Computer Science & Engineering Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 122
Issue DateTitleAuthor(s)
2015A Community Driven Social Recommendation SystemLalwani, Deepika; Somayajulu, D. V. L. N.; Krishna, P. Radha
2014Human Machine Interface for controlling a robot using image processingGautam, Ambuj K.; Vasu, V.; Raju, U.S.N
2014Heterogeneous resource allocation under degree constraints in peer-to-peer networksSudhakar, Chapram; Rathod, Vatsal; Ramesh, T.
2013-12BUSYEMBED: An HVS based reversible data embedding scheme for video using DCT Publisher:Gujjunoori, S.; Amberker B.B., B.B.
2013Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard ModelAli, S.T; Amberker, B.B.
2013Topic dependent cross-word Spelling Corrections for Web Sentiment AnalysisJadhav, S.A.; Somayajulu, D.V.L.N.; Bhattu, S.N.; Subramanyam, R.B.V.; Suresh, P.
2014SE-CDA: A scalable and efficient community detection algorithmLunagariya, Dhaval C.; Somayajulu, D.V.L.N; Krishna, P. Radha
2006ALGORITHMSFORENERGY-EFFICIENTCLUSTERINGIN WIRELESSSENSORNETWORKSSingh, Gurpreet; Gaoxi, Xiao
2004Cost effective genetic optimal database index set for decision support systems with attributes accessing probabilitiesRaja Kumar Reddy, N.; Somayajulu, D.V.L.N.
2010Connectionist Predicate Logic Model with Parallel Execution of Rule ChainsSanjeevi, S G; Bhattacharyya, P
2010Secure Data Collection in Sensor Networks using Tree based Key management Scheme and Secret SharingPoornima, A.S.; Amberker, B.B.; Raj, H.S.Likith; Kumar, S.Naveen; Pradeep, K.N.; Ravithej, S.V.
2008Forward-Secure proxy Signature scheme for Cellphone service providersSunitha, N.R.; Amberker, B.B
2010Logical Ring based Key Management for Clustered Sensor Networks with Changing Cluster HeadPoornima, A.S.; Amberker, B.B.
2007Controlled Delegation in e-cheques using Proxy SignaturesSunitha, N.R; Amberker, B.B.; Koulgi, Prashant
2008Privacy Preserving Clustering by Cluster Bulging for Information SustenanceKadampur, Mohammad Ali; Somayajulu, D.V.L.N; Dhiraj, S.S.Shivaji; Satyam, Shailesh G.P.
2009Improved analysis on Chang and Chang Password Key Exchange ProtocolPadmavathy, R; Shirisha, Tallapally; Rajkumar, M; Gyan, Jayadev
2009Key Management Scheme for Multiple Simultaneous Secure Group CommunicationAparna, R.; Amberker, B.B.
2009An Energy Efficient Deterministic Key Establishment Scheme for Clustered Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.; Jadhav, Harihar Baburao
2009Protocols for Secure Node-to-Cluster Head Communication in Clustered Wireless Sensor NetworksPoornima, A.S.; Amberker, B.B.
2010Fault Repair Algorithm using Localization and Controlled mobility in WSNSayeesh, K.Venkat; Vinod Kumar, K.; Phan, G.Lakshmi; Thaskani, SandhyaSree; Garimella, Rama Murthy
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 122