Publications

Export 10 results:
Sort by: [ Author  (Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
A
Athira, AB, Kumar SDM, Chacko AM.  2023.  A systematic survey on explainable AI applied to fake news detection. Engineering Applications of Artificial Intelligence. (https://doi.org/10.1016/j.engappai.2023.106087)
G
Gilesh, MP, Sanjay S, MadhuKumar SD, Lillykutty J.  2018.  Selecting Suitable Virtual Machine Migrations for Optimal Provisioning of Virtual Data Centers. ACM Applied Computing Review. 18(2):22-32.
K
Kovilakath, VP, Kumar MSD.  2012.  Semantic broken link detection using structured tagging scheme. Proceedings of the International Conference on Advances in Computing, Communications and Informatics. :16–20., New York, NY, USA: ACM Abstract
n/a
L
Lee, OT, GJ A, MadhuKumar SD, Chandran P.  2019.  Storage Node Allocation Methods for Erasure Code-based Cloud Storage Systems. Arabian Journal for Science and Engineering, Springer. (11)
M
MadhuKumar, SD, BabithaBalachandran, SadulaSrikrishna.  2007.  A Survey Of Overlay Simulators. PCTE journal of Computer Sciences. 3(2):12-21.
MadhuKumar, SD, Veeresh.B.  2010.  Semantic Interoperability of Web Applications in Clouds using XML. nternational Journal of Information Processing. 4(4):54-62.
MadhuKumar, SD, ShibleyJoseph.  2009.  Secure Content Based Publish/Subscribe System Using Prefix Preserving encryption. The Third International Conference on Information Processing, ICIP 09. :569-578., Bangalore,India
MadhuKumar, SD, ShibleyJoseph.  2010.  Secure Content Based Publish/Subscribe System Using Prefix Preserving encryption. International Journal of Information Processing. 4(2):69-79.
MadhuKumar, SD, Manu.J.Pillai, Sebastian.M.P.  2010.  A survey of Basic MAC protocols for Mobile Ad Hoc Networks. A survey of Basic MAC protocols for Mobile Ad Hoc Networks. International Conference on Technological Trends (ICTT 2010). , Trivandrum,India
MadhuKumar, SD, Sarma VVS.  2000.  A Software Tool for Assessing Software Reuse Libraries. The Journal of the Computer Society of India. 30(4):1-8.