The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dharmendra Sharma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xu Huang, Allan C. Madoc, Dharmendra Sharma
    Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator. [Citation Graph (0, 0)][DBLP]
    DELTA, 2006, pp:31-34 [Conf]
  2. D. Sharma
    UniLR: An Automated Fuzzy Legal Reasoner. [Citation Graph (0, 0)][DBLP]
    HIS, 2002, pp:433-441 [Conf]
  3. Manoj Achuthan, Bala M. Balachandran, Dharmendra Sharma
    Multi-agents for Decision Support. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:469-475 [Conf]
  4. Zul Waker Al-Kabir, Kim Le, Dharmendra Sharma
    MEDADVIS: A Medical Advisory System. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:789-795 [Conf]
  5. Girija Chetty, Dharmendra Sharma
    Distributed Face Recognition: A Multiagent Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1168-1175 [Conf]
  6. Patricia S. Crowther, Robert Cox, Dharmendra Sharma
    A Study of the Radial Basis Function Neural Network Classifiers Using Known Data of Varying Accuracy and Complexity. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:210-216 [Conf]
  7. Xu Huang, Alexander Ridgewell, Dharmendra Sharma
    A Dynamic Threshold Technique for XML Data Transmission on Networks. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1163-1167 [Conf]
  8. Xu Huang, Dharmendra Sharma
    Investigating Security in Multi-tree Based Technique in RFID Systems. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1150-1156 [Conf]
  9. Wanli Ma, Dharmendra Sharma
    A Multiple Agents Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:205-211 [Conf]
  10. G. L. Ligon, Bala M. Balachandran, Dharmendra Sharma
    Personalised Search on Electronic Information. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:35-41 [Conf]
  11. G. L. Ligon, Bala M. Balachandran, Dharmendra Sharma
    Personalisation of Web Search: An Agent Based Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1192-1200 [Conf]
  12. Wanli Ma, Dat Tran, Dharmendra Sharma, Abhishek Mathur
    Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1176-1183 [Conf]
  13. Phu-Nhan Nguyen, Dharmendra Sharma, Dat Tran
    Smart Clients and Small Business Model. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:730-736 [Conf]
  14. Alexander Ridgewell, Xu Huang, Dharmendra Sharma
    Evaluating the Size of the SOAP for Integration in B2B. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:29-34 [Conf]
  15. Fariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky
    Use of Artificial Neural Networks in the Prediction of the Kidney Transplant Outcomes. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:566-572 [Conf]
  16. Fariba Shadabi, Robert Cox, Dharmendra Sharma, Nikolai Petrovsky
    A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:116-122 [Conf]
  17. Dharmendra Sharma, Wanli Ma, Dat Tran
    On an IT Security Framework. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:226-232 [Conf]
  18. Dharmendra Sharma, Wanli Ma, Dat Tran, Mary Anderson
    A Novel Approach to Programming: Agent Based Software Engineering. [Citation Graph (0, 0)][DBLP]
    KES (3), 2006, pp:1184-1191 [Conf]
  19. Naveen Sharma, Dharmendra Sharma
    A Multi-agent Framework for .NET. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:219-225 [Conf]
  20. Dharmendra Sharma, Dat Tran
    Dynamic Scheduling Using Multiagent Architecture. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:476-482 [Conf]
  21. Dat Tran, Dharmendra Sharma
    New Background Speaker Models and Experiments on the ANDOSL Speech Corpus. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:498-503 [Conf]
  22. Dharmendra Sharma, Nivlesh Chandra
    An Evolutionary Approach to Constraint-Based Timetabling. [Citation Graph (0, 0)][DBLP]
    PRICAI Workshops, 2000, pp:80-92 [Conf]
  23. Wanli Ma, Dat Tran, Dharmendra Sharma
    Using Tuple Space to Coordinate Multiagent Activities. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:589-596 [Conf]
  24. Xiaobing Wu, Xueshan Gao, Dharmendra Sharma
    A Multiagent Based Vehicle Engine Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:541-546 [Conf]
  25. Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran
    A Multi-agent Security Framework for e-Health Services. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:547-554 [Conf]
  26. Son Le, Xu Huang, Dharmendra Sharma
    A Multi-agent Architecture for RFID Taxonomy. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:917-925 [Conf]
  27. Nazni Farooq, Xu Huang, Dharmendra Sharma
    Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:950-958 [Conf]
  28. Ebrahim Al-Hashel, Bala M. Balachandran, Dharmendra Sharma
    A Comparison of Three Agent-Oriented Software Development Methodologies: ROADMAP, Prometheus, and MaSE. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:909-916 [Conf]

  29. Novel Protocol and Its Implementation QKD in Wi-Fi Networks. [Citation Graph (, )][DBLP]


  30. Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  31. Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. [Citation Graph (, )][DBLP]


  32. E-health Services with Secure Mobile Agent. [Citation Graph (, )][DBLP]


  33. Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks. [Citation Graph (, )][DBLP]


  34. Evaluating security risks based on intelligent systems and attack graphs. [Citation Graph (, )][DBLP]


  35. A Multi-agents Approach to Knowledge Discovery. [Citation Graph (, )][DBLP]


  36. Negative Selection with Antigen Feedback in Intrusion Detection. [Citation Graph (, )][DBLP]


  37. Remote multimodal biometric authentication using bit priority-based fragile watermarking. [Citation Graph (, )][DBLP]


  38. Password Less System Security Using Multimodal Biometric Fusion. [Citation Graph (, )][DBLP]


  39. On Extendable Software Architecture for Spam Email Filtering. [Citation Graph (, )][DBLP]


  40. A Synthetic Method for Wafer Character Recognition. [Citation Graph (, )][DBLP]


  41. A Fast Matching Method for Fingerprints with Less Than Two Global Singular Points. [Citation Graph (, )][DBLP]


  42. A New Efficient Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]


  43. Fuzzy Normalisation Methods for Typist Verification. [Citation Graph (, )][DBLP]


  44. A study on the feature selection of network traffic for intrusion detection purpose. [Citation Graph (, )][DBLP]


  45. Automated network feature weighting-based anomaly detection. [Citation Graph (, )][DBLP]


  46. An Agent Based Multifactor Biometric Security System. [Citation Graph (, )][DBLP]


  47. An Agent-Oriented Dynamic Adaptive Threshold Transmission for XML Data on Networks. [Citation Graph (, )][DBLP]


  48. An Agent-Oriented Quantum Key Distribution for Wi-Fi Network Security. [Citation Graph (, )][DBLP]


  49. Multi-Agent Systems in Quantum Security for Modern Wireless Networks. [Citation Graph (, )][DBLP]


  50. The Role of Ontology in Modelling Autonomous Agent-Based Systems. [Citation Graph (, )][DBLP]


  51. Automatic Speech-Based Classification of Gender, Age and Accent. [Citation Graph (, )][DBLP]


  52. RFID Technology and Crowded Event Management. [Citation Graph (, )][DBLP]


  53. Extending Prometheus with Agent Cooperation. [Citation Graph (, )][DBLP]


  54. Possibility Theory-Based Approach to Spam Email Detection. [Citation Graph (, )][DBLP]


  55. Fuzzy Vector Quantization for Network Intrusion Detection. [Citation Graph (, )][DBLP]


  56. An Intelligent Multi Agent Design in Healthcare Management System. [Citation Graph (, )][DBLP]


  57. Multi-Agent Based Approach for Quantum Key Distribution in WiFi Networks. [Citation Graph (, )][DBLP]


  58. Detecting Image Based Spam Email. [Citation Graph (, )][DBLP]


  59. Australian Accent-Based Speaker Classification. [Citation Graph (, )][DBLP]


  60. Artificial Intelligence and Data Mining Techniques in Medicine – Success Stories. [Citation Graph (, )][DBLP]


  61. Fuzzy Switching Controller for the Security in 802.11 Networks. [Citation Graph (, )][DBLP]


  62. A Multi-agent Security Architecture. [Citation Graph (, )][DBLP]


Search in 0.408secs, Finished in 0.411secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002