Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vaidehi Vijayakumar
@article{DBLP:journals/adt/NathezhthaDV23, author = {T. Nathezhtha and Sangeetha Dhamodaran and Vaidehi V.}, title = {Social network malicious insider detection using time-based trust evaluation}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {78}, number = {9-10}, pages = {585--597}, year = {2023}, url = {https://doi.org/10.1007/s12243-023-00959-6}, doi = {10.1007/S12243-023-00959-6}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/NathezhthaDV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/MarimuthuV23, author = {Poorani Marimuthu and V. Vaidehi}, title = {An unsupervised approach for personalized {RHM} with reduced mean alert latency}, journal = {J. Intell. Fuzzy Syst.}, volume = {44}, number = {2}, pages = {2173--2190}, year = {2023}, url = {https://doi.org/10.3233/JIFS-220539}, doi = {10.3233/JIFS-220539}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/MarimuthuV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/NathezhthaVS23, author = {T. Nathezhtha and Vaidehi V. and Sangeetha Dhamodaran}, title = {Detection of fraudulent marketing of consumer product in social networking services}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {3}, pages = {4767--4775}, year = {2023}, url = {https://doi.org/10.3233/JIFS-223569}, doi = {10.3233/JIFS-223569}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/NathezhthaVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/SathyaV23, author = {K. B. Sathya and V. Vaidehi}, title = {Suppressing Rain Streak Weather Noise for Recognizing Overturned Accidental Car Vehicle License Plate}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--12}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307555}, doi = {10.1109/ICCCNT56998.2023.10307555}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/SathyaV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ChakravarthiNSV22, author = {K. Kalyana Chakravarthi and P. Neelakantan and L. Shyamala and Vaidehi V.}, title = {Reliable budget aware workflow scheduling strategy on multi-cloud environment}, journal = {Clust. Comput.}, volume = {25}, number = {2}, pages = {1189--1205}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03464-4}, doi = {10.1007/S10586-021-03464-4}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ChakravarthiNSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ChakravarthiSV22, author = {Koneti Kalyan Chakravarthi and L. Shyamala and Vaidehi V.}, title = {{TOPSIS} inspired cost-efficient concurrent workflow scheduling algorithm in cloud}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {6 Part {A}}, pages = {2359--2369}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2020.02.006}, doi = {10.1016/J.JKSUCI.2020.02.006}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/ChakravarthiSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/TripathyCSSV22, author = {Jatin Karthik Tripathy and S. Sibi Chakkaravarthy and Suresh Chandra Satapathy and Madhulika Sahoo and Vaidehi V.}, title = {ALBERT-based fine-tuning model for cyberbullying analysis}, journal = {Multim. Syst.}, volume = {28}, number = {6}, pages = {1941--1949}, year = {2022}, url = {https://doi.org/10.1007/s00530-020-00690-5}, doi = {10.1007/S00530-020-00690-5}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/TripathyCSSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/DhamodaranCSVC22, author = {Sangeetha Dhamodaran and S. Sibi Chakkaravarthy and Suresh Chandra Satapathy and Vaidehi V. and Meenalosini Vimal Cruz}, title = {Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud}, journal = {Multim. Tools Appl.}, volume = {81}, number = {16}, pages = {22065--22085}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-10817-z}, doi = {10.1007/S11042-021-10817-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/DhamodaranCSVC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/ChakravarthiSV21, author = {Koneti Kalyan Chakravarthi and L. Shyamala and Vaidehi V.}, title = {Cost-effective workflow scheduling approach on cloud under deadline constraint using firefly algorithm}, journal = {Appl. Intell.}, volume = {51}, number = {3}, pages = {1629--1644}, year = {2021}, url = {https://doi.org/10.1007/s10489-020-01875-1}, doi = {10.1007/S10489-020-01875-1}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/ChakravarthiSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/TripathySCNPRSV21, author = {Jatin Karthik Tripathy and Sibi Chakkaravarthy Sethuraman and Meenalosini Vimal Cruz and Anupama Namburu and Mangalraj P. and Nandha Kumar R. and Sudhakar Ilango S. and Vaidehi Vijayakumar}, title = {Comprehensive analysis of embeddings and pre-training in {NLP}}, journal = {Comput. Sci. Rev.}, volume = {42}, pages = {100433}, year = {2021}, url = {https://doi.org/10.1016/j.cosrev.2021.100433}, doi = {10.1016/J.COSREV.2021.100433}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csr/TripathySCNPRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/RSV21, author = {Drishya S. R. and Renukadevi S. and Vaidehi V.}, title = {A Stable Clustering Scheme with Node Prediction in {MANET}}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4746}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/RSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChakkaravarthyD20, author = {S. Sibi Chakkaravarthy and Sangeetha Dhamodaran and Meenalosini Vimal Cruz and Vaidehi Vijayakumar and Balasubramanian Raman}, title = {Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks}, journal = {{IEEE} Access}, volume = {8}, pages = {169944--169956}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3023764}, doi = {10.1109/ACCESS.2020.3023764}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChakkaravarthyD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ChakravarthiSV20, author = {Koneti Kalyan Chakravarthi and L. Shyamala and Vaidehi V.}, title = {Budget aware scheduling algorithm for workflow applications in IaaS clouds}, journal = {Clust. Comput.}, volume = {23}, number = {4}, pages = {3405--3419}, year = {2020}, url = {https://doi.org/10.1007/s10586-020-03095-1}, doi = {10.1007/S10586-020-03095-1}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ChakravarthiSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/AthanesiousSVCS20, author = {J. Joshan Athanesious and Vasuhi Srinivasan and Vaidehi Vijayakumar and Shiny Christobel and Sibi Chakkaravarthy Sethuraman}, title = {Detecting abnormal events in traffic video surveillance using superorientation optical flow feature}, journal = {{IET} Image Process.}, volume = {14}, number = {9}, pages = {1881--1891}, year = {2020}, url = {https://doi.org/10.1049/iet-ipr.2019.0549}, doi = {10.1049/IET-IPR.2019.0549}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/AthanesiousSVCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/MarimuthuPV20, author = {Poorani Marimuthu and Varalakshmi Perumal and Vaidehi Vijayakumar}, title = {Intelligent Personalized Abnormality Detection for Remote Health Monitoring}, journal = {Int. J. Intell. Inf. Technol.}, volume = {16}, number = {2}, pages = {87--109}, year = {2020}, url = {https://doi.org/10.4018/IJIIT.2020040105}, doi = {10.4018/IJIIT.2020040105}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiit/MarimuthuPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/AthanesiousVVCJ20, author = {J. Joshan Athanesious and Srinivasan Vasuhi and Vaidehi V. and Shiny Christobel and L. Jerart Julus}, title = {Adaptive density based data mining technique for detection of abnormalities in traffic video surveillance}, journal = {J. Intell. Fuzzy Syst.}, volume = {39}, number = {3}, pages = {3737--3747}, year = {2020}, url = {https://doi.org/10.3233/JIFS-192062}, doi = {10.3233/JIFS-192062}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/AthanesiousVVCJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/SethuramanVW20, author = {Sibi Chakkaravarthy Sethuraman and Vaidehi Vijayakumar and Steven Walczak}, title = {Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles}, journal = {J. Medical Syst.}, volume = {44}, number = {1}, pages = {29}, year = {2020}, url = {https://doi.org/10.1007/s10916-019-1489-9}, doi = {10.1007/S10916-019-1489-9}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/SethuramanVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/ChakkaravarthyS19, author = {S. Sibi Chakkaravarthy and Sangeetha Dhamodaran and Vaidehi Vijayakumar}, title = {A Survey on malware analysis and mitigation techniques}, journal = {Comput. Sci. Rev.}, volume = {32}, pages = {1--23}, year = {2019}, url = {https://doi.org/10.1016/j.cosrev.2019.01.002}, doi = {10.1016/J.COSREV.2019.01.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csr/ChakkaravarthyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/HemalathaPV19, author = {C. Sweetlin Hemalatha and Ravi Pathak and V. Vaidehi}, title = {Hybrid decision trees for data streams based on Incremental Flexible Naive Bayes prediction at leaf nodes}, journal = {Evol. Intell.}, volume = {12}, number = {4}, pages = {515--526}, year = {2019}, url = {https://doi.org/10.1007/s12065-019-00252-3}, doi = {10.1007/S12065-019-00252-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/HemalathaPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/SethuramanDV19, author = {Sibi Chakkaravarthy Sethuraman and Sangeetha Dhamodaran and Vaidehi Vijayakumar}, title = {Intrusion detection system for detecting wireless attacks in {IEEE} 802.11 networks}, journal = {{IET} Networks}, volume = {8}, number = {4}, pages = {219--232}, year = {2019}, url = {https://doi.org/10.1049/iet-net.2018.5050}, doi = {10.1049/IET-NET.2018.5050}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/SethuramanDV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AthanesiousCVV19, author = {J. Joshan Athanesious and S. Sibi Chakkaravarthy and Srinivasan Vasuhi and Vaidehi Vijayakumar}, title = {Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering}, journal = {Multim. Tools Appl.}, volume = {78}, number = {14}, pages = {19877--19903}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7332-y}, doi = {10.1007/S11042-019-7332-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AthanesiousCVV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/MarimuthuPV19, author = {Poorani Marimuthu and Varalakshmi Perumal and Vaidehi Vijayakumar}, title = {{OAFPM:} optimized {ANFIS} using frequent pattern mining for activity recognition}, journal = {J. Supercomput.}, volume = {75}, number = {8}, pages = {5347--5366}, year = {2019}, url = {https://doi.org/10.1007/s11227-019-02802-z}, doi = {10.1007/S11227-019-02802-Z}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/MarimuthuPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/TembhareCDVR19, author = {Akshay Tembhare and S. Sibi Chakkaravarthy and Sangeetha Dhamodaran and Vaidehi V. and M. Venkata Rathnam}, title = {Role-based policy to maintain privacy of patient health records in cloud}, journal = {J. Supercomput.}, volume = {75}, number = {9}, pages = {5866--5881}, year = {2019}, url = {https://doi.org/10.1007/s11227-019-02887-6}, doi = {10.1007/S11227-019-02887-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/TembhareCDVR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/NathezhthaDV19, author = {T. Nathezhtha and Sangeetha Dhamodaran and Vaidehi V.}, editor = {Gordon L. Thomas and Mala John}, title = {{WC-PAD:} Web Crawling based Phishing Attack Detection}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888416}, doi = {10.1109/CCST.2019.8888416}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/NathezhthaDV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/MohanrajVVK18, author = {V. Mohanraj and Vaidehi Vijayakumar and S. Vasuhi and Ranajit Kumar}, title = {A Novel Approach for Face Recognition under Varying Illumination Conditions}, journal = {Int. J. Intell. Inf. Technol.}, volume = {14}, number = {2}, pages = {22--42}, year = {2018}, url = {https://doi.org/10.4018/IJIIT.2018040102}, doi = {10.4018/IJIIT.2018040102}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiit/MohanrajVVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/ChakkaravarthyV18, author = {S. Sibi Chakkaravarthy and Vaidehi Vijayakumar and P. Rajesh}, title = {Hybrid Analysis Technique to detect Advanced Persistent Threats}, journal = {Int. J. Intell. Inf. Technol.}, volume = {14}, number = {2}, pages = {59--76}, year = {2018}, url = {https://doi.org/10.4018/IJIIT.2018040104}, doi = {10.4018/IJIIT.2018040104}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijiit/ChakkaravarthyV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/HemalathaSVSPLV18, author = {C. Sweetlin Hemalatha and Vignesh Sankaran and Vaidehi V. and Shree Nandhini S and Sharmi P and B. Lavanya and S. Vasuhi and Ranajit Kumar}, title = {Symmetric Uncertainty Based Search Space Reduction for Fast Face Recognition}, journal = {Int. J. Intell. Inf. Technol.}, volume = {14}, number = {4}, pages = {77--97}, year = {2018}, url = {https://doi.org/10.4018/IJIIT.2018100105}, doi = {10.4018/IJIIT.2018100105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiit/HemalathaSVSPLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/MohanrajCGKKV18, author = {V. Mohanraj and S. Sibi Chakkaravarthy and I. Gogul and Sathiesh Kumar Vajravelu and Ranajit Kumar and Vaidehi Vijayakumar}, title = {Hybrid feature descriptors to detect face spoof attacks}, journal = {J. Intell. Fuzzy Syst.}, volume = {34}, number = {3}, pages = {1411--1419}, year = {2018}, url = {https://doi.org/10.3233/JIFS-169436}, doi = {10.3233/JIFS-169436}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/MohanrajCGKKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/ChakkaravarthyS18, author = {S. Sibi Chakkaravarthy and Sangeetha Dhamodaran and M. Venkata Rathnam and K. Srinithi and Vaidehi Vijayakumar}, title = {Futuristic cyber-attacks}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {22}, number = {3}, pages = {195--204}, year = {2018}, url = {https://doi.org/10.3233/KES-180384}, doi = {10.3233/KES-180384}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/ChakkaravarthyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/SangeethaV17, author = {Sangeetha Dhamodaran and Vaidehi Vijayakumar}, title = {A secure cloud based Personal Health Record framework for a multi owner environment}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {1-2}, pages = {95--104}, year = {2017}, url = {https://doi.org/10.1007/s12243-016-0529-4}, doi = {10.1007/S12243-016-0529-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/SangeethaV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/RSIMV17, author = {Deepika R. and Arvinth Prasath V. S. and M. Indhumathi and Ashok Kumar P. M. and Vaidehi V.}, title = {Anomalous Event Detection in Traffic Video Surveillance Based on Temporal Pattern Analysis}, journal = {J. Comput.}, volume = {12}, number = {2}, year = {2017}, url = {https://doi.org/10.17706/jcp.12.2.190-199}, doi = {10.17706/JCP.12.2.190-199}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/RSIMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/VijayakumarS17, author = {Vaidehi Vijayakumar and Sangeetha Dhamodaran}, title = {Improved Searchable Attribute Based Encryption in Cloud}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {3}, pages = {823--836}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=156\_2038}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/VijayakumarS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvip/RajGRKVC17, author = {Mohan Raj and I. Gogul and M. Deepan Raj and Sathiesh Kumar Vajravelu and Vaidehi Vijayakumar and S. Sibi Chakkaravarthy}, editor = {Bidyut B. Chaudhuri and Mohan S. Kankanhalli and Balasubramanian Raman}, title = {Analyzing ConvNets Depth for Deep Face Recognition}, booktitle = {Proceedings of 2nd International Conference on Computer Vision {\&} Image Processing - {CVIP} 2017, Roorkee, India, September 9-12, 2017, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {703}, pages = {317--330}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-7895-8\_25}, doi = {10.1007/978-981-10-7895-8\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvip/RajGRKVC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/NathezhthaV17, author = {T. Nathezhtha and Vaidehi V.}, editor = {Sabu M. Thampi and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Carlos Becker Westphall and Jiankun Hu and Chun I. Fan and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol}, title = {Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials}, booktitle = {Security in Computing and Communications - 5th International Symposium, {SSCC} 2017, Manipal, India, September 13-16, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {746}, pages = {159--169}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-6898-0\_13}, doi = {10.1007/978-981-10-6898-0\_13}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sscc/NathezhthaV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/ThangaveluV16, author = {Subashri Thangavelu and Vaidehi Vijayakumar}, title = {Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks}, journal = {Int. Arab J. Inf. Technol.}, volume = {13}, number = {5}, pages = {492--500}, year = {2016}, url = {http://iajit.org/index.php?option=com\_content\&\#38;task=blogcategory\&\#38;id=107\&\#38;Itemid=392}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iajit/ThangaveluV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ised/VanithaV16, author = {A. Vanitha and V. Vaidehi}, title = {Pose estimation in real time video using Tri-Line method}, booktitle = {Sixth International Symposium on Embedded Computing and System Design, {ISED} 2016, Patna, India, December 15-17, 2016}, pages = {303--307}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISED.2016.7977102}, doi = {10.1109/ISED.2016.7977102}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ised/VanithaV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/GanapathyVC15, author = {Kirupa Ganapathy and Vaidehi V. and Jesintha B. Chandrasekar}, title = {Optimum steepest descent higher level learning radial basis function network}, journal = {Expert Syst. Appl.}, volume = {42}, number = {21}, pages = {8064--8077}, year = {2015}, url = {https://doi.org/10.1016/j.eswa.2015.06.036}, doi = {10.1016/J.ESWA.2015.06.036}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/GanapathyVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiit/PathakV15, author = {Ravi Pathak and Vaidehi V.}, title = {Complex Event Refinement by Statistical Augmentation Model}, journal = {Int. J. Intell. Inf. Technol.}, volume = {11}, number = {2}, pages = {55--69}, year = {2015}, url = {https://doi.org/10.4018/IJIIT.2015040104}, doi = {10.4018/IJIIT.2015040104}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiit/PathakV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MV15, author = {Ashok Kumar P. M. and Vaidehi V.}, title = {Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {1}, pages = {169--189}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.01.010}, doi = {10.3837/TIIS.2015.01.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MV15a, author = {Ashok Kumar P. M. and Vaidehi V.}, title = {An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {2}, pages = {659--679}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.02.010}, doi = {10.3837/TIIS.2015.02.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaise/GanapathyVP15, author = {Kirupa Ganapathy and Vaidehi V. and Dhivya Poorani}, title = {Sensor based efficient decision making framework for remote healthcare}, journal = {J. Ambient Intell. Smart Environ.}, volume = {7}, number = {4}, pages = {461--481}, year = {2015}, url = {https://doi.org/10.3233/AIS-150330}, doi = {10.3233/AIS-150330}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaise/GanapathyVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MohanrajVKN15, author = {V. Mohanraj and Vaidehi V. and Ranajith Kumar and R. Nakkeeran}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform {(DPSIFT)}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 2}, series = {Advances in Intelligent Systems and Computing}, volume = {396}, pages = {69--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2653-6\_5}, doi = {10.1007/978-81-322-2653-6\_5}, timestamp = {Fri, 27 Dec 2019 21:20:31 +0100}, biburl = {https://dblp.org/rec/conf/acss/MohanrajVKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/PathakV15, author = {Ravi Pathak and Vaidehi V.}, title = {An efficient rule balancing for scalable complex event processing}, booktitle = {{IEEE} 28th Canadian Conference on Electrical and Computer Engineering, {CCECE} 2015, Halifax, NS, Canada, May 3-6, 2015}, pages = {190--195}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCECE.2015.7129184}, doi = {10.1109/CCECE.2015.7129184}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccece/PathakV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/VaidehiGR15, author = {Vaidehi V. and Kirupa Ganapathy and Vignesh Raghuraman}, title = {A genetic approach for personalized healthcare}, booktitle = {{IEEE} 28th Canadian Conference on Electrical and Computer Engineering, {CCECE} 2015, Halifax, NS, Canada, May 3-6, 2015}, pages = {196--201}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCECE.2015.7129185}, doi = {10.1109/CCECE.2015.7129185}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccece/VaidehiGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/GanapathyVKM14, author = {Kirupa Ganapathy and Vaidehi V. and Bhairavi Kannan and Harini Murugan}, title = {Hierarchical Particle Swarm Optimization with Ortho-Cyclic Circles}, journal = {Expert Syst. Appl.}, volume = {41}, number = {7}, pages = {3460--3476}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.10.050}, doi = {10.1016/J.ESWA.2013.10.050}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/GanapathyVKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/SangeethaVTR14, author = {Sangeetha Dhamodaran and Vaidehi Vijayakumar and Valliammai Thirunavukkarasu and Aiswarya Ramesh}, editor = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Sabu M. Thampi and Ryan K. L. Ko and Lei Shu}, title = {Enhanced Security of {PHR} System in Cloud Using Prioritized Level Based Encryption}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, series = {Communications in Computer and Information Science}, volume = {420}, pages = {57--69}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54525-2\_5}, doi = {10.1007/978-3-642-54525-2\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/snds/SangeethaVTR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aai/MalleswaranVSM13, author = {M. Malleswaran and Vaidehi V. and A. Saravanaselvan and M. Mohankumar}, title = {Performance Analysis of Various Artificial Intelligent Neural Networks for {GPS/INS} Integration}, journal = {Appl. Artif. Intell.}, volume = {27}, number = {5}, pages = {367--407}, year = {2013}, url = {https://doi.org/10.1080/08839514.2013.785793}, doi = {10.1080/08839514.2013.785793}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aai/MalleswaranVSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/NirmalaPV13, author = {D. Egfin Nirmala and A. Bibin Sam Paul and Vaidehi V.}, title = {Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion}, journal = {J. Comput. Sci.}, volume = {9}, number = {9}, pages = {1117--1132}, year = {2013}, url = {https://doi.org/10.3844/jcssp.2013.1117.1132}, doi = {10.3844/JCSSP.2013.1117.1132}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/NirmalaPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/GanapathyPPDPV13, author = {Kirupa Ganapathy and Bharathi Priya and Bhanu Priya and Dhivya and V. Prashanth and Vaidehi V.}, editor = {Elhadi M. Shakshuki and Karim Djouani and Michael Sheng and Mohamed F. Younis and Eduardo Vaz and Wayne Groszko}, title = {{SOA} Framework for Geriatric Remote Health Care Using Wireless Sensor Network}, booktitle = {Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013}, series = {Procedia Computer Science}, volume = {19}, pages = {1012--1019}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.06.141}, doi = {10.1016/J.PROCS.2013.06.141}, timestamp = {Fri, 28 Jan 2022 08:58:39 +0100}, biburl = {https://dblp.org/rec/conf/ant/GanapathyPPDPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/NirmalaVV13, author = {D. Egfin Nirmala and R. K. Vignesh and Vaidehi V.}, title = {Fusion of multisensor images using Nonsubsampled Contourlet Transform and Fuzzy Logic}, booktitle = {{FUZZ-IEEE} 2013, {IEEE} International Conference on Fuzzy Systems, Hyderabad, India, 7-10 July, 2013, Proceedings}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/FUZZ-IEEE.2013.6622362}, doi = {10.1109/FUZZ-IEEE.2013.6622362}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/NirmalaVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/JawaharVN12, author = {P. K. Jawahar and Vaidehi V. and D. Egfin Nirmala}, title = {Qos Enhancement in Wireless VoIP Networks Using Interactive Multiple Model Based Kalman Filter}, journal = {Wirel. Pers. Commun.}, volume = {65}, number = {1}, pages = {67--81}, year = {2012}, url = {https://doi.org/10.1007/s11277-011-0228-4}, doi = {10.1007/S11277-011-0228-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/JawaharVN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/RoyVS11, author = {J. Jackson Juliet Roy and Vaidehi V. and M. S. Sricharan}, title = {QoS guaranteed integration methodology for a WLAN-WiMAX heterogeneous network}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {3}, pages = {261--274}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2011.01.001}, doi = {10.1016/J.COMPELECENG.2011.01.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/RoyVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RoyV11, author = {J. Jackson Juliet Roy and Vaidehi V.}, title = {Analysis of Frequency Reuse and Throughput Enhancement in WiMAX Systems}, journal = {Wirel. Pers. Commun.}, volume = {61}, number = {1}, pages = {1--17}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-9995-6}, doi = {10.1007/S11277-010-9995-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/RoyV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acwr/SathishTV11, author = {S. Sathish and K. Thangavel and Vaidehi V.}, editor = {Rajagopala Chidambaram and P. Venkat Rangan and Satish K. Tripathi and Prasant Mohapatra and Maneesha V. Ramesh and Maarten van Steen}, title = {Cache based ant colony routing algorithm for mobile ad hoc networks}, booktitle = {Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, {ACWR} '11, Amritapuri, Kollam, Kerala, India, December 18-21, 2011}, pages = {473--476}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2185216.2185336}, doi = {10.1145/2185216.2185336}, timestamp = {Tue, 06 Nov 2018 11:07:21 +0100}, biburl = {https://dblp.org/rec/conf/acwr/SathishTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasanVRKKD10, author = {Rajavelu Srinivasan and Vaidehi V. and Rajavelu Rajaraman and S. Kanagaraj and R. Chidambaram Kalimuthu and R. Dharmaraj}, title = {Secure Group Key Management Scheme for Multicast Networks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {205--209}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p205-209.pdf}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasanVRKKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasanVRKKD10a, author = {Rajavelu Srinivasan and Vaidehi V. and Rajavelu Rajaraman and S. Kanagaraj and R. Chidambaram Kalimuthu and R. Dharmaraj}, title = {Secure Group Key Management Scheme for Multicast Networks}, journal = {Int. J. Netw. Secur.}, volume = {11}, number = {1}, pages = {33--38}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v11-n1/ijns-2010-v11-n1-p33-38.pdf}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasanVRKKD10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SangeethaHPVS10, author = {S. Sangeetha and S. Haripriya and S. G. Mohana Priya and Vaidehi V. and N. Srinivasan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Fuzzy Rule-Base Based Intrusion Detection System on Application Layer}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {27--36}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_3}, doi = {10.1007/978-3-642-14478-3\_3}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SangeethaHPVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KayalvizhiSSGV10, author = {R. Kayalvizhi and R. Harihara Subramanian and R. Girish Santhosh and J. Gurubaran and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {{VLSI} Design and Implementation of Combined Secure Hash Algorithm {SHA-512}}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {105--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_11}, doi = {10.1007/978-3-642-14478-3\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KayalvizhiSSGV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubashriKV10, author = {T. Subashri and B. Gokul Vinoth Kumar and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {132--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_14}, doi = {10.1007/978-3-642-14478-3\_14}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SubashriKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KayalvizhiVV10, author = {R. Kayalvizhi and M. Vijayalakshmi and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Energy Analysis of {RSA} and {ELGAMAL} Algorithms for Wireless Sensor Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {172--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_18}, doi = {10.1007/978-3-642-14478-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KayalvizhiVV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubashriAKV10, author = {T. Subashri and R. Arunachalam and B. Gokul Vinoth Kumar and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Pipelining Architecture of {AES} Encryption and Key Generation with Search Based Memory}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {224--231}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_23}, doi = {10.1007/978-3-642-14478-3\_23}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SubashriAKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icarcv/MalleswaranASV10, author = {M. Malleswaran and J. Mary Anita and S. N. Sabreen and Vaidehi V.}, title = {Real-time {INS/GPS} data fusion using hybrid adaptive network based fuzzy inference}, booktitle = {11th International Conference on Control, Automation, Robotics and Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings}, pages = {1536--1540}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICARCV.2010.5707296}, doi = {10.1109/ICARCV.2010.5707296}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icarcv/MalleswaranASV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icarcv/MalleswaranDMV10, author = {M. Malleswaran and Angel Deborah S and S. Manjula and Vaidehi V.}, title = {Integration of {INS} and {GPS} using radial basis function neural networks for vehicular navigation}, booktitle = {11th International Conference on Control, Automation, Robotics and Vision, {ICARCV} 2010, Singapore, 7-10 December 2010, Proceedings}, pages = {2427--2430}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICARCV.2010.5707295}, doi = {10.1109/ICARCV.2010.5707295}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icarcv/MalleswaranDMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-4501, author = {S. Sangeetha and V. Vaidehi}, title = {Fuzzy Aided Application Layer Semantic Intrusion Detection System - {FASIDS}}, journal = {CoRR}, volume = {abs/1005.4501}, year = {2010}, url = {http://arxiv.org/abs/1005.4501}, eprinttype = {arXiv}, eprint = {1005.4501}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-4501.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasanV08, author = {N. Srinivasan and V. Vaidehi}, title = {Performance Analysis of Soft Computing Based Anomaly Detectors}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {3}, pages = {436--447}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p436-447.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasanV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/SricharanV08, author = {M. S. Sricharan and Vaidehi V.}, title = {A pragmatic analysis of user mobility patterns in macrocellular wireless networks}, journal = {Pervasive Mob. Comput.}, volume = {4}, number = {5}, pages = {616--632}, year = {2008}, url = {https://doi.org/10.1016/j.pmcj.2008.05.006}, doi = {10.1016/J.PMCJ.2008.05.006}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/SricharanV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmso/SumalathaVK07, author = {M. R. Sumalatha and Vaidehi V. and Arputharaj Kannan}, title = {Semantic query Cache using Dynamic Facts {(SCDF):} a novel approach to efficient information retrieval}, journal = {Int. J. Metadata Semant. Ontologies}, volume = {2}, number = {4}, pages = {281--294}, year = {2007}, url = {https://doi.org/10.1504/IJMSO.2007.019446}, doi = {10.1504/IJMSO.2007.019446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmso/SumalathaVK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SrinivasanVRSS07, author = {Rajavelu Srinivasan and Vaidehi V. and N. Ranjani and M. Sathya and D. Subramani}, title = {Multi-path routing scheme for non-interactive multicast communications}, journal = {Int. J. Netw. Manag.}, volume = {17}, number = {6}, pages = {399--413}, year = {2007}, url = {https://doi.org/10.1002/nem.636}, doi = {10.1002/NEM.636}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SrinivasanVRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasanVSBK07, author = {Rajavelu Srinivasan and Vaidehi V. and K. N. Srivathsan and L. Ramesh Babu and C. Karunagaran}, title = {SeReRoM: Secured Reliable Routing Scheme for Multicasting}, journal = {Int. J. Netw. Secur.}, volume = {5}, number = {1}, pages = {82--88}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v5-n1/ijns-2007-v5-n1-p82-88.pdf}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasanVSBK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/SanthaV07, author = {K. R. Santha and Vaidehi V.}, title = {Design of efficient architectures for 1-D and 2-D {DLMS} adaptive filters}, journal = {Integr.}, volume = {40}, number = {3}, pages = {209--225}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.10.003}, doi = {10.1016/J.VLSI.2005.10.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/SanthaV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/RameshV07, author = {C. Ramesh and Vaidehi V.}, title = {Performance Analysis of {UWB} Channels for Wireless Personal Area Networks}, journal = {Wirel. Pers. Commun.}, volume = {41}, number = {2}, pages = {169--178}, year = {2007}, url = {https://doi.org/10.1007/s11277-006-9136-4}, doi = {10.1007/S11277-006-9136-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/RameshV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/SricharanV07, author = {M. S. Sricharan and Vaidehi V.}, title = {A Pragmatic Analysis of User Mobility Patterns in Macrocellular Wireless Networks}, booktitle = {2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WOWMOM.2007.4351710}, doi = {10.1109/WOWMOM.2007.4351710}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/SricharanV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icns/AnithaV06, author = {A. Anitha and Vaidehi V.}, title = {Context based Application Level Intrusion Detection System}, booktitle = {2006 International Conference on Networking and Services {(ICNS} 2006), 16-21 July 2006, Silicon Valley, California, {USA}}, pages = {16}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICNS.2006.34}, doi = {10.1109/ICNS.2006.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icns/AnithaV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/ChidambaramPV03, author = {Ramesh Chidambaram and V. Sai Prithvi and Vaidehi V.}, title = {Erratum to "VLSI based fuzzy logic controller enabled adaptive interactive multiple model for target tracking" [Integration 35 {(2003)} 1-10]}, journal = {Integr.}, volume = {36}, number = {3}, pages = {155}, year = {2003}, url = {https://doi.org/10.1016/j.vlsi.2003.08.003}, doi = {10.1016/J.VLSI.2003.08.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/ChidambaramPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/VaidehiCCK01, author = {Vaidehi V. and N. Chitra and M. Chokkalingam and C. N. Krishnan}, title = {Neural network aided Kalman filtering for multitarget tracking applications}, journal = {Comput. Electr. Eng.}, volume = {27}, number = {2}, pages = {217--228}, year = {2001}, url = {https://doi.org/10.1016/S0045-7906(00)00013-6}, doi = {10.1016/S0045-7906(00)00013-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/VaidehiCCK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/VaidehiKS99, author = {V. Vaidehi and C. N. Krishnan and P. Swaminathan}, title = {An Aided Genetic Algorithm for Multiprocessor Scheduling}, journal = {Parallel Process. Lett.}, volume = {9}, number = {3}, pages = {423--436}, year = {1999}, url = {https://doi.org/10.1142/S0129626499000396}, doi = {10.1142/S0129626499000396}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/VaidehiKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.