|
Search the dblp DataBase
V. Rhymend Uthariaraj:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- V. Rhymend Uthariaraj, T. C. Rangarajan, S. Srinivasan
A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols. [Citation Graph (0, 0)][DBLP] CNSR, 2007, pp:192-202 [Conf]
- M. Aramudhan, V. Rhymend Uthariaraj
LDMA: Load Balancing Using Decentralized Decision Making Mobile Agents. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2006, pp:388-395 [Conf]
- R. Elijah Blessing, V. Rhymend Uthariaraj
Evaluation and Analysis of Computational Complexity for Secure Multicast Models. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2003, pp:684-694 [Conf]
- D. George Washington, T. R. Natesan, V. Rhymend Uthariaraj
Models for Implementation of Online Real Time It-Enabled Service for Entry to Professional Education. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2003, pp:260-266 [Conf]
- V. Parthasarathy, S. Aram valartha Bharathi, V. Rhymend Uthariaraj
Performance Analysis of Embedded Media Applications in Newer ARM Architectures. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2005, pp:210-214 [Conf]
- M. Aramudhan, V. Rhymend Uthariaraj
End-to-End Web service Performance comparison with Web Server Stress Tool. [Citation Graph (0, 0)][DBLP] iiWAS, 2004, pp:- [Conf]
- R. Gunasekaran, V. Rhymend Uthariayaraj
An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] IWUC, 2005, pp:49-59 [Conf]
- S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai
Measuring the Object-Oriented Properties in Small Sized C++ Programs? An Empirical Investigation. [Citation Graph (0, 0)][DBLP] PROFES, 2004, pp:185-202 [Conf]
- R. Elijah Blessing, V. Rhymend Uthariaraj
Design of Secure Multicast Models for Mobile Services. [Citation Graph (0, 0)][DBLP] SOFSEM, 2004, pp:163-173 [Conf]
- S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai
Object-oriented software fault prediction using neural networks. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2007, v:49, n:5, pp:483-492 [Journal]
A New Mechanism for Job Scheduling in Computational Grid Network Environments. [Citation Graph (, )][DBLP]
G-LeaSel: A Secure Multicast Model for Grid. [Citation Graph (, )][DBLP]
Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. [Citation Graph (, )][DBLP]
A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment. [Citation Graph (, )][DBLP]
Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. [Citation Graph (, )][DBLP]
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. [Citation Graph (, )][DBLP]
Efficient algorithms to solve Broadcast Scheduling problem in WiMAX mesh networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|