SS
Publications
- Towards a generic framework for short term firm-specific stock forecasting
- Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices
- Smart card based password authentication and user anonymity scheme using ECC and steganography
- Differential private random forest
- Modeling and verification of fiat-shamir zero knowledge authentication protocol DOI: 10.1007/978-3-642-27308-7_6
- Cloud based application development for accessing restaurant information on mobile device using lbs
- Two Way Concurrent Buffer System without Deadlock in Various Time Models Using Timed Automata ISSN: 2150-7988
- Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS) DOI: 10.1109/indcon.2013.6726055
- Stock market prediction accuracy analysis using kappa measure DOI: 10.1109/CSNT.2013.136
- Ownership authentication transfer protocol for ubiquitous computing devices DOI: 10.1109/ICCCI.2013.6466133
- Optimal neural network architecture for stock market forecasting DOI: 10.1109/CSNT.2013.120
- Intrusion Detection in Zero Knowledge System Using Model Checking Approach DOI: 10.1007/978-1-4614-6154-8_45
- Detection of User Cluster with Suspicious Activity in Online Social Networking Sites DOI: 10.1109/ADCONS.2013.17
- Detection and filtering of collaborative malicious users in reputation system using quality repository approach DOI: 10.1109/ICACCI.2013.6637216
- Contextual information based recommender system using Singular Value Decomposition DOI: 10.1109/ICACCI.2013.6637502
- Aware-BDI: An extension of the BDI model incorporating situational awareness DOI: 10.1109/CSNT.2013.30
- Alert-BDI: BDI model with adaptive alertness through situational awareness DOI: 10.1109/ICACCI.2013.6637212
- Web opinion mining for social networking sites DOI: 10.1145/2393216.2393316
- Symbolic verification of web crawler functionality and its properties DOI: 10.1109/ICCCI.2012.6158649
- Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication DOI: 10.1109/INNOVATIONS.2012.6207712
- Modeling two way concurrent buffer system using timed automata in UPPAAL DOI: 10.1109/WICT.2012.6409193
- Modeling and Verification of Sliding Window Protocol with Data Loss and Intruder Detection using NuSMV
- Modeling and Verification of Extensible Authentication Protocol using SPIN Model Checker DOI: 10.5121/ijnsa.2012.4606
- Modeling and verification of agent based adaptive traffic signal using symbolic model verifier ISSN: 0975 - 8887
- Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV DOI: 10.1145/2393216.2393276
- Formal verification of the extensible authentication protocol using SPIN DOI: 10.1145/2393216.2393278
- Erroneous state detection in piecewise FIFO system DOI: 10.1109/WICT.2012.6409192
- Enhanced mining association rule algorithm with reduced time & space complexity DOI: 10.1109/INDCON.2012.6420782
- Differentiated QoS with Modified C/I based scheduling algorithm DOI: 10.1109/WICT.2012.6409191
- Design and development of a desktop monitoring system DOI: 10.1145/2393216.2393319
- Decoding robustness performance comparison for QR and data matrix code DOI: 10.1145/2393216.2393337
- Symbolic verification of a strength based multi-agent argumentation scheme
- Physical layer authentication in wired and wireless communication systems DOI: 10.1007/978-3-642-24055-3_30
- Modeling and verification of server aided verification protocol using NuSMV DOI: 10.1007/978-3-642-24043-0_49
- Modeling and verification of kerberos protocol using symbolic model verifier DOI: 10.1109/CSNT.2011.140
- Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier DOI: 10.1007/978-3-642-24043-0_50
- Modeling and verification of chess game using NuSMV DOI: 10.1007/978-3-642-22714-1_47
- Modeling and verifcation of inter realm authentication in kerberos using symbolic model verifier DOI: 10.1007/978-3-642-24043-0_50
- Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV DOI: 10.1007/978-3-642-17857-3_38
- Formal verification of OAuth 2.0 using alloy framework DOI: 10.1109/CSNT.2011.141
- Cloud based application development for mobile devices for accessing LBS DOI: 10.1007/978-3-642-24037-9_53
- Securing location privacy in augmented reality DOI: 10.1109/ICIINFS.2010.5578714
- Protecting location privacy in augmented reality using k-anonymization and pseudo-id DOI: 10.1109/ICCCT.2010.5640424
- Performance analysis of error control coding techniques for peak-to-average power ratio reduction of multicarrier signals
- Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV DOI: 10.1109/ICCCT.2010.5640425
- Model checking message exchange in location based services DOI: 10.1109/ICCCT.2010.5640417
- Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking DOI: 10.1109/ICIINFS.2010.5578694
- A generalized closed form relation for BER of QPSK/M-QAM over fading channel DOI: 10.1109/ICIINFS.2010.5578716
- Reduction of peak-to-average ratio of an ofdm signal using scrambling coding
- Providing confidentiality to nemo in an efficient way using session key generation
- Peak-to-average power ratio reduction performance comparision of golay and reed-muller coded ofdm signal
- Effect of peak-to-average power ratio reduction on the multicarrier communication systems performance parameters
- Design and development of an online voting system
- A performance comparison of golay and reed-muller coded ofdm signal for peak-to-average power ratio reduction
- Peak-to-average power ratio reduction of an ofdm signal using scrambling coding
- PAPR reduction of multicarrier signal using error control coding techniques
- Multicarrier modulation system and its challenges
- Mobile device based social networking application
- Wavelet based acoustic measures for pathological voice analysis
- Is Stack Overflow Overflowing With Questions and Tags DOI: http://dx.doi.org/10.1145/2791405.2791537
- Is That Twitter Hashtag Worth Reading DOI: http://dx.doi.org/10.1145/2791405.2791526
- Stock market prediction accuracy analysis using kappa measure DOI: 10.1109/CSNT.2013.136
- Ownership authentication transfer protocol for ubiquitous computing devices DOI: 10.1109/ICCCI.2013.6466133
- Optimal neural network architecture for stock market forecasting DOI: 10.1109/CSNT.2013.120
- Aware-BDI: An extension of the BDI model incorporating situational awareness DOI: 10.1109/CSNT.2013.30
- Web opinion mining for social networking sites DOI: 10.1145/2393216.2393316
- Symbolic verification of web crawler functionality and its properties DOI: 10.1109/ICCCI.2012.6158649
- Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication DOI: 10.1109/INNOVATIONS.2012.6207712
- Modeling two way concurrent buffer system using timed automata in UPPAAL DOI: 10.1109/WICT.2012.6409193
- Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV DOI: 10.1145/2393216.2393276
- Formal verification of the extensible authentication protocol using SPIN DOI: 10.1145/2393216.2393278
- Erroneous state detection in piecewise FIFO system DOI: 10.1109/WICT.2012.6409192
- Enhanced mining association rule algorithm with reduced time & space complexity DOI: 10.1109/INDCON.2012.6420782
- Differentiated QoS with Modified C/I based scheduling algorithm DOI: 10.1109/WICT.2012.6409191
- Design and development of a desktop monitoring system DOI: 10.1145/2393216.2393319
- Decoding robustness performance comparison for QR and data matrix code DOI: 10.1145/2393216.2393337
- Physical layer authentication in wired and wireless communication systems DOI: 10.1007/978-3-642-24055-3_30
- Modeling and verification of server aided verification protocol using NuSMV DOI: 10.1007/978-3-642-24043-0_49
- Modeling and verification of kerberos protocol using symbolic model verifier DOI: 10.1109/CSNT.2011.140
- Modeling and verification of chess game using NuSMV DOI: 10.1007/978-3-642-22714-1_47
- Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV DOI: 10.1007/978-3-642-17857-3_38
- Formal verification of OAuth 2.0 using alloy framework DOI: 10.1109/CSNT.2011.141
- Cloud based application development for mobile devices for accessing LBS DOI: 10.1007/978-3-642-24037-9_53
- Securing location privacy in augmented reality DOI: 10.1109/ICIINFS.2010.5578714
- Protecting location privacy in augmented reality using k-anonymization and pseudo-id DOI: 10.1109/ICCCT.2010.5640424
- Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV DOI: 10.1109/ICCCT.2010.5640425
- Model checking message exchange in location based services DOI: 10.1109/ICCCT.2010.5640417
- Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking DOI: 10.1109/ICIINFS.2010.5578694
- A generalized closed form relation for BER of QPSK/M-QAM over fading channel DOI: 10.1109/ICIINFS.2010.5578716