Follow
Shweta Singh
Shweta Singh
Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Detection and classification of emergent behaviors using multi-agent simulation framework (WIP)
S Singh, S Lu, MM Kokar, PA Kogut, L Martin
Proceedings of the Symposium on Modeling and Simulation of Complexity in …, 2017
262017
A fuzzy impulse noise filter based on boundary discriminative noise detection
OP Verma, S Singh
Journal of Information Processing Systems 9 (1), 89-102, 2013
122013
Comparative diagnosis of falciparum malaria infections by microscopy, two RDTs, and nested PCR in the three states of North-western Nigeria
R Singh, K Abdullahi, MDA Bunza, S Singh, K Kaitholia
J Biol Agric Healthc 3 (5), 31-39, 2013
92013
Simulation of scale-free correlation in swarms of UAVs
S Singh, MM Kokar
Unifying Themes in Complex Systems IX: Proceedings of the Ninth …, 2018
32018
Detection of Emergent Behaviors in Systems of Dynamical Systems Using Similitude Theory
S Singh
Winter Simulation Conference, 2017, 2017
22017
Detecting undesirable emergent behavior in teams of autonomous uass
P Kogut, M Kokar, S Singh, S Lu
Safe and Secure Systems and Software Symposium (S5), 2016
12016
Drainage Network Analysis of River Basin Using Remote Sensing and GIS
S Singh, K Chaubey, P Singh, OP Kumar, A Karmakar, T Subramani, ...
Modern River Science for Watershed Management: GIS and Hydrogeological …, 2024
2024
Developing an Ontology for Emergence Using Formal Concept Analysis
S Singh, MM Kokar, D Suresh
International Conference on Complex Systems, 109-122, 2020
2020
Dynamic Deployment of Communication Applications to Different Hardware Platforms using Ontological Representations
Y Chen, M Gungor, S Singh, A Tazin, MM Kokar, M Leeser
2018 IEEE High Performance extreme Computing Conference (HPEC), 1-6, 2018
2018
Detection and Learning of Unexpected Behaviors of Systems of Dynamical Systems by Using the Q2 Abstractions
S Lu, M Kokar, S Singh, Northeastern University Boston United States
2017
Modeling and Analyzing Wavelet based Watermarking System using Game Theoretic Optimization Technique
M Shweta, MA Tayal, MA Lathey
IJCSI, 408, 2011
2011
Decryption of MD5 encrypted key Password using Cloud Computing No Image
SS N. S. Raghava, Shweta, Amit Gupta, Gaurav Abrol, Sohil Gupta
CCV'10, 29-41, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–12