Showing results 16 to 35 of 110
< previous
next >
Issue Date | Title | Author(s) |
2018-03-01 | Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need | Roy, SS; Puthal, D; Sharma, S; Mohanty, SP; Zomaya, AY |
2018-05-31 | Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors | Lenka, RK; Rath, AK; Tan, Z; Sharma, S; Puthal, D; Simha, NVR; Prasad, M; Raja, R; Tripathi, SS |
2019-01-08 | Building Scalable Mobile Edge Computing by Enhancing Quality of Services | Tiwary, M; Sharma, S; Mishra, P; El-Sayed, H; Prasad, M; Puthal, D |
2017-10-01 | Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] | Puthal, D; Mohanty, SP; Nanda, P; Choppali, U |
2015-03-02 | Cloud computing features, issues, and challenges: A big picture | Puthal, D; Sahoo, BPS; Mishra, S; Swain, S |
2021-05-01 | Collaborative Edge Computing for Smart Villages | Puthal, D; Mohanty, S; Wilson, S; Choppali, U |
2022-03-01 | Combination of Reduction Detection Using TOPSIS for Gene Expression Data Analysis | Tripathy, J; Dash, R; Pattanayak, BK; Mishra, SK; Mishra, TK; Puthal, D |
2015-03-02 | A comparative analysis of packet scheduling schemes for multimedia services in LTE networks | Sahoo, BPS; Puthal, D; Swain, S; Mishra, S |
2019-01-28 | A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance | Rajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M |
2018-11-01 | A Computing Perspective of Quantum Cryptography [Energy and Security] | Nanda, A; Puthal, D; Mohanty, SP; Choppali, U |
2013-01-01 | Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks | Puthal, D; Mir, ZH; Filali, F; Menouar, H |
2018-07-27 | CTOM: Collaborative task offloading mechanism for mobile cloudlet networks | Fan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X |
2021-07-01 | Cybersecurity Issues in AI | Puthal, D; Mohanty, S |
2017-09-12 | Deadline-constraint services in cloud with heterogeneous servers | Sahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS |
2022-04-01 | Decision tree based user-centric security solution for critical IoT infrastructure | Puthal, D; Wilson, S; Nanda, A; Liu, M; Swain, S; Sahoo, BPS; Yelamarthi, K; Pillai, P; El-Sayed, H; Prasad, M |
2017-01-01 | Deep Learning Based Face Recognition with Sparse Representation Classification | Cheng, EJ; Prasad, M; Puthal, D; Sharma, N; Prasad, OK; Chin, PH; Lin, CT; Blumenstein, M; Liu, D; Xie, S; Li, Y; Zhao, D; ElAlfy, ESM |
2020-08-01 | Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks | El Sayed, H; Zeadally, S; Puthal, D |
2021-05-01 | Detection of SLA Violation for Big Data Analytics Applications in Cloud | Zeng, X; Garg, S; Barika, M; Bista, S; Puthal, D; Zomaya, AY; Ranjan, R |
2016-12-01 | DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream | Puthal, D; Nepal, S; Ranjan, R; Chen, J |
2015-12-02 | DPBSV - An efficient and secure scheme for big sensing data stream | Puthal, D; Nepal, S; Ranjan, R; Chen, J |