The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Manoj Kumar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Raghu Krishnapuram, Manoj Kumar, Jayanta Basak, Vivek Jain
    Soft Computing in E-Commerce. [Citation Graph (0, 0)][DBLP]
    AFSS, 2002, pp:450-458 [Conf]
  2. Otto R. Koppius, Manoj Kumar, Eric van Heck
    Electronic Multidimensional Auctions and the Role of Information Feedback. [Citation Graph (0, 0)][DBLP]
    ECIS, 2000, pp:- [Conf]
  3. Kemal Ebcioglu, Manoj Kumar
    A Wide Instruction Word Architecture for Parallel Execution of Logic Programs Coded in BSL. [Citation Graph (0, 0)][DBLP]
    FGCS, 1988, pp:931-942 [Conf]
  4. Daniel M. Dias, Manoj Kumar
    Preventing Congestion in Multistage Networks in the Presence of Hotspots. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1989, pp:9-13 [Conf]
  5. Manoj Kumar, Kimming So
    Trace Driven Simulation for Studying MIMD Parallel Computers. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1989, pp:68-72 [Conf]
  6. Manoj Kumar, J. Robert Jump
    Generalized Delta Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 1983, pp:10-18 [Conf]
  7. Gregory F. Pfister, Manoj Kumar
    The Onset of Hot-Spot Contention. [Citation Graph (0, 0)][DBLP]
    ICPP, 1986, pp:28-34 [Conf]
  8. Sanjay Ranka, Jhy-Chun Wang, Manoj Kumar
    Personalized Communication Avoiding Node Contention on Distributed Memory Systems. [Citation Graph (0, 0)][DBLP]
    ICPP, 1993, pp:241-244 [Conf]
  9. Manoj Kumar
    Effect of Storage Allocation/Reclamation Methods on Parallelism and Storage Requirements. [Citation Graph (0, 0)][DBLP]
    ISCA, 1987, pp:197-205 [Conf]
  10. Manoj Kumar, Daniel M. Dias, J. Robert Jump
    Switching Strategies in a Class of Packet Switching Networks [Citation Graph (0, 0)][DBLP]
    ISCA, 1983, pp:284-300 [Conf]
  11. Rema Ananthanarayanan, Manoj Kumar
    Negotiation Support in Online Markets, with Competition and Co-Operation. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:42-49 [Conf]
  12. Manoj Kumar
    The Password Change Phase is Still Insecure [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  13. Manoj Kumar
    A Digital Signature with Threshold Generation and Verification [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  14. Sunder Lal, Manoj Kumar
    A Directed Signature Scheme and its Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  15. Manoj Kumar
    A Directed -Threshold Multi-Signature Scheme [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  16. Sunder Lal, Manoj Kumar
    Some Applications of Directed Signature Scheme [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  17. Sunder Lal, Manoj Kumar
    A Directed Threshold - Signature Scheme [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  18. Aseem Agrawal, Jayanta Basak, Vivek Jain, Ravi Kothari, Manoj Kumar, Parul A. Mittal, Natwar Modani, K. Ravikumar, Yogish Sabharwal, R. Sureka
    Online marketing research. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2004, v:48, n:5-6, pp:671-678 [Journal]
  19. Parul A. Mittal, Manoj Kumar, Mukesh K. Mohania, Medha Nair, Nipun Batra, Prasan Roy, Anupam Saronwala, Lalit Yagnik
    A framework for eGovernance solutions. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2004, v:48, n:5-6, pp:717-734 [Journal]
  20. Jakka Sairamesh, Rakesh Mohan, Manoj Kumar, Laurent D. Hasson, Craig Bender
    A platform for business-to-business sell-side, private exchanges and marketplaces. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2002, v:41, n:2, pp:242-252 [Journal]
  21. Manoj Kumar
    A fourth-order spline finite difference method for singular two-point boundary value problems. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2003, v:80, n:12, pp:1499-1504 [Journal]
  22. Sanjay Ranka, Jhy-Chun Wang, Manoj Kumar
    Irregular Personalized Communication on Distributed Memory Machines. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1995, v:25, n:1, pp:58-71 [Journal]
  23. Manoj Kumar, Y. Baransky, Monty Denneau
    The GF11 Parallel Computer. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1993, v:19, n:12, pp:1393-1412 [Journal]
  24. Daniel M. Dias, Manoj Kumar
    Comments on ``Interference Analysis of Shuffle/Exchange Networks''. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1982, v:31, n:6, pp:546-547 [Journal]
  25. Manoj Kumar
    Measuring Parallelism in Computation-Intensive Scientific/Engineering Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:9, pp:1088-1098 [Journal]
  26. Manoj Kumar, Daniel M. Dias, J. Robert Jump
    Switching Strategies in Shuffle-Exchange Packet-Switched Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1985, v:34, n:2, pp:180-186 [Journal]
  27. Manoj Kumar, Daniel S. Hirschberg
    An Efficient Implementation of Batcher's Odd-Even Merge Algorithm and Its Application in Parallel Sorting Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1983, v:32, n:3, pp:254-264 [Journal]
  28. Manoj Kumar, J. Robert Jump
    Performance of Unbuffered Shuffle-Exchange Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1986, v:35, n:6, pp:573-578 [Journal]
  29. Manoj Kumar, Tariq Aziz
    A uniform mesh finite difference method for a class of singular two-point boundary value problems. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:180, n:1, pp:173-177 [Journal]
  30. Manoj Kumar
    A Cryptographic Study of Some Digital Signature Schemes [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  31. Manoj Kumar
    Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  32. Manoj Kumar
    Directed Threshold Multi - Signature Scheme without SDC [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  33. Manoj Kumar
    An Improved Remote User Authentication Scheme Using Smart Cards [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  34. Manoj Kumar
    The Modified Scheme is still vulnerable to the parallel Session Attack [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  35. Text Detection using Multilayer Separation in Real Scene Images. [Citation Graph (, )][DBLP]


  36. Response-Time Modeling of Controller Area Network (CAN). [Citation Graph (, )][DBLP]


  37. Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene. [Citation Graph (, )][DBLP]


  38. Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  39. Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP. [Citation Graph (, )][DBLP]


  40. Security Analysis of a Remote User Authentication Scheme with Smart Cards [Citation Graph (, )][DBLP]


  41. Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.065secs, Finished in 0.068secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002