529 results on '"Laxmi, Vijay"'
Search Results
202. A Brief Comment on “A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs” [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106]
203. Passive Marker Based Optical System for Gait Kinematics for Lower Extremity
204. CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip
205. Investigating the Immunomodulatory Effect of Cassia fistula on Albino Rats
206. d2-LBDR: Distance-Driven Routing to Handle Permanent Failures in 2D Mesh NoCs
207. Android Security: A Survey of Issues, Malware Penetration, and Defenses
208. IEEE 802.11 WLAN Load Balancing for Network Performance Enhancement
209. Impact analysis of attacks in multicast routing algorithms in MANETs
210. Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs
211. Fault tolerant and highly adaptive routing for 2D NoCs
212. A novel non-minimal turn model for highly adaptive routing in 2D NoCs
213. Impact of Zero Tillage in India's Rice-Wheat Systems
214. Factors Affecting the Adoption of Resource Conservation Technology: Case of Zero Tillage in Rice-Wheat Farming Systems
215. Assessing the impact of international natural resource management research: The Case of Zero Tillage in India's rice-wheat systems
216. Improved multicast routing in MANETs using link stability and route stability.
217. Exploring Worm Behaviors using DTW
218. Analysis of Identity Forging Attack in MANETs
219. Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation
220. License Plate Recognition System using Back Propagation Neural Network
221. LSMRP: Link stability based multicast routing protocol in MANETs
222. Bandwidth-aware routing and admission control for efficient video streaming over MANETs
223. Distributed adaptive routing for spidergon NoC
224. Highly adaptive and congestion-aware routing for 3D NoCs
225. Computer forensics in IT audit and credit card fraud investigation - for USB devices
226. CARM: Congestion Adaptive Routing Method for On Chip Networks
227. Detecting malicious files using non-signature-based methods
228. DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets
229. NEAR-OPTIMAL GEOMETRIC FEATURE SELECTION FOR VISUAL SPEECH RECOGNITION
230. AndroSimilar
231. Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
232. The darker side of Firefox extension
233. DynaDroid.
234. A robust dynamic analysis system preventing SandBox detection by Android malware.
235. DRACO.
236. sandFOX.
237. Improved Route Selection Approaches using Q-learning framework for 2D NoCs.
238. d2-LBDR: Distance-driven routing to handle permanent failures in 2D mesh NoCs.
239. Environment–Reactive Malware Behavior: Detection and Categorization.
240. Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps.
241. Attack models and infrastructure supported detection mechanisms for position forging attacks in vehicular ad hoc networks
242. QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs
243. Video streaming over MANETs: Testing and analysis using real-time emulation
244. An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs
245. σnLBDR: generic congestion handling routing implementation for two‐dimensional mesh network‐on‐chip.
246. Resilient routing implementation in 2D mesh NoC.
247. Mining control flow graph as API call-grams to detect portable executable malware
248. ESCAPE
249. Lip peripheral motion for visual surveillance
250. Detection of incorrect position information using speed and time span verification in VANET
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.