Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Valli Kumari Vatsavayi
@article{DBLP:journals/jcm/YadwadV22, author = {Sunita A. Yadwad and Valli Kumari Vatsavayi}, title = {Fault Prediction for Network Devices Using Service Outage Prediction Model}, journal = {J. Commun.}, volume = {17}, number = {5}, pages = {339--349}, year = {2022}, url = {https://doi.org/10.12720/jcm.17.5.339-349}, doi = {10.12720/JCM.17.5.339-349}, timestamp = {Tue, 07 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/YadwadV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/VatsavayiA22, author = {Valli Kumari Vatsavayi and Nagaraju Andavarapu}, title = {Identification and classification of wild animals from video sequences using hybrid deep residual convolutional neural network}, journal = {Multim. Tools Appl.}, volume = {81}, number = {23}, pages = {33335--33360}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12852-w}, doi = {10.1007/S11042-022-12852-W}, timestamp = {Wed, 24 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/VatsavayiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/KumarKR22, author = {Sajja Ratan Kumar and V. Valli Kumari and K. V. S. V. N. Raju}, title = {Time Series Dataset For {DDOS} Attack Detection}, publisher = {{IEEE} DataPort}, year = {2022}, month = jan, howpublished = {\url{https://doi.org/10.21227/td3p-4n51}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/td3p-4n51}, doi = {10.21227/TD3P-4N51}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/KumarKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jois/KiranKR21, author = {B. Ravi Kiran and Vatsavayi Valli Kumari and K. V. S. V. N. Raju}, title = {Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion}, journal = {J. Intell. Syst.}, volume = {30}, number = {1}, pages = {346--360}, year = {2021}, url = {https://doi.org/10.1515/jisys-2018-0412}, doi = {10.1515/JISYS-2018-0412}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jois/KiranKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/KiranK19, author = {B. Ravi Kiran and V. Valli Kumari}, title = {High dynamic range image tone mapping technique based on the improved bitonic filter}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {23}, number = {2}, pages = {121--129}, year = {2019}, url = {https://doi.org/10.3233/KES-190405}, doi = {10.3233/KES-190405}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/KiranK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasKR18, author = {Vegi Srinivas and Vatsavayi Valli Kumari and K. V. S. V. N. Raju}, title = {Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {5}, pages = {951--959}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n5/ijns-2018-v20-n5-p951-959.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/VatsavayiK18, author = {Valli Kumari Vatsavayi and Hari Kishan Kondaveeti}, title = {Efficient {ISAR} image classification using {MECSM} representation}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {30}, number = {3}, pages = {356--372}, year = {2018}, url = {https://doi.org/10.1016/j.jksuci.2016.07.004}, doi = {10.1016/J.JKSUCI.2016.07.004}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/VatsavayiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jois/RaoKR17, author = {A. Rama Rao and V. Valli Kumari and Ch. Satyananda Reddy}, title = {Exponential Genetic Algorithm-Based Stable and Load-Aware QoS Routing Protocol for {MANET}}, journal = {J. Intell. Syst.}, volume = {26}, number = {4}, pages = {669--682}, year = {2017}, url = {https://doi.org/10.1515/jisys-2016-0031}, doi = {10.1515/JISYS-2016-0031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jois/RaoKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdr/VarmaKKR16, author = {P. China Venkanna Varma and Venkata Kalyan Chakravarthy K. and V. Valli Kumari and S. Viswanadha Raju}, title = {Analysis of a Network {IO} Bottleneck in Big Data Environments Based on Docker Containers}, journal = {Big Data Res.}, volume = {3}, pages = {24--28}, year = {2016}, url = {https://doi.org/10.1016/j.bdr.2015.12.002}, doi = {10.1016/J.BDR.2015.12.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdr/VarmaKKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/NadimpalliV16, author = {Sandeep Varma Nadimpalli and Valli Kumari Vatsavayi}, title = {Verification in Privacy Preserving Data Publishing}, journal = {Comput. Informatics}, volume = {35}, number = {5}, pages = {1160--1188}, year = {2016}, url = {http://www.cai.sk/ojs/index.php/cai/article/view/1925}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cai/NadimpalliV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hcis/KumariC16, author = {Valli Kumari Vatsavayi and Srinivasa Chakravarthy}, title = {Cooperative privacy game: a novel strategy for preserving privacy in data publishing}, journal = {Hum. centric Comput. Inf. Sci.}, volume = {6}, pages = {12}, year = {2016}, url = {https://doi.org/10.1186/s13673-016-0069-y}, doi = {10.1186/S13673-016-0069-Y}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hcis/KumariC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChandakannaV16, author = {Veerabhadra Rao Chandakanna and Valli Kumari Vatsavayi}, title = {A QoS-aware self-correcting observation based load balancer}, journal = {J. Syst. Softw.}, volume = {115}, pages = {111--129}, year = {2016}, url = {https://doi.org/10.1016/j.jss.2016.01.042}, doi = {10.1016/J.JSS.2016.01.042}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChandakannaV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icia2/JyothiK16, author = {Vadisala Jyothi and V. Valli Kumari}, editor = {V. Akila and N. Sivakumar and K. Saruladha and G. Zayaraz and E. Ilavarasan}, title = {Privacy Preserving in Dynamic Social Networks}, booktitle = {Proceedings of the International Conference on Informatics and Analytics, {ICIA} 2016, Pondicherry, India, August 25-26, 2016}, pages = {79:1--79:8}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2980258.2980426}, doi = {10.1145/2980258.2980426}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icia2/JyothiK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijista/VarmaKK15, author = {P. Ravi Kiran Varma and V. Valli Kumari and Samayamantula Srinivas Kumar}, title = {A novel rough set attribute reduction based on ant colony optimisation}, journal = {Int. J. Intell. Syst. Technol. Appl.}, volume = {14}, number = {3/4}, pages = {330--353}, year = {2015}, url = {https://doi.org/10.1504/IJISTA.2015.074333}, doi = {10.1504/IJISTA.2015.074333}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijista/VarmaKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChandakannaV15, author = {Veerabhadra Rao Chandakanna and Valli Kumari Vatsavayi}, title = {A sliding window based Self-Learning and Adaptive Load Balancer}, journal = {J. Netw. Comput. Appl.}, volume = {56}, pages = {188--205}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.07.001}, doi = {10.1016/J.JNCA.2015.07.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChandakannaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpros/VarmaKKR15, author = {P. China Venkanna Varma and Venkata Kalyan Chakravarthy K. and V. Valli Kumari and S. Viswanadha Raju}, editor = {Millie Pant and Kusum Deep and Jagdish Chand Bansal and Atulya Nagar and Kedar Nath Das}, title = {Analysis of Network {IO} Performance in Hadoop Cluster Environments Based on Docker Containers}, booktitle = {Proceedings of Fifth International Conference on Soft Computing for Problem Solving - SocProS 2015, Volume 2, Saharanpur, Uttar Pradesh, India, December 18-20, 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {437}, pages = {227--237}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0451-3\_22}, doi = {10.1007/978-981-10-0451-3\_22}, timestamp = {Fri, 27 Dec 2019 21:28:34 +0100}, biburl = {https://dblp.org/rec/conf/socpros/VarmaKKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpros/AndavarapuV15, author = {Nagaraju Andavarapu and Valli Kumari Vatsavayi}, editor = {Millie Pant and Kusum Deep and Jagdish Chand Bansal and Atulya Nagar and Kedar Nath Das}, title = {Weighted CoHOG (W-CoHOG) Feature Extraction for Human Detection}, booktitle = {Proceedings of Fifth International Conference on Soft Computing for Problem Solving - SocProS 2015, Volume 2, Saharanpur, Uttar Pradesh, India, December 18-20, 2015}, series = {Advances in Intelligent Systems and Computing}, volume = {437}, pages = {273--283}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0451-3\_26}, doi = {10.1007/978-981-10-0451-3\_26}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socpros/AndavarapuV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcistudies/ChakravarthyK14, author = {Srinivasa Chakravarthy and V. Valli Kumari}, title = {Privacy preserving data publishing: a coalitional game theory perspective}, journal = {Int. J. Comput. Intell. Stud.}, volume = {3}, number = {2/3}, pages = {196--220}, year = {2014}, url = {https://doi.org/10.1504/IJCISTUDIES.2014.062733}, doi = {10.1504/IJCISTUDIES.2014.062733}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcistudies/ChakravarthyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jikm/VatsavayiA14, author = {Valli Kumari Vatsavayi and Sri Krishna Adusumalli}, title = {Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy}, journal = {J. Inf. Knowl. Manag.}, volume = {13}, number = {4}, year = {2014}, url = {https://doi.org/10.1142/S021964921450035X}, doi = {10.1142/S021964921450035X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jikm/VatsavayiA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RaoK14, author = {G. Sanjiv Rao and V. Valli Kumari}, title = {Trail Coverage : {A} Coverage Model for Efficient Intruder Detection near Geographical Obstacles in WSNs}, journal = {J. Networks}, volume = {9}, number = {12}, pages = {3336--3346}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.12.3336-3346}, doi = {10.4304/JNW.9.12.3336-3346}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RaoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChandakannaV14, author = {Veerabhadra Rao Chandakanna and Valli Kumari Vatsavayi}, title = {A model view controller based Self-Adjusting Clustering Framework}, journal = {J. Syst. Softw.}, volume = {89}, pages = {193--206}, year = {2014}, url = {https://doi.org/10.1016/j.jss.2013.11.1112}, doi = {10.1016/J.JSS.2013.11.1112}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChandakannaV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/RajuK13, author = {K. V. Krishnam Raju and V. Valli Kumari}, title = {Formal Verification of {IEEE} 802.11 Authentication Protocols}, journal = {J. Networks}, volume = {8}, number = {4}, pages = {769--778}, year = {2013}, url = {https://doi.org/10.4304/jnw.8.4.769-778}, doi = {10.4304/JNW.8.4.769-778}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/RajuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/GadirajuK13, author = {Mahesh Gadiraju and Vastavayi Valli Kumari}, title = {Primal-dual parallel algorithm for continuous aggregate query dissemination}, booktitle = {International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2013, Mysore, India, August 22-25, 2013}, pages = {545--549}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICACCI.2013.6637230}, doi = {10.1109/ICACCI.2013.6637230}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/GadirajuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/AdusumalliK13, author = {Sri Krishna Adusumalli and V. Valli Kumari}, editor = {Chittaranjan Hota and Pradip K. Srimani}, title = {An Efficient and Dynamic Concept Hierarchy Generation for Data Anonymization}, booktitle = {Distributed Computing and Internet Technology, 9th International Conference, {ICDCIT} 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7753}, pages = {488--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36071-8\_39}, doi = {10.1007/978-3-642-36071-8\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/AdusumalliK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cube/ViswanadhamK12, author = {Sangeeta Viswanadham and Vatsavayi Valli Kumari}, editor = {Vidyasagar M. Potdar and Debajyoti Mukhopadhyay}, title = {An efficient approach to identify n-wMVD for eliminating data redundancy}, booktitle = {{CUBE} International {IT} Conference {\&} Exhibition, {CUBE} '12, Pune, India - September 03 - 06, 2012}, pages = {464--469}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381716.2381804}, doi = {10.1145/2381716.2381804}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cube/ViswanadhamK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/NadimpalliV12, author = {Sandeep Varma Nadimpalli and Valli Kumari Vatsavayi}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Detecting dependencies in an anonymized dataset}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {82--89}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345410}, doi = {10.1145/2345396.2345410}, timestamp = {Sun, 29 Aug 2021 01:08:46 +0200}, biburl = {https://dblp.org/rec/conf/icacci/NadimpalliV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/RajuK12, author = {Bhupathiraju V. S. Ramakrishnam Raju and Vatsavayi Valli Kumari}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Parameter-lite clustering algorithm based on {MST} and fuzzy similarity merging}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {1019--1026}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345560}, doi = {10.1145/2345396.2345560}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/RajuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/SunkaraAKR12, author = {Raja Sunkara and Aditya Achanta and Vatsavayi Valli Kumari and K. V. S. V. N. Raju}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {SenSim: sentence similarity based on the concept of relevance}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {1086--1092}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345570}, doi = {10.1145/2345396.2345570}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/SunkaraAKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/BollaVM12, author = {Jhansi Vazram Bolla and Valli Kumari Vatsavayi and J. V. R. Murthy}, editor = {Ramaswamy Ramanujam and Srini Ramaswamy}, title = {Anonymity and Security in Mobile Ad Hoc Networks}, booktitle = {Distributed Computing and Internet Technology - 8th International Conference, {ICDCIT} 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7154}, pages = {71--82}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28073-3\_7}, doi = {10.1007/978-3-642-28073-3\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcit/BollaVM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intelligent/ViswanadhamK12, author = {Sangeeta Viswanadham and Vatsavayi Valli Kumari}, editor = {Ajith Abraham and Sabu M. Thampi}, title = {An Approach to Identify n-wMVD for Eliminating Data Redundancy}, booktitle = {Intelligent Informatics - Proceedings of the International Symposium on Intelligent Informatics ISI'12 Held at August 4-5 2012, Chennai, India}, series = {Advances in Intelligent Systems and Computing}, volume = {182}, pages = {89--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32063-7\_11}, doi = {10.1007/978-3-642-32063-7\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intelligent/ViswanadhamK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securit/ReddyKR12, author = {B. Dinesh Reddy and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {R. Chandrasekhar and Andrew S. Tanenbaum and P. Venkat Rangan}, title = {Randomized symmetric block encryption}, booktitle = {First International Conference on Security of Internet of Things, {SECURIT} '12, Kollam, India - August 17 - 19, 2012}, pages = {222--226}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2490428.2490460}, doi = {10.1145/2490428.2490460}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securit/ReddyKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acc/BodduV11, author = {Bhaskara Rao Boddu and Valli Kumari Vatsavayi}, editor = {Ajith Abraham and Jaime Lloret Mauri and John F. Buford and Junichi Suzuki and Sabu M. Thampi}, title = {A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm}, booktitle = {Advances in Computing and Communications - First International Conference, {ACC} 2011, Kochi, India, July 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {191}, pages = {296--306}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22714-1\_31}, doi = {10.1007/978-3-642-22714-1\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acc/BodduV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acc/AdusumalliK11, author = {Sri Krishna Adusumalli and V. Valli Kumari}, editor = {Ajith Abraham and Jaime Lloret Mauri and John F. Buford and Junichi Suzuki and Sabu M. Thampi}, title = {Attribute Based Anonymity for Preserving Privacy}, booktitle = {Advances in Computing and Communications - First International Conference, {ACC} 2011, Kochi, India, July 22-24, 2011, Proceedings, Part {IV}}, series = {Communications in Computer and Information Science}, volume = {193}, pages = {572--579}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22726-4\_59}, doi = {10.1007/978-3-642-22726-4\_59}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acc/AdusumalliK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/KumariVKRR11, author = {V. Valli Kumari and N. Sandeep Varma and A. Sri Krishna and K. Venkata Ramana and K. V. S. V. N. Raju}, editor = {Raja Natarajan and Adegboyega K. Ojo}, title = {Checking Anonymity Levels for Anonymized Data}, booktitle = {Distributed Computing and Internet Technology - 7th International Conference, {ICDCIT} 2011, Bhubaneshwar, India, February 9-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6536}, pages = {278--289}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19056-8\_21}, doi = {10.1007/978-3-642-19056-8\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcit/KumariVKRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/NadimpalliV11, author = {Sandeep Varma Nadimpalli and Valli Kumari Vatsavayi}, title = {{BM} (Break-Merge): An Elegant Approach for Privacy Preserving Data Publishing}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {1202--1207}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.153}, doi = {10.1109/PASSAT/SOCIALCOM.2011.153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/NadimpalliV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpros/RamanaKR11, author = {K. Venkata Ramana and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {Kusum Deep and Atulya Nagar and Millie Pant and Jagdish Chand Bansal}, title = {Minimum Spanning Tree Based k-Anonymity}, booktitle = {Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011 - Volume 1}, series = {Advances in Intelligent and Soft Computing}, volume = {130}, pages = {405--413}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-81-322-0487-9\_39}, doi = {10.1007/978-81-322-0487-9\_39}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socpros/RamanaKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-4727, author = {Ramaprasada R. Kalidindi and K. V. S. V. N. Raju and V. Valli Kumari and Ch. Satyananda Reddy}, title = {Trust Based Participant Driven Privacy Control in Participatory Sensing}, journal = {CoRR}, volume = {abs/1103.4727}, year = {2011}, url = {http://arxiv.org/abs/1103.4727}, eprinttype = {arXiv}, eprint = {1103.4727}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-4727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/baip/RaoKR10, author = {V. V. R. Maheswara Rao and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {Vinu V. Das and R. Vijayakumar and Narayan C. Debnath and Janahanlal Stephen and Natarajan Meghanathan and Suresh Sankaranarayanan and P. M. Thankachan and Ford Lumban Gaol and Nessy Thankachan}, title = {Study of Visitor Behavior by Web Usage Mining}, booktitle = {Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {70}, pages = {181--187}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12214-9\_31}, doi = {10.1007/978-3-642-12214-9\_31}, timestamp = {Thu, 01 Jun 2017 18:59:02 +0200}, biburl = {https://dblp.org/rec/conf/baip/RaoKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/baip/RajuKR10, author = {D. V. Naga Raju and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {Vinu V. Das and R. Vijayakumar and Narayan C. Debnath and Janahanlal Stephen and Natarajan Meghanathan and Suresh Sankaranarayanan and P. M. Thankachan and Ford Lumban Gaol and Nessy Thankachan}, title = {Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring}, booktitle = {Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {70}, pages = {194--201}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12214-9\_33}, doi = {10.1007/978-3-642-12214-9\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/baip/RajuKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RajuK10, author = {D. V. Naga Raju and V. Valli Kumari}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {{TRING:} {A} New Framework for Efficient Group Key Distribution for Dynamic Groups}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {55--65}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_6}, doi = {10.1007/978-3-642-14478-3\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/RajuK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/RajuKR10, author = {D. V. Naga Raju and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {P. R. Kumar and Henning Schulzrinne and Harrick M. Vin}, title = {Scalable rekeying for dynamic groups using key path compression}, booktitle = {Second International Conference on Communication Systems and Networks, {COMSNETS} 2010, Bangalore, India, January 5-9, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/COMSNETS.2010.5431963}, doi = {10.1109/COMSNETS.2010.5431963}, timestamp = {Thu, 08 Apr 2021 08:40:48 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/RajuKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmin/ReddyVR10, author = {S. Ram Prasad Reddy and Valli Kumari Vatsavayi and K. V. S. V. N. Raju}, editor = {Robert Stahlbock and Sven F. Crone and Mahmoud Abou{-}Nasr and Hamid R. Arabnia and Nikolaos Kourentzes and Philippe Lenca and Wolfram{-}Manfred Lippe and Gary M. Weiss}, title = {s-Tuple Inclusion - {A} New Method for Privacy Preserving Publication of Datasets}, booktitle = {Proceedings of The 2010 International Conference on Data Mining, {DMIN} 2010, July 12-15, 2010, Las Vegas, Nevada, {USA}}, pages = {206--212}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Tue, 07 Dec 2010 10:44:25 +0100}, biburl = {https://dblp.org/rec/conf/dmin/ReddyVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsap/KumariRR10, author = {V. Valli Kumari and D. V. Naga Raju and K. V. S. V. N. Raju}, title = {Efficient Conference Key Distribution for Dynamic Groups}, booktitle = {2010 International Conference on Signal Acquisition and Processing, {ICSAP} 2010, Bangalore, India, February 9-10, 2010}, pages = {167--171}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICSAP.2010.66}, doi = {10.1109/ICSAP.2010.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsap/KumariRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/RaoK10, author = {V. V. R. Maheswara Rao and V. Valli Kumari}, editor = {Vinu V. Das and R. Vijayakumar and K. G. Srinivasa and Hatim A. Aboalsamh and Mohammad Hammoudeh and Vahid Salmani and Dinesh Kumar Tyagi and Anjali Mohapatra and Bharatheesh Jaysimha and Eliathamby Ambikairajah and Jonathan M. Blackledge}, title = {A Novel Lattice Based Research Frame Work for Identifying Web User's Behavior with Web Usage Mining}, booktitle = {Information and Communication Technologies - International Conference, {ICT} 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {101}, pages = {90--99}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15766-0\_14}, doi = {10.1007/978-3-642-15766-0\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict/RaoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/GadirajuK10, author = {Mahesh Gadiraju and V. Valli Kumari}, editor = {Vinu V. Das and R. Vijayakumar and K. G. Srinivasa and Hatim A. Aboalsamh and Mohammad Hammoudeh and Vahid Salmani and Dinesh Kumar Tyagi and Anjali Mohapatra and Bharatheesh Jaysimha and Eliathamby Ambikairajah and Jonathan M. Blackledge}, title = {Distribution of Continuous Queries over Data Aggregators in Dynamic Data Dissemination Networks}, booktitle = {Information and Communication Technologies - International Conference, {ICT} 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {101}, pages = {584--589}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15766-0\_100}, doi = {10.1007/978-3-642-15766-0\_100}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict/GadirajuK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/RajuKVR10, author = {K. V. Krishnam Raju and V. Valli Kumari and N. Sandeep Varma and K. V. S. V. N. Raju}, editor = {Vinu V. Das and R. Vijayakumar and K. G. Srinivasa and Hatim A. Aboalsamh and Mohammad Hammoudeh and Vahid Salmani and Dinesh Kumar Tyagi and Anjali Mohapatra and Bharatheesh Jaysimha and Eliathamby Ambikairajah and Jonathan M. Blackledge}, title = {Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR}, booktitle = {Information and Communication Technologies - International Conference, {ICT} 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {101}, pages = {590--595}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15766-0\_101}, doi = {10.1007/978-3-642-15766-0\_101}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict/RajuKVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/PrasadSKR09, author = {R. V. V. S. V. Prasad and Vegi Srinivas and V. Valli Kumari and K. V. S. V. N. Raju}, title = {An Effective Calculation of Reputation in {P2P} Networks}, journal = {J. Networks}, volume = {4}, number = {5}, pages = {332--342}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.5.332-342}, doi = {10.4304/JNW.4.5.332-342}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/PrasadSKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmin/RaoRRKR09, author = {Sreenivasa Rao and S. Ram Prasad Reddy and K. Venkata Ramana and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {Robert Stahlbock and Sven F. Crone and Stefan Lessmann}, title = {Privacy Preserving Sharing of Data}, booktitle = {Proceedings of The 2009 International Conference on Data Mining, {DMIN} 2009, July 13-16, 2009, Las Vegas, {USA}}, pages = {131--137}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Mon, 17 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmin/RaoRRKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmin/VallikumariRSVR08, author = {V. Valli Kumari and S. Ram Prasad Reddy and M. Aruna Sowjanya and B. Jhansi Vazram and K. V. S. V. N. Raju}, editor = {Robert Stahlbock and Sven F. Crone and Stefan Lessmann}, title = {A Novel Approach for Privacy Preserving Publication of Data}, booktitle = {Proceedings of The 2008 International Conference on Data Mining, {DMIN} 2008, July 14-17, 2008, Las Vegas, USA, 2 Volumes}, pages = {506--512}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Sun, 02 May 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmin/VallikumariRSVR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/PrasadSKR08, author = {R. V. V. S. V. Prasad and Vegi Srinivas and V. Valli Kumari and K. V. S. V. N. Raju}, editor = {Manish Parashar and Sanjeev K. Aggarwal}, title = {Credibility Based Reputation Calculation in {P2P} Networks}, booktitle = {Distributed Computing and Internet Technology, 5th International Conference, {ICDCIT} 2008, New Delhi, India, December 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5375}, pages = {188--195}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89737-8\_20}, doi = {10.1007/978-3-540-89737-8\_20}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcit/PrasadSKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/VatsavayiR07, author = {Valli Kumari Vatsavayi and K. V. S. V. N. Raju}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Enhanced User Privacy on Trusted Processors}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {205--210}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Thu, 20 Dec 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/VatsavayiR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmin/KilambiRVS07, author = {Sridevi Kilambi and K. V. S. V. N. Raju and Valli Kumari Vatsavayi and SrinivasaRao Siringi}, editor = {Robert Stahlbock and Sven F. Crone and Stefan Lessmann}, title = {Privacy Preserving in Clustering by Categorizing Attributes Using Privacy and Non Privacy Disclosure Sets}, booktitle = {Proceedings of the 2007 International Conference on Data Mining, {DMIN} 2007, June 25-28, 2007, Las Vegas, Nevada, {USA}}, pages = {301--307}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Thu, 20 Dec 2007 11:10:11 +0100}, biburl = {https://dblp.org/rec/conf/dmin/KilambiRVS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/KumariKRRP07, author = {V. Valli Kumari and Y. Aditya Kumar and K. V. S. V. N. Raju and K. Venkata Ramana and R. V. V. S. V. Prasad}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {550--553}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.242}, doi = {10.1109/IIH-MSP.2007.242}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/KumariKRRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/VatsavayiMR06, author = {Valli Kumari Vatsavayi and Ravi Mukkamala and K. V. S. V. N. Raju}, title = {Fair and secure m-cash}, booktitle = {2006 {IEEE} International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, May 10-12, 2006}, pages = {778--781}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GRC.2006.1635916}, doi = {10.1109/GRC.2006.1635916}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/grc/VatsavayiMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/AbbadasariMK04, author = {Ranjit Abbadasari and Ravi Mukkamala and V. Valli Kumari}, editor = {R. K. Ghosh and Hrushikesha Mohanty}, title = {MobiCoin: Digital Cash for M-Commerce}, booktitle = {Distributed Computing and Internet Technology, First International Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3347}, pages = {441--451}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30555-2\_51}, doi = {10.1007/978-3-540-30555-2\_51}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/AbbadasariMK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.