Follow
Shweta Singh
Shweta Singh
Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Detection and classification of emergent behaviors using multi-agent simulation framework (WIP)
S Singh, S Lu, MM Kokar, PA Kogut, L Martin
Proceedings of the Symposium on Modeling and Simulation of Complexity in …, 2017
282017
Comparative diagnosis of falciparum malaria infections by microscopy, two RDTs, and nested PCR in the three states of North-western Nigeria
R Singh, K Abdullahi, MDA Bunza, S Singh, K Kaitholia
J Biol Agric Healthc 3 (5), 31-39, 2013
102013
A fuzzy impulse noise filter based on boundary discriminative noise detection
OP Verma, S Singh
Journal of Information Processing Systems 9 (1), 89-102, 2013
102013
Simulation of scale-free correlation in swarms of UAVs
S Singh, MM Kokar
Unifying Themes in Complex Systems IX: Proceedings of the Ninth …, 2018
32018
Detection of Emergent Behaviors in Systems of Dynamical Systems Using Similitude Theory
S Singh
Winter Simulation Conference, 2017, 2017
22017
Developing an Ontology for Emergence Using Formal Concept Analysis
S Singh, MM Kokar, D Suresh
International Conference on Complex Systems, 109-122, 2020
12020
Detecting undesirable emergent behavior in teams of autonomous uass
P Kogut, M Kokar, S Singh, S Lu
Safe and Secure Systems and Software Symposium (S5), 2016
12016
Drainage Network Analysis of River Basin Using Remote Sensing and GIS
S Singh, K Chaubey, P Singh, OP Kumar, A Karmakar, T Subramani, ...
Modern River Science for Watershed Management: GIS and Hydrogeological …, 2024
2024
Dynamic Deployment of Communication Applications to Different Hardware Platforms using Ontological Representations
Y Chen, M Gungor, S Singh, A Tazin, MM Kokar, M Leeser
2018 IEEE High Performance extreme Computing Conference (HPEC), 1-6, 2018
2018
Detection and Learning of Unexpected Behaviors of Systems of Dynamical Systems by Using the Q2 Abstractions
S Lu, M Kokar, S Singh, Northeastern University Boston United States
2017
Modeling and Analyzing Wavelet based Watermarking System using Game Theoretic Optimization Technique
M Shweta, MA Tayal, MA Lathey
IJCSI, 408, 2011
2011
Decryption of MD5 encrypted key Password using Cloud Computing No Image
SS N. S. Raghava, Shweta, Amit Gupta, Gaurav Abrol, Sohil Gupta
CCV'10, 29-41, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–12