default search action
Punam Bedi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Purnima Khurana, Bhavna Gupta, Ravish Sharma, Punam Bedi:
Session-aware recommender system using double deep reinforcement learning. J. Intell. Inf. Syst. 62(2): 403-429 (2024) - [j68]Punam Bedi, Anuradha Singhal, Veenu Bhasin:
Deep learning based active image steganalysis: a review. Int. J. Syst. Assur. Eng. Manag. 15(3): 786-799 (2024) - [j67]Richa, Punam Bedi, Shivani Gupta, Ranjeet Kumar:
Incorporation of Two-Fold Trust in Group Recommender System to Handle Popularity Bias. SN Comput. Sci. 5(2): 259 (2024) - [j66]Anuradha Singhal, Punam Bedi:
USteg-DSE: Universal quantitative Steganalysis framework using Densenet merged with Squeeze & Excitation net. Signal Process. Image Commun. 128: 117171 (2024) - [j65]Purnima Khurana, Bhavna Gupta, Ravish Sharma, Punam Bedi:
A sentiment-guided session-aware recommender system. J. Supercomput. 80(19): 27204-27243 (2024) - [c81]Ningyao Ningshen, Vinita Jindal, Punam Bedi:
CGM: A hybrid model for forecasting future stock price. SCI 2024: 126-137 - 2023
- [j64]Punam Bedi, Vinita Jindal, Arti Dua:
SPYIPv6: Locating Covert Data in One or a Combination of IPv6 Header Field(s). IEEE Access 11: 103486-103501 (2023) - [j63]Neha Gupta, Vinita Jindal, Punam Bedi:
A Survey on Intrusion Detection and Prevention Systems. SN Comput. Sci. 4(5): 439 (2023) - [j62]Tulika Kumari, Ravish Sharma, Bhavna Gupta, Punam Bedi:
Generating Popularity-Aware Reciprocal Recommendations Using Siamese Bi-Directional Gated Recurrent Units Network. Vietnam. J. Comput. Sci. 10(3): 273-301 (2023) - [j61]Tulika Kumari, Bhavna Gupta, Ravish Sharma, Punam Bedi:
Empowering reciprocal recommender system using contextual bandits and argumentation based explanations. World Wide Web (WWW) 26(5): 2969-3000 (2023) - [c80]S. B. Taneja, G. C. Brahma, Sanjay Bisht, Vinita Jindal, Punam Bedi:
Predator-Prey PSO based Weapon deployment in Constructive Simulation. IC3 2023: 58-65 - [c79]Punam Bedi, Tanisha Roy, Vidhi Arora, Pushkar Gole:
Smart Contract based Skill Verification System for Recruitment. IC3 2023: 147-152 - 2022
- [j60]Arti Dua, Vinita Jindal, Punam Bedi:
Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6. IEEE Access 10: 110661-110675 (2022) - [j59]Neha Gupta, Vinita Jindal, Punam Bedi:
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. Comput. Secur. 112: 102499 (2022) - [j58]Bhavna Gupta, Harmeet Kaur, Punam Bedi:
Enhancing system robustness of active products using trust based collaboration. J. Intell. Fuzzy Syst. 43(1): 939-956 (2022) - [j57]Tulika Kumari, Ravish Sharma, Punam Bedi:
A contextual-bandit approach for multifaceted reciprocal recommendations in online dating. J. Intell. Inf. Syst. 59(3): 705-731 (2022) - [j56]Punam Bedi, Anuradha Singhal:
Estimating cover image for universal payload region detection in stego images. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 5797-5809 (2022) - 2021
- [j55]Richa, Punam Bedi:
Trust and Distrust based Cross-domain Recommender System. Appl. Artif. Intell. 35(4): 326-351 (2021) - [j54]Punam Bedi, Neha Gupta, Vinita Jindal:
I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. Appl. Intell. 51(2): 1133-1151 (2021) - [j53]Neha Gupta, Vinita Jindal, Punam Bedi:
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system. Comput. Networks 192: 108076 (2021) - [j52]Richa, Punam Bedi:
Trust and fuzzy inference based cross domain serendipitous item recommendations (TFCDSRS). J. Intell. Fuzzy Syst. 41(5): 5511-5523 (2021) - [j51]Anuradha Singhal, Punam Bedi:
Multi-class blind steganalysis using deep residual networks. Multim. Tools Appl. 80(9): 13931-13956 (2021) - [j50]Punam Bedi, Shivani Dhiman, Pushkar Gole, Neha Gupta, Vinita Jindal:
Prediction of COVID-19 Trend in India and Its Four Worst-Affected States Using Modified SEIRD and LSTM Models. SN Comput. Sci. 2(3): 224 (2021) - 2020
- [j49]Richa, Punam Bedi:
Combining trust and reputation as user influence in cross domain group recommender system (CDGRS). J. Intell. Fuzzy Syst. 38(5): 6235-6246 (2020) - [i7]Punam Bedi, Shivani, Pushkar Gole, Neha Gupta, Vinita Jindal:
Projections for COVID-19 spread in India and its worst affected five states using the Modified SEIRD and LSTM models. CoRR abs/2009.06457 (2020) - [i6]Punam Bedi, Neha Gupta, Vinita Jindal:
I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems. CoRR abs/2009.10940 (2020) - [i5]Vinita Jindal, Punam Bedi:
GMACO-P: GPU assisted Preemptive MACO algorithm for enabling Smart Transportation. CoRR abs/2010.14244 (2020)
2010 – 2019
- 2019
- [j48]Anjali Gautam, Punam Bedi:
FS-CARS: fast and scalable context-aware news recommender system using tensor factorisation. Int. J. Comput. Sci. Eng. 18(2): 118-129 (2019) - [j47]Richa, Punam Bedi:
Parallel context-aware multi-agent tourism recommender system. Int. J. Comput. Sci. Eng. 20(4): 536-549 (2019) - [j46]Punam Bedi, Veenu Bhasin:
Multilayer ensemble of ELMs for image steganalysis with multiple feature sets. Int. J. Comput. Sci. Eng. 20(4): 558-569 (2019) - [j45]Vinita Jindal, Punam Bedi:
Parameter Tuning in MACO for Actual Road Conditions. Wirel. Pers. Commun. 106(3): 1309-1323 (2019) - 2018
- [j44]Vinita Jindal, Punam Bedi:
An improved hybrid ant particle optimization (IHAPO) algorithm for reducing travel time in VANETs. Appl. Soft Comput. 64: 526-535 (2018) - [j43]Punam Bedi, Sumit Kumar Agarwal, Richa:
Trust and reputation-based multi-agent recommender system. Int. J. Comput. Sci. Eng. 16(4): 350-362 (2018) - [j42]Vinita Jindal, Punam Bedi:
High performance adaptive traffic control for efficient response in vehicular ad hoc networks. Int. J. Comput. Sci. Eng. 16(4): 390-400 (2018) - [j41]Chhavi Sharma, Punam Bedi:
Community based Hashtag Recommender System (CHRS) for twitter. J. Intell. Fuzzy Syst. 34(3): 1511-1519 (2018) - [j40]Richa, Punam Bedi:
Parallel proactive cross domain context aware recommender system. J. Intell. Fuzzy Syst. 34(3): 1521-1533 (2018) - [c78]Anuradha Singhal, Punam Bedi:
Blind Quantitative Steganalysis using SVD Features. ICACCI 2018: 369-374 - [c77]Neha Gupta, Punam Bedi:
E-waste Management Using Blockchain based Smart Contracts. ICACCI 2018: 915-921 - 2017
- [j39]Vinita Jindal, Punam Bedi:
Preemptive MACO (MACO-P) Algorithm for Reducing Travel Time in VANETs. Appl. Artif. Intell. 31(2): 174-196 (2017) - [j38]Chhavi Sharma, Punam Bedi:
CCFRS - Community based Collaborative Filtering Recommender System. J. Intell. Fuzzy Syst. 32(4): 2987-2995 (2017) - [j37]Anjali Gautam, Punam Bedi:
Developing content-based recommender system using Hadoop Map Reduce. J. Intell. Fuzzy Syst. 32(4): 2997-3008 (2017) - [j36]Pooja Bhatt Vashisth, Purnima Khurana, Punam Bedi:
A fuzzy hybrid recommender system. J. Intell. Fuzzy Syst. 32(6): 3945-3960 (2017) - [j35]Shailey Chawla, Sangeeta Srivastava, Punam Bedi:
Improving the quality of web applications with web specific goal driven requirements engineering. Int. J. Syst. Assur. Eng. Manag. 8(1s): 65-77 (2017) - [j34]Vinita Jindal, Punam Bedi:
Reducing waiting time with parallel preemptive algorithm in VANETs. Veh. Commun. 7: 58-65 (2017) - [c76]Vinita Jindal, Punam Bedi:
GPU accelerated preemptive HAPO (GHAPO-P) for reducing trip time in VANETS. ICACCI 2017: 1569-1575 - 2016
- [j33]Shailey Chawla, Sangeeta Srivastava, Punam Bedi:
Goals and scenarios based web requirements engineering. Comput. Syst. Sci. Eng. 31(1) (2016) - [j32]Neeraj Kumar Sharma, Vibha Gaur, Punam Bedi:
Safeguarding Buyers with Attack-Resilient Reputation Parameters. J. Theor. Appl. Electron. Commer. Res. 11(1): 46-66 (2016) - [j31]Punam Bedi, Chhavi Sharma:
Community detection in social networks. WIREs Data Mining Knowl. Discov. 6(3): 115-135 (2016) - [c75]Punam Bedi, Richa, Sumit Kumar Agarwal, Veenu Bhasin:
ELM based imputation-boosted proactive recommender systems. ICACCI 2016: 69-74 - [c74]Anjali Gautam, Parila Chaudhary, Kunal Sindhwani, Punam Bedi:
CBCARS: Content boosted context-aware recommendations using tensor factorization. ICACCI 2016: 75-81 - [c73]Anuradha Singhal, Punam Bedi:
Local binary pattern operator based steganography in wavelet domain. ICACCI 2016: 826-831 - [c72]Vinita Jindal, Vishwa Raj Sharma, Punam Bedi:
A preemptive hybrid ant particle optimization (HAPO-P) algorithm for smart transportation. ICACCI 2016: 1357-1363 - [c71]Richa, Punam Bedi:
Parallel context aware recommender system using GPU and JCuda. ICACCI 2016: 1383-1389 - [c70]Punam Bedi, Veenu Bhasin, Tarun Yadav:
2L-DWTS - Steganography technique based on second level DWT. ICACCI 2016: 1533-1538 - 2015
- [j30]Punam Bedi, Pooja Bhatt Vashisth:
Argumentation-enabled interest-based personalised recommender system. J. Exp. Theor. Artif. Intell. 27(2): 199-226 (2015) - [c69]Punam Bedi, Vinita Jindal, Heena Dhankani, Ruchika Garg:
ATSOT: Adaptive Traffic Signal Using mOTes. DNIS 2015: 152-171 - [c68]Vinita Jindal, Punam Bedi:
Reducing Travel Time in VANETs with Parallel Implementation of MACO (Modified ACO). IBICA 2015: 383-392 - [c67]Veenu Bhasin, Punam Bedi, Neha Singh, Charu Aggarwal:
FS-EHS: Harmony Search Based Feature Selection Algorithm for Steganalysis Using ELM. IBICA 2015: 393-402 - [c66]Anjali Gautam, Punam Bedi:
MR-VSM: Map Reduce based vector Space Model for user profiling-an empirical study on News data. ICACCI 2015: 355-360 - [c65]Punam Bedi, Richa Sharma:
User interest expansion using spreading activation for generating recommendations. ICACCI 2015: 766-771 - [c64]Punam Bedi, Chhavi Sharma, Pooja Bhatt Vashisth, Deepika Goel, Muskan Dhanda:
Handling cold start problem in Recommender Systems by using Interaction Based Social Proximity factor. ICACCI 2015: 1987-1993 - [c63]Punam Bedi, Vinita Jindal, Ruchika Garg, Heena Dhankani:
A preemptive approach to reduce average queue length in VANETs. ICACCI 2015: 2089-2095 - [c62]Vinita Jindal, Heena Dhankani, Ruchika Garg, Punam Bedi:
MACO: Modified ACO for reducing travel time in VANETs. WCI 2015: 97-102 - [c61]Veenu Bhasin, Punam Bedi, Aakarshi Goel, Sukanya Gupta:
StegTrack: Tracking images with hidden content. WCI 2015: 318-323 - [c60]Anuradha Singhal, Punam Bedi:
Steganography using Cuckoo Optimized Wavelet Coefficients. WCI 2015: 365-370 - [e1]Indu Nair, Sushmita Mitra, Ljiljana Trajkovic, Punam Bedi, Suzanne McIntosh, M. S. Rajasree:
Proceedings of the Third International Symposium on Women in Computing and Informatics, WCI 2015, co-located with ICACCI 2015, Kochi, India, August 10-13, 2015. ACM 2015, ISBN 978-1-4503-3361-0 [contents] - 2014
- [j29]Veer Sain Dixit, Harita Mehta, Punam Bedi:
A Proposed Framework for Group-Based Multi-Criteria Recommendations. Appl. Artif. Intell. 28(10): 917-956 (2014) - [j28]Anurag Mishra, Charu Agarwal, Arpita Sharma, Punam Bedi:
Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm. Expert Syst. Appl. 41(17): 7858-7867 (2014) - [j27]V. Aakanksha, Ravish Sharma, Punam Bedi:
Trusted and load-balanced ant-based routing in mobile ad hoc networks. Int. J. Artif. Intell. Soft Comput. 4(2/3): 195-211 (2014) - [j26]Neeraj Kumar Sharma, Vibha Gaur, Punam Bedi:
A dynamic personalised product pricing strategy using multiple attributes in agent mediated e-market - a neural approach. Int. J. Inf. Decis. Sci. 6(1): 46-69 (2014) - [j25]Neeraj Kumar Sharma, Vibha Gaur, Punam Bedi:
Improving Trustworthiness in E-Market Using Attack Resilient Reputation Modeling. Int. J. Intell. Inf. Technol. 10(3): 57-82 (2014) - [j24]Punam Bedi, Pooja Bhatt Vashisth:
Empowering recommender systems using trust and argumentation. Inf. Sci. 279: 569-586 (2014) - [j23]Punam Bedi, Harmeet Kaur, Bhavna Gupta:
Trust-based access control for collaborative systems. J. Exp. Theor. Artif. Intell. 26(1): 109-126 (2014) - [j22]Meera Sharma, Punam Bedi, V. B. Singh:
An empirical evaluation of cross project priority prediction. Int. J. Syst. Assur. Eng. Manag. 5(4): 651-663 (2014) - [j21]Shailey Chawla, Sangeeta Srivastava, Punam Bedi:
Evaluation of web-specific goal oriented requirements language models with quantitative reasoning. ACM SIGSOFT Softw. Eng. Notes 39(2): 1-9 (2014) - [c59]Punam Bedi, Sumit Kumar Agarwal, Vinita Jindal, Richa:
MARST: Multi-Agent Recommender System for e-Tourism Using Reputation Based Collaborative Filtering. DNIS 2014: 189-201 - [c58]Punam Bedi, Sumit Kumar Agarwal, Samarth Sharma, Harshita Joshi:
SAPRS: Situation-Aware Proactive Recommender system with explanations. ICACCI 2014: 277-283 - [c57]Punam Bedi, Vinita Jindal:
Use of Big Data technology in Vehicular Ad-hoc Networks. ICACCI 2014: 1677-1683 - [c56]Veenu Bhasin, Punam Bedi, Anuradha Singhal:
Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score. ICACCI 2014: 2323-2330 - [c55]Punam Bedi, Veenu Bhasin, Natasha Mittal, Trisha Chatterjee:
FS-SDS: Feature selection for JPEG steganalysis using stochastic diffusion search. SMC 2014: 3797-3802 - 2013
- [j20]Punam Bedi, Anjali Thukral, Hema Banati:
Focused crawling of tagged web resources using ontology. Comput. Electr. Eng. 39(2): 613-628 (2013) - [j19]Punam Bedi, Roli Bansal, Priti Sehgal:
Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput. Electr. Eng. 39(2): 640-654 (2013) - [j18]Richa Sharma, Punam Bedi, Hema Banati:
Stigmergic agent-based adaptive content sequencing in an e-learning environment. Int. J. Adv. Intell. Paradigms 5(1/2): 59-82 (2013) - [j17]Samiksha Goel, Arpita Sharma, Punam Bedi:
Novel approaches for classification based on Cuckoo Search Strategy. Int. J. Hybrid Intell. Syst. 10(3): 107-116 (2013) - [j16]Veer Sain Dixit, Punam Bedi, Harita Mehta:
Generation of web recommendations using implicit user feedback and normalised mutual information. Int. J. Knowl. Web Intell. 4(2/3): 113-141 (2013) - [j15]Punam Bedi, V. Aakanksha, Richa Sharma:
Trust and context view-based knowledge sharing in MANets. Int. J. Trust. Manag. Comput. Commun. 1(1): 85-103 (2013) - [j14]Punam Bedi, Vandana Gandotra, Archana Singhal, Himanshi Narang, Sumit Sharma:
Mitigating multi-threats optimally in proactive threat management. ACM SIGSOFT Softw. Eng. Notes 38(1): 1-7 (2013) - [j13]Punam Bedi, Vandana Gandotra, Archana Singhal, Himanshi Narang, Sumit Sharma:
Threat-oriented security framework in risk management using multiagent system. Softw. Pract. Exp. 43(9): 1013-1038 (2013) - [c54]K. K. Chaturvedi, Punam Bedi, Sanjay Misra, V. B. Singh:
An Empirical Validation of the Complexity of Code Changes and Bugs in Predicting the Release Time of Open Source Software. CSE 2013: 1201-1206 - [c53]Roli Bansal, Priti Sehgal, Veenu Bhasin, Punam Bedi:
Multi-agent system for intelligent watermarking of fingerprint images. FUZZ-IEEE 2013: 1-8 - [c52]Punam Bedi, Pooja Bhatt Vashisth, Purnima Khurana, Preeti Marwaha:
Modeling user preferences in a hybrid recommender system using type-2 fuzzy sets. FUZZ-IEEE 2013: 1-8 - [c51]Neeraj Kumar Sharma, Vibha Gaur, Punam Bedi:
Distributed multi-agent reputation framework for interactions in e-market. FUZZ-IEEE 2013 - [c50]Veenu Bhasin, Punam Bedi:
Multi-class JPEG Steganalysis using Extreme Learning Machine. ICACCI 2013: 1948-1952 - [c49]Harita Mehta, Veer Sain Dixit, Punam Bedi:
Weighted difference entropy based similarity measure at two levels in a recommendation framework. ICACCI 2013: 2076-2083 - [c48]Veenu Bhasin, Punam Bedi:
