The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Johnson P. Thomas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham
    Fair BPEL Processes Transaction using Non-Repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:337-342 [Conf]
  2. Istvan Jonyer, Prach Apiratikul, Johnson P. Thomas
    Source Code Fingerprinting Using Graph Grammar Induction. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2005, pp:468-473 [Conf]
  3. In Joe Khor, Johnson P. Thomas, Istvan Jonyer
    Sliding Window Protocol for Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  4. Subil Abraham, Mathews Thomas, Johnson P. Thomas
    Enhancing Web Services Availability. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:352-355 [Conf]
  5. George Ghinea, Johnson P. Thomas
    Impact of Protocol Stacks on Quality of Perception. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:847-854 [Conf]
  6. Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas
    Hybrid Feature Selection for Modeling Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICONIP, 2004, pp:1020-1025 [Conf]
  7. Johnson P. Thomas, Istvan Jonyer, Muhammad Tanvir Alam
    Reducing Latency in Ad Hoc Networks by Pre-Fetching. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:952-958 [Conf]
  8. Brent Doeksen, Ajith Abraham, Johnson P. Thomas, Marcin Paprzycki
    Real Stock Trading Using Soft Computing Models. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:162-167 [Conf]
  9. P. Muppala, Johnson P. Thomas, Ajith Abraham
    QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:709-714 [Conf]
  10. P. Muppala, Johnson P. Thomas, Ajith Abraham
    QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:651-656 [Conf]
  11. George Ghinea, Johnson P. Thomas
    QoS Impact on User Perception and Understanding of Multimedia Video Clips. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1998, pp:49-54 [Conf]
  12. George Ghinea, Johnson P. Thomas, Robert S. Fish
    Multimedia, network protocols and users - bridging the gap. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia (1), 1999, pp:473-476 [Conf]
  13. Zhengming Shen, Johnson Thomas
    Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:261-268 [Conf]
  14. Austin Gilbert, Johnson P. Thomas, Istvan Jonyer
    Modeling Work Flow in Hierarchically Cluster Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2004, pp:1403-1409 [Conf]
  15. Johnson P. Thomas, Mathews Thomas, George Ghinea
    Modeling of Web Services Flow. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:391-398 [Conf]
  16. George Ghinea, Johnson P. Thomas
    Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, v:13, n:2, pp:149-161 [Journal]
  17. Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas
    Feature deduction and ensemble design of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:295-307 [Journal]
  18. Ajith Abraham, Johnson P. Thomas, Sugata Sanyal, Lakhmi C. Jain
    Information Assurance and Security. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:1-3 [Journal]
  19. In Joe Khor, Johnson P. Thomas, Istvan Jonyer
    Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:37-55 [Journal]
  20. Johnson P. Thomas
    Design and verification of a coordination protocol for cooperating systems. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2000, v:4, n:2, pp:130-140 [Journal]
  21. George Ghinea, Johnson P. Thomas
    Quality of perception: user quality of service in multimedia presentations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:4, pp:786-789 [Journal]
  22. Anuradha Gasikanti, Johnson P. Thomas, Mathews Thomas
    Information Discovery across Organizational Boundaries through Local Caching. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2007, pp:522-529 [Conf]
  23. Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas
    Modeling intrusion detection system using hybrid intelligent systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:1, pp:114-132 [Journal]

  24. Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations. [Citation Graph (, )][DBLP]


  25. Trust determination in ad hoc networks. [Citation Graph (, )][DBLP]


  26. Manipulation as a Security Mechanism in Sensor Networks. [Citation Graph (, )][DBLP]


  27. Trust model for certificate revocation in ad hoc networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002