default search action
Nilothpal Talukder
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Natalia Chen, Oinam Nganba Meetei, Nilothpal Talukder, Alexey Zankevich:
Leveling Up the Peloton Homescreen: A System and Algorithm for Dynamic Row Ranking. RecSys 2023: 1062-1066 - 2022
- [c14]Shayak Banerjee, Vijay Pappu, Nilothpal Talukder, Shoya Yoshida, Arnab Bhadury, Allison Schloss, Jasmine Paulino:
Timely Personalization at Peloton: A System and Algorithm for Boosting Time-Relevant Content. RecSys 2022: 494-498 - 2021
- [c13]Shayak Banerjee, Arnab Bhadury, Nilothpal Talukder, Santosh Thammana:
Personalizing Peloton: Combining Rankers and Filters To Balance Engagement and Business Goals. RecSys 2021: 575-576 - 2020
- [d1]Mohammed J. Zaki, Nilothpal Talukder:
Protein Graphs Dataset from PDB. Zenodo, 2020
2010 – 2019
- 2016
- [b1]Nilothpal Talukder:
Parallel subgraph mining on hybrid platforms : HPC systems, multi-cores and GPUs. Rensselaer Polytechnic Institute, USA, 2016 - [j4]Nilothpal Talukder, Mohammed J. Zaki:
A distributed approach for graph mining in massive networks. Data Min. Knowl. Discov. 30(5): 1024-1052 (2016) - [c12]Nilothpal Talukder, Mohammed J. Zaki:
Parallel graph mining with dynamic load balancing. IEEE BigData 2016: 3352-3359 - 2014
- [c11]Robert Kessl, Nilothpal Talukder, Pranay Anchuri, Mohammed J. Zaki:
Parallel Graph Mining with GPUs. BigMine 2014: 1-16 - 2013
- [c10]Ryan A. Rossi, Sonia Fahmy, Nilothpal Talukder:
A multi-level approach for evaluating internet topology generators. Networking 2013: 1-9 - 2010
- [j3]Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. J. Syst. Softw. 83(2): 253-270 (2010) - [j2]Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder:
A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment. Telecommun. Syst. 44(3-4): 221-240 (2010) - [c9]Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmagarmid, Hazem Elmeleegy, Mohamed Yakout:
Privometer: Privacy protection in social networks. ICDE Workshops 2010: 266-269 - [c8]Nilothpal Talukder, Sheikh Iqbal Ahamed:
Preventing multi-query attack in location-based services. WISEC 2010: 25-36
2000 – 2009
- 2009
- [j1]Sheikh Iqbal Ahamed, Haifeng Li, Nilothpal Talukder, Mehrab Monjur, Chowdhury Sharif Hasan:
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications. J. Syst. Softw. 82(10): 1657-1677 (2009) - 2008
- [c7]Sheikh Iqbal Ahamed, Nilothpal Talukder, Mehrab Monjur:
WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment. COMPSAC 2008: 335-338 - [c6]Nilothpal Talukder, Sheikh Iqbal Ahamed:
FPCS: A Formal Approach for Privacy-Aware Context-Based Services. COMPSAC 2008: 432-439 - [c5]Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder:
Service sharing with trust in pervasive environment: now it's time to break the jinx. SAC 2008: 1622-1628 - 2007
- [c4]K. M. Ibrahim Asif, Sheikh Iqbal Ahamed, Nilothpal Talukder:
Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. COMPSAC (2) 2007: 269-274 - [c3]Sheikh Iqbal Ahamed, Nilothpal Talukder, Munirul M. Haque:
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. MobiQuitous 2007: 1-6 - [c2]Nilothpal Talukder, Sheikh Iqbal Ahamed, Rezaul M. Abid:
Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment. MobiQuitous 2007: 1-8 - [c1]Rezwan Islam, Sheikh Iqbal Ahamed, Nilothpal Talukder, Ian Obermiller:
Usability of Mobile Computing Technologies to Assist Cancer Patients. USAB 2007: 227-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint