default search action
Sujoy Ghose
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j37]Sangita Dhara, Sujoy Ghose, Raja Datta:
MFR - A Max-Flow-Based Routing for Future Interplanetary Networks. IEEE Trans. Aerosp. Electron. Syst. 58(6): 5334-5350 (2022) - 2020
- [c23]Shibabroto Banerjee, Pourush Sood, Sujoy Ghose, Partha Pratim Das:
Coronary Artery Disease Classification from Photoplethysmographic Signals. ICMHI 2020: 246-251
2010 – 2019
- 2016
- [j36]Piyoosh Purushothaman Nair, Arnab Sarkar, N. M. Harsha, Megha Gandhi, P. P. Chakrabarti, Sujoy Ghose:
ERfair Scheduler with Processor Suspension for Real-Time Multiprocessor Embedded Systems. ACM Trans. Design Autom. Electr. Syst. 22(1): 19:1-19:25 (2016) - 2011
- [j35]Arnab Sarkar, A. Shanker, Sujoy Ghose, P. P. Chakrabarti:
A Low-Overhead Partition-Oriented ERfair Scheduler for Hard Real-Time Embedded Systems. IEEE Embed. Syst. Lett. 3(1): 5-8 (2011) - [j34]Arnab Sarkar, Sujoy Ghose, P. P. Chakrabarti:
Sticky-ERfair: a task-processor affinity aware proportional fair scheduler. Real Time Syst. 47(4): 356-377 (2011) - [j33]Arnab Sarkar, Sujoy Ghose, P. P. Chakrabarti:
A Corrigendum to: "Sticky-ERfair: a task-processor affinity aware proportional fair scheduler". Real Time Syst. 47(4): 382-385 (2011) - 2010
- [j32]Arnab Sarkar, P. P. Chakrabarti, Sujoy Ghose:
Partition oriented frame based fair scheduler. J. Parallel Distributed Comput. 70(7): 707-718 (2010) - [c22]Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Niloy Ganguly:
Formal Understanding of the Emergence of Superpeer Networks: A Complex Network Approach. ICDCN 2010: 219-230 - [c21]Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Niloy Ganguly:
How do Superpeer Networks Emerge? INFOCOM 2010: 1514-1522 - [c20]Bivas Mitra, Sujoy Ghose, Niloy Ganguly:
Brief announcement: superpeer formation amidst churn and rewiring. PODC 2010: 127-128 - [c19]Arnab Sarkar, Rahul Nanda, Sujoy Ghose, P. P. Chakrabarti:
Safe-ERfair. VLSI Design 2010: 128-133
2000 – 2009
- 2009
- [c18]Arnab Sarkar, Sarthak Swaroop, Sujoy Ghose, Partha Pratim Chakrabarti:
ERfair Scheduler with Processor Shutdown. HiPC 2009: 4-12 - [c17]Devshri Roy, Sudeshna Sarkar, Sujoy Ghose:
A personalized information retrieval module for retrieving learning materials. T4E 2009: 68-74 - 2008
- [j31]Devshri Roy, Sudeshna Sarkar, Sujoy Ghose:
Automatic Extraction of Pedagogic Metadata from Learning Content. Int. J. Artif. Intell. Educ. 18(2): 97-118 (2008) - 2007
- [j30]Raja Datta, Sujoy Ghose, Indranil Sengupta:
Two New Algorithms for Static Virtual Topology Design in Optical WDM Networks. Int. J. Wirel. Opt. Commun. 4(1): 61-74 (2007) - [c16]Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Analyzing the vulnerability of superpeer networks against attack. CCS 2007: 225-234 - [c15]Bivas Mitra, Sujoy Ghose, Niloy Ganguly:
Effect of Dynamicity on Peer to Peer Networks. HiPC 2007: 452-463 - [c14]Bivas Mitra, Sujoy Ghose, Niloy Ganguly:
How stable are large superpeer networks against attack? Peer-to-Peer Computing 2007: 239-242 - [c13]Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly:
Measuring robustness of superpeer topologies. PODC 2007: 372-373 - 2006
- [j29]Mamata Jenamani, Pratap K. J. Mohapatra, Sujoy Ghose:
Design benchmarking, user behavior analysis and link-structure personalization in commercial web sites. Internet Res. 16(3): 248-266 (2006) - [c12]Bivas Mitra, Md. Moin Afaque, Sujoy Ghose, Niloy Ganguly:
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks. ICDCN 2006: 257-268 - 2005
- [j28]Sujoy Ghose, Rajeev Kumar, Nilanjan Banerjee, Raja Datta:
Multihop Virtual Topology Design in WDM Optical Networks for Self-Similar Traffic. Photonic Netw. Commun. 10(2): 199-214 (2005) - [c11]Devshri Roy, Sudeshna Sarkar, Sujoy Ghose:
Automatic Annotation of Documents with Metadata for use with Tutoring System. IICAI 2005: 3576-3592 - 2004
- [j27]Raja Datta, Ashok K. Turuk, Sujoy Ghose, Rajeev Kumar, Indranil Sengupta:
New Schemes for Connection Establishment in GMPLS Environment for WDM Networks. Int. J. Wirel. Opt. Commun. 2(1): 83-98 (2004) - [j26]Raja Datta, Bivas Mitra, Sujoy Ghose, Indranil Sengupta:
An algorithm for optimal assignment of a wavelength in a tree topology and its application in WDM networks. IEEE J. Sel. Areas Commun. 22(9): 1589-1600 (2004) - 2003
- [j25]Mamata Jenamani, Pratap K. J. Mohapatra, Sujoy Ghose:
A stochastic model of e-customer behavior. Electron. Commer. Res. Appl. 2(1): 81-94 (2003) - [c10]Raja Datta, Sujoy Ghose, Indranil Sengupta:
A rerouting technique with minimum traffic disruption for dynamic traffic in WDM networks. ICON 2003: 425-430 - 2002
- [j24]Mamata Jenamani, Pratap K. J. Mohapatra, Sujoy Ghose:
Online Customized Index Synthesis in Commercial Web Sites. IEEE Intell. Syst. 17(6): 20-26 (2002) - [j23]Pallab Dasgupta, P. P. Chakrabarti, Arnab Dey, Sujoy Ghose, Wolfgang Bibel:
Solving Constraint Optimization Problems from CLP-Style Specifications Using Heuristic Search Techniques. IEEE Trans. Knowl. Data Eng. 14(2): 353-368 (2002) - [c9]Raja Datta, Sujoy Ghose, Indranil Sengupta:
New Scheme for Design of Static Virtual Topology in Wide Area Optical Networks. IWDC 2002: 280-289 - 2000
- [j22]Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy Ghose:
GABIND: a GA approach to allocation and binding for the high-level synthesis of data paths. IEEE Trans. Very Large Scale Integr. Syst. 8(6): 747-750 (2000)
1990 – 1999
- 1999
- [j21]Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy Ghose:
A design space exploration scheme for data-path synthesis. IEEE Trans. Very Large Scale Integr. Syst. 7(3): 331-338 (1999) - 1998
- [j20]Sudeshna Sarkar, P. P. Chakrabarti, Sujoy Ghose:
A Framework for Learning in Search-Based Systems. IEEE Trans. Knowl. Data Eng. 10(4): 563-575 (1998) - [j19]Sudeshna Sarkar, P. P. Chakrabarti, Sujoy Ghose:
Learning while solving problems in best first search. IEEE Trans. Syst. Man Cybern. Part A 28(4): 535-541 (1998) - [j18]Chittaranjan A. Mandal, Partha Pratim Chakrabarti, Sujoy Ghose:
Complexity of Scheduling in High Level Synthesis. VLSI Design 7(4): 337-346 (1998) - 1997
- [c8]Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy Ghose:
Design Space Exploration for Data Path Synthesis. VLSI Design 1997: 166-173 - 1996
- [j17]V. V. Vinod, Sujoy Ghose:
Growing nonuniform feedforward networks for continuous mappings. Neurocomputing 10(1): 55-69 (1996) - [c7]Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy Ghose:
Allocation and Binding in Data Path Synthesis Using a Genetic Algorithm Approach. VLSI Design 1996: 122-125 - 1994
- [j16]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Improving Greedy Algorithms by Lookahead-Search. J. Algorithms 16(1): 1-23 (1994) - [j15]V. V. Vinod, Santanu Chaudhury, J. Mukherjee, Sujoy Ghose:
