2009 |
20 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
What makes conversations interesting?: themes, participants and consequences of conversations in online social media.
WWW 2009: 331-340 |
2008 |
19 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
Multi-scale characterization of social network dynamics in the blogosphere.
CIKM 2008: 1515-1516 |
18 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
Dynamic prediction of communication flow using social context.
Hypertext 2008: 49-54 |
17 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
Can blog communication dynamics be correlated with stock market activity?
Hypertext 2008: 55-60 |
16 | EE | Ajita John,
Lada A. Adamic,
Marc Davis,
Frank Nack,
David A. Shamma,
Dorée D. Seligmann:
The future of online social interactions: what to expect in 2020.
WWW 2008: 1255-1256 |
2007 |
15 | EE | Adithya Renduchintala,
Shreeharsh Kelkar,
Ajita John,
Dorée D. Seligmann:
Designing for persistent audio conversations in the enterprise.
DUX 2007: 11 |
14 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
Context Aware Routing of Enterprise User Communications.
PerCom Workshops 2007: 39-44 |
13 | EE | Munmun De Choudhury,
Hari Sundaram,
Ajita John,
Dorée D. Seligmann:
Contextual Prediction of Communication Flow in Social Networks.
Web Intelligence 2007: 57-65 |
2006 |
12 | EE | Ajita John,
Reinhard Klemm,
Ankur Mani,
Dorée D. Seligmann:
Hermes: A Platform for Context-Aware Enterprise Communication.
PerCom Workshops 2006: 62-69 |
2005 |
11 | EE | Parminder Chhabra,
Ajita John,
Huzur Saran:
PISA: Automatic Extraction of Traffic Signatures.
NETWORKING 2005: 730-742 |
2004 |
10 | | Ajita John,
Burkhard Stiller:
Distributed Management of Networks.
J. Network Syst. Manage. 12(2): (2004) |
2003 |
9 | | Ajita John,
Binay Sugla,
Hari Krishnan,
Edwin Park,
Arni Raghu,
Roshan Sequiera,
Ajay Wanchoo:
An Architecture for Provisioning IP Services in an Operations Support System.
Integrated Network Management 2003: 455-458 |
2002 |
8 | EE | Parminder Chhabra,
Shobhit Chuig,
Anurag Goel,
Ajita John,
Abhishek Kumar,
Huzur Saran,
Rajeev Shorey:
XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways.
ICNP 2002: 186-187 |
1999 |
7 | EE | Ajita John,
Keith Vanderveen,
Binay Sugla:
An XML-based Framework for Dynamic SNMP MIB Extension.
DSOM 1999: 107-120 |
6 | | Mark Bearden,
Ajita John,
Keith Vanderveen:
Implementing Policy-based Network Management through Automated Plan Generation.
IC-AI 1999: 459-464 |
1998 |
5 | | Ajita John,
James C. Browne:
Compilation of Constraint Programs with Noncyclic and Cyclic Dependencies to Procedural Parallel Programs.
International Journal of Parallel Programming 26(1): 65-119 (1998) |
1997 |
4 | EE | David Lee,
Arun N. Netravali,
Krishan K. Sabnani,
Binay Sugla,
Ajita John:
Passive testing and applications to network management.
ICNP 1997: 113- |
1996 |
3 | | Ajita John,
James C. Browne:
Compilation of Constraint Systems to Procedural Parallel Programs.
LCPC 1996: 501-518 |
2 | | Ajita John,
James C. Browne:
Extraction of Parallelism from Constraint Specifications.
PDPTA 1996: 1501-1512 |
1994 |
1 | EE | Joydeep Ghosh,
Sajal K. Das,
Ajita John:
Concurrent Processing of Linearly Ordered Data Structures on Hypercube Multicomputers.
IEEE Trans. Parallel Distrib. Syst. 5(9): 898-911 (1994) |