Arindam Khan
Arindam Khan
Assistant Professor, Indian Institute of Science, Bengaluru
Verified email at iisc.ac.in
TitleCited byYear
Attribute-based messaging: Access control and confidentiality
R Bobba, O Fatemieh, F Khan, A Khan, CA Gunter, H Khurana, ...
ACM Transactions on Information and System Security (TISSEC) 13 (4), 31, 2010
422010
Approximation and online algorithms for multidimensional bin packing: A survey
HI Christensen, A Khan, S Pokutta, P Tetali
Computer Science Review, 2017
402017
Improved Approximation Algorithm for Two-Dimensional Bin Packing
N Bansal, A Khan
ACM-SIAM Symposium on Discrete Algorithms (SODA), 13-25, 2014
352014
On Mimicking Networks Representing Minimum Terminal Cuts
A Khan, P Raghavendra, P Tetali, LA Végh
Arxiv preprint arXiv:1207.6371, 2012
172012
On Discovering Bucket Orders from Preference Data
S Kenkre, A Khan, V Pandit
SIAM International Conference on Data Mining, 2011
142011
Improved approximation for vector bin packing
N Bansal, M Eliáš, A Khan
Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete …, 2016
13*2016
Improved Pseudo-Polynomial-Time Approximation for Strip Packing
W Galvez, F Grandoni, S Ingala, A Khan
FSTTCS 2016, 2016
92016
Multidimensional bin packing and other related problems: A survey
HI Christensen, A Khan, S Pokutta, P Tetali
82016
Approximation Algorithms For Multidimensional Bin Packing
A Khan
Georgia Institute of Technology, 2015
62015
Dorsal hand veins based person identification
MU Akram, HM Awan, AA Khan
2014 4th International Conference on Image Processing Theory, Tools and …, 2014
52014
Role of Conformity in Opinion Dynamics in Social Networks
A Das, S Gollapudi, A Khan, RP Leme
ACM Conference on Online Social Networks (COSN), 2014
52014
Approximating Geometric Knapsack via L-packings
W Gálvez, F Grandoni, S Heydrich, S Ingala, A Khan, A Wiese
FOCS, 2017
42017
A cryptographic primitive based authentication scheme for run-time software of embedded systems
A Khan, G Ganesh, SD Dhodapkar, BB Biswas, RK Patil
2010 2nd International Conference on Reliability, Safety and Hazard-Risk …, 2010
42010
On weighted bipartite edge coloring
A Khan, M Singh
35th IARCS Annual Conference on Foundations of Software Technology and …, 2015
32015
Diffuse Reflection Diameter and Radius for Convex Quadrilateralizable Polygons
A Khan, SP Pal, M Aanjaneya, A Bishnu, SC Nandy
Discrete Applied Mathematics, 2013
32013
A Study on Detecting Malcodes Distribution Sites
D Seo, A Khan, H Lee
Korean Information Processing Society (KIPS) 1 (2), 1425-1428, 2008
32008
A review of groundwater fluoride contamination in Pakistan and an assessment of the risk of fluorosis
ZU Rahman, B Khan, I Ahmada, IA Mian, A Saeed, A Afaq, A Khan, ...
Fluoride, 2018
22018
Secret key encryption model for Wireless Sensor Networks
A Khan, SW Shah, A Ali, R Ullah
2017 14th International Bhurban Conference on Applied Sciences and …, 2017
22017
Improved Online Algorithms for Knapsack and GAP in the Random Order Model
S Albers, A Khan, L Ladewig
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2019
12019
The matching augmentation problem: a -approximation algorithm
J Cheriyan, J Dippel, F Grandoni, A Khan, VV Narayan
Mathematical Programming, 1-40, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20