Santosh Kumar

According to our database1, Santosh Kumar authored at least 42 papers between 1966 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fault Tolerant Routing Protocol in Cognitive Radio Networks.
Wireless Personal Communications, 2019

An eco-epidemiological model for Newcastle disease in central zone Tanzania.
IJCSM, 2019

2018
Energy Efficient Target Tracking with Collision Avoidance in WSNs.
Wireless Personal Communications, 2018

Enhanced decision tree algorithm using genetic algorithm for heart disease prediction.
IJBRA, 2018

New approximation for pdf of K- distribution: analytical study of QoS parameters in free space optical communication.
IET Communications, 2018

Predicting Inactiveness in Telecom (Prepaid) Sector: A Complex Bigdata Application.
Proceedings of the International Conference on Information Technology, 2018

2017
Components integration-effect graph: a black box testing and test case generation technique for component-based software.
Int. J. Systems Assurance Engineering and Management, 2017

mSelf: Using Mobile Sensors to Self-monitor and Improve Health, Wellness, and Performance.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

Hardware implementation of support vector machine classifier using reconfigurable architecture.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Cluster-than-Label: Semi-Supervised Approach for Domain Adaptation.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Learning Under Data Shift for Domain Adaptation: A Model-Based Co-clustering Transfer Learning Solution.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016

Volume of metric balls in real Grassmann manifold with an application to frames.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Novel Features for Web Spam Detection.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016

Evaluation of Network Risk Using Attack Graph Based Security Metrics.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Co-clustering for Dual Topic Models.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016

A Machine Learning Based Web Spam Filtering Approach.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
A transportation branch and bound algorithm for solving the generalized assignment problem.
Int. J. Systems Assurance Engineering and Management, 2015

Generation and Risk Analysis of Network Attack Graph.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

2014
In-out interaction complexity metrics for component-based software.
ACM SIGSOFT Software Engineering Notes, 2014

Cyclomatic complexity metric for component based software.
ACM SIGSOFT Software Engineering Notes, 2014

Incentive-Driven QoS for Ephemeral Virtual Clouds.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
A minimum weight labelling method for determination of a shortest route in a non-directed network.
Int. J. Systems Assurance Engineering and Management, 2013

Query Processing Performance and Searching Over Encrypted Data By Using An Efficient Algorithm.
CoRR, 2013

Application of Remote Sensing, GIS and GPS for efficient Urban Management Plan, A case study of part of Hyderabad city.
CoRR, 2013

2011
Stage Staffing Scheme for Copyright Protection in Multimedia
CoRR, 2011

A Solution Procedure for a Linear Fractional Programming Problem with Fuzzy Numbers.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Research and application of One-class small hypersphere support vector machine for network anomaly detection.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset.
Proceedings of the Advances in Computing and Communications, 2011

Distributed smart camera network and mobile devices.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

Automated taxi/cab system using A* algorithm.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

2010
Development of an innovative e-content generation process.
Proceedings of the 2010 International Conference on Technology for Education, 2010

Peer-to-Peer Network Classification Using nu-Maximal Margin Spherical Structured Multiclass Support Vector Machine.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

2009
Challenges for Ubiquitous Computing.
Proceedings of the Fifth International Conference on Networking and Services, 2009

2008
Queueing Theory.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Single robot - Multiple human interaction via intelligent user interfaces.
Knowl.-Based Syst., 2008

2006
Nonbinary Stabilizer Codes Over Finite Fields.
IEEE Trans. Information Theory, 2006

2005
Nonbinary stabilizer codes over finite fields
CoRR, 2005

1971
Stochastic behaviour of a parallel redundant complex system with three types of components.
Computing, 1971

1970
Stochastic behaviour of a stand-by redundant complex system with imperfect switching over devices.
Computing, 1970

Stochastic behaviour of a complex system under priority repair.
Computing, 1970

1968
Erratum.
Operations Research, 1968

1966
The Routing Problem with "K" Specified Nodes.
Operations Research, 1966


  Loading...