|
Search the dblp DataBase
Dharmendra Sharma:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xu Huang, Allan C. Madoc, Dharmendra Sharma
Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator. [Citation Graph (0, 0)][DBLP] DELTA, 2006, pp:31-34 [Conf]
- D. Sharma
UniLR: An Automated Fuzzy Legal Reasoner. [Citation Graph (0, 0)][DBLP] HIS, 2002, pp:433-441 [Conf]
- Manoj Achuthan, Bala M. Balachandran, Dharmendra Sharma
Multi-agents for Decision Support. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:469-475 [Conf]
- Zul Waker Al-Kabir, Kim Le, Dharmendra Sharma
MEDADVIS: A Medical Advisory System. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:789-795 [Conf]
- Girija Chetty, Dharmendra Sharma
Distributed Face Recognition: A Multiagent Approach. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1168-1175 [Conf]
- Patricia S. Crowther, Robert Cox, Dharmendra Sharma
A Study of the Radial Basis Function Neural Network Classifiers Using Known Data of Varying Accuracy and Complexity. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:210-216 [Conf]
- Xu Huang, Alexander Ridgewell, Dharmendra Sharma
A Dynamic Threshold Technique for XML Data Transmission on Networks. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1163-1167 [Conf]
- Xu Huang, Dharmendra Sharma
Investigating Security in Multi-tree Based Technique in RFID Systems. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1150-1156 [Conf]
- Wanli Ma, Dharmendra Sharma
A Multiple Agents Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:205-211 [Conf]
- G. L. Ligon, Bala M. Balachandran, Dharmendra Sharma
Personalised Search on Electronic Information. [Citation Graph (0, 0)][DBLP] KES (4), 2005, pp:35-41 [Conf]
- G. L. Ligon, Bala M. Balachandran, Dharmendra Sharma
Personalisation of Web Search: An Agent Based Approach. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1192-1200 [Conf]
- Wanli Ma, Dat Tran, Dharmendra Sharma, Abhishek Mathur
Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1176-1183 [Conf]
- Phu-Nhan Nguyen, Dharmendra Sharma, Dat Tran
Smart Clients and Small Business Model. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:730-736 [Conf]
- Alexander Ridgewell, Xu Huang, Dharmendra Sharma
Evaluating the Size of the SOAP for Integration in B2B. [Citation Graph (0, 0)][DBLP] KES (4), 2005, pp:29-34 [Conf]
- Fariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky
Use of Artificial Neural Networks in the Prediction of the Kidney Transplant Outcomes. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:566-572 [Conf]
- Fariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky
A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:116-122 [Conf]
- Dharmendra Sharma, Wanli Ma, Dat Tran
On an IT Security Framework. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:226-232 [Conf]
- Dharmendra Sharma, Wanli Ma, Dat Tran, Mary Anderson
A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP] KES (3), 2006, pp:1184-1191 [Conf]
- Naveen Sharma, Dharmendra Sharma
A Multi-agent Framework for .NET. [Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:219-225 [Conf]
- Dharmendra Sharma, Dat Tran
Dynamic Scheduling Using Multiagent Architecture. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:476-482 [Conf]
- Dat Tran, Dharmendra Sharma
New Background Speaker Models and Experiments on the ANDOSL Speech Corpus. [Citation Graph (0, 0)][DBLP] KES, 2004, pp:498-503 [Conf]
- Dharmendra Sharma, Nivlesh Chandra
An Evolutionary Approach to Constraint-Based Timetabling. [Citation Graph (0, 0)][DBLP] PRICAI Workshops, 2000, pp:80-92 [Conf]
- Wanli Ma, Dat Tran, Dharmendra Sharma
Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP] KES (2), 2007, pp:589-596 [Conf]
- Xiaobing Wu, Xueshan Gao, Dharmendra Sharma
A Multiagent Based Vehicle Engine Fault Diagnosis. [Citation Graph (0, 0)][DBLP] KES (2), 2007, pp:541-546 [Conf]
- Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP] KES (2), 2007, pp:547-554 [Conf]
- Son Le, Xu Huang, Dharmendra Sharma
A Multi-agent Architecture for RFID Taxonomy. [Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:917-925 [Conf]
- Nazni Farooq, Xu Huang, Dharmendra Sharma
Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. [Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:950-958 [Conf]
- Ebrahim Al-Hashel, Bala M. Balachandran, Dharmendra Sharma
A Comparison of Three Agent-Oriented Software Development Methodologies: ROADMAP, Prometheus, and MaSE. [Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:909-916 [Conf]
Novel Protocol and Its Implementation QKD in Wi-Fi Networks. [Citation Graph (, )][DBLP]
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. [Citation Graph (, )][DBLP]
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. [Citation Graph (, )][DBLP]
E-health Services with Secure Mobile Agent. [Citation Graph (, )][DBLP]
Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks. [Citation Graph (, )][DBLP]
Evaluating security risks based on intelligent systems and attack graphs. [Citation Graph (, )][DBLP]
A Multi-agents Approach to Knowledge Discovery. [Citation Graph (, )][DBLP]
Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP]
Remote multimodal biometric authentication using bit priority-based fragile watermarking. [Citation Graph (, )][DBLP]
Password Less System Security Using Multimodal Biometric Fusion. [Citation Graph (, )][DBLP]
On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP]
A Synthetic Method for Wafer Character Recognition. [Citation Graph (, )][DBLP]
A Fast Matching Method for Fingerprints with Less Than Two Global Singular Points. [Citation Graph (, )][DBLP]
A New Efficient Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]
Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP]
A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP]
Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP]
An Agent Based Multifactor Biometric Security System. [Citation Graph (, )][DBLP]
An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]
An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. [Citation Graph (, )][DBLP]
Multi-Agent Systems in Quantum Security for Modern Wireless Networks. [Citation Graph (, )][DBLP]
The Role of Ontology in Modelling Autonomous Agent-Based Systems. [Citation Graph (, )][DBLP]
Automatic Speech-Based Classification of Gender, Age and Accent. [Citation Graph (, )][DBLP]
RFID Technology and Crowded Event Management. [Citation Graph (, )][DBLP]
Extending Prometheus with Agent Cooperation. [Citation Graph (, )][DBLP]
Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP]
Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP]
An Intelligent Multi Agent Design in Healthcare Management System. [Citation Graph (, )][DBLP]
Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. [Citation Graph (, )][DBLP]
Detecting Image Based Spam Email. [Citation Graph (, )][DBLP]
Australian Accent-Based Speaker Classification. [Citation Graph (, )][DBLP]
Artificial Intelligence and Data Mining Techniques in Medicine Success Stories. [Citation Graph (, )][DBLP]
Fuzzy Switching Controller for the Security in 802.11 Networks. [Citation Graph (, )][DBLP]
A Multi-agent Security Architecture. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.307secs
|