default search action
Pallapa Venkataram
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j43]Venkatesan Subramanian, Kalaivany Karthikeyan, Pallapa Venkataram:
A Concept Map based Teaching of Compiler Design for Undergraduate Students. EAI Endorsed Trans. e Learn. 8(1): e4 (2023) - 2022
- [j42]Chandrashekhar Pomu Chavan, Pallapa Venkataram:
Design and implementation of event-based multicast AODV routing protocol for ubiquitous network. Array 14: 100129 (2022) - 2021
- [j41]Kirti Keshav, Ashish Kumar Pradhan, T. Srinivas, Pallapa Venkataram:
Dynamic QoS Management for Interactive Multimedia in Integrated 4G/5G Networks. EAI Endorsed Trans. Mob. Commun. Appl. 6(19): e2 (2021) - [j40]Suresh Chavhan, Pallapa Venkataram:
Transport Management for Evacuation of Victims. IEEE Trans. Emerg. Top. Comput. Intell. 5(3): 426-441 (2021) - 2020
- [j39]Preeti Khanwalkar, Pallapa Venkataram:
Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors. EAI Endorsed Trans. Context aware Syst. Appl. 7(22): e2 (2020) - [j38]Preeti Khanwalkar, Pallapa Venkataram:
Organization of Museum Exhibit Information for Ubiquitous Visitors. EAI Endorsed Trans. Creative Technol. 7(25): e2 (2020)
2010 – 2019
- 2019
- [j37]Swapnil S. Ninawe, Pallapa Venkataram:
Authentication schemes for social network users: a review. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 151-176 (2019) - [c19]Suresh Chavhan, Pallapa Venkataram:
Emergent Intelligence: A Novel Computational Intelligence Technique to Solve Problems. ICAART (1) 2019: 93-102 - 2018
- [j36]T. Divya Sai Keerthi, Pallapa Venkataram:
Confirmation of wormhole attack in MANETs using honeypot. Comput. Secur. 76: 32-49 (2018) - [j35]Bhawani Shanker Bhati, Pallapa Venkataram:
Performance Analysis of Privacy Protection System During Data Transfer in MANETs. Int. J. Wirel. Inf. Networks 25(1): 30-43 (2018) - [j34]T. Divya Sai Keerthi, Pallapa Venkataram:
Honeypot Based Black-Hole Attack Confirmation in a MANET - Black-Hole Attack Confirmation. Int. J. Wirel. Inf. Networks 25(4): 434-448 (2018) - 2017
- [j33]Seema B. Hegde, B. Satish Babu, Pallapa Venkataram:
A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. J. Intell. Syst. 26(1): 47-68 (2017) - [j32]Bhawani Shanker Bhati, Pallapa Venkataram:
Preserving Data Privacy During Data Transfer in MANETs. Wirel. Pers. Commun. 97(3): 4063-4086 (2017) - [i4]Seema B. Hegde, B. Sathish Babu, Pallapa Venkataram:
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach. CoRR abs/1707.03148 (2017) - [i3]Seema B. Hegde, B. Satish Babu, Pallapa Venkataram:
A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks. CoRR abs/1707.03199 (2017) - 2016
- [j31]Mallikarjun B. Channappagoudar, Pallapa Venkataram:
Performance evaluation of mobile agent based resource management protocol for MANETs. Ad Hoc Networks 36: 308-320 (2016) - [j30]Bhawani Shanker Bhati, Pallapa Venkataram:
Performance Analysis of Location Privacy Preserving Scheme for MANETs. Int. J. Netw. Secur. 18(4): 736-749 (2016) - [j29]Swapnil S. Ninawe, Pallapa Venkataram:
A method of designing an access mechanism for social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 387-408 (2016) - 2015
- [j28]Swapnil S. Ninawe, Pallapa Venkataram:
A method of designing a generic actor model for a professional social network. Hum. centric Comput. Inf. Sci. 5: 25 (2015) - [j27]Mallikarjun B. Channappagoudar, Pallapa Venkataram:
Performance analysis of a node monitoring protocol for mobile ad-hoc networks: an agent-based approach. Int. J. Commun. Networks Distributed Syst. 14(3): 303-338 (2015) - [j26]Sarada Prasad Gochhayat, Pallapa Venkataram:
An Efficient QoS Support for Ubiquitous Networks. IEEE Trans. Emerg. Top. Comput. 3(4): 524-533 (2015) - [c18]Suresh Chavhan, Pallapa Venkataram:
Emergent Intelligence Based QoS Routing in MANET. ANT/SEIT 2015: 659-664 - [c17]Preeti Khanwalkar, Pallapa Venkataram:
Context-Based Service Identification in the Museum Environment. ICCASA 2015: 151-164 - [c16]Swapnil S. Ninawe, Pallapa Venkataram:
Web Service Query Selection for a Professional Social Network Members. NGMAST 2015: 29-34 - [c15]T. Divya Sai Keerthi, Pallapa Venkataram:
AODV route maintenance using HoneyPots in MANETs. WorldCIS 2015: 105-112 - [i2]Chandrashekhar Pomu Chavan, Pallapa Venkataram:
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme. CoRR abs/1507.07662 (2015) - [i1]Anandi Giridharan, Pallapa Venkataram:
SDL based validation of a node monitoring protocol. CoRR abs/1508.07724 (2015) - 2014
- [c14]Bhawani Shanker Bhati, Pallapa Venkataram:
Data privacy preserving scheme in MANETs. WorldCIS 2014: 22-23 - 2013
- [j25]B. Sathish Babu, Bhargavi K., Pallapa Venkataram:
CAs-Based QoS Scheme for Remote Health Monitoring. Int. J. Agent Technol. Syst. 5(4): 44-67 (2013) - [j24]B. Sathish Babu, Jayashree N., Pallapa Venkataram:
Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks. Int. J. Netw. Secur. 15(5): 331-340 (2013) - [j23]Sarada Prasad Gochhayat, Pallapa Venkataram:
Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(3): 23-40 (2013) - [c13]Pallapa Venkataram, M. Bharath:
A Method of Context-Based Services Discovery in Ubiquitous Environment. ICCASA 2013: 260-270 - 2012
- [c12]T. Divya Sai Keerthi, Pallapa Venkataram:
Locating the Attacker of Wormhole Attack by Using the Honeypot. TrustCom 2012: 1175-1180 - 2011
- [c11]P. V. Pushpa, Pallapa Venkataram:
Context aware M-commerce services: C-IOB model approach. ICICS 2011: 1-5 - [c10]Pallapa Venkataram, M. Bharath:
Context based service discovery for ubiquitous applications. ICOIN 2011: 311-316
2000 – 2009
- 2009
- [j22]B. Sathish Babu, Pallapa Venkataram:
A Dynamic Authentication Scheme for Mobile Transactions. Int. J. Netw. Secur. 8(1): 59-74 (2009) - [j21]B. Sathish Babu, Pallapa Venkataram:
Random security scheme selection for mobile transactions. Secur. Commun. Networks 2(6): 694-708 (2009) - 2008
- [j20]B. Sathish Babu, Pallapa Venkataram:
Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS). Comput. Commun. 31(17): 4060-4071 (2008) - [j19]Pallapa Venkataram, Jeremy Pitt, B. Sathish Babu, Ebrahim Mamdani:
An intelligent proactive security system for cyber centres using Cognitive Agents. Int. J. Inf. Comput. Secur. 2(3): 235-249 (2008) - [j18]G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:
An efficient resource allocation scheme for multimedia applications in MANET. J. Netw. Comput. Appl. 31(4): 577-584 (2008) - [c9]Prashant K. Wali, Pallapa Venkataram:
An effective seamless connectivity scheme for ubiquitous applications. MoMM 2008: 307-312 - 2007
- [j17]Basavaraj Talwar, Pallapa Venkataram, Lalit M. Patnaik:
A Method for Resource and Service Discovery in MANETs. Wirel. Pers. Commun. 41(2): 301-323 (2007) - [c8]B. Sathish Babu, Pallapa Venkataram:
An Authentication Scheme for Personalized Mobile Multimedia Services: A Cognitive Agents Based Approach. FGCN (1) 2007: 167-172 - [c7]G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:
New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications. FGCN (2) 2007: 540-542 - [c6]Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal:
A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. IPCCC 2007: 395-401 - [c5]B. Sathish Babu, Pallapa Venkataram:
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach. IPDPS 2007: 1-8 - 2006
- [j16]Sunilkumar S. Manvi, Pallapa Venkataram:
Agent-based subsystem for multimedia communications. IEE Proc. Softw. 153(1): 38-48 (2006) - [j15]Sunilkumar S. Manvi, Pallapa Venkataram:
An Agent-Based Best Effort Routing Technique for Load Balancing. Informatica 17(3): 407-426 (2006) - 2005
- [c4]Jeremy Pitt, Pallapa Venkataram, Abe Mamdani:
QoS Management in MANETs Using Norm-Governed Agent Societies. ESAW 2005: 221-240 - [c3]Gowrishankar, G. Varaprasad, G. T. Raju, Suresh Kahandige, Pallapa Venkataram, R. S. D. Wahida Banu:
A Middleware for Distributed System in Heterogeneous Wireless Networks. ICPADS (2) 2005: 654-658 - 2003
- [j14]Pallapa Venkataram, R. Rajavelsamy, Shashikant Chaudhari, T. R. Ramamohan, H. Ramakrishna:
A Wireless Rural Education and Learning System Based on Disk Oriented MPEG Streaming Multimedia. Int. J. Distance Educ. Technol. 1(4): 20-38 (2003) - [j13]B. P. Vijay Kumar, Pallapa Venkataram:
A Neural Network-Based Connectivity Management for Mobile Computing Environment. Int. J. Wirel. Inf. Networks 10(2): 63-71 (2003) - 2002
- [j12]Pallapa Venkataram, Sudip Ghosal, B. P. Vijay Kumar:
Neural network based optimal routing algorithm for communication networks. Neural Networks 15(10): 1289-1298 (2002) - [j11]B. P. Vijay Kumar, Pallapa Venkataram:
A LP-RR principle-based admission control for a mobile network. IEEE Trans. Syst. Man Cybern. Part C 32(4): 293-306 (2002) - [j10]B. P. Vijay Kumar, Pallapa Venkataram:
A LP-based Admission Control Using Artificial Neural Networks for Integrated Services in Mobile Networks. Wirel. Pers. Commun. 20(3): 219-236 (2002) - 2001
- [j9]Pallapa Venkataram, R. Rajavelsamy, S. Laxmaiah:
A method of data transfer control during handoffs in mobile-IP based multimedia networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(2): 27-36 (2001) - [j8]Anirban Roy, Pallapa Venkataram:
Design of a Link Control Protocol for Multimedia Services in Wireless Local Communication. Wirel. Pers. Commun. 18(3): 247-274 (2001)
1990 – 1999
- 1999
- [j7]Anirban Roy, Pallapa Venkataram:
A multiple access scheme for VBR traffic in broadband wireless local communication. Comput. Commun. 22(4): 353-360 (1999) - 1998
- [j6]G. Prem Kumar, Pallapa Venkataram:
Network restoration using recurrent neural networks. Int. J. Netw. Manag. 8(5): 264-273 (1998) - [j5]Ananthanarayanan Chockalingam, Michele Zorzi, Laurence B. Milstein, Pallapa Venkataram:
Performance of a wireless access protocol on correlated Rayleigh-fading channels with capture. IEEE Trans. Commun. 46(5): 644-655 (1998) - 1997
- [j4]Ashish Verma, Pallapa Venkataram:
Performance of centralized bandwidth reservation protocol in AVPNs. Comput. Commun. Rev. 27(3): 47-66 (1997) - [j3]G. Prem Kumar, Pallapa Venkataram:
Artificial intelligence approaches to network management: recent advances and a survey. Comput. Commun. 20(15): 1313-1322 (1997) - 1995
- [c2]G. Prem Kumar, Pallapa Venkataram:
Network performance management using realistic abductive reasoning model. Integrated Network Management 1995: 187-198 - 1994
- [j2]Ananthanarayanan Chockalingam, Pallapa Venkataram, A. Prabhakar:
Throughput-delay characteristics of OCUM protocol for media access in multihop wireless networks with buffers. Comput. Commun. 17(6): 419-427 (1994) - 1993
- [c1]Gang Luo, Rachida Dssouli, Gregor von Bochmann, Pallapa Venkataram, Abderrazak Ghedamsi:
Generating Synchronizable Test Sequences Based on Finite State Machine with Distributed Ports. Protocol Test Systems 1993: 139-153
1980 – 1989
- 1987
- [j1]Valerie J. Gillet, Geoffrey M. Downs, Ai Ling, Michael F. Lynch, Pallapa Venkataram, Jennifer V. Wood, Winfried Dethlefsen:
Computer storage and retrieval of generic chemical structures in patents. 8. Reduced chemical graphs and their applications in generic chemical structure retrieval. J. Chem. Inf. Comput. Sci. 27(3): 126-137 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint