<?xml version="1.0"?>
<dblpperson name="Durgesh Kumar Mishra" pid="95/7253" n="29">
<person key="homepages/95/7253" mdate="2009-09-01">
<author pid="95/7253">Durgesh Kumar Mishra</author>
</person>
<r><inproceedings key="conf/ukci/ChandravanshiSM23" mdate="2024-02-13">
<author pid="132/9033">Kamlesh Chandravanshi</author>
<author pid="132/8936">Gaurav Soni</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling.</title>
<pages>325-335</pages>
<year>2023</year>
<booktitle>UKCI</booktitle>
<ee>https://doi.org/10.1007/978-3-031-47508-5_26</ee>
<crossref>conf/ukci/2023</crossref>
<url>db/conf/ukci/ukci2023.html#ChandravanshiSM23</url>
</inproceedings>
</r>
<r><article key="journals/access/ChandravanshiSM22" mdate="2025-03-03">
<author orcid="0000-0003-0569-0357" pid="132/9033">Kamlesh Chandravanshi</author>
<author orcid="0000-0001-7308-8777" pid="132/8936">Gaurav Soni</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Design and Analysis of an Energy-Efficient Load Balancing and Bandwidth Aware Adaptive Multipath N-Channel Routing Approach in MANET.</title>
<pages>110003-110025</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2022.3213051</ee>
<url>db/journals/access/access10.html#ChandravanshiSM22</url>
</article>
</r>
<r><inproceedings key="conf/dsmlai/MishraJM21" mdate="2025-03-03">
<author pid="310/9609">Ajai Mishra</author>
<author pid="06/2858">Dharm Singh Jat</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Machine Intelligence for Predicting New Start-ups Success: A Survey.</title>
<pages>99-105</pages>
<year>2021</year>
<booktitle>DSMLAI</booktitle>
<ee>https://doi.org/10.1145/3484824.3484919</ee>
<crossref>conf/dsmlai/2021</crossref>
<url>db/conf/dsmlai/dsmlai2021.html#MishraJM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wocn/JadonBM19" mdate="2025-03-03">
<author pid="260/9870">Priyanshu Jadon</author>
<author orcid="0000-0003-1203-1069" pid="261/0391">Deepshikha Bhatia</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN45266.2019.8995109</ee>
<crossref>conf/wocn/2019</crossref>
<url>db/conf/wocn/wocn2019.html#JadonBM19</url>
</inproceedings>
</r>
<r><proceedings key="conf/wir/2018" mdate="2020-03-09">
<editor pid="95/7253">Durgesh Kumar Mishra</editor>
<editor pid="14/6178-1">Xin-She Yang 0001</editor>
<editor pid="259/9172">Aynur Unal</editor>
<title>Data Science and Big Data Analytics, ACM-WIR 2018, Women In Research 2018, Indore, India, 5-6 January 2018</title>
<booktitle>WIR</booktitle>
<series href="db/series/lndect/index.html">Lecture Notes on Data Engineering and Communications Technologies</series>
<volume>16</volume>
<publisher>Springer</publisher>
<year>2019</year>
<isbn>978-981-10-7640-4</isbn>
<isbn>978-981-10-7641-1</isbn>
<ee>https://doi.org/10.1007/978-981-10-7641-1</ee>
<url>db/conf/wir/wir2018.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/wir/SheikhM18" mdate="2025-03-03">
<author orcid="0009-0001-9509-9693" pid="14/7661">Rashid Sheikh</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Secure Sum Computation Using Homomorphic Encryption.</title>
<pages>357-363</pages>
<year>2018</year>
<booktitle>WIR</booktitle>
<ee>https://doi.org/10.1007/978-981-10-7641-1_31</ee>
<crossref>conf/wir/2018</crossref>
<url>db/conf/wir/wir2018.html#SheikhM18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictcs2/SheikhM16" mdate="2025-03-03">
<author orcid="0009-0001-9509-9693" pid="14/7661">Rashid Sheikh</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Secure Sum Computation for Insecure Networks.</title>
<pages>102:1-102:7</pages>
<year>2016</year>
<booktitle>ICTCS</booktitle>
<ee>https://doi.org/10.1145/2905055.2905316</ee>
