default search action
Shweta Singh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Shweta Singh 0001 — Manipal Institute of Technology, Department of Electronics and Communications, Bangalore, KA, India (and 1 more)
- Shweta Singh 0002 — Indian Institute of Technology Roorkee, UK, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Shweta Singh, Vedant Ghatnekar, Sudaman Katti:
Long horizon episodic decision making for cognitively inspired robots. Cogn. Syst. Res. 87: 101259 (2024) - 2023
- [j8]Jingrui Ju, Qingguo Meng, Fangfang Sun, Luning Liu, Shweta Singh:
Citizen preferences and government chatbot social characteristics: Evidence from a discrete choice experiment. Gov. Inf. Q. 40(3): 101785 (2023) - [j7]Ravi Bapna, Alok Gupta, Gautam Ray, Shweta Singh:
Single-Sourcing vs. Multisourcing: An Empirical Analysis of Large Information Technology Outsourcing Arrangements. Inf. Syst. Res. 34(3): 1109-1130 (2023) - [j6]Mukesh Soni, Nikhil Kumar Singh, Pranjit Das, Mohammad Shabaz, Piyush Kumar Shukla, Partha Sarkar, Shweta Singh, Ismail Keshta, Ali Rizwan:
IoT-Based Federated Learning Model for Hypertensive Retinopathy Lesions Classification. IEEE Trans. Comput. Soc. Syst. 10(4): 1722-1731 (2023) - [c13]Shweta Singh, Sudaman Katti:
Reinforcement Learning with Memory Based Automatic Chunking for Complex Skill Acquisition. ICANN (1) 2023: 570-573 - [c12]Shweta Singh, Sudaman Katti, Vedant Ghatnekar:
Complex Skill Learning using Modified Transformers with Automatic Chunking and Forgetting. ICRAI 2023: 17-22 - 2021
- [j5]Shweta Singh, Ayush Sharma, Alankrita Aggarwal:
Performance Comparison of Image Processing Techniques on Various Filters: A Review. Int. J. Secur. Priv. Pervasive Comput. 13(3): 34-42 (2021) - [c11]Shweta Singh, Srikanth Vasamsetti:
Moving Objects Detection in Intricate Scenes via Spatio-Temporal Co-occurrence Based Background Subtraction. CVIP (1) 2021: 447-457 - [i4]William Farlessyost, Shweta Singh:
Reduced Order Dynamical Models For Complex Dynamics in Manufacturing and Natural Systems Using Machine Learning. CoRR abs/2110.08313 (2021) - 2020
- [c10]Shweta Singh, M. P. Singh, Ramprakash Pandey:
Phishing Detection from URLs Using Deep Learning Approach. ICCCS 2020: 1-4
2010 – 2019
- 2019
- [c9]Shweta Singh, Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta:
Quick Response Encoding of Human Facial Images for Identity Fraud Detection. IFIP Int. Conf. Digital Forensics 2019: 185-199 - [i3]Renganathan Subramanian, Shweta Singh:
Can Machine Learning Identify Governing Laws For Dynamics in Complex Engineered Systems ? : A Study in Chemical Engineering. CoRR abs/1907.07755 (2019) - 2018
- [c8]Yanji Chen, Mehmet Güngör, Shweta Singh, Alex Tazin, Mieczyslaw M. Kokar, Miriam Leeser:
Dynamic Deployment of Communication Applications to Different Hardware Platforms using Ontological Representations. HPEC 2018: 1-6 - [c7]Rashmi Bisht, Ritu Vijay, Shweta Singh:
Comparative Analysis of Fixed Valued Impulse Noise Removal Techniques for Image Enhancement. ICACDS (1) 2018: 175-184 - [c6]Jijnasa Nayak, Shweta Singh, Saheb Chhabra, Gaurav Gupta, Monika Gupta, Garima Gupta:
Detecting Data Leakage from Hard Copy Documents. IFIP Int. Conf. Digital Forensics 2018: 111-124 - 2017
- [c5]Shweta Singh:
Detection of emergent behaviors in system of dynamical systems using similitude theory. WSC 2017: 4650-4651 - 2016
- [j4]Ravi Bapna, Alok Gupta, Gautam Ray, Shweta Singh:
Research Note - IT Outsourcing and the Impact of Advisors on Clients and Vendors. Inf. Syst. Res. 27(3): 636-647 (2016) - [c4]Shweta Singh, Arun Kumar Tripathi:
A Comparative Study of Internet Protocols in MANET. ICACDS 2016: 221-231 - 2013
- [j3]Shweta Singh, B. P. S. Murthi, Erin Steffes:
Developing a measure of risk adjusted revenue (RAR) in credit cards market: Implications for customer relationship management. Eur. J. Oper. Res. 224(2): 425-434 (2013) - [j2]Om Prakash Verma, Shweta Singh:
A Fuzzy Impulse Noise Filter Based on Boundary Discriminative Noise Detection. J. Inf. Process. Syst. 9(1): 89-102 (2013) - [c3]Ravi Bapna, Alok Gupta, Gautam Ray, Shweta Singh:
Specialization, Integration, and Multi-sourcing: A study of Large IT Outsourcing Projects. ICIS 2013 - [c2]Shweta Singh, D. Vijay Rao:
Recognition and identification of target images using feature based retrieval in UAV missions. NCVPRIPG 2013: 1-4 - 2012
- [i2]Shweta Singh, Ravindara Bhatt:
Adjacency Matrix Based Energy Efficient Scheduling using S-MAC Protocol in Wireless Sensor Networks. CoRR abs/1204.0986 (2012) - 2011
- [i1]Pritha Guha, Kinjal Shah, Shiv Shankar Prasad Shukla, Shweta Singh:
Incorporating Agile with MDA Case Study: Online Polling System. CoRR abs/1110.6879 (2011)
2000 – 2009
- 2006
- [j1]Shweta Singh:
MAC Layer RFID Protocol for Low Cost Object Identification. J. Commun. 1(4): 41-47 (2006) - [c1]Shweta Singh:
Low Cost Object Identification in RFID via Dynamic Markov Chain & Two Time Scale SPSA. SAINT Workshops 2006: 64-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint