Search

Your search keyword '"Manoj Singh"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Manoj Singh" Remove constraint Author: "Manoj Singh" Publisher springer singapore Remove constraint Publisher: springer singapore
46 results on '"Manoj Singh"'

Search Results

1. A Study of Inverse Kinematics from Machine Vision Methods

2. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android

3. DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks

4. Investigation of Nonlinear Effects in Electronically Pattern Reconfigurable Hexagon-Shaped Loop Antenna

5. InGaAs MOSFET for High Power Applications

6. 3D LBDR: Logic-Based Distributed Routing for 3D NoC

8. A Design of Compact Planar Active-Integrated Inverted-F Antenna (AI-PIFA) for Mobile Handsets

10. Performance-Enhanced -LBDR for 2D Mesh Network-on-Chip

16. A Study of Inverse Kinematics from Machine Vision Methods

17. Reconfigurable Slot-Based MIMO Antenna for Cognitive Radio Application

18. InGaAs MOSFET for High Power Applications

19. Bloom Filter Based Privacy Preserving Deduplication System

20. 3D LBDR: Logic-Based Distributed Routing for 3D NoC

21. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android

22. Human Face Detection Enabled Smart Stick for Visually Impaired People

23. A Design of Compact Planar Active-Integrated Inverted-F Antenna (AI-PIFA) for Mobile Handsets

24. Identity Based Secure RSA Encryption System

25. Performance-Enhanced $$d^2$$ -LBDR for 2D Mesh Network-on-Chip

26. Variance-Based Clustering for Balanced Clusters in Growing Datasets

27. Multi Chromatic Balls with Relaxed Criterion to Detect Larger Communities in Social Networks

28. Fuzzy String Matching Algorithm for Spam Detection in Twitter

29. Threshold Ring Signature with Message Block Sharing

30. Multiparty Evaluation of Finite State Machine

31. An Enhanced Privacy-Preserving Recommender System

32. Testing Program Crash Based on Search Based Testing and Exception Injection

33. An Approach to Meta-Alert Generation for Anomalous TCP Traffic

34. Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking

35. EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers

36. Malware Signature Generation Using Locality Sensitive Hashing

37. Bad Signature Identification in a Batch Using Error Detection Codes

38. Machine Learning Based Approach to Detect Position Falsification Attack in VANETs

39. IP Traceback in Dynamic Networks

40. A Solution to 'Confused Deputy' Problem Using RWFM Labels

41. ARBAC: Attribute-Enabled Role Based Access Control Model

42. BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics

43. Keystroke Dynamics Authentication Using Small Datasets

44. A Semantic Notion of Secure Information-Flow

45. Bloom Filter Based Privacy Preserving Deduplication System

46. Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks

Catalog

Books, media, physical & digital resources