Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 122
| Issue Date | Title | Author(s) |
| 2010 | Reversible Fragile Medical Image Watermarking with Zero Distortion | Dharwadkar, Nagaraj V.; Amberker, B. B.; Supriya; Panchannavar, Prateeksha B. |
| 2008 | ON Chip LDO voltage regulator with improved transient response in 180nm | Rao, Patri Sreehari; Prasad, K. S. R. Krishna |
| 2008 | New Method to Compute Auxiliary keys in LKH based Secure Group Key Management Scheme | Aparna, R; Amberker, B.B |
| 2010 | Privacy Preserving Outlier Detection using Hierarchical Clustering Methods | Challagalla, Ajay; Dhiraj, S. S. Shivaji; Somayajulu, D.V.L.N; Mathew, Toms Shaji; Tiwari, Saurav; Ahmad, Syed Sharique |
| 2008 | New Group Key Computation Technique for Secure Group Communication | Aparna, R; Amberker, B.B |
| 2009 | Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation | Sunitha, N.R; Amberker, B.B |
| 2005 | A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed Representations | Sanjeevi, S.G.; Bhattacharya, P. |
| 2010 | Estimating the Embedding Capacity of a Color Image using Color Difference | Dharwadkar, Nagaraj V.; Amberker, B. B. |
| 2008 | Some Aggregate Forward-Secure Signature Schemes | Sunitha, N.R; Amberker, B.B |
| 2010 | A Connectionist Knowledge Based System using CoarseCoded Distributed Representations | Sanjeevi, S G; Bhattacharyya, P |
| 2009 | Transferable E-cheques: An Application of Forward-Secure Serial Multi-signatures | Sunitha, Nagarajaiah R; Amberker, Bharat B.R; Koulgi, Prashant |
| 2008 | A New Method of Verifying Digital Signatures in e-cheque Processing | Sunitha, N.R.; Amberker, B.B |
| 2010 | Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme | Sunitha, N.R.; Bharat Amberker, B. |
| 2006 | Design and Implementation of Peer-to-Peer E-Mail System | Ramesh, K.; Venkateswarlu, K..; Chandra Sekharam, R. |
| 2006 | Non-Monotonic Reasoning with Connectionist Networks using Coarse-Coded Representations | Sanjeevi S.G., Bhattacharyya P. |
| 2010 | Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform | Kadampur, Mohammad Ali; D V L N, Somayajulu |
| 2010 | Learning Style Recognition using Artificial Neural Network for Adaptive User Interface in E-learning | Kolekar, Sucheta V.; Sanjeevi, S. G.; Bormane, D. S. |
| 2010 | Sentiment Classification of Text Reviews Using Novel Feature Selection with Reduced Over-fitting | Reddy., V. Siva RamaKrishna; Somayajulu, D V L N.; Dani, Ajay R. |
| 2006 | Restructuring and Extensible Simulator for Shared Memory and Message Passing Parallel Programs | Ramesh, T.; Sudhakar, Chapram |
| 2008 | Tree-based Key Management Scheme for Heterogeneous Sensor Networks | Poornima, A.S; Amberker, B.B |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 122