Computer Science & Engineering Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 113
Issue DateTitleAuthor(s)
2015Attribute Reduction in Decision-Theoretic Rough Set Model using Particle Swarm Optimization with the threshold parameters determined using LMS training ruleChebrolu, Srilatha; Sanjeevi, Sriram G
2015Weighted Finite Automata based on Local Patterns for Image AuthenticationRaju, U.S.N.; George, Shibin; Sandeep, Irlanki; Kiran, Kothuri Sai
2015A Scalable Algorithm for Discovering Topologies in Social NetworksYadav, Jyoti Rani; Somayajulu, D.V. L. N.; Krishna, P. Rhaad
2013Digital watermarking using modified techniques in spectral domain of imagesKanduri, Yashwanth; Midatala, Madhuri
2015Trust-based Decentralized Service Discovery in Structured Peer-to-Peer NetworksRout, Rashmi Ranjan; Talreja, Dolly
2012-03Modified correlation based technique in micro array data analysis for searching differentially expressed genesRao, A.C.S.; Somayajulu, D.V.L.N.; Banka, H.
2012-03Index Tuning through Query Evaluation Mechanism Based on Indirect Domain KnowledgeVobugari, S.; Somayajulu, D.V.L.N.; Subraya, B.M.
2013Provable data possession scheme with constant proof size for outsourced data in public cloudPurushothama, B.R.; Amberker, B.B
2015Energy Efficient Relaying using Network Coding for Inter-Cluster Communication in Sensor NetworksRout, Rashmi Ranjan; Sai Krishna, M; Ghosh, Soumya K.
2012A novel adaptive re-configuration compliance design pattern for autonomic computing systemsMannava, V.; Ramesh, T.
2012-03Partition-Based Approach for Fast Mining of Transitional PatternsSubramanyam, R.B.V.; Suvvari, S.R.
2013Context Dependent Bag of Words GenerationJadhav, Swapnil Ashok; Somayajulu, D.V.L.N.; Nagesh Bhattu, S.; Subramanyam, R.B.V.; Suresh, P.
2012-01Access control mechanisms for outsourced data in cloudPurushothama, B.R.; Amberker, B.B.
2015A New Hybrid Watermarking Technique using DCT and DWT based on Scaling FactorRaju, U.S.N.; Sethi, Kamalakanta; Choudhary, Sunaina; Jain, Priyanka
2012-12Reconciling visual cryptography with an Etched photoengraving practice for an exceedingly secured secret image sharingSelvan, N.S.
2012Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover ImagesNagaraj, V; Dharwadkar, N.V.; Amberker, B.B.
2015Weighted Finite Automata based Image Compression on Hadoop MapReduce FrameworkRaju, U. S. N; Sandeep, Irlanki; Sai Karthik, Nattam; Praveen, Rayapudi Siva; Sachan, Mayank Singh
2015Pseudo Random Bit Generation Using Arithematic ProgressionDivyanjali, Ankur and; Bhardwaj, Trishansh
2012-12Efficient data collection with directional antenna and network coding in wireless sensor networksRout, R.R.; Ghosh, S; Ghosh, S.K.
2014Power optimized PLL implementation in 180nm CMOS technologySreehari, Patri; Devulapalli, Pavankumarsharma; Kewale, Dhananjay; Asbe, Omkar; Prasad, K S R Krishna
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 113