Follow
Suman Roy
Title
Cited by
Cited by
Year
An empirical study of error patterns in industrial business process models
S Roy, ASM Sajeev, S Bihary, A Ranjan
IEEE Transactions on Services Computing 7 (2), 140-153, 2013
512013
An efficient XML to OWL converter
D Lacoste, KP Sawant, S Roy
Proceedings of the 4th India software engineering conference, 145-154, 2011
312011
Completeness of neighbourhood logic
R Barua, S Roy, Z Chaochen
Journal of Logic and Computation 10 (2), 271-295, 2000
302000
System and method for checking the conformance of the behavior of a process
S Roy, SS Bihary, M Khattri
US Patent App. 13/418,316, 2013
242013
A finite state analysis of time-triggered CAN (TTCAN) protocol using spin
I Saha, S Roy
2007 International Conference on Computing: Theory and Applications (ICCTA …, 2007
242007
Clustering and labeling IT maintenance tickets
S Roy, DP Muni, JJY Tack Yan, N Budhiraja, F Ceiler
Service-Oriented Computing: 14th International Conference, ICSOC 2016, Banff …, 2016
232016
A ZKP-based identification scheme for base nodes in wireless sensor networks
D Anshul, S Roy
Proceedings of the 2005 ACM symposium on Applied computing, 319-323, 2005
222005
Notes on neighbourhood logic
S Roy, Z Chaochen
Technical report, UNU/IIST Report No. 97, UNU/IIST, 1997
211997
A numerical method for the hyperbolic-heat conduction equation based on multiple scale technique
S Roy, ASV Murthy, RB Kudenatti
Applied numerical mathematics 59 (6), 1419-1430, 2009
192009
Defending against sybil attacks in sensor networks
S Banerjee, D Mukhopadhyay, S Roy
US Patent App. 11/258,976, 2007
182007
Formal verification of fault-tolerant startup algorithms for time-triggered architectures: a survey
I Saha, S Roy, S Ramesh
Proceedings of the IEEE 104 (5), 904-922, 2016
172016
A finite state modeling of AFDX frame management using spin
I Saha, S Roy
Formal Methods: Applications and Technology: 11th International Workshop …, 2007
142007
Recommending resolutions of itil services tickets using deep neural network
DP Muni, S Roy, YTYJJL Chiang, AJM Viallet, N Budhiraja
Proceedings of the 4th ACM IKDD Conferences on Data Sciences, 1-10, 2017
132017
A framework for security quantification of networked machines
H Wang, S Roy, A Das, S Paul
2010 Second International Conference on COMmunication Systems and NETworks …, 2010
132010
Timeout and calendar based finite state modeling and verification of real-time systems
I Saha, J Misra, S Roy
International Symposium on Automated Technology for Verification and …, 2007
132007
Computationally and resource efficient group key agreement for ad hoc sensor networks
DR Choudhary, D Anshul, S Roy, CS Thejaswi
2007 2nd International Conference on Communication Systems Software and …, 2007
122007
Deriving requirements model from textual use cases
KP Sawant, S Roy, S Sripathi, F Plesse, ASM Sajeev
Companion Proceedings of the 36th International Conference on Software …, 2014
112014
Method and apparatus for managing process flow
S Roy, KP Sawant
US Patent App. 13/173,568, 2013
112013
An unsupervised approach to assignment of pre-defined labels to text documents
S Roy, S Kumar, A Kumar, VV Malladi, R Chetlangia, P Pratap
US Patent App. 16/930,862, 2022
102022
Modeling a sensor network design to secure a network against attack
SSR Roy, D Mukhopadhyay, CT PS
US Patent 7,804,962, 2010
102010
The system can't perform the operation now. Try again later.
Articles 1–20