The SCEAS System
Navigation Menu

Search the dblp DataBase


V. Rao Vemuri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. V. Rao Vemuri, Joseph Miranda
    Software Agents for Computer Games. [Citation Graph (0, 0)][DBLP]
    GAME-ON, 2000, pp:56-0 [Conf]
  2. Jian Wang, V. Rao Vemuri, Biswanath Mukherjee, Wonhong Cho
    Improved Approaches for Cost-Effective Traffic Grooming in WDM Ring Networks: Non-Uniform Traffic and Bidirectional Ring. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1295-1299 [Conf]
  3. Wenjie Hu, Yihua Liao, V. Rao Vemuri
    Robust Support Vector Machines for Anomaly Detection in Computer Security. [Citation Graph (0, 0)][DBLP]
    ICMLA, 2003, pp:168-174 [Conf]
  4. V. Rao Vemuri
    Machine Learning in Infrastructure Security. [Citation Graph (0, 0)][DBLP]
    IICAI, 2003, pp:1-3 [Conf]
  5. Na Tang, V. Rao Vemuri
    User-Interest-Based Document Filtering via Semi-supervised Clustering. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:573-582 [Conf]
  6. Na Tang, V. Rao Vemuri
    An artificial immune system approach to document clustering. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:918-922 [Conf]
  7. Yihua Liao, V. Rao Vemuri, Alejandro Pasos
    A General Framework for Adaptive Anomaly Detection with Evolving Connectionist Systems. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]
  8. Yihua Liao, V. Rao Vemuri
    Using Text Categorization Techniques for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:51-59 [Conf]
  9. Na Tang, V. Rao Vemuri
    Web-Based Knowledge Acquisition to Impute Missing Values for Classification. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:124-130 [Conf]
  10. Khaled Labib, V. Rao Vemuri
    An application of principal component analysis to the detection and visualization of computer network attacks. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:1-2, pp:218-234 [Journal]
  11. Yihua Liao, V. Rao Vemuri
    Use of K-Nearest Neighbor classifier for intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:439-448 [Journal]
  12. Walter Cedeño, V. Rao Vemuri, Tom Slezak
    Multi-Niche Crowding in Genetic Algorithms and its Application to the Assembly of DNA Restriction-Fragments. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 1994, v:2, n:4, pp:321-345 [Journal]
  13. Kenrick J. Mock, V. Rao Vemuri
    Information filtering via hill climbing, wordnet, and index patterns. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1997, v:33, n:5, pp:633-644 [Journal]
  14. Walter Cedeño, V. Rao Vemuri
    Analysis of Speciation and Niching in the Multi-Niche Crowding GA. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:229, n:1, pp:177-197 [Journal]
  15. Yihua Liao, V. Rao Vemuri, Alejandro Pasos
    Adaptive anomaly detection with evolving connectionist systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:60-80 [Journal]

Search in 0.186secs, Finished in 0.188secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002