cori}, title = {Some Complexity Theoretic Aspects of {AC} Rewriting}, booktitle = {{STACS} 89, 6th Annual Symposium on Theoretical Aspects of Computer Science, Paderborn, FRG, February 16-18, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {349}, pages = {407--420}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0029003}, doi = {10.1007/BFB0029003}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/VermaR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/VermaR88, author = {Rakesh M. Verma and I. V. Ramakrishnan}, editor = {Ewing L. Lusk and Ross A. Overbeek}, title = {Optimal Time Bounds for Parallel Term Matching}, booktitle = {9th International Conference on Automated Deduction, Argonne, Illinois, USA, May 23-26, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {310}, pages = {694--703}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0012867}, doi = {10.1007/BFB0012867}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/VermaR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/RameshVKR87, author = {R. Ramesh and Rakesh M. Verma and Krishnaprasad Thirunarayan and I. V. Ramakrishnan}, editor = {Thomas Ottmann}, title = {Term Matching on Parallel Computers}, booktitle = {Automata, Languages and Programming, 14th International Colloquium, ICALP87, Karlsruhe, Germany, July 13-17, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {267}, pages = {336--346}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-18088-5\_28}, doi = {10.1007/3-540-18088-5\_28}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/RameshVKR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/VermaKR86, author = {Rakesh M. Verma and Krishnaprasad Thirunarayan and I. V. Ramakrishnan}, editor = {Kesav V. Nori}, title = {An Efficient Parallel Algorithm for Term Matching}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, Sixth Conference, New Delhi, India, December 18-20, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {241}, pages = {504--518}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-17179-7\_31}, doi = {10.1007/3-540-17179-7\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/VermaKR86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.