default search action
Bala Srinivasan 0002
Balasubramaniam Srinivasan 0002
Person information
- affiliation: Monash University, Melbourne, Australia
Other persons with the same name
- Bala Srinivasan — disambiguation page
- Bala Srinivasan 0001 (aka: Balasubramaniam Srinivasan 0001) — École Polytechnique de Montréal, Canada (and 1 more)
- Balasubramaniam Srinivasan — disambiguation page
- Balasubramaniam Srinivasan 0003 — Purdue University, Department of Computer Science, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – 2019
- 2018
- [j52]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
Activity Recognition with Evolving Data Streams: A Review. ACM Comput. Surv. 51(4): 71:1-71:36 (2018) - [j51]Omid Zanganeh, Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Quality Controlled Region-Based PartialFingerprint Recognition. J. Mobile Multimedia 14(2): 123-156 (2018) - [j50]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
A Dual Privacy Preserving Approach for Location-Based Services in Mobile Multicast Environment. Mob. Networks Appl. 23(1): 34-43 (2018) - [j49]Amiza Amir, Bala Srinivasan, Asad I. Khan:
Distributed classification for image spam detection. Multim. Tools Appl. 77(11): 13249-13278 (2018) - [c109]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Parameter Recovery Using Radon Transform. MoMM 2018: 34-43 - [i3]Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan:
Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment. CoRR abs/1806.07057 (2018) - 2017
- [j48]Md. Rakib Hassan, Gour C. Karmakar, Joarder Kamruzzaman, Bala Srinivasan:
Exclusive Use Spectrum Access Trading Models in Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutorials 19(4): 2192-2231 (2017) - [j47]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Trustworthy data delivery in mobile P2P network. J. Comput. Syst. Sci. 86: 33-48 (2017) - [c108]Jishan E. Giti, Bala Srinivasan, Joarder Kamruzzaman:
Impact of Friendly Jammers on Secrecy Multicast Capacity in Presence of Adaptive Eavesdroppers. GLOBECOM Workshops 2017: 1-6 - [c107]Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le:
A Formal Model for an Ideal CFI. ISPEC 2017: 707-726 - [c106]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Transformational Approach for Alignment-free Image Matching Applications. MoMM 2017: 49-57 - 2016
- [j46]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
AnyNovel: detection of novel concepts in evolving data streams. Evol. Syst. 7(2): 73-93 (2016) - [c105]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks. AINA 2016: 1176-1183 - [c104]Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan:
A network defense system for detecting and preventing potential hacking attempts. ICOIN 2016: 449-454 - [c103]Komal Komal, David W. Albrecht, Nandita Bhattacharjee, Bala Srinivasan:
A Region-based Alignment-free Partial Fingerprint Matching. MoMM 2016: 63-70 - 2015
- [j45]Md. Rakib Hassan, Gour C. Karmakar, Joarder Kamruzzaman, Bala Srinivasan:
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements. Comput. Networks 84: 17-31 (2015) - [j44]Abdullah Mohammed Almuhaideb, Bala Srinivasan:
Authentication in Ubiquitous Networking. Int. J. Inf. Secur. Priv. 9(3): 57-83 (2015) - [j43]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
Adaptive mobile activity recognition system with evolving data streams. Neurocomputing 150: 304-317 (2015) - [j42]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11(2): 151-168 (2015) - [j41]Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [c102]Waleed Alfehaid, Asad I. Khan, Bala Srinivasan, Salem Alkhalaf:
Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory Applications. BWCCA 2015: 92-98 - [c101]Amir H. Basirat, Asad I. Khan, Bala Srinivasan:
A Highly Distributable Computational Framework for Fast Cloud Data Retrieval. ICMLA 2015: 246-250 - [c100]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Alignment and Matching Through Region-Based Approach. MoMM 2015: 275-284 - [c99]Amiza Amir, Bala Srinivasan, Asad I. Khan:
A Communication-Efficient Distributed Algorithm for Large-scale Classification within P2P Networks. SoICT 2015: 75-82 - [c98]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid:
A Hybrid Mobile Authentication Model for Ubiquitous Networking. TrustCom/BigDataSE/ISPA (1) 2015: 360-367 - 2014
- [j40]Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Bala Srinivasan:
Time constraint route search over multi-locations. Knowl. Eng. Rev. 29(2): 217-233 (2014) - [c97]Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan:
Design and Implementation of a Mobile Broadcast System. AINA 2014: 449-456 - [c96]Omid Zanganeh, Bala Srinivasan, Nandita Bhattacharjee:
Partial Fingerprint Matching through Region-Based Similarity. DICTA 2014: 1-8 - [c95]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data. iiWAS 2014: 152-158 - [c94]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Identification Through Correlation-based Approach. SECRYPT 2014: 275-284 - [i2]Orhio Mark Creado, Bala Srinivasan, Phu Dung Le, Jefferson Tan:
An Explicit Trust Model Towards Better System Security. CoRR abs/1403.0282 (2014) - 2013
- [j39]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Ailixier Aikebaier, Makoto Takizawa, Bala Srinivasan:
Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks. Inf. Sci. 230: 3-20 (2013) - [j38]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Mobile query services in a participatory embedded sensing environment. ACM Trans. Embed. Comput. Syst. 12(2): 31:1-31:24 (2013) - [j37]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Clustering-Based Index and Data Broadcasting for Mobile Nearest Neighbor Query Processing. IEEE Trans. Ind. Informatics 9(4): 1964-1974 (2013) - [c93]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan:
Empowering Data Placement for Ad-hoc Queries in Mobile Broadcast Environments. AINA 2013: 993-1000 - [c92]Amir Hossein Basirat, Asad I. Khan, Balasubramaniam Srinivasan:
Highly Distributable Associative Memory Based Computational Framework for Parallel Data Processing in Cloud. MobiQuitous 2013: 66-77 - [c91]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan:
The Convergence of Big Data and Mobile Computing. NBiS 2013: 79-84 - 2012
- [j36]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Ailixier Aikebaier, Makoto Takizawa, Bala Srinivasan:
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. 78(6): 1716-1736 (2012) - [c90]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
CBARS: Cluster Based Classification for Activity Recognition Systems. AMLTA 2012: 82-91 - [c89]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
StreamAR: Incremental and Active Learning with Evolving Sensory Data for Activity Recognition. ICTAI 2012: 1163-1170 - [c88]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
Increasing level of confidence of iris biometric matching. IJCNN 2012: 1-8 - [c87]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
Fingerprint reference point detection based on local ridge orientation patterns of fingerprints. IJCNN 2012: 1-8 - [c86]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A method for fingerprint alignment and matching. MoMM 2012: 297-301 - [c85]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
How confident are you to counter uncertainty? SECURIT 2012: 116-125 - [c84]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra:
Analysis of mobile authentication protocols by SVO logic. SECURIT 2012: 126-134 - 2011
- [j35]Kefeng Xuan, Geng Zhao, David Taniar, Maytham Safar, Bala Srinivasan:
Constrained range search query processing on road networks. Concurr. Comput. Pract. Exp. 23(5): 491-504 (2011) - [j34]Kefeng Xuan, Geng Zhao, David Taniar, J. Wenny Rahayu, Maytham Safar, Bala Srinivasan:
Voronoi-based range and continuous range query processing in mobile databases. J. Comput. Syst. Sci. 77(4): 637-651 (2011) - [j33]Li Wang, Bala Srinivasan, Nandita Bhattacharjee:
Security Analysis and Improvements on WLANs. J. Networks 6(3): 470-481 (2011) - [j32]Kefeng Xuan, Geng Zhao, David Taniar, Maytham Safar, Bala Srinivasan:
Voronoi-based multi-level range search in mobile navigation. Multim. Tools Appl. 53(2): 459-479 (2011) - [j31]Agustinus Borgy Waluyo, J. Wenny Rahayu, David Taniar, Bala Srinivasan:
A Novel Structure and Access Mechanism for Mobile Data Broadcast in Digital Ecosystems. IEEE Trans. Ind. Electron. 58(6): 2173-2182 (2011) - [j30]Geng Zhao, Kefeng Xuan, J. Wenny Rahayu, David Taniar, Maytham Safar, Maytham L. Gavrilova, Bala Srinivasan:
Voronoi-Based Continuous k Nearest Neighbor Search in Mobile Navigation. IEEE Trans. Ind. Electron. 58(6): 2247-2257 (2011) - [j29]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Mobile broadcast services with MIMO antennae in 4G wireless networks. World Wide Web 14(4): 351-375 (2011) - [c83]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu, Makoto Takizawa:
Adaptive and Efficient Data Dissemination in Mobile P2P Environments. AINA Workshops 2011: 861-866 - [c82]Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan, Bala Srinivasan:
An Efficient Localized Chain Construction Scheme for Chain Oriented Wireless Sensor Networks. ISADS 2011: 3-9 - [c81]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. ISPA 2011: 262-269 - [c80]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. ISPA 2011: 318-323 - [c79]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A novel technique for singular point detection based on Poincaré index. MoMM 2011: 12-18 - [c78]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
On the commonality of iris biometrics. MoMM 2011: 19-25 - [c77]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks. NCA 2011: 285-288 - 2010
- [j28]Geng Zhao, Kefeng Xuan, David Taniar, Bala Srinivasan:
LookAhead continuous KNN mobile query processing. Comput. Syst. Sci. Eng. 25(3) (2010) - [j27]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan:
Dynamic Key Cryptography and Applications. Int. J. Netw. Secur. 10(3): 161-174 (2010) - [j26]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Bala Srinivasan, Huamei Qi:
Novel Hybrid Group Key Agreement for Sensitive Information Systems. J. Convergence Inf. Technol. 5(1): 69-81 (2010) - [j25]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Individual and Group Authentication Model for Wireless Network Services. J. Convergence Inf. Technol. 5(1): 82-94 (2010) - [j24]Alex Tze Hiang Sim, Maria Indrawan, Samar Zutshi, Bala Srinivasan:
Logic-Based Pattern Discovery. IEEE Trans. Knowl. Data Eng. 22(6): 798-811 (2010) - [c76]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Information Security Threats Classification Pyramid. AINA Workshops 2010: 208-213 - [c75]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Authentication Model for Wireless Network Services. AINA 2010: 996-1003 - [c74]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. AINA 2010: 1047-1053 - [c73]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
An Enhanced Global Index for Location-Based Mobile Broadcast Services. AINA 2010: 1173-1180 - [c72]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Framework to Measure the Effectiveness of Image Representations. IPCV 2010: 41-46 - [c71]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. MobiQuitous 2010: 224-236 - [c70]Li Wang, Nandita Bhattacharjee, Gopal Gupta, Bala Srinivasan:
Adaptive approach to fingerprint image enhancement. MoMM 2010: 42-49 - [c69]Parman Sukarno, Mieng Phu, Nandita Bhattacharjee, Bala Srinivasan:
Increasing error tolerance in biometric systems. MoMM 2010: 50-55 - [c68]Kefeng Xuan, David Taniar, Maytham Safar, Bala Srinivasan:
Time constrained range search queries over moving objects in road networks. MoMM 2010: 329-336 - [c67]Geng Zhao, David Taniar, J. Wenny Rahayu, Maytham Safar, Bala Srinivasan:
Path branch points in mobile navigation. MoMM 2010: 337-344 - [c66]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. ISA 2010: 249-264 - [c65]Mohammed A. Alhabeeb, Saad Alsunbul, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers. SNPD 2010: 49-54 - [c64]Abdullah Mohammed Almuhaideb, Talal Alharbi, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach. SNPD 2010: 143-148 - [c63]Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan, Bala Srinivasan:
Selecting Member Nodes in a Chain Oriented WSN. WCNC 2010: 1-6 - [i1]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens. CoRR abs/1003.5619 (2010)
2000 – 2009
- 2009
- [j23]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers. Int. J. Bus. Data Commun. Netw. 5(3): 67-90 (2009) - [j22]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. Int. J. Comput. Sci. Appl. 6(3): 57-74 (2009) - [j21]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Continuous range search based on network Voronoi diagram. Int. J. Grid Util. Comput. 1(4): 328-335 (2009) - [j20]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Mobile service oriented architectures for NN-queries. J. Netw. Comput. Appl. 32(2): 434-447 (2009) - [c62]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Network Voronoi Diagram Based Range Search. AINA 2009: 741-748 - [c61]Samar Zutshi, Campbell Wilson, Bala Srinivasan:
Proto-reduct Fusion Based Relevance Feedback in CBIR. ICAPR 2009: 121-124 - [c60]Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina L. Gavrilova, Bala Srinivasan:
Multiple Object Types KNN Search Using Network Voronoi Diagram. ICCSA (2) 2009: 819-834 - [c59]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
An effective crypto-biometric system for secure email in wireless environment. MoMM 2009: 241-245 - [c58]Yiling Wang, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
Multicasting Key Management in Wireless Networks. NBiS 2009: 234-239 - [c57]Huy Hoang Ngo, Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
A Membership-Oriented Group Key Management for Application Services. NBiS 2009: 240-245 - [p3]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Information Processing Involving Multiple Non-Collaborative Sources. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 1108-1126 - [p2]Say Ying Lim, David Taniar, Bala Srinivasan:
A Taxonomy of Database Operations on Mobile Devices. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 1235-1256 - 2008
- [j19]Alex Tze Hiang Sim, Maria Indrawan, Bala Srinivasan:
The importance of negative associations and the discovery of association rule pairs. Int. J. Bus. Intell. Data Min. 3(2): 158-176 (2008) - [j18]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Indexing schemes for multichannel data broadcasting in mobile databases. Int. J. Wirel. Mob. Comput. 3(1/2): 79-90 (2008) - [j17]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
Fraudulent Internet Banking Payments Prevention using Dynamic Key. J. Networks 3(1): 25-34 (2008) - [j16]Geng Zhao, Kefeng Xuan, David Taniar, Bala Srinivasan:
Incremental k-Nearest-Neighbor Search on Road Networks. J. Interconnect. Networks 9(4): 455-470 (2008) - [c56]Aparna Kanakatte, Nallasamy Mani, Bala Srinivasan, Jayavardhana Gubbi:
Pulmonary Tumor Volume Detection from Positron Emission Tomography Images. BMEI (2) 2008: 213-217 - [c55]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. Security and Management 2008: 93-99 - [c54]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan:
Continuous Range Search Query Processing in Mobile Navigation. ICPADS 2008: 361-368 - [c53]Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan:
Dynamic Keys Based Sensitive Information System. ICYCS 2008: 1895-1901 - [c52]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Study of Wavelets-Based Image Representations and Their Effectiveness. IPCV 2008: 638-642 - 2007
- [j15]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Information Processing Involving Multiple Non-collaborative Sources. Int. J. Bus. Data Commun. Netw. 3(2): 72-93 (2007) - [j14]Murali Muniyandi, Shonali Krishnaswamy, Bala Srinivasan:
Improving the quality of business and quality of experience in web services through prioritising and scheduling. Int. J. Bus. Process. Integr. Manag. 2(3): 156-171 (2007) - [c51]Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan:
Hybrid Group Key Management Scheme for Secure Wireless Multicast. ACIS-ICIS 2007: 346-351 - [c50]Samar Zutshi, Campbell Wilson, Bala Srinivasan:
Reduct-Based Result Set Fusion for Relevance Feedback in CBIR. ACIS-ICIS 2007: 918-923 - [c49]Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Multiple Entity Types Wireless Broadcast Database System. AINA 2007: 179-186 - [c48]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection. ICEIS (4) 2007: 57-62 - [c47]Ehsan A. Aghdaee, Nallasamy Mani, Bala Srinivasan:
An Enhanced Bandwidth Allocation Algorithms for QoS Provision in IEEE 802.16 BWA. ICOIN 2007: 709-718 - [c46]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. ITNG 2007: 83-88 - [c45]Flora Dilys Salim, Seng Wai Loke, Andry Rakotonirainy, Bala Srinivasan, Shonali Krishnaswamy:
Collision Pattern Modeling and Real-Time Collision Detection at Road Intersections. ITSC 2007: 161-166 - [c44]Bala Srinivasan, Asad I. Khan, Raja Azlina Raja Mahmood:
Abnormal Behaviour Detection within Mobile Networks. MoMM 2007: 3-10 - [c43]Minh Viet Le, P. D. Le, Balasubramaniam Srinivasan:
A methodology for deriving objective image comparison metrics. SIP 2007: 87-91 - [c42]Osama Dandash, Phu Dung Le, Bala Srinivasan:
Security Analysis for Internet Banking Models. SNPD (3) 2007: 1141-1146 - 2006
- [c41]Xianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan:
The design and implementation of a wireless payment system. COMSWARE 2006 - [c40]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar, J. Wenny Rahayu, Bernady O. Apduhan:
Performance Analysis of Unified Data Broadcast Model for Multi-channel Wireless Databases. UIC 2006: 698-707 - 2005
- [j13]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Research on location-dependent queries in mobile databases. Comput. Syst. Sci. Eng. 20(2) (2005) - [j12]