Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 113
Issue Date | Title | Author(s) |
2015 | Attribute Reduction in Decision-Theoretic Rough Set Model using Particle Swarm Optimization with the threshold parameters determined using LMS training rule | Chebrolu, Srilatha; Sanjeevi, Sriram G |
2015 | Weighted Finite Automata based on Local Patterns for Image Authentication | Raju, U.S.N.; George, Shibin; Sandeep, Irlanki; Kiran, Kothuri Sai |
2015 | A Scalable Algorithm for Discovering Topologies in Social Networks | Yadav, Jyoti Rani; Somayajulu, D.V. L. N.; Krishna, P. Rhaad |
2013 | Digital watermarking using modified techniques in spectral domain of images | Kanduri, Yashwanth; Midatala, Madhuri |
2015 | Trust-based Decentralized Service Discovery in Structured Peer-to-Peer Networks | Rout, Rashmi Ranjan; Talreja, Dolly |
2012-03 | Modified correlation based technique in micro array data analysis for searching differentially expressed genes | Rao, A.C.S.; Somayajulu, D.V.L.N.; Banka, H. |
2012-03 | Index Tuning through Query Evaluation Mechanism Based on Indirect Domain Knowledge | Vobugari, S.; Somayajulu, D.V.L.N.; Subraya, B.M. |
2013 | Provable data possession scheme with constant proof size for outsourced data in public cloud | Purushothama, B.R.; Amberker, B.B |
2015 | Energy Efficient Relaying using Network Coding for Inter-Cluster Communication in Sensor Networks | Rout, Rashmi Ranjan; Sai Krishna, M; Ghosh, Soumya K. |
2012 | A novel adaptive re-configuration compliance design pattern for autonomic computing systems | Mannava, V.; Ramesh, T. |
2012-03 | Partition-Based Approach for Fast Mining of Transitional Patterns | Subramanyam, R.B.V.; Suvvari, S.R. |
2013 | Context Dependent Bag of Words Generation | Jadhav, Swapnil Ashok; Somayajulu, D.V.L.N.; Nagesh Bhattu, S.; Subramanyam, R.B.V.; Suresh, P. |
2012-01 | Access control mechanisms for outsourced data in cloud | Purushothama, B.R.; Amberker, B.B. |
2015 | A New Hybrid Watermarking Technique using DCT and DWT based on Scaling Factor | Raju, U.S.N.; Sethi, Kamalakanta; Choudhary, Sunaina; Jain, Priyanka |
2012-12 | Reconciling visual cryptography with an Etched photoengraving practice for an exceedingly secured secret image sharing | Selvan, N.S. |
2012 | Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images | Nagaraj, V; Dharwadkar, N.V.; Amberker, B.B. |
2015 | Weighted Finite Automata based Image Compression on Hadoop MapReduce Framework | Raju, U. S. N; Sandeep, Irlanki; Sai Karthik, Nattam; Praveen, Rayapudi Siva; Sachan, Mayank Singh |
2015 | Pseudo Random Bit Generation Using Arithematic Progression | Divyanjali, Ankur and; Bhardwaj, Trishansh |
2012-12 | Efficient data collection with directional antenna and network coding in wireless sensor networks | Rout, R.R.; Ghosh, S; Ghosh, S.K. |
2014 | Power optimized PLL implementation in 180nm CMOS technology | Sreehari, Patri; Devulapalli, Pavankumarsharma; Kewale, Dhananjay; Asbe, Omkar; Prasad, K S R Krishna |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 113