Author of the publication

The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network.

, , and . ICN, page 15. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Narsimha, Gugulothu
add a person with the name Narsimha, Gugulothu
 

Other publications of authors with the same name

Intrusion Detection A Text Mining Based Approach., , and . CoRR, (2016)Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud., and . IJCAC, 8 (2): 113-129 (2018)Multiplicative Data Perturbation Using Fuzzy Logic in Preserving Privacy., , and . ICTCS, page 38:1-38:5. (2016)The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network., , and . ICN, page 15. IEEE Computer Society, (2007)Optimized Clustering with Statistical-Based Local Model for Replica Management in DDM over Grid., and . CSOC (2), volume 465 of Advances in Intelligent Systems and Computing, page 23-33. Springer, (2016)Data perturbation and feature selection in preserving privacy., , and . WOCN, page 1-6. IEEE, (2012)OCSLM: Optimized Clustering with Statistical Based Local Model to Leverage Distributed Mining in Grid Architecture., and . CSOC (3), volume 765 of Advances in Intelligent Systems and Computing, page 321-336. Springer, (2018)Miscegenation of scalable and DEP3K performance evaluation of nosql-cassandra for bigdata applications deployed in cloud., and . Int. J. Bus. Process. Integr. Manag., 9 (1): 12-21 (2018)An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection., , and . Int. J. Inf. Technol. Web Eng., 14 (4): 19-49 (2019)QOS Multicast Routing Based on Bandwidth and Resource Availability in Mobile Adhoc Networks., , and . ICN, page 24-29. IEEE Computer Society, (2008)