P. Sojan Lal

Orcid: 0000-0003-3453-5313

According to our database1, P. Sojan Lal authored at least 17 papers between 1998 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Fingerprint reference point identification based on chain encoded discrete curvature and bending energy.
Pattern Anal. Appl., 2017

2016
Pre- and Post-fingerprint Skeleton Enhancement for Minutiae Extraction.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2013
Mining Web Logs to Identify Search Engine Behaviour at Websites.
Informatica (Slovenia), 2013

2012
Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation
CoRR, 2012

Extracting Extended Web Logs to Identify the Origin of Visits and Search Keywords.
Proceedings of the Intelligent Informatics, 2012

2011
WEBTRACLUS: a spatio-temporal trajectory clustering tool for personalization in healthcare web portals.
Proceedings of the PETRA 2011, 2011

Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Combining Chain-Code and Fourier Descriptors for Fingerprint Matching.
Proceedings of the Advances in Computing and Communications, 2011

2010
Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Combining singular point and co-occurrence matrix for fingerprint classification.
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, 2010

2009
JConstHide: A Framework for Java Source Code Constant Hiding
CoRR, 2009

JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

2008
JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes
CoRR, 2008

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
CoRR, 2008

Trigger Based Security Alarming Scheme for Moving Objects on Road Networks.
Proceedings of the Intelligence and Security Informatics, 2008

2001
Generation of Octrees from Raster Scan with Reduced Information Loss.
Proceedings of the IASTED International Conference on Visualization, 2001

1998
Parallel Implementation of Octtree Generation Algorithm.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998


  Loading...