Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Clustering Based Approach for Mining Usage Profiles from Web Log Data., , , and . CoRR, (2015)Role of Statistical tests in Estimation of the Security of a New Encryption Algorithm, and . CoRR, (2010)A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support, and . CoRR, (2010)Competitive Equilibrium Theory and Its Applications in Computer Science., , and . HPAGC, volume 169 of Communications in Computer and Information Science, page 539-547. Springer, (2011)Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data, and . CoRR, (2010)Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection., , and . Clust. Comput., 25 (5): 3129-3144 (2022)Analysis of N-gram model on Telugu document classification., , , , and . IEEE Congress on Evolutionary Computation, page 3199-3203. IEEE, (2008)Multimodal Biometrics - Sources, Architecture and Fusion Techniques: An Overview., , , and . ISBAST, page 27-34. IEEE Computer Society, (2012)Study of aggregation algorithms for aggregating imprecise software requirements' priorities., and . Eur. J. Oper. Res., 259 (3): 1191-1199 (2017)Exploiting on-chip data behavior for delay minimization., , and . SLIP, page 103-110. ACM, (2007)