Computer Science & Engineering Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 122
Issue DateTitleAuthor(s)
2010Reversible Fragile Medical Image Watermarking with Zero DistortionDharwadkar, Nagaraj V.; Amberker, B. B.; Supriya; Panchannavar, Prateeksha B.
2008ON Chip LDO voltage regulator with improved transient response in 180nmRao, Patri Sreehari; Prasad, K. S. R. Krishna
2008New Method to Compute Auxiliary keys in LKH based Secure Group Key Management SchemeAparna, R; Amberker, B.B
2010Privacy Preserving Outlier Detection using Hierarchical Clustering MethodsChallagalla, Ajay; Dhiraj, S. S. Shivaji; Somayajulu, D.V.L.N; Mathew, Toms Shaji; Tiwari, Saurav; Ahmad, Syed Sharique
2008New Group Key Computation Technique for Secure Group CommunicationAparna, R; Amberker, B.B
2009Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy RevocationSunitha, N.R; Amberker, B.B
2005A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed RepresentationsSanjeevi, S.G.; Bhattacharya, P.
2010Estimating the Embedding Capacity of a Color Image using Color DifferenceDharwadkar, Nagaraj V.; Amberker, B. B.
2008Some Aggregate Forward-Secure Signature SchemesSunitha, N.R; Amberker, B.B
2010A Connectionist Knowledge Based System using CoarseCoded Distributed RepresentationsSanjeevi, S G; Bhattacharyya, P
2009Transferable E-cheques: An Application of Forward-Secure Serial Multi-signaturesSunitha, Nagarajaiah R; Amberker, Bharat B.R; Koulgi, Prashant
2008A New Method of Verifying Digital Signatures in e-cheque ProcessingSunitha, N.R.; Amberker, B.B
2010Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature SchemeSunitha, N.R.; Bharat Amberker, B.
2006Design and Implementation of Peer-to-Peer E-Mail SystemRamesh, K.; Venkateswarlu, K..; Chandra Sekharam, R.
2006Non-Monotonic Reasoning with Connectionist Networks using Coarse-Coded RepresentationsSanjeevi S.G., Bhattacharyya P.
2010Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related TransformKadampur, Mohammad Ali; D V L N, Somayajulu
2010Learning Style Recognition using Artificial Neural Network for Adaptive User Interface in E-learningKolekar, Sucheta V.; Sanjeevi, S. G.; Bormane, D. S.
2010Sentiment Classification of Text Reviews Using Novel Feature Selection with Reduced Over-fittingReddy., V. Siva RamaKrishna; Somayajulu, D V L N.; Dani, Ajay R.
2006Restructuring and Extensible Simulator for Shared Memory and Message Passing Parallel ProgramsRamesh, T.; Sudhakar, Chapram
2008Tree-based Key Management Scheme for Heterogeneous Sensor NetworksPoornima, A.S; Amberker, B.B
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 122