Steganalysis for JPEG Images Using Extreme Learning Machine. SMC 2013: 1361-1366 - [i4]Vibha Gaur, Neeraj Kumar Sharma, Punam Bedi:
Evaluating Reputation Systems for Agent Mediated e-Commerce. CoRR abs/1303.7377 (2013) - 2012
- [j12]Punam Bedi, Ravish Sharma:
Trust based recommender system using ant colony for trust computation. Expert Syst. Appl. 39(1): 1183-1190 (2012) - [j11]Punam Bedi, Karima Qayumi, Tejinder Kaur:
Home security surveillance system using multi-robot system. Int. J. Comput. Appl. Technol. 45(4): 272-279 (2012) - [j10]Roli Bansal, Priti Sehgal, Punam Bedi:
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking. Int. J. Inf. Secur. Priv. 6(2): 34-52 (2012) - [j9]Richa Sharma, Hema Banati, Punam Bedi:
Building Socially-Aware E-Learning Systems Through Knowledge Management. Int. J. Knowl. Manag. 8(3): 1-26 (2012) - [j8]Roli Bansal, Priti Sehgal, Punam Bedi:
Securing Fingerprint Images Using PSO-Based Wavelet Domain Watermarking. Inf. Secur. J. A Glob. Perspect. 21(2): 88-101 (2012) - [j7]Punam Bedi, Anjali Thukral, Hema Banati, Abhishek Behl, Varun Mendiratta:
A Multi-Threaded Semantic Focused Crawler. J. Comput. Sci. Technol. 27(6): 1233-1242 (2012) - [c47]Punam Bedi, Sumit Kumar Agarwal:
A Situation-Aware Proactive Recommender System. HIS 2012: 85-89 - [c46]Roli Bansal, Priti Sehgal, Punam Bedi:
Intelligent wavelet domain watermarking of fingerprint images. HIS 2012: 90-95 - [c45]Punam Bedi, Bhavna Gupta, Harmeet Kaur:
Predicting attribute based user trustworthiness for access control of resources. HIS 2012: 294-299 - [c44]Hema Banati, Punam Bedi, Preeti Marwaha:
Extending BPEL for WSDL-Temporal based Web services. HIS 2012: 484-489 - [c43]Roli Bansal, Priti Sehgal, Punam Bedi:
Securing fingerprint images using a hybrid technique. ICACCI 2012: 557-565 - [c42]Pooja Bhatt Vashisth, Deepak Chandoliya, Bipin Kumar Yadav, Punam Bedi:
Trust enabled Argumentation Based Recommender System. ISDA 2012: 137-142 - [c41]Anjali Thukral, Savita M. Datta, Hema Banati, Punam Bedi:
Informal eLearning using Multi Agent Systems. ISDA 2012: 213-217 - [c40]Richa Sharma, Savita M. Datta, Hema Banati, Punam Bedi:
An opinion-based framework for designing socially aware e-learning systems. ISDA 2012: 431-436 - [c39]V. Aakanksha, Punam Bedi:
Mobile process groups based device/service discovery and interoperability in MANets. ISDA 2012: 466-471 - [c38]Shikha Agarwal, Archana Singhal, Punam Bedi:
Classification of RSS feed news items using ontology. ISDA 2012: 491-496 - [c37]Harita Mehta, Veer Sain Dixit, Punam Bedi:
Refinement of recommendations based on user preferences. ISDA 2012: 515-520 - [c36]Meera Sharma, Punam Bedi, K. K. Chaturvedi, V. B. Singh:
Predicting the priority of a reported bug using machine learning techniques and cross project validation. ISDA 2012: 539-545 - [c35]Hema Banati, Punam Bedi, Preeti Marwaha:
WSDL-TC: Collaborative customization of web services. ISDA 2012: 692-697 - [i3]Roli Bansal, Priti Sehgal, Punam Bedi:
Minutiae Extraction from Fingerprint Images - a Review. CoRR abs/1201.1422 (2012) - [i2]Vibha Gaur, Neeraj Kumar Sharma, Punam Bedi:
A Dynamic Model for Sharing Reputation of Sellers among Buyers for Enhancing Trust in Agent Mediated e-market. CoRR abs/1201.3835 (2012) - [i1]Harita Mehta, Shveta Kundra Bhatia, Punam Bedi, Veer Sain Dixit:
Collaborative Personalized Web Recommender System using Entropy based Similarity Measure. CoRR abs/1201.4210 (2012) - 2011
- [j6]Anjali Thukral, Hema Banati, Punam Bedi:
Ranking Tagged Resources Using Social Semantic Relevance. Int. J. Inf. Retr. Res. 1(3): 15-34 (2011) - [j5]Vandana Gandotra, Archana Singhal, Punam Bedi:
MASPTA-O: Multiagent System Planning to Avoid Threats Optimally. Inf. Secur. J. A Glob. Perspect. 20(6): 290-310 (2011) - [j4]Vandana Gandotra, Archana Singhal, Punam Bedi:
Layered security architecture for threat management using multi-agent system. ACM SIGSOFT Softw. Eng. Notes 36(5): 1-11 (2011) - [j3]Punam Bedi, Suruchi Chawla:
High Scent Web Page Recommendations Using Fuzzy Rough Set Attribute Reduction. Trans. Rough Sets 14: 18-36 (2011) - [c34]Punam Bedi, Roli Bansal, Priti Sehgal:
Using PSO in Image Hiding Scheme Based on LSB Substitution. ACC (3) 2011: 259-268 - [c33]Anjali Thukral, Varun Mendiratta, Abhishek Behl, Hema Banati, Punam Bedi:
FCHC: A Social Semantic Focused Crawler. ACC (2) 2011: 273-283 - [c32]Shailey Chawla, Sangeeta Srivastava, Punam Bedi:
GOREWEB Framework for Goal Oriented Requirements Engineering of Web Applications. IC3 2011: 229-241 - [c31]V. Aakanksha, Ravish Sharma, Punam Bedi:
MPG_AbTR: Ant Based Trusted Routing in MANets Using Mobile Process Groups. SocProS (1) 2011: 367-376 - [c30]Punam Bedi, Pooja Bhatt Vashisth:
A Fuzzy Trust Model for Argumentation-Based Recommender Systems. SocProS (1) 2011: 493-502 - [c29]Richa Sharma, Hema Banati, Punam Bedi:
Adaptive Content Sequencing for e-Learning Courses Using Ant Colony Optimization. SocProS (2) 2011: 579-590 - 2010
- [c28]Vibha Gaur, Anuja Soni, Punam Bedi:
An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented Paradigm. DSDE 2010: 164-168 - [c27]Punam Bedi, Pooja Bhatt Vashisth:
Negotiation using Argumentation for Location based E-Commerce in a Multi Agent Society. IC-AI 2010: 444-450 - [c26]Ruchika Bajaj, Punam Bedi, Saibal K. Pal:
Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization. SEMCCO 2010: 230-237
2000 – 2009
- 2009
- [c25]V. Aakanksha, Punam Bedi:
A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks. ARTCom 2009: 396-400 - [c24]Vandana Gandotra, Archana Singhal, Punam Bedi:
Threat Mitigation, Monitoring and Management Plan - A New Approach in Risk Management. ARTCom 2009: 719-723 - [c23]Ravish Sharma, Punam Bedi:
Personalized Tag Recommendations to Enhance User's Perception. ARTCom 2009: 944-947 - [c22]Roli Bansal, Payal Arora, Malvika Gaur, Priti Sehgal, Punam Bedi:
Fingerprint Image Enhancement Using Type-2 Fuzzy Sets. FSKD (3) 2009: 412-417 - [c21]Punam Bedi, Vandana Gandotra, Archana Singhal, Vandita Vats, Neha Mishra:
Avoiding Threats Using Multi Agent System Planning for Web Based Systems. ICCCI 2009: 709-719 - [c20]Vandana Gandotra, Archana Singhal, Punam Bedi:
Identifying Security Requirements Hybrid Technique. ICSEA 2009: 407-412 - [c19]Jyotsna Talreja, Mansi Sood, Harmeet Kaur, Punam Bedi, Bhavna Gupta:
Using Web Mining to Generate Recommendations: A Website Recommender. IICAI 2009: 333-349 - [c18]Sudeep Marwaha, Punam Bedi, Ranjan Yadav, Nikhil Malik:
Diseases and Pests Identification in Crops - A Semantic Web Approach. IICAI 2009: 1057-1076 - [c17]Bhavna Gupta, Harmeet Kaur, Punam Bedi:
Trust based Personalized Ecommerce System for Farmers. IICAI 2009: 1085-1093 - [c16]Shikha Mehta, Hema Banati, Punam Bedi:
BDI Planning Approach to Distributed Multiagent Based Semantic Search Engine. IWANN (2) 2009: 25-28 - [c15]Punam Bedi, Suruchi Chawla:
Use of Fuzzy Rough Set Attribute Reduction in High Scent Web Page Recommendations. RSFDGrC 2009: 192-200 - 2008
- [j2]Punam Bedi, Vibha Gaur:
Trust based prioritization of Quality Attributes. Int. Arab J. Inf. Technol. 5(3): 223-229 (2008) - [c14]Roli Bansal, Priti Sehgal, Punam Bedi:
A Novel Framework for Enhancing Images Corrupted by Impulse Noise Using Type-II Fuzzy Sets. FSKD (3) 2008: 266-271 - [c13]Suruchi Chawla, Punam Bedi:
Finding Hubs and Authorities using Information Scent to Improve the Information Retrieval precision. IC-AI 2008: 185-191 - [c12]Suruchi Chawla, Punam Bedi:
Improving Information Retrieval Precision by Finding Related Queries with Similar Information Need Using Information Scent. ICETET 2008: 486-491 - 2007
- [c11]Punam Bedi, Vibha Gaur:
Optimal Partner Selection Model for Cooperation. IICAI 2007: 1297-1307 - [c10]Punam Bedi, Harmeet Kaur, Sudeep Marwaha:
Trust Based Recommender System for Semantic Web. IJCAI 2007: 2677-2682 - [c9]Punam Bedi, Vibha Gaur:
Prioritizing Quality Specifications of Multi-agent Systems. World Congress on Engineering 2007: 541-546 - [c8]Punam Bedi, Vibha Gaur:
Exploring the Interdependencies among Communication, Knowledgeability and Performance of Multi-agent Systems. World Congress on Engineering 2007: 547-552 - 2006
- [j1]Punam Bedi, Hema Banati:
Trust Aware Usability. J. Inf. Technol. Tour. 8(3-4): 215-226 (2006) - [c7]Punam Bedi, Vibha Gaur:
Multi Dimension Quality Model of MAS. Software Engineering Research and Practice 2006: 130-138 - 2005
- [c6]Hema Banati, Punam Bedi:
HISE- An Algorithmic Approach To Evolve a Usable Website. CSREA HCI 2005: 17-23 - [c5]Harmeet Kaur, Punam Bedi:
Using Fuzzy Clustering to Determine Agent Reputation. DMIN 2005: 79-88 - [c4]Punam Bedi, Sudeep Marwaha:
Framework for Ontology Based Expert Systems : Disease & Pests Identification in Crops - A Case Study. IC-AI 2005: 256-259 - [c3]Punam Bedi, Harmeet Kaur:
Trust Based Recommender System. IC-AI 2005: 798-801 - [c2]Punam Bedi, Harmeet Kaur:
Using Fuzzy Clustering to Determine Trust based Recommendations. IICAI 2005: 2120-2136 - [c1]Punam Bedi, Hema Banati:
Prioritizing Web Usability Attributes Using Intuitionistic Fuzzy Sets. Software Engineering Research and Practice 2005: 570-578
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint