Shalini, S. ., Naikodi, C. ., & Suresh, L. . (2015). Path oriented randomly-generated keys for uncompromising security in MANETs. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCS.2015.7324084
CSE
Suresh, L. ., Simha, J. ., & Velur, R. . (2009). Analysis and prediction server with column store database - A case study in telecom churn. https://doi.org/10.1109/TENCON.2009.5395982
Bhat, P. ., & Reddy, K. . (2015). Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in Wireless Sensor Networks. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICACCI.2015.7275734
Kumar, D. S., Kumar, R. ., Raja, K. ., Chhotaray, R. ., & Pattanaik, S. . (2010). Combined Off-Line Signature Verification Using Neural Networks. https://doi.org/10.1007/978-3-642-15766-0_99
Suresh, L. ., Simha, J. ., & Velur, R. . (2010). Seeding cluster centers of K-means clustering through median projection. https://doi.org/10.1109/CISIS.2010.133
Zou, D.-X. ., Deb, S. ., & Wang, G.-G. . (2016). Infinitive Impulse Response System Identification Using an Improved Particle Swarm Optimization Algorithm. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ISCMI.2015.13
Biradar, A. ., Panda, S. ., & Thool, R. . (2008). Synchronization of traffic pattern in mobile ad-hoc network with genetic algorithm. https://doi.org/10.1109/ICETET.2008.55
Rajappa, V. ., Biradar, A. ., & Panda, S. . (2008). Efficient software test case generation using genetic algorithm based graph theory. https://doi.org/10.1109/ICETET.2008.79
Simha, J. ., Suresh, L. ., & Velur, R. . (2009). rePivot - Developing analysis services with column store database. https://doi.org/10.1109/ICETET.2009.191
Fong, S. ., Deb, S. ., Hanne, T. ., & Li, J. . (2016). Eidetic Wolf Search Algorithm with a global memory structure. European Journal of Operational Research, 254(1), 19-28. https://doi.org/10.1016/j.ejor.2016.03.043