Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Supervisor
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
IR@NITK
Browsing by Author Santhi Thilagam, P.
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 45 to 63 of 63
< previous
Issue Date
Title
Author(s)
Supervisor(s)
2012
Optimal scheduling of computational task in cloud using Virtual Machine Tree
Achar, R.
;
Santhi Thilagam, P.
;
Shwetha, D.
;
Pooja, H.
;
Roshni
;
Andrea
-
2015
Optimization of countour based template matching using GPGPU based hexagonal framework
Bhagya, M.
;
Tripathi, S.
;
Santhi Thilagam, P.
-
2003
Optimization of countour based template matching using GPGPU based hexagonal framework
Bhagya, M.
;
Tripathi, S.
;
Santhi Thilagam, P.
-
2019
Privacy-preserving searchable encryption scheme over encrypted data supporting dynamic update
Rashmi, R.
;
Siva, Kumar, D.V.N.
;
Santhi Thilagam, P.
-
2019
A Probabilistic Model of Clock Offset Estimator (PMCOE) for Clock Synchronization in Wireless Sensor Network
Upadhyay, D.
;
Dubey, A.K.
;
Santhi Thilagam, P.
-
2008
A QoS broker based architecture for dynamic web service selection
D'Mello, D.A.
;
Ananthanarayana, V.S.
;
Santhi Thilagam, P.
-
2008
An RDF approach for discovering the relevant semantic associations in a social network
A.k., T.
;
Santhi Thilagam, P.
-
2014
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks
Karri, G.R.
;
Santhi Thilagam, P.
-
2019
Searchable encryption approaches: attacks and challenges
Siva Kumar, D.V.N.
;
Santhi Thilagam, P.
-
2016
Securing native XML database-driven web applications from XQuery injection vulnerabilities
Palsetia, N.
;
Deepa, G.
;
Ahmed, Khan, F.
;
Santhi Thilagam, P.
;
Pais, A.R.
-
2016
Securing web applications from injection and logic vulnerabilities: Approaches and challenges
Deepa, G.
;
Santhi Thilagam, P.
-
2007
Semantic partition based association rule mining across multiple databases using abstraction
Santhi Thilagam, P.
;
Ananthanarayana, V.S.
-
2012
SQL injection attack mechanisms and prevention techniques
Chandrashekhar, R.
;
Mardithaya, M.
;
Santhi Thilagam, P.
;
Saha, D.
-
2019
A statistical tool for time synchronization problem in WSN
Upadhyay, D.
;
Dubey, A.K.
;
Santhi Thilagam, P.
-
2017
Target specific influence maximization: An approach to maximize adoption in labeled social networks
Tejaswi, V.
;
Bindu, P.V.
;
Santhi Thilagam, P.
-
2012
Taxonomy of network layer attacks in wireless mesh network
Reddy, K.G.
;
Santhi Thilagam, P.
-
2015
Time stamp based set covering greedy algorithm
Vasanthi, P.
;
Tejaswi, V.
;
Santhi Thilagam, P.
-
2018
Time synchronization problem of wireless sensor network using maximum probability theory
Upadhyay, D.
;
Dubey, A.K.
;
Santhi Thilagam, P.
-
2011
Towards evaluating resilience of SIP server under low rate DoS attack
Kumar, A.
;
Santhi Thilagam, P.
;
Pais, A.R.
;
Sharma, V.
;
Sadalkar, K.M.
-