default search action
Ashish Arora
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j24]Ashish Arora, Sharon Belenzon, Jungkyu Suh:
Science and the Market for Technology. Manag. Sci. 68(10): 7176-7201 (2022) - 2021
- [j23]Ashish Arora, Andrea Fosfuri, Thomas Rønde:
Waiting for the Payday? The Market for Startups and the Timing of Entrepreneurial Exit. Manag. Sci. 67(3): 1453-1467 (2021) - [j22]Ashish Arora, Sharon Belenzon, Andrea Patacconi:
Knowledge Sharing in Alliances and Alliance Portfolios. Manag. Sci. 67(3): 1569-1585 (2021) - [c15]Matthew Wiesner, Mousmita Sarma, Ashish Arora, Desh Raj, Dongji Gao, Ruizhe Huang, Supreet Preet, Moris Johnson, Zikra Iqbal, Nagendra Goel, Jan Trmal, Leibny Paola García-Perera, Sanjeev Khudanpur:
Training Hybrid Models on Noisy Transliterated Transcripts for Code-Switched Speech Recognition. Interspeech 2021: 2906-2910 - 2020
- [j21]Avantika Singh, Ashish Arora, Aditya Nigam:
Cancelable Iris template generation by aggregating patch level ordinal relations with its holistically extended performance and security analysis. Image Vis. Comput. 104: 104017 (2020) - [j20]Avantika Singh, Ashish Arora, Gaurav Jaswal, Aditya Nigam:
Comprehensive survey on cancelable biometrics with novel case study on finger dorsal template protection. J. Bank. Financial Technol. 4(1): 37-52 (2020) - [c14]Ashish Arora, Niloufar Shoeibi, Vishwani Sati, Alfonso González-Briones, Pablo Chamoso, Emilio Corchado:
Data Augmentation Using Gaussian Mixture Model on CSV Files. DCAI 2020: 258-265 - [c13]Ruizhe Huang, Ke Li, Ashish Arora, Daniel Povey, Sanjeev Khudanpur:
Efficient MDI Adaptation for n-Gram Language Models. INTERSPEECH 2020: 4916-4920 - [c12]Vishwani Sati, Sergio Márquez Sánchez, Niloufar Shoeibi, Ashish Arora, Juan M. Corchado:
Face Detection and Recognition, Face Emotion Recognition Through NVIDIA Jetson Nano. ISAmI 2020: 177-185 - [c11]Sergio Márquez Sánchez, Francisco Lecumberri, Vishwani Sati, Ashish Arora, Niloufar Shoeibi, Sara Rodríguez, Juan M. Corchado Rodríguez:
Edge Computing Driven Smart Personal Protective System Deployed on NVIDIA Jetson and Integrated with ROS. PAAMS (Workshops) 2020: 385-393 - [i4]Ashish Arora, Desh Raj, Aswin Shanmugam Subramanian, Ke Li, Bar Ben-Yair, Matthew Maciejewski, Piotr Zelasko, Paola García, Shinji Watanabe, Sanjeev Khudanpur:
The JHU Multi-Microphone Multi-Speaker ASR System for the CHiME-6 Challenge. CoRR abs/2006.07898 (2020) - [i3]Ruizhe Huang, Ke Li, Ashish Arora, Daniel Povey, Sanjeev Khudanpur:
Efficient MDI Adaptation for n-gram Language Models. CoRR abs/2008.02385 (2020)
2010 – 2019
- 2019
- [c10]Chun-Chieh Chang, Ashish Arora, Leibny Paola García-Perera, David Etter, Daniel Povey, Sanjeev Khudanpur:
Optical Character Recognition with Chinese and Korean Character Decomposition. WML@ICDAR 2019: 134-139 - [c9]Ashish Arora, Paola García, Shinji Watanabe, Vimal Manohar, Yiwen Shao, Sanjeev Khudanpur, Chun-Chieh Chang, Babak Rekabdar, Bagher BabaAli, Daniel Povey, David Etter, Desh Raj, Hossein Hadian, Jan Trmal:
Using ASR Methods for OCR. ICDAR 2019: 663-668 - [c8]Avantika Singh, Ashish Arora, Shreya Hasmukh Patel, Gaurav Jaswal, Aditya Nigam:
FDFNet: A Secure Cancelable Deep Finger Dorsal Template Generation Network Secured via. Bio-Hashing. ISBA 2019: 1-9 - 2018
- [c7]Akshay Rangamani, Anirbit Mukherjee, Amitabh Basu, Ashish Arora, Tejaswini Ganapathi, Sang (Peter) Chin, Trac D. Tran:
Sparse Coding and Autoencoders. ISIT 2018: 36-40 - [i2]Avantika Singh, Ashish Arora, Shreya Hasmukh Patel, Gaurav Jaswal, Aditya Nigam:
FDFNet : A Secure Cancelable Deep Finger Dorsal Template Generation Network Secured via. Bio-Hashing. CoRR abs/1812.05308 (2018) - 2017
- [c6]Neeraj Kumar, Ruchika Verma, Ashish Arora, Abhay Kumar, Sanchit Gupta, Amit Sethi, Peter H. Gann:
Convolutional neural networks for prostate cancer recurrence prediction. Digital Pathology 2017: 101400H - [i1]Akshay Rangamani, Anirbit Mukherjee, Ashish Arora, Tejaswini Ganapathy, Amitabh Basu, Sang (Peter) Chin, Trac D. Tran:
Critical Points Of An Autoencoder Can Provably Recover Sparsely Used Overcomplete Dictionaries. CoRR abs/1708.03735 (2017) - 2013
- [j19]Ashish Arora, Andrea Fosfuri, Thomas Rønde:
Managing Licensing in a Market for Technology. Manag. Sci. 59(5): 1092-1106 (2013) - 2012
- [c5]Rakesh S., Kailash Atal, Ashish Arora, Pulak Purkait, Bhabatosh Chanda:
Face Image Retrieval Based on Probe Sketch Using SIFT Feature Descriptors. PerMIn 2012: 50-57 - 2011
- [j18]Ashish Arora, Anand Nandkumar:
Cash-Out or Flameout! Opportunity Cost and Entrepreneurial Strategy: Theory, and Evidence from the Information Security Industry. Manag. Sci. 57(10): 1844-1860 (2011) - 2010
- [j17]Ashish Arora, Chris Forman, Anand Nandkumar, Rahul Telang:
Competition and patching of security vulnerabilities: An empirical analysis. Inf. Econ. Policy 22(2): 164-177 (2010) - [j16]Ashish Arora, Chris Forman, Ji Woong Yoon:
Complementarity and information technology adoption: Local area networks and the Internet. Inf. Econ. Policy 22(3): 228-242 (2010) - [j15]Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang:
An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure. Inf. Syst. Res. 21(1): 115-132 (2010)
2000 – 2009
- 2009
- [j14]Ashish Arora, Matej Drev, Chris Forman:
Economic and business dimensions - The extent of globalization of software innovation. Commun. ACM 52(2): 20-22 (2009) - [j13]Ashish Arora, Alfonso Gambardella, Laura Magazzini, Fabio Pammolli:
A Breath of Fresh Air? Firm Type, Scale, Scope, and Selection Effects in Drug Development. Manag. Sci. 55(10): 1638-1653 (2009) - 2008
- [j12]Ashish Arora, Rahul Telang, Hao Xu:
Optimal Policy for Software Vulnerability Disclosure. Manag. Sci. 54(4): 642-656 (2008) - 2007
- [j11]Ashish Arora, Chris Forman:
Proximity and Information Technology Outsourcing: How Local Are IT Services Markets? J. Manag. Inf. Syst. 24(2): 73-102 (2007) - [j10]Ashish Arora, Amy Greenwald, Karthik N. Kannan, Ramayya Krishnan:
Effects of Information-Revelation Policies Under Market-Structure Uncertainty. Manag. Sci. 53(8): 1234-1248 (2007) - [c4]Ashish Arora, Chris Forman:
Proximity and Software Programming: IT Outsourcing and the Local Market. HICSS 2007: 211 - 2006
- [j9]Ashish Arora, Anand Nandkumar, Rahul Telang:
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Inf. Syst. Frontiers 8(5): 350-362 (2006) - [j8]Ashish Arora, Marco Ceccagnoli:
Patent Protection, Complementary Assets, and Firms' Incentives for Technology Licensing. Manag. Sci. 52(2): 293-308 (2006) - [j7]Ashish Arora, Jonathan P. Caulkins, Rahul Telang:
Research Note - Sell First, Fix Later: Impact of Patching on Software Quality. Manag. Sci. 52(3): 465-471 (2006) - [c3]Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang:
An Empirical Analysis of Software Vendors' Patching Behavior: Impact of Vulnerability Disclosure. ICIS 2006: 22 - [c2]Ashish Arora, Chris Forman, Anand Nandkumar, Rahul Telang:
Competitive and Strategic Effects in the Timing of Patch Release. WEIS 2006 - 2005
- [j6]Ashish Arora, Rahul Telang:
Economics of Software Vulnerability Disclosure. IEEE Secur. Priv. 3(1): 20-25 (2005) - [j5]Ashish Arora, Andrea Fosfuri:
Pricing Diagnostic Information. Manag. Sci. 51(7): 1092-1100 (2005) - [j4]Christopher Scaffidi, Ashish Arora, Shawn A. Butler, Mary Shaw:
A value-based approach to predicting system properties from design. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [c1]Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang:
An Empirical Analysis of Vendor Response to Disclosure Policy. WEIS 2005 - 2004
- [j3]Ashish Arora, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, Rahul Telang:
Measuring the Risk-Based Value of IT Security Solutions. IT Prof. 6(6): 35-42 (2004) - 2002
- [j2]Ashish Arora, Suma Athreye:
The software industry and India's economic development. Inf. Econ. Policy 14(2): 253-273 (2002) - 2000
- [j1]Ashish Arora, Gregory Cooper, Ramayya Krishnan, Rema Padman:
IBIZA: E-market Infrastructure for Custom-built Information Products. Inf. Syst. Frontiers 2(1): 65-84 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint