default search action
Neela Sawant
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Neela Sawant, Srinivasan H. Sengamedu:
Code Compliance Assessment as a Learning Problem. ICSE-SEIP 2023: 445-454 - 2022
- [c12]Neela Sawant, Srinivasan H. Sengamedu:
Learning-based Identification of Coding Best Practices from Software Documentation. ICSME 2022: 533-542 - [i2]Neela Sawant, Srinivasan H. Sengamedu:
Code Compliance Assessment as a Learning Problem. CoRR abs/2209.04602 (2022)
2010 – 2019
- 2018
- [i1]Neela Sawant, Chitti Babu Namballa, Narayanan Sadagopan, Houssam Nassif:
Contextual Multi-Armed Bandits for Causal Marketing. CoRR abs/1810.01859 (2018) - 2016
- [c11]Xin Lu, Neela Sawant, Michelle G. Newman, Reginald B. Adams Jr., James Z. Wang, Jia Li:
Identifying Emotions Aroused from Paintings. ECCV Workshops (1) 2016: 48-63 - 2013
- [j2]Neela Sawant, James Ze Wang, Jia Li:
Enhancing Training Collections for Image Annotation: An Instance-Weighted Mixture Modeling Approach. IEEE Trans. Image Process. 22(9): 3562-3577 (2013) - 2012
- [c10]Mingyi Zhao, Chen Zhong, Richard Ciamaichelo, Michael Konek, Neela Sawant, Nicklaus A. Giacobe:
Federating geovisual analytic tools for cyber security analysis. IEEE VAST 2012: 303-304 - 2011
- [j1]Neela Sawant, Jia Li, James Ze Wang:
Automatic image semantic interpretation using social action and tagging data. Multim. Tools Appl. 51(1): 213-246 (2011) - [c9]Neela Sawant:
Modeling tagged photos for automatic image annotation. ACM Multimedia 2011: 865-866 - [c8]Guifang Duan, Neela Sawant, James Ze Wang, Dean R. Snow, Danni Ai, Yen-Wei Chen:
Analysis of cypriot icon faces using ICA-enhanced active shape model representation. ACM Multimedia 2011: 901-904 - 2010
- [c7]Neela Sawant, Ritendra Datta, Jia Li, James Ze Wang:
Quest for relevant tags using local interaction networks and visual content. Multimedia Information Retrieval 2010: 231-240 - [c6]Zhu Liu, Eric Zavesky, Behzad Shahraray, Neela Sawant:
AT&T Research at TRECVID 2010. TRECVID 2010
2000 – 2009
- 2008
- [c5]Srinivasan H. Sengamedu, Neela Sawant:
Finding near-duplicate images on the web using fingerprints. ACM Multimedia 2008: 881-884 - 2007
- [c4]Srinivasan H. Sengamedu, Neela Sawant, Smita Wadhwa:
vADeo: video advertising system. ACM Multimedia 2007: 455-456 - 2006
- [c3]Neela Sawant, Sharat Chandran, B. Krishna Mohan:
Retrieving Images for Remote Sensing Applications. ICVGIP 2006: 849-860 - [c2]Nithya Manickam, Neela Sawant, Aman Parnami, Srikanth Lingamneni, Sharat Chandran:
Indian Institute of Technology, Bombay at TRECVID 2006. TRECVID 2006 - 2005
- [c1]Nithya Manickam, Neela Sawant, Deepali Singla, Sharat Chandran:
Indian Institute of Technology, Bombay at TRECVID 2005. TRECVID 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint