Bala Srinivasan

According to our database1, Bala Srinivasan authored at least 161 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Distributed classification for image spam detection.
Multimedia Tools Appl., 2018

A Dual Privacy Preserving Approach for Location-Based Services in Mobile Multicast Environment.
MONET, 2018

Activity Recognition with Evolving Data Streams: A Review.
ACM Comput. Surv., 2018

2017
Trustworthy data delivery in mobile P2P network.
J. Comput. Syst. Sci., 2017

Exclusive Use Spectrum Access Trading Models in Cognitive Radio Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2017

Transformational Approach for Alignment-free Image Matching Applications.
Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia, 2017

A Formal Model for an Ideal CFI.
Proceedings of the Information Security Practice and Experience, 2017

Impact of Friendly Jammers on Secrecy Multicast Capacity in Presence of Adaptive Eavesdroppers.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
AnyNovel: detection of novel concepts in evolving data streams.
Evolving Systems, 2016

A Region-based Alignment-free Partial Fingerprint Matching.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

A network defense system for detecting and preventing potential hacking attempts.
Proceedings of the 2016 International Conference on Information Networking, 2016

Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

Privacy-preserving biometrics authentication systems using fully homomorphic encryption.
Int. J. Pervasive Computing and Communications, 2015

Adaptive mobile activity recognition system with evolving data streams.
Neurocomputing, 2015

Authentication in Ubiquitous Networking.
IJISP, 2015

A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements.
Computer Networks, 2015

A Hybrid Mobile Authentication Model for Ubiquitous Networking.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Communication-Efficient Distributed Algorithm for Large-scale Classification within P2P Networks.
Proceedings of the Sixth International Symposium on Information and Communication Technology, 2015

Partial Fingerprint Alignment and Matching Through Region-Based Approach.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

A Highly Distributable Computational Framework for Fast Cloud Data Retrieval.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory Applications.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Time constraint route search over multi-locations.
Knowledge Eng. Review, 2014

Partial Fingerprint Identification Through Correlation-based Approach.
Proceedings of the SECRYPT 2014, 2014

Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Partial Fingerprint Matching through Region-Based Similarity.
Proceedings of the 2014 International Conference on Digital Image Computing: Techniques and Applications, 2014

Design and Implementation of a Mobile Broadcast System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Clustering-Based Index and Data Broadcasting for Mobile Nearest Neighbor Query Processing.
IEEE Trans. Industrial Informatics, 2013

Mobile query services in a participatory embedded sensing environment.
ACM Trans. Embedded Comput. Syst., 2013

Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks.
Inf. Sci., 2013

The Convergence of Big Data and Mobile Computing.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Highly Distributable Associative Memory Based Computational Framework for Parallel Data Processing in Cloud.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Empowering Data Placement for Ad-hoc Queries in Mobile Broadcast Environments.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments.
J. Comput. Syst. Sci., 2012

How confident are you to counter uncertainty?
Proceedings of the First International Conference on Security of Internet of Things, 2012

Analysis of mobile authentication protocols by SVO logic.
Proceedings of the First International Conference on Security of Internet of Things, 2012

A method for fingerprint alignment and matching.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Fingerprint reference point detection based on local ridge orientation patterns of fingerprints.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Increasing level of confidence of iris biometric matching.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

StreamAR: Incremental and Active Learning with Evolving Sensory Data for Activity Recognition.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

CBARS: Cluster Based Classification for Activity Recognition Systems.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
Mobile broadcast services with MIMO antennae in 4G wireless networks.
World Wide Web, 2011

Voronoi-Based Continuous k Nearest Neighbor Search in Mobile Navigation.
IEEE Trans. Industrial Electronics, 2011

A Novel Structure and Access Mechanism for Mobile Data Broadcast in Digital Ecosystems.
IEEE Trans. Industrial Electronics, 2011

Voronoi-based multi-level range search in mobile navigation.
Multimedia Tools Appl., 2011

Security Analysis and Improvements on WLANs.
JNW, 2011

Voronoi-based range and continuous range query processing in mobile databases.
J. Comput. Syst. Sci., 2011

Constrained range search query processing on road networks.
Concurrency and Computation: Practice and Experience, 2011

Two-Party Mobile Authentication Protocols for Wireless Roaming Networks.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

A novel technique for singular point detection based on Poincaré index.
Proceedings of the MoMM'2011, 2011

On the commonality of iris biometrics.
Proceedings of the MoMM'2011, 2011

Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

An Efficient Localized Chain Construction Scheme for Chain Oriented Wireless Sensor Networks.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

Adaptive and Efficient Data Dissemination in Mobile P2P Environments.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Logic-Based Pattern Discovery.
IEEE Trans. Knowl. Data Eng., 2010

Novel Hybrid Group Key Agreement for Sensitive Information Systems.
JCIT, 2010

An Individual and Group Authentication Model for Wireless Network Services.
JCIT, 2010

Dynamic Key Cryptography and Applications.
I. J. Network Security, 2010

LookAhead continuous KNN mobile query processing.
Comput. Syst. Sci. Eng., 2010

Selecting Member Nodes in a Chain Oriented WSN.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A New Holistic Security Approach for Government Critical Systems: Flooding Prevention.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Path branch points in mobile navigation.
Proceedings of the MoMM'2010, 2010

Time constrained range search queries over moving objects in road networks.
Proceedings of the MoMM'2010, 2010

Adaptive approach to fingerprint image enhancement.
Proceedings of the MoMM'2010, 2010

Increasing error tolerance in biometric systems.
Proceedings of the MoMM'2010, 2010

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Framework to Measure the Effectiveness of Image Representations.
Proceedings of the 2010 International Conference on Image Processing, 2010

An Enhanced Global Index for Location-Based Mobile Broadcast Services.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

An Authentication Model for Wireless Network Services.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Information Security Threats Classification Pyramid.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Mobile service oriented architectures for NN-queries.
J. Network and Computer Applications, 2009

Continuous range search based on network Voronoi diagram.
IJGUC, 2009

Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.
IJCSA, 2009

Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers.
IJBDCN, 2009

Multicasting Key Management in Wireless Networks.
Proceedings of the NBiS 2009, 2009

A Membership-Oriented Group Key Management for Application Services.
Proceedings of the NBiS 2009, 2009

An effective crypto-biometric system for secure email in wireless environment.
Proceedings of the MoMM'2009, 2009

Multiple Object Types KNN Search Using Network Voronoi Diagram.
Proceedings of the Computational Science and Its Applications, 2009

Proto-reduct Fusion Based Relevance Feedback in CBIR.
Proceedings of the Seventh International Conference on Advances in Pattern Recognition, 2009

Network Voronoi Diagram Based Range Search.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

A Taxonomy of Database Operations on Mobile Devices.
Proceedings of the Database Technologies: Concepts, 2009

Mobile Information Processing Involving Multiple Non-Collaborative Sources.
Proceedings of the Database Technologies: Concepts, 2009

2008
Incremental k-Nearest-Neighbor Search on Road Networks.
Journal of Interconnection Networks, 2008

Fraudulent Internet Banking Payments Prevention using Dynamic Key.
JNW, 2008

Indexing schemes for multichannel data broadcasting in mobile databases.
IJWMC, 2008

The importance of negative associations and the discovery of association rule pairs.
IJBIDM, 2008

A Study of Wavelets-Based Image Representations and Their Effectiveness.
Proceedings of the 2008 International Conference on Image Processing, 2008

Dynamic Keys Based Sensitive Information System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Continuous Range Search Query Processing in Mobile Navigation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems.
Proceedings of the 2008 International Conference on Security & Management, 2008

Pulmonary Tumor Volume Detection from Positron Emission Tomography Images.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Improving the quality of business and quality of experience in web services through prioritising and scheduling.
IJBPIM, 2007

Mobile Information Processing Involving Multiple Non-collaborative Sources.
IJBDCN, 2007

Security Analysis for Internet Banking Models.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Abnormal Behaviour Detection within Mobile Networks.
Proceedings of the MoMM'2007, 2007

Collision Pattern Modeling and Real-Time Collision Detection at Road Intersections.
Proceedings of the IEEE Intelligent Transportation Systems Conference, 2007

A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Enhanced Bandwidth Allocation Algorithms for QoS Provision in IEEE 802.16 BWA.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection.
Proceedings of the ICEIS 2007, 2007

Multiple Entity Types Wireless Broadcast Database System.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Reduct-Based Result Set Fusion for Relevance Feedback in CBIR.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Hybrid Group Key Management Scheme for Secure Wireless Multicast.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Performance Analysis of Unified Data Broadcast Model for Multi-channel Wireless Databases.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

The design and implementation of a wireless payment system.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Multiple Feature Relevance Feedback in Content- Based Image Retrieval using Probabilistic Inference Networks.
Proceedings of the Computational Intelligence for Modelling and Prediction, 2005

Research in mobile database query optimization and processing.
Mobile Information Systems, 2005

Efficient Broadcast Indexing Scheme for Location-dependent Queries in Multi Channels Wireless Environment.
Journal of Interconnection Networks, 2005

On-Mobile Query Processing Incorporating Multiple Non-Collaborative Servers.
Ingénierie des Systèmes d'Information, 2005

On Building a Data Broadcast System in a Wireless Environment.
IJBDCN, 2005

Research on location-dependent queries in mobile databases.
Comput. Syst. Sci. Eng., 2005

Mobile agents for network management: when and when not!
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Filter-Predict-Schedule: Balancing the Needs of Users and Web Service Providers.
Proceedings of the iiWAS'2005, 2005

Incorporating Global Index with Data Placement Scheme for Multi Channels Mobile Broadcast Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2005

Optimizing Physical Design of Multidimensional Files for Join Queries.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On Building a Data Broadcasting System for Mobile Databases.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Data Dissemination in Mobile Databases.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
A Limited-Used Key Generation Scheme for Internet Transactions.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Secure Prepaid Wireless Micropayment Protocol.
Proceedings of the Security In Information Systems, 2004

Accountability Logic for Mobile Payment Protocols.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Secure Account-Based Mobile Payment Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Location Dependent Queries in Mobile Databases.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Profiling System.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment.
Proceedings of the iiWAS'2004, 2004

Optimizing Query Access Time over Broadcast Channel in a Mobile Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Allocation of Data Items for Multi Channel Data Broadcasting in a Mobile Computing Environment.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Utilising Push and Pull Mechanism in Wireless E-Health Environment.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A Taxonomy of Broadcast Indexing Schemes for Multi Channel Data Dissemination in Mobile Database.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Making sense of video content.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Global Index for Multi Channel Data Dissemination in Mobile Databases.
Proceedings of the Computer and Information Sciences, 2003

Lightweight Mobile Credit-Card Payment Protocol.
Proceedings of the Progress in Cryptology, 2003

A Unified Framework for E-commerce Negotiation Agents.
Proceedings of the iiWAS'2003, 2003

Optimal Broadcast Channel for Data Dissemination in Mobile Database Environment.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003

2002
Multiple Feature Relevance Feedback in Content Based Image Retrieval using Probabilistic Inference Networks.
Proceedings of the FSDK'02, 2002

2000
Dynamic self-organizing maps with controlled growth for knowledge discovery.
IEEE Trans. Neural Netw. Learning Syst., 2000

A General Inference Network Based Architecture for Multimedia Information Retrieval.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Extending the Unified Modeling Language to Support Spatiotemporal Applications.
Proceedings of the TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 1999

Spatiotemporal Extensions to Unified Modeling Language.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Vector-Space Image Model (VSIM) for Content-Based Retrieval.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

A Neural Networks Based Approach for Fast Mining Characteristic Rules.
Proceedings of the Advanced Topics in Artificial Intelligence, 1999

1998
Optimising Bayesian belief networks: a case study of information retrieval systems.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

A measure for image quality.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

A Structure Adapting Feature Map for Optimal Cluster Representation.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998

Multi Level Browsing for Efficient Image Transmission.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Integrating gestures into the user-interface management system.
The Visual Computer, 1997

1996
Storage-Efficient Data Structure for Large Lookup Dictionaries.
Inf. Process. Lett., 1996

Using Bayesian Networks as Retrieval Engines.
Proceedings of The Fifth Text REtrieval Conference, 1996

Primary Copy Method and its Modifications for Database Replication in Distributed Mobile Computing Environment.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Novel parallel join algorithms for grid files.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

Performance Evaluation of Tree-Based Structures.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
A Tool for Resource and Load Sharing in Heterogeneous Environments.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

1994
Distribution algorithms for document allocation in multiprocessor information retrieval systems.
Microprocessing and Microprogramming, 1994

Update Anomalies and the Justification for 4NF in Relational Databases.
Inf. Sci., 1994

Key-Based Update Anomalies and the Justification for 4NF in Database Design.
Proceedings of the 5th Australasian Database Conference, 1994

1993
A Note on Relation Schemes which are in 3NF but not in BCNF.
Inf. Process. Lett., 1993

Redundancy and the Justification for Fourth Normal Form in Relational Databases.
Int. J. Found. Comput. Sci., 1993

Armstrong Relations for Functional and Multivalued Dependencies in Relational Databases.
Proceedings of the Advances in Database Research, 1993


  Loading...