A connectionist approach for clustering with applications in image analysis. IEEE Trans. Syst. Man Cybern. 24(3): 365-384 (1994) - 1993
- [j14]V. V. Vinod, Sujoy Ghose:
Point matching using asymmetric neural networks. Pattern Recognit. 26(8): 1207-1214 (1993) - [c6]Chunduri Rama Mohan, Partha Pratim Chakrabarti, Sujoy Ghose:
Combining State Assignment with PLA Folding. VLSI Design 1993: 9-14 - 1992
- [j13]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Effective Use of Memory in Iterative Deepening Search. Inf. Process. Lett. 42(1): 47-52 (1992) - [j12]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
A Simple 0.5-Bounded Greedy Algorithm for the 0/1 Knapsack Problem. Inf. Process. Lett. 42(3): 173-177 (1992) - [j11]P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Generalized best first search using single and multiple heuristics. Inf. Sci. 60(1-2): 145-175 (1992) - [j10]P. P. Chakrabarti, Sujoy Ghose:
A General Best First Search Algorithm in AND/OR Graphs. J. Algorithms 13(2): 177-187 (1992) - [j9]Chittaranjan A. Mandal, P. P. Chakrabarti, Sujoy Ghose:
Register-interconnect optimization in data path synthesis. Microprocess. Microprogramming 33(5): 279-288 (1992) - [j8]V. V. Vinod, Santanu Chaudhury, Sujoy Ghose, J. Mukherjee:
A connectionist approach for peak detection in Hough space. Pattern Recognit. 25(10): 1253-1264 (1992) - [c5]V. V. Vinod, Santanu Chaudhury, J. Mukherjee, Sujoy Ghose:
A connectionist approach for gray level image segmentation. ICPR (3) 1992: 489-492 - [c4]Chittaranjan A. Mandal, Partha Pratim Chakrabarti, Sujoy Ghose:
Interconnect Optimization Techniques in Data Path Synthesis. VLSI Design 1992: 85-90 - [c3]Chunduri Rama Mohan, Partha Pratim Chakrabarti, Sujoy Ghose:
A New algorithm for combined PLA folding. VLSI Design 1992: 368-369 - 1991
- [j7]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Reducing Reexpansions in Iterative-Deepening Search by Controlling Cutoff Bounds. Artif. Intell. 50(2): 207-221 (1991) - [j6]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Multiple Stack Branch and Bound. Inf. Process. Lett. 37(1): 43-48 (1991)
1980 – 1989
- 1989
- [j5]P. P. Chakrabarti, Sujoy Ghose, Arup Acharya, S. C. De Sarkar:
Heuristic Search in Restricted Memory. Artif. Intell. 41(2): 197-221 (1989) - [j4]P. P. Chakrabarti, Sujoy Ghose, A. Pandey, S. C. De Sarkar:
Increasing Search Efficiency Using Multiple Heuristics. Inf. Process. Lett. 30(1): 33-36 (1989) - [j3]P. P. Chakrabarti, Sujoy Ghose, A. Pandey, S. C. De Sarkar:
Increasing Search Efficiency Using Multiple Heuristics. Inf. Process. Lett. 32(5): 275 (1989) - [c2]U. K. Sarkar, P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Pruning by Upperbounds in Heuristic Search: Use of Approximate Algorithms. KBCS 1989: 451-461 - 1988
- [c1]P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Best first search in and/or graphs. ACM Conference on Computer Science 1988: 256-261 - 1987
- [j2]P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Admissibility of A0* when Heuristics Overestimate. Artif. Intell. 34(1): 97-113 (1987) - 1986
- [j1]P. P. Chakrabarti, Sujoy Ghose, S. C. De Sarkar:
Heuristic Search Through Islands. Artif. Intell. 29(3): 339-347 (1986)
Coauthor Index
aka: Partha Pratim Chakrabarti
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint