Browsing by Author Santhi Thilagam, P.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 29 to 48 of 63 < previous   next >
Issue DateTitleAuthor(s)Supervisor(s)
2015Heuristics based server consolidation with residual resource defragmentation in cloud data centersSunil, Rao, K.; Santhi Thilagam, P.-
2011Hierarchical DHT to efficiently load balancing in dynamic peer-to-peer environmentKakulte, B.S.; Santhi Thilagam, P.-
2014Hierarchical homomorphic encryption based privacy preserving distributed association rule miningRana, S.; Santhi Thilagam, P.-
2016HiRE : A heuristic approach for user generated record extractionChandrakanth, S.; Santhi Thilagam, P.-
2018Identifying Provenance of Information and Anomalous Paths in Attributed Social NetworksTrivedi, H.; Bindu, P.V.; Santhi Thilagam, P.-
2017In-memory representations for mining big graphsGoyal, S.; Bindu, P.V.; Santhi Thilagam, P.-
2019Influence maximisation in social networksTejaswi, V.; Bindu, P.V.; Santhi Thilagam, P.-
2008InterTARM: FP-tree based framework for mining inter-transaction association rules from stock market dataChhinkaniwala, H.; Santhi Thilagam, P.-
2012Intrusion detection technique for wormhole and following jellyfish and byzantine attacks in wireless mesh networkReddy, K.G.; Santhi Thilagam, P.-
2009A linear hash based indexing scheme for location dependent data broadcastSriprajna, K.J.; Santhi Thilagam, P.-
2017Live migration of virtual machines with their local persistent storage in a data intensive cloudModi, A.; Achar, R.; Santhi Thilagam, P.-
2013Load balancing in cloud based on live migration of virtual machinesAchar, R.; Santhi Thilagam, P.; Soans, N.; Vikyath, P.V.; Rao, S.; Vijeth, A.M.-
2016MAC layer security issues in wireless mesh networksReddy, K.G.; Santhi Thilagam, P.-
2013Message from the conference chairsVijaya Kumar V.; Chandra Sekaran K.; Santhi Thilagam, P.; Annappa-
2016Mining social networks for anomalies: Methods and challengesBindu P.V.; Santhi Thilagam, P.-
2020Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 ServersPraseed, A.; Santhi Thilagam, P.-
2012Optimal scheduling of computational task in cloud using Virtual Machine TreeAchar, R.; Santhi Thilagam, P.; Shwetha, D.; Pooja, H.; Roshni; Andrea-
2015Optimization of countour based template matching using GPGPU based hexagonal frameworkBhagya, M.; Tripathi, S.; Santhi Thilagam, P.-
2003Optimization of countour based template matching using GPGPU based hexagonal frameworkBhagya, M.; Tripathi, S.; Santhi Thilagam, P.-
2019Privacy-preserving searchable encryption scheme over encrypted data supporting dynamic updateRashmi, R.; Siva, Kumar, D.V.N.; Santhi Thilagam, P.-