Browsing byAuthorPuthal, D

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 16 to 35 of 110< previous   next >
Issue DateTitleAuthor(s)
2018-03-01Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the NeedRoy, SS; Puthal, D; Sharma, S; Mohanty, SP; Zomaya, AY
2018-05-31Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power SensorsLenka, RK; Rath, AK; Tan, Z; Sharma, S; Puthal, D; Simha, NVR; Prasad, M; Raja, R; Tripathi, SS
2019-01-08Building Scalable Mobile Edge Computing by Enhancing Quality of ServicesTiwary, M; Sharma, S; Mishra, P; El-Sayed, H; Prasad, M; Puthal, D
2017-10-01Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]Puthal, D; Mohanty, SP; Nanda, P; Choppali, U
2015-03-02Cloud computing features, issues, and challenges: A big picturePuthal, D; Sahoo, BPS; Mishra, S; Swain, S
2021-05-01Collaborative Edge Computing for Smart VillagesPuthal, D; Mohanty, S; Wilson, S; Choppali, U
2022-03-01Combination of Reduction Detection Using TOPSIS for Gene Expression Data AnalysisTripathy, J; Dash, R; Pattanayak, BK; Mishra, SK; Mishra, TK; Puthal, D
2015-03-02A comparative analysis of packet scheduling schemes for multimedia services in LTE networksSahoo, BPS; Puthal, D; Swain, S; Mishra, S
2019-01-28A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceRajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M
2018-11-01A Computing Perspective of Quantum Cryptography [Energy and Security]Nanda, A; Puthal, D; Mohanty, SP; Choppali, U
2013-01-01Cross-layer architecture for congestion control in Vehicular Ad-hoc NetworksPuthal, D; Mir, ZH; Filali, F; Menouar, H
2018-07-27CTOM: Collaborative task offloading mechanism for mobile cloudlet networksFan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X
2021-07-01Cybersecurity Issues in AIPuthal, D; Mohanty, S
2017-09-12Deadline-constraint services in cloud with heterogeneous serversSahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS
2022-04-01Decision tree based user-centric security solution for critical IoT infrastructurePuthal, D; Wilson, S; Nanda, A; Liu, M; Swain, S; Sahoo, BPS; Yelamarthi, K; Pillai, P; El-Sayed, H; Prasad, M
2017-01-01Deep Learning Based Face Recognition with Sparse Representation ClassificationCheng, EJ; Prasad, M; Puthal, D; Sharma, N; Prasad, OK; Chin, PH; Lin, CT; Blumenstein, M; Liu, D; Xie, S; Li, Y; Zhao, D; ElAlfy, ESM
2020-08-01Design and evaluation of a novel hierarchical trust assessment approach for vehicular networksEl Sayed, H; Zeadally, S; Puthal, D
2021-05-01Detection of SLA Violation for Big Data Analytics Applications in CloudZeng, X; Garg, S; Barika, M; Bista, S; Puthal, D; Zomaya, AY; Ranjan, R
2016-12-01DLSeF: A dynamic key-length-based efficient real-time security verification model for big data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J
2015-12-02DPBSV - An efficient and secure scheme for big sensing data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J