Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 122
| Issue Date | Title | Author(s) |
| 2015 | A Community Driven Social Recommendation System | Lalwani, Deepika; Somayajulu, D. V. L. N.; Krishna, P. Radha |
| 2014 | Human Machine Interface for controlling a robot using image processing | Gautam, Ambuj K.; Vasu, V.; Raju, U.S.N |
| 2014 | Heterogeneous resource allocation under degree constraints in peer-to-peer networks | Sudhakar, Chapram; Rathod, Vatsal; Ramesh, T. |
| 2013-12 | BUSYEMBED: An HVS based reversible data embedding scheme for video using DCT Publisher: | Gujjunoori, S.; Amberker B.B., B.B. |
| 2013 | Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard Model | Ali, S.T; Amberker, B.B. |
| 2013 | Topic dependent cross-word Spelling Corrections for Web Sentiment Analysis | Jadhav, S.A.; Somayajulu, D.V.L.N.; Bhattu, S.N.; Subramanyam, R.B.V.; Suresh, P. |
| 2014 | SE-CDA: A scalable and efficient community detection algorithm | Lunagariya, Dhaval C.; Somayajulu, D.V.L.N; Krishna, P. Radha |
| 2006 | ALGORITHMSFORENERGY-EFFICIENTCLUSTERINGIN WIRELESSSENSORNETWORKS | Singh, Gurpreet; Gaoxi, Xiao |
| 2004 | Cost effective genetic optimal database index set for decision support systems with attributes accessing probabilities | Raja Kumar Reddy, N.; Somayajulu, D.V.L.N. |
| 2010 | Connectionist Predicate Logic Model with Parallel Execution of Rule Chains | Sanjeevi, S G; Bhattacharyya, P |
| 2010 | Secure Data Collection in Sensor Networks using Tree based Key management Scheme and Secret Sharing | Poornima, A.S.; Amberker, B.B.; Raj, H.S.Likith; Kumar, S.Naveen; Pradeep, K.N.; Ravithej, S.V. |
| 2008 | Forward-Secure proxy Signature scheme for Cellphone service providers | Sunitha, N.R.; Amberker, B.B |
| 2010 | Logical Ring based Key Management for Clustered Sensor Networks with Changing Cluster Head | Poornima, A.S.; Amberker, B.B. |
| 2007 | Controlled Delegation in e-cheques using Proxy Signatures | Sunitha, N.R; Amberker, B.B.; Koulgi, Prashant |
| 2008 | Privacy Preserving Clustering by Cluster Bulging for Information Sustenance | Kadampur, Mohammad Ali; Somayajulu, D.V.L.N; Dhiraj, S.S.Shivaji; Satyam, Shailesh G.P. |
| 2009 | Improved analysis on Chang and Chang Password Key Exchange Protocol | Padmavathy, R; Shirisha, Tallapally; Rajkumar, M; Gyan, Jayadev |
| 2009 | Key Management Scheme for Multiple Simultaneous Secure Group Communication | Aparna, R.; Amberker, B.B. |
| 2009 | An Energy Efficient Deterministic Key Establishment Scheme for Clustered Wireless Sensor Networks | Poornima, A.S.; Amberker, B.B.; Jadhav, Harihar Baburao |
| 2009 | Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor Networks | Poornima, A.S.; Amberker, B.B. |
| 2010 | Fault Repair Algorithm using Localization and Controlled mobility in WSN | Sayeesh, K.Venkat; Vinod Kumar, K.; Phan, G.Lakshmi; Thaskani, SandhyaSree; Garimella, Rama Murthy |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 122