Pallapa Venkataram

According to our database1, Pallapa Venkataram authored at least 65 papers between 1987 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Concept Map based Teaching of Compiler Design for Undergraduate Students.
EAI Endorsed Trans. e Learn., 2023

2022
Design and implementation of event-based multicast AODV routing protocol for ubiquitous network.
Array, 2022

2021
Transport Management for Evacuation of Victims.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Dynamic QoS Management for Interactive Multimedia in Integrated 4G/5G Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2021

2020
Organization of Museum Exhibit Information for Ubiquitous Visitors.
EAI Endorsed Trans. Creative Technol., 2020

Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors.
EAI Endorsed Trans. Context aware Syst. Appl., 2020

2019
Authentication schemes for social network users: a review.
Int. J. Soc. Comput. Cyber Phys. Syst., 2019

Emergent Intelligence: A Novel Computational Intelligence Technique to Solve Problems.
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019

2018
Honeypot Based Black-Hole Attack Confirmation in a MANET - Black-Hole Attack Confirmation.
Int. J. Wirel. Inf. Networks, 2018

Performance Analysis of Privacy Protection System During Data Transfer in MANETs.
Int. J. Wirel. Inf. Networks, 2018

Confirmation of wormhole attack in MANETs using honeypot.
Comput. Secur., 2018

2017
Preserving Data Privacy During Data Transfer in MANETs.
Wirel. Pers. Commun., 2017

A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks.
J. Intell. Syst., 2017

An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach.
CoRR, 2017

2016
A method of designing an access mechanism for social networks.
Int. J. Soc. Comput. Cyber Phys. Syst., 2016

Performance Analysis of Location Privacy Preserving Scheme for MANETs.
Int. J. Netw. Secur., 2016

Performance evaluation of mobile agent based resource management protocol for MANETs.
Ad Hoc Networks, 2016

2015
An Efficient QoS Support for Ubiquitous Networks.
IEEE Trans. Emerg. Top. Comput., 2015

Performance analysis of a node monitoring protocol for mobile ad-hoc networks: an agent-based approach.
Int. J. Commun. Networks Distributed Syst., 2015

A method of designing a generic actor model for a professional social network.
Hum. centric Comput. Inf. Sci., 2015

SDL based validation of a node monitoring protocol.
CoRR, 2015

Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme.
CoRR, 2015

AODV route maintenance using HoneyPots in MANETs.
Proceedings of the 2015 World Congress on Internet Security, 2015

Web Service Query Selection for a Professional Social Network Members.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Context-Based Service Identification in the Museum Environment.
Proceedings of the Context-Aware Systems and Applications - 4th International Conference, 2015

Emergent Intelligence Based QoS Routing in MANET.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Data privacy preserving scheme in MANETs.
Proceedings of the 2014 World Congress on Internet Security, 2014

2013
Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks.
Int. J. Netw. Secur., 2013

CAs-Based QoS Scheme for Remote Health Monitoring.
Int. J. Agent Technol. Syst., 2013

A Method of Context-Based Services Discovery in Ubiquitous Environment.
Proceedings of the Context-Aware Systems and Applications, 2013

2012
Locating the Attacker of Wormhole Attack by Using the Honeypot.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Context based service discovery for ubiquitous applications.
Proceedings of the 2011 International Conference on Information Networking, 2011

Context aware M-commerce services: C-IOB model approach.
Proceedings of the 8th International Conference on Information, 2011

2009
Random security scheme selection for mobile transactions.
Secur. Commun. Networks, 2009

A Dynamic Authentication Scheme for Mobile Transactions.
Int. J. Netw. Secur., 2009

2008
An efficient resource allocation scheme for multimedia applications in MANET.
J. Netw. Comput. Appl., 2008

An intelligent proactive security system for cyber centres using Cognitive Agents.
Int. J. Inf. Comput. Secur., 2008

Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS).
Comput. Commun., 2008

An effective seamless connectivity scheme for ubiquitous applications.
Proceedings of the MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24, 2008

2007
A Method for Resource and Service Discovery in MANETs.
Wirel. Pers. Commun., 2007

Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications.
Proceedings of the Future Generation Communication and Networking, 2007

An Authentication Scheme for Personalized Mobile Multimedia Services: A Cognitive Agents Based Approach.
Proceedings of the Future Generation Communication and Networking, 2007

2006
An Agent-Based Best Effort Routing Technique for Load Balancing.
Informatica, 2006

Agent-based subsystem for multimedia communications.
IEE Proc. Softw., 2006

2005
A Middleware for Distributed System in Heterogeneous Wireless Networks.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

QoS Management in MANETs Using Norm-Governed Agent Societies.
Proceedings of the Engineering Societies in the Agents World VI, 2005

2003
A Neural Network-Based Connectivity Management for Mobile Computing Environment.
Int. J. Wirel. Inf. Networks, 2003

A Wireless Rural Education and Learning System Based on Disk Oriented MPEG Streaming Multimedia.
Int. J. Distance Educ. Technol., 2003

2002
A LP-based Admission Control Using Artificial Neural Networks for Integrated Services in Mobile Networks.
Wirel. Pers. Commun., 2002

A LP-RR principle-based admission control for a mobile network.
IEEE Trans. Syst. Man Cybern. Part C, 2002

Neural network based optimal routing algorithm for communication networks.
Neural Networks, 2002

2001
Design of a Link Control Protocol for Multimedia Services in Wireless Local Communication.
Wirel. Pers. Commun., 2001

A method of data transfer control during handoffs in mobile-IP based multimedia networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001

1999
A multiple access scheme for VBR traffic in broadband wireless local communication.
Comput. Commun., 1999

1998
Performance of a wireless access protocol on correlated Rayleigh-fading channels with capture.
IEEE Trans. Commun., 1998

Network restoration using recurrent neural networks.
Int. J. Netw. Manag., 1998

1997
Artificial intelligence approaches to network management: recent advances and a survey.
Comput. Commun., 1997

Performance of centralized bandwidth reservation protocol in AVPNs.
Comput. Commun. Rev., 1997

1995
Network performance management using realistic abductive reasoning model.
Proceedings of the Integrated Network Management IV, 1995

1994
Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers.
Comput. Commun., 1994

1993
Generating Synchronizable Test Sequences Based on Finite State Machine with Distributed Ports.
Proceedings of the Protocol Test Systems, 1993

1987
Computer storage and retrieval of generic chemical structures in patents. 8. Reduced chemical graphs and their applications in generic chemical structure retrieval.
J. Chem. Inf. Comput. Sci., 1987


  Loading...