Search the dblp DataBase
Johnson P. Thomas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
M. Bilal , Johnson P. Thomas , Mathews Thomas , Subil Abraham Fair BPEL Processes Transaction using Non-Repudiation Protocols. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:337-342 [Conf ] Istvan Jonyer , Prach Apiratikul , Johnson P. Thomas Source Code Fingerprinting Using Graph Grammar Induction. [Citation Graph (0, 0)][DBLP ] FLAIRS Conference, 2005, pp:468-473 [Conf ] In Joe Khor , Johnson P. Thomas , Istvan Jonyer Sliding Window Protocol for Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] Subil Abraham , Mathews Thomas , Johnson P. Thomas Enhancing Web Services Availability. [Citation Graph (0, 0)][DBLP ] ICEBE, 2005, pp:352-355 [Conf ] George Ghinea , Johnson P. Thomas Impact of Protocol Stacks on Quality of Perception. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (II), 2000, pp:847-854 [Conf ] Srilatha Chebrolu , Ajith Abraham , Johnson P. Thomas Hybrid Feature Selection for Modeling Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICONIP, 2004, pp:1020-1025 [Conf ] Johnson P. Thomas , Istvan Jonyer , Muhammad Tanvir Alam Reducing Latency in Ad Hoc Networks by Pre-Fetching. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:952-958 [Conf ] Brent Doeksen , Ajith Abraham , Johnson P. Thomas , Marcin Paprzycki Real Stock Trading Using Soft Computing Models. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:162-167 [Conf ] P. Muppala , Johnson P. Thomas , Ajith Abraham QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:709-714 [Conf ] P. Muppala , Johnson P. Thomas , Ajith Abraham QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:651-656 [Conf ] George Ghinea , Johnson P. Thomas QoS Impact on User Perception and Understanding of Multimedia Video Clips. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1998, pp:49-54 [Conf ] George Ghinea , Johnson P. Thomas , Robert S. Fish Multimedia, network protocols and users - bridging the gap. [Citation Graph (0, 0)][DBLP ] ACM Multimedia (1), 1999, pp:473-476 [Conf ] Zhengming Shen , Johnson Thomas Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NCA, 2004, pp:261-268 [Conf ] Austin Gilbert , Johnson P. Thomas , Istvan Jonyer Modeling Work Flow in Hierarchically Cluster Distributed Systems. [Citation Graph (0, 0)][DBLP ] PDPTA, 2004, pp:1403-1409 [Conf ] Johnson P. Thomas , Mathews Thomas , George Ghinea Modeling of Web Services Flow. [Citation Graph (0, 0)][DBLP ] CEC, 2003, pp:391-398 [Conf ] George Ghinea , Johnson P. Thomas Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol. [Citation Graph (0, 0)][DBLP ] CIT, 2005, v:13, n:2, pp:149-161 [Journal ] Srilatha Chebrolu , Ajith Abraham , Johnson P. Thomas Feature deduction and ensemble design of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:295-307 [Journal ] Ajith Abraham , Johnson P. Thomas , Sugata Sanyal , Lakhmi C. Jain Information Assurance and Security. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:1-3 [Journal ] In Joe Khor , Johnson P. Thomas , Istvan Jonyer Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:37-55 [Journal ] Johnson P. Thomas Design and verification of a coordination protocol for cooperating systems. [Citation Graph (0, 0)][DBLP ] Soft Comput., 2000, v:4, n:2, pp:130-140 [Journal ] George Ghinea , Johnson P. Thomas Quality of perception: user quality of service in multimedia presentations. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2005, v:7, n:4, pp:786-789 [Journal ] Anuradha Gasikanti , Johnson P. Thomas , Mathews Thomas Information Discovery across Organizational Boundaries through Local Caching. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2007, pp:522-529 [Conf ] Sandhya Peddabachigari , Ajith Abraham , Crina Grosan , Johnson P. Thomas Modeling intrusion detection system using hybrid intelligent systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:114-132 [Journal ] Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations. [Citation Graph (, )][DBLP ] Trust determination in ad hoc networks. [Citation Graph (, )][DBLP ] Manipulation as a Security Mechanism in Sensor Networks. [Citation Graph (, )][DBLP ] Trust model for certificate revocation in ad hoc networks. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.153secs