Padam Kumar

According to our database1, Padam Kumar authored at least 34 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Improving DV-Hop-Based Localization Algorithms in Wireless Sensor Networks by Considering Only Closest Anchors.
Int. J. Inf. Secur. Priv., 2020

2019
A new localization using single mobile anchor and mesh-based path planning models.
Wirel. Networks, 2019

A node activity and connectivity-based model for influence maximization in social networks.
Soc. Netw. Anal. Min., 2019

A weighted centroid localization algorithm for randomly deployed wireless sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2019

2018
Nature Inspired Algorithm-Based Improved Variants of DV-Hop Algorithm for Randomly Deployed 2D and 3D Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

Application of Soft Computing on Localization in Wireless Sensor Networks.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

2017
Profile and Back Off Based Distributed NIDS in Cloud.
Wirel. Pers. Commun., 2017

Impact of non-linear numerical methods on localization algorithm.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

2015
An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment.
Wirel. Pers. Commun., 2015

2014
System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud.
Inf. Secur. J. A Glob. Perspect., 2014

2013
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment.
Int. J. Distributed Sens. Networks, 2013

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Robust Segmentation of Moving Vehicles Under Complex Outdoor Conditions.
IEEE Trans. Intell. Transp. Syst., 2012

A light weight centralized file monitoring approach for securing files in Cloud environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

SEReleC# - C# implementation of SEReleC: a meta search engine based on combinatorial search and search keyword based link classification.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A secure and lightweight approach for critical data security in cloud.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

A fingerprinting system calls approach for intrusion detection in a cloud environment.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Real-time motion detection using block matching algorithms on multicore processors.
Int. J. Inf. Commun. Technol., 2011

Efficient Variable Size Template Matching Using Fast Normalized Cross Correlation on Multicore Processors.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Parallel Implementation of Part of Speech Tagging for Text Mining Using Grid Computing.
Proceedings of the Advances in Computing and Communications, 2011

2010
Addressing uncertainty in multi-modal fusion for improved object detection in dynamic environment.
Inf. Fusion, 2010

An effective compaction strategy for bi-criteria DAG scheduling in grids.
Int. J. Commun. Networks Distributed Syst., 2010

2009
Trust-Oriented Multi-objective Workflow Scheduling in Grids.
Proceedings of the Grid and Distributed Computing, 2009

2008
Study of Robust and Intelligent Surveillance in Visible and Multi-modal Framework.
Informatica (Slovenia), 2008

2006
An improved two-step algorithm for task and data parallel scheduling in distributed memory machines.
Parallel Comput., 2006

Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance.
Proceedings of the Computer Vision, Graphics and Image Processing, 5th Indian Conference, 2006

An Improved Processor Allocation Scheme for Mixed Parallel Task Graphs.
Proceedings of the ISCA 19th International Conference on Parallel and Distributed Computing Systems, 2006

2005
Dealing with heterogeneity through limited duplication for scheduling precedence constrained task graphs.
J. Parallel Distributed Comput., 2005

A Scalable Multi-level Distributed System-Level Diagnosis.
Proceedings of the Distributed Computing and Internet Technology, 2005

2003
An Improved Duplication Strategy for Scheduling Precedence Constrained Graphs in Multiprocessor Systems.
IEEE Trans. Parallel Distributed Syst., 2003

2002
Duplication-Based Scheduling Algorithm for Interconnection-Constrained Distributed Memory Machines.
Proceedings of the High Performance Computing, 2002

1995
CTDNet III-An eager reduction model with laziness features.
Future Gener. Comput. Syst., 1995

1990
Implementing pattern-matching function definitions in CTDNet - a multiprocessor architecture.
Microprocessing and Microprogramming, 1990


  Loading...