Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
G. Murugaboopathi
Jon Calhoun
Claudia Calabrese
Maria Concetta Palumbo
Yilong Yin
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
N. CH. S. N. IYENGAR
Author Info
Open Visualization
Name
Affiliation
Papers
N. CH. S. N. IYENGAR
Sch Comp Sci, Vellore Inst Tech, Vellore 632014, Tamil Nadu, India
26
Collaborators
Citations
PageRank
32
84
11.24
Referers
Referees
References
197
634
292
Search Limit
100
634
Publications (26 rows)
Collaborators (32 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
JADETraderPal – JADE mobile agent embedded with flexible negotiation strategies for dynamic e-commerce environments
0
0.34
2020
A mathematical model with flexible negotiation strategies for agent based negotiations in dynamic e-commerce environments
0
0.34
2018
Optimal feature selection using a modified differential evolution algorithm and its effectiveness for prediction of heart disease.
10
0.51
2017
Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR.
0
0.34
2017
A Hybrid Model For Rice Disease Diagnosis Using Entropy Based Neuro Genetic Algorithm
0
0.34
2016
QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks
4
0.55
2015
Adaptive Semantic Indexing Of Documents For Locating Relevant Information In P2p Networks
0
0.34
2015
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks.
1
0.41
2015
Semantic indexing of hybrid frequent pattern-based clustering of documents with missing semantic information
0
0.34
2015
Algebraic Properties of Rough Set on Two Universal Sets based on Multigranulation
0
0.34
2014
A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment.
2
0.37
2014
An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks.
7
0.65
2014
A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
5
0.40
2014
Interference Aware Channel Assignmnet Using Edge Coloring in Multi-Channel Multi-Radio Wireless Mesh Networks
0
0.34
2013
An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment.
11
0.62
2013
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
3
0.45
2013
Algebraic properties and measures of uncertainty in rough set on two universal sets based on multi-granulation.
0
0.34
2013
Improved concept-based query expansion using Wikipedia
1
0.38
2013
Concept Based Clustering of Documents with Missing Semantic Information.
1
0.36
2013
An intelligent knowledge mining model for kidney cancer using rough set theory
7
0.62
2012
Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment.
6
0.65
2012
Methods of Increasing Spatial Resolution of Digital Images with Minimum Detail Loss and its Applications
0
0.34
2009
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks
8
0.48
2008
Design and performance analysis of agent-based architecture for session management
0
0.34
2007
Secure Mobile Agent System for E-Business Applications
0
0.34
2006
LSCrawler: A Framework for an Enhanced Focused Web Crawler Based on Link Semantics
18
0.74
2006
1