default search action
Madhu Kumari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Context-Based Persuasion Analysis of Sentiment Polarity Disambiguation in Social Media Text Streams. New Gener. Comput. 42(4): 497-531 (2024) - [j15]Meera Sharma, Madhu Kumari, V. B. Singh:
Bug summary entropy based training candidates identification in cross project severity prediction. Int. J. Syst. Assur. Eng. Manag. 15(3): 981-1014 (2024) - [j14]Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Rumor identification and diffusion impact analysis in real-time text stream using deep learning. J. Supercomput. 80(6): 7993-8037 (2024) - 2022
- [j13]Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Real-time event detection and classification in social text steam using embedding. Clust. Comput. 25(6): 3799-3817 (2022) - [j12]Daya Sagar Gupta, Sangram Ray, Tajinder Singh, Madhu Kumari:
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security. Comput. Commun. 181: 69-79 (2022) - [j11]Madhu Kumari, Prachi Ahlawat:
Intelligent Information Retrieval for Reducing Missed Cancer and Improving the Healthcare System. Int. J. Inf. Retr. Res. 12(1): 1-25 (2022) - [j10]Madhu Kumari, V. B. Singh, Meera Sharma:
Evaluating the Veracity of Software Bug Reports using Entropy-based Measures. Int. J. Open Source Softw. Process. 13(1): 1-21 (2022) - 2021
- [j9]Tajinder Singh, Madhu Kumari:
Burst: real-time events burst detection in social text stream. J. Supercomput. 77(10): 11228-11256 (2021) - 2020
- [c13]Madhu Kumari, Ujjawal Kumar Singh, Meera Sharma:
Entropy Based Machine Learning Models for Software Bug Severity Assessment in Cross Project Context. ICCSA (6) 2020: 939-953
2010 – 2019
- 2019
- [j8]Madhu Kumari, Ananya Misra, Sanjay Misra, Luis Fernández Sanz, Robertas Damasevicius, V. B. Singh:
Quantitative Quality Evaluation of Software Products by Considering Summary and Comments Entropy of a Reported Bug. Entropy 21(1): 91 (2019) - [j7]Mohammad Ahsan, Madhu Kumari, Teek Parval Sharma:
Rumors detection, verification and controlling mechanisms in online social networks: A survey. Online Soc. Networks Media 14 (2019) - [j6]Pritom Hazarika, Madhu Kumari:
Evolution of Modern Deep Learning Methods of Object Recognition. Res. Comput. Sci. 148(3): 71-79 (2019) - [j5]Meera Sharma, Madhu Kumari, V. B. Singh:
Multi-attribute dependent bug severity and fix time prediction modeling. Int. J. Syst. Assur. Eng. Manag. 10(5): 1328-1352 (2019) - [c12]Kumari Seema Rani, Madhu Kumari, V. B. Singh, Meera Sharma:
Deep Learning with Big Data: An Emerging Trend. ICCSA (7) 2019: 93-101 - [c11]Madhu Kumari, Tajinder Singh:
Food Image to Cooking Instructions Conversion Through Compressed Embeddings Using Deep Learning. ICDE Workshops 2019: 81-84 - [c10]Nilesh Nilesh, Madhu Kumari, Pritom Hazarika, Vishal Raman:
Recommendation of Indian Cuisine Recipes Based on Ingredients. ICDE Workshops 2019: 96-99 - 2018
- [j4]Mohammad Ahsan, Madhu Kumari, Tajinder Singh, Triveni Lal Pal:
Sentiment Based Information Diffusion in Online Social Networks. Int. J. Knowl. Discov. Bioinform. 8(1): 60-74 (2018) - [j3]Madhu Kumari, Meera Sharma, V. B. Singh:
Severity Assessment of a Reported Bug by Considering its Uncertainty and Irregular State. Int. J. Open Source Softw. Process. 9(4): 20-46 (2018) - [c9]Vishal Raman, Madhu Kumari:
Multimodal Deep Learning in Semantic Image Segmentation: A Review. CCIOT 2018: 7-11 - [c8]Kewei Sha, Madhu Kumari:
Patient Identification Based on Wrist Activity Data. CHASE 2018: 29-30 - [c7]Suryakanta Panda, Madhu Kumari, Samrat Mondal:
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. ICISS 2018: 129-145 - [c6]Madhu Kumari, V. B. Singh:
An Improved Classifier Based on Entropy and Deep Learning for Bug Priority Prediction. ISDA (1) 2018: 571-580 - [i1]Meera Sharma, Abhishek Tandon, Madhu Kumari, V. B. Singh:
Reduction of Redundant Rules in Association Rule Mining-Based Bug Assignment. CoRR abs/1807.08906 (2018) - 2017
- [j2]Utkarsh Rajput, Madhu Kumari:
Mobile robot path planning with modified ant colony optimisation. Int. J. Bio Inspired Comput. 9(2): 106-113 (2017) - [j1]Madhu Kumari, Singh Vijendra:
Big data analytics in healthcare: opportunities, challenges and techniques. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1): 35-58 (2017) - 2015
- [c5]Meera Sharma, Madhu Kumari, V. B. Singh:
The Way Ahead for Bug-fix time Prediction. QuASoQ/WAWSE/CMCE@APSEC 2015: 31-38 - [c4]Meera Sharma, Madhu Kumari, V. B. Singh:
Bug Assignee Prediction Using Association Rule Mining. ICCSA (4) 2015: 444-457 - [c3]Meera Sharma, Madhu Kumari, V. B. Singh:
Post Release Versions based Code Change Quality Metrics. WCI 2015: 235-243 - 2014
- [c2]Meera Sharma, Madhu Kumari, R. K. Singh, V. B. Singh:
Multiattribute Based Machine Learning Models for Severity Prediction in Cross Project Context. ICCSA (5) 2014: 227-241 - 2010
- [c1]Madhu Kumari, Kamal Kant Bharadwaj:
Revenue Estimation and Quantification in Sponsored Search Auctions: An Inductive Learning Approach. ICDEM 2010: 242-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint