V. Rhymend Uthariaraj

According to our database1, V. Rhymend Uthariaraj authored at least 52 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An efficient list-based task scheduling algorithm for heterogeneous distributed computing environment.
Softw. Pract. Exp., 2023

2022
An Analytic solution for the Hadoop Configuration Combinatorial Puzzle based on General Factorial Design.
KSII Trans. Internet Inf. Syst., 2022

TARA: temperature aware online dynamic resource allocation scheme for energyoptimization in cloud data centres.
Turkish J. Electr. Eng. Comput. Sci., 2022

2021
Beyond Statistical Analysis in Chaos-Based CSPRNG Design.
Secur. Commun. Networks, 2021

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation.
KSII Trans. Internet Inf. Syst., 2021

An improved list-based task scheduling algorithm for fog computing environment.
Computing, 2021

2020
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience.
Secur. Commun. Networks, 2020

A Novel Parameter Initialization Technique Using RBM-NN for Human Action Recognition.
Comput. Intell. Neurosci., 2020

2019
Energy Efficient Load Balancing in Cloud Data Center Using Clustering Technique.
Int. J. Intell. Inf. Technol., 2019

2016
Enhancing the fault prediction accuracy of CK metrics using high precision cohesion metric.
Int. J. Comput. Appl. Technol., 2016

Efficient Key Management Protocol with Predictive Rekeying for Dynamic Networks.
Proceedings of the 2nd International Conference on Green High Performance Computing, 2016

2015
Huffman based conditional access system for key distribution in digital TV multicast.
Multim. Tools Appl., 2015

WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2015

2014
Huddle hierarchy based group key management protocol using gray code.
Wirel. Networks, 2014

Using Mobile Agents for Load Balancing in Peer-to-Peer Systems Hosting Virtual Servers.
J. Comput. Sci., 2014

Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment.
Proceedings of the Security in Computing and Communications, 2014

2013
An integrated approach for trust management based on policy, community adherence and reputation.
Int. J. Ad Hoc Ubiquitous Comput., 2013

2012
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2012

Enhanced MAC Parameters to Support Hybrid Dynamic Prioritization in MANETs
CoRR, 2012

User profile based proportional share scheduling and mac protocol for manets
CoRR, 2012

SLA for a Pervasive Healthcare Environment.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Scheduling with Job Checkpoint in Computational Grid Environment.
Int. J. Model. Simul. Sci. Comput., 2011

Throughput optimisation of inter- and intra-domain autonomous systems traffic engineering.
Int. J. Commun. Networks Distributed Syst., 2011

Mitigating channel usage in cooperative caching for Mobile Ad hoc Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2011

2010
An approach to find redundant objective function(s) and redundant constraint(s) in multi-objective nonlinear stochastic fractional programming problems.
Eur. J. Oper. Res., 2010

Efficient algorithms to solve Broadcast Scheduling problem in WiMAX mesh networks.
Comput. Commun., 2010

Context Representation and Management in a Pervasive Environment.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Enhanced Genetic algorithm for solving broadcast scheduling problem in TDMA based wireless networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Context representation using hierarchical method and heuristic based context selection in context aware computing.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

Sender initiated decentralized dynamic load balancing for multi cluster computational grid environment.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

2009
A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks.
J. Comput. Sci. Technol., 2009

Secure Authenticated Key Establishment Protocol for Ad Hoc Networks.
Proceedings of the Third International Conference on Network and System Security, 2009

Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication.
Proceedings of the First International Conference on Networks and Communications, 2009

A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A New Mechanism for Job Scheduling in Computational Grid Network Environments.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2007
Graduate Courses in Embedded and Real-Time Systems.
IEEE Pervasive Comput., 2007

Object-oriented software fault prediction using neural networks.
Inf. Softw. Technol., 2007

G-LeaSel: A Secure Multicast Model for Grid.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
LDMA: Load Balancing Using Decentralized Decision Making Mobile Agents.
Proceedings of the Computational Science, 2006

2005
An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing.
Proceedings of the Ubiquitous Computing, 2005

Performance Analysis of Embedded Media Applications in Newer ARM Architectures.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

2004
Object oriented software quality prediction using general regression neural networks.
ACM SIGSOFT Softw. Eng. Notes, 2004

Investigation into the exploitation of Object-Oriented features.
ACM SIGSOFT Softw. Eng. Notes, 2004

Design of Secure Multicast Models for Mobile Services.
Proceedings of the SOFSEM 2004: Theory and Practice of Computer Science, 2004

Measuring the Object-Oriented Properties in Small Sized C++ Programs? An Empirical Investigation.
Proceedings of the Product Focused Software Process Improvement, 2004

End-to-End Web service Performance comparison with Web Server Stress Tool.
Proceedings of the iiWAS'2004, 2004

2003
Models for Implementation of Online Real Time It-Enabled Service for Entry to Professional Education.
Proceedings of the ICEIS 2003, 2003

Evaluation and Analysis of Computational Complexity for Secure Multicast Models.
Proceedings of the Computational Science and Its Applications, 2003


  Loading...