<url>db/conf/ictcs2/ictcs2016.html#SheikhM16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wir/AhujaMJ16" mdate="2025-03-03">
<author pid="259/9137">Kamlesh Ahuja</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="00/7626">Sarika Jain</author>
<title>A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set.</title>
<pages>139-141</pages>
<year>2016</year>
<booktitle>WIR</booktitle>
<ee>https://doi.org/10.1145/2909067.2909093</ee>
<crossref>conf/wir/2016</crossref>
<url>db/conf/wir/wir2016.html#AhujaMJ16</url>
</inproceedings>
</r>
<r><proceedings key="conf/wir/2016" mdate="2020-03-09">
<editor pid="95/7253">Durgesh Kumar Mishra</editor>
<editor pid="14/7661">Rashid Sheikh</editor>
<editor pid="00/7626">Sarika Jain</editor>
<title>WIR '16: Women in Research 2016, Indore India, March, 2016</title>
<publisher>ACM</publisher>
<booktitle>WIR</booktitle>
<year>2016</year>
<isbn>978-1-4503-4278-0</isbn>
<ee>https://doi.org/10.1145/2909067</ee>
<url>db/conf/wir/wir2016.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/ShuklaSM14" mdate="2018-08-13">
<author pid="21/7661">Samiksha Shukla</author>
<author pid="47/8326">G. Sadashivappa</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>Simulation of Collision Resistant Secure Sum Protocol.</title>
<year>2014</year>
<volume>abs/1411.7756</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1411.7756</ee>
<url>db/journals/corr/corr1411.html#ShuklaSM14</url>
</article>
</r>
<r><inproceedings key="conf/wocn/JoshiM12" mdate="2025-03-03">
<author orcid="0000-0003-3815-1261" pid="120/7788">Shubham Joshi</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>A survey on threats in routing security in manet for trust management using SMC protocols.</title>
<pages>1-6</pages>
<year>2012</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN.2012.6335557</ee>
<crossref>conf/wocn/2012</crossref>
<url>db/conf/wocn/wocn2012.html#JoshiM12</url>
</inproceedings>
</r>
<r><article key="journals/isjgp/SheikhMK11" mdate="2025-03-03">
<author orcid="0009-0001-9509-9693" pid="14/7661">Rashid Sheikh</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="01/7661">Beerendra Kumar</author>
<title>Secure Multiparty Computation: From Millionaires Problem to Anonymizer.</title>
<pages>25-33</pages>
<year>2011</year>
<volume>20</volume>
<journal>Inf. Secur. J. A Glob. Perspect.</journal>
<number>1</number>
<ee>https://doi.org/10.1080/19393555.2010.544701</ee>
<url>db/journals/isjgp/isjgp20.html#SheikhMK11</url>
</article>
</r>
<r><inproceedings key="conf/cicsyn/DoohanMT11" mdate="2025-03-03">
<author orcid="0000-0002-6688-0894" pid="73/10241">Nitika Vats Doohan</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author orcid="0000-0002-0845-0300" pid="19/6177">Sanjeev Tokekar</author>
<title>Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLAB.</title>
<pages>99-102</pages>
<year>2011</year>
<booktitle>CICSyN</booktitle>
<ee>https://doi.org/10.1109/CICSyN.2011.32</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CICSyN.2011.32</ee>
<crossref>conf/cicsyn/2011</crossref>
<url>db/conf/cicsyn/cicsyn2011.html#DoohanMT11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cicsyn/ChoudharyPNM11" mdate="2025-03-03">
<author pid="67/10241">Kavita Choudhary</author>
<author pid="60/10240">Umasanker Pandey</author>
<author pid="70/10242">Malay Kumar Nayak</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Electronic Data Interchange: A Review.</title>
<pages>323-327</pages>
<year>2011</year>
<booktitle>CICSyN</booktitle>
<ee>https://doi.org/10.1109/CICSyN.2011.74</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CICSyN.2011.74</ee>
<crossref>conf/cicsyn/2011</crossref>
<url>db/conf/cicsyn/cicsyn2011.html#ChoudharyPNM11</url>
</inproceedings>
</r>
<r><article key="journals/isjgp/MishraC10" mdate="2025-03-03">
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="37/2947">Manohar Chandwani</author>
<title>A Secured MultiParty Computational Protocol to Protect Cyber Space.</title>
<pages>175-181</pages>
<year>2010</year>
<volume>19</volume>
<journal>Inf. Secur. J. A Glob. Perspect.</journal>
<number>4</number>
<ee>https://doi.org/10.1080/19393550903532553</ee>
<url>db/journals/isjgp/isjgp19.html#MishraC10</url>
</article>
</r>
<r><inproceedings key="conf/wocn/LudhiyaniPJM10" mdate="2025-03-03">
<author pid="90/10016">Arpit Ludhiyani</author>
<author pid="99/7082">Rohit Pathak</author>
<author orcid="0009-0002-6011-5080" pid="27/7081">Satyadhar Joshi</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Strategic Game theory models and commercialization for Nano RFID systems.</title>
<pages>1-5</pages>
<year>2010</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN.2010.5587329</ee>
<crossref>conf/wocn/2010</crossref>
<url>db/conf/wocn/wocn2010.html#LudhiyaniPJM10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wocn/MishraPJL10" mdate="2025-03-03">
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="99/7082">Rohit Pathak</author>
<author orcid="0009-0002-6011-5080" pid="27/7081">Satyadhar Joshi</author>
<author pid="90/10016">Arpit Ludhiyani</author>
<title>Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network.</title>
<pages>1-6</pages>
<year>2010</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN.2010.5587326</ee>
<crossref>conf/wocn/2010</crossref>
<url>db/conf/wocn/wocn2010.html#MishraPJL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wocn/PathakJML10" mdate="2025-03-03">
<author pid="99/7082">Rohit Pathak</author>
<author orcid="0009-0002-6011-5080" pid="27/7081">Satyadhar Joshi</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="90/10016">Arpit Ludhiyani</author>
<title>Tri-TTP based architecture for Secure Multi-Party Computations using Virtual Parties.</title>
<pages>1-6</pages>
<year>2010</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN.2010.5587324</ee>
<crossref>conf/wocn/2010</crossref>
<url>db/conf/wocn/wocn2010.html#PathakJML10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wocn/SheikhCM10" mdate="2025-03-03">
<author orcid="0009-0001-9509-9693" pid="14/7661">Rashid Sheikh</author>
<author pid="14/10017">Mahakal Singh Chande</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Security issues in MANET: A review.</title>
<pages>1-4</pages>
<year>2010</year>
<booktitle>WOCN</booktitle>
<ee>https://doi.org/10.1109/WOCN.2010.5587317</ee>
<crossref>conf/wocn/2010</crossref>
<url>db/conf/wocn/wocn2010.html#SheikhCM10</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1002-2409" mdate="2018-08-13">
<author pid="14/7661">Rashid Sheikh</author>
<author pid="01/7661">Beerendra Kumar</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation</title>
<ee type="oa">http://arxiv.org/abs/1002.2409</ee>
<year>2010</year>
<journal>CoRR</journal>
<volume>abs/1002.2409</volume>
<url>db/journals/corr/corr1002.html#abs-1002-2409</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1002-4000" mdate="2018-08-13">
<author pid="14/7661">Rashid Sheikh</author>
<author pid="01/7661">Beerendra Kumar</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>A Modified ck-Secure Sum Protocol for Multi-Party Computation</title>
<ee type="oa">http://arxiv.org/abs/1002.4000</ee>
<year>2010</year>
<journal>CoRR</journal>
<volume>abs/1002.4000</volume>
<url>db/journals/corr/corr1002.html#abs-1002-4000</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1003-4071" mdate="2018-08-13">
<author pid="14/7661">Rashid Sheikh</author>
<author pid="01/7661">Beerendra Kumar</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations</title>
<ee type="oa">http://arxiv.org/abs/1003.4071</ee>
<year>2010</year>
<journal>CoRR</journal>
<volume>abs/1003.4071</volume>
<url>db/journals/corr/corr1003.html#abs-1003-4071</url>
</article>
</r>
<r><inproceedings key="conf/cicsyn/SatheeshMP09" mdate="2025-03-03">
<author pid="06/10242">Ajita Satheesh</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="13/7943">Ravindra Patel</author>
<title>Classification Rule Mining for Object Oriented Databases: A Brief Review.</title>
<pages>259-263</pages>
<year>2009</year>
<booktitle>CICSyN</booktitle>
<ee>https://doi.org/10.1109/CICSYN.2009.60</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CICSYN.2009.60</ee>
<crossref>conf/cicsyn/2009</crossref>
<url>db/conf/cicsyn/cicsyn2009.html#SatheeshMP09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icetet/ShaikhBPPM09" mdate="2025-03-03">
<author pid="81/7797">Zulfa Shaikh</author>
<author pid="50/7796">Dinesh Bhati</author>
<author pid="59/7797">D. M. Puntambekar</author>
<author pid="30/7799">Pushpa Pathak</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>Congestion Control during Data Privacy in Secure Multiparty Computation.</title>
<pages>330-332</pages>
<year>2009</year>
<booktitle>ICETET</booktitle>
<ee>https://doi.org/10.1109/ICETET.2009.63</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICETET.2009.63</ee>
<crossref>conf/icetet/2009</crossref>
<url>db/conf/icetet/icetet2009.html#ShaikhBPPM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icetet/SethiMSM09" mdate="2025-03-03">
<author orcid="0009-0004-2668-7792" pid="82/7798">Kamal K. Sethi</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="54/7798">Gopal Solanki</author>
<author pid="36/7800">Bharat Mishra</author>
<title>Key Issues of Security and Integrity in Third Party Association Rule Mining.</title>
<pages>337-340</pages>
<year>2009</year>
<booktitle>ICETET</booktitle>
<ee>https://doi.org/10.1109/ICETET.2009.136</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICETET.2009.136</ee>
<crossref>conf/icetet/2009</crossref>
<url>db/conf/icetet/icetet2009.html#SethiMSM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icetet/GuptaTM09" mdate="2025-03-03">
<author pid="45/5942">Richa Gupta</author>
<author orcid="0000-0002-0845-0300" pid="19/6177">Sanjiv Tokekar</author>
<author orcid="0000-0003-3466-4529" pid="95/7253">Durgesh Kumar Mishra</author>
<title>A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security.</title>
<pages>346-351</pages>
<year>2009</year>
<booktitle>ICETET</booktitle>
<ee>https://doi.org/10.1109/ICETET.2009.16</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICETET.2009.16</ee>
<crossref>conf/icetet/2009</crossref>
<url>db/conf/icetet/icetet2009.html#GuptaTM09</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-0908-0994" mdate="2018-08-13">
<author pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="74/7255">Neha Koria</author>
<author pid="69/7253">Nikhil Kapoor</author>
<author pid="25/7254">Ravish Bahety</author>
<title>A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining</title>
<ee type="oa">http://arxiv.org/abs/0908.0994</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0908.0994</volume>
<url>db/journals/corr/corr0908.html#abs-0908-0994</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-0912-0956" mdate="2018-08-13">
<author pid="14/7661">Rashid Sheikh</author>
<author pid="01/7661">Beerendra Kumar</author>
<author pid="95/7253">Durgesh Kumar Mishra</author>
<title>Privacy Preserving k Secure Sum Protocol</title>
<ee type="oa">http://arxiv.org/abs/0912.0956</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0912.0956</volume>
<url>db/journals/corr/corr0912.html#abs-0912-0956</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-0912-3984" mdate="2018-08-13">
<author pid="95/7253">Durgesh Kumar Mishra</author>
<author pid="21/7661">Samiksha Shukla</author>
<title>Multi-Agent Model using Secure Multi-Party Computing in e-Governance</title>
<ee type="oa">http://arxiv.org/abs/0912.3984</ee>
<year>2009</year>
<journal>CoRR</journal>
<volume>abs/0912.3984</volume>
<url>db/journals/corr/corr0912.html#abs-0912-3984</url>
</article>
</r>
<coauthors n="38" nc="13">
<co c="0"><na f="a/Ahuja:Kamlesh" pid="259/9137">Kamlesh Ahuja</na></co>
<co c="4"><na f="b/Bahety:Ravish" pid="25/7254">Ravish Bahety</na></co>
<co c="1"><na f="b/Bhati:Dinesh" pid="50/7796">Dinesh Bhati</na></co>
<co c="8"><na f="b/Bhatia:Deepshikha" pid="261/0391">Deepshikha Bhatia</na></co>
<co c="0"><na f="c/Chande:Mahakal_Singh" pid="14/10017">Mahakal Singh Chande</na></co>
<co c="12"><na f="c/Chandravanshi:Kamlesh" pid="132/9033">Kamlesh Chandravanshi</na></co>
<co c="-1"><na f="c/Chandwani:Manohar" pid="37/2947">Manohar Chandwani</na></co>
<co c="3"><na f="c/Choudhary:Kavita" pid="67/10241">Kavita Choudhary</na></co>
<co c="2"><na f="d/Doohan:Nitika_Vats" pid="73/10241">Nitika Vats Doohan</na></co>
<co c="2"><na f="g/Gupta:Richa" pid="45/5942">Richa Gupta</na></co>
<co c="8"><na f="j/Jadon:Priyanshu" pid="260/9870">Priyanshu Jadon</na></co>
<co c="0"><na f="j/Jain:Sarika" pid="00/7626">Sarika Jain</na></co>
<co c="11"><na f="j/Jat:Dharm_Singh" pid="06/2858">Dharm Singh Jat</na></co>
<co c="5"><na f="j/Joshi:Satyadhar" pid="27/7081">Satyadhar Joshi</na></co>
<co c="-1"><na f="j/Joshi:Shubham" pid="120/7788">Shubham Joshi</na></co>
<co c="4"><na f="k/Kapoor:Nikhil" pid="69/7253">Nikhil Kapoor</na></co>
<co c="4"><na f="k/Koria:Neha" pid="74/7255">Neha Koria</na></co>
<co c="0"><na f="k/Kumar:Beerendra" pid="01/7661">Beerendra Kumar</na></co>
<co c="5"><na f="l/Ludhiyani:Arpit" pid="90/10016">Arpit Ludhiyani</na></co>
<co c="11"><na f="m/Mishra:Ajai" pid="310/9609">Ajai Mishra</na></co>
<co c="6"><na f="m/Mishra:Bharat" pid="36/7800">Bharat Mishra</na></co>
<co c="3"><na f="n/Nayak:Malay_Kumar" pid="70/10242">Malay Kumar Nayak</na></co>
<co c="3"><na f="p/Pandey:Umasanker" pid="60/10240">Umasanker Pandey</na></co>
<co c="7"><na f="p/Patel:Ravindra" pid="13/7943">Ravindra Patel</na></co>
<co c="1"><na f="p/Pathak:Pushpa" pid="30/7799">Pushpa Pathak</na></co>
<co c="5"><na f="p/Pathak:Rohit" pid="99/7082">Rohit Pathak</na></co>
<co c="1"><na f="p/Puntambekar:D=_M=" pid="59/7797">D. M. Puntambekar</na></co>
<co c="9"><na f="s/Sadashivappa:G=" pid="47/8326">G. Sadashivappa</na></co>
<co c="7"><na f="s/Satheesh:Ajita" pid="06/10242">Ajita Satheesh</na></co>
<co c="6"><na f="s/Sethi:Kamal_K=" pid="82/7798">Kamal K. Sethi</na></co>
<co c="1"><na f="s/Shaikh:Zulfa" pid="81/7797">Zulfa Shaikh</na></co>
<co c="0"><na f="s/Sheikh:Rashid" pid="14/7661">Rashid Sheikh</na></co>
<co c="9"><na f="s/Shukla:Samiksha" pid="21/7661">Samiksha Shukla</na></co>
<co c="6"><na f="s/Solanki:Gopal" pid="54/7798">Gopal Solanki</na></co>
<co c="12"><na f="s/Soni:Gaurav" pid="132/8936">Gaurav Soni</na></co>
<co c="2" n="2"><na f="t/Tokekar:Sanjiv" pid="19/6177">Sanjiv Tokekar</na><na>Sanjeev Tokekar</na></co>
<co c="10"><na f="u/Unal:Aynur" pid="259/9172">Aynur Unal</na></co>
<co c="10"><na f="y/Yang_0001:Xin=She" pid="14/6178-1">Xin-She Yang 0001</na></co>
</coauthors>
</dblpperson>

