default search action
Bala Srinivasan 0002
Person information
- affiliation: Monash University, Melbourne, Australia
Other persons with the same name
- Bala Srinivasan — disambiguation page
- Bala Srinivasan 0001 (aka: Balasubramaniam Srinivasan 0001) — École Polytechnique de Montréal, Canada (and 1 more)
- Balasubramaniam Srinivasan — disambiguation page
- Balasubramaniam Srinivasan 0003 — Purdue University, Department of Computer Science, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j52]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
Activity Recognition with Evolving Data Streams: A Review. ACM Comput. Surv. 51(4): 71:1-71:36 (2018) - [j51]Omid Zanganeh, Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Quality Controlled Region-Based PartialFingerprint Recognition. J. Mobile Multimedia 14(2): 123-156 (2018) - [j50]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
A Dual Privacy Preserving Approach for Location-Based Services in Mobile Multicast Environment. Mob. Networks Appl. 23(1): 34-43 (2018) - [j49]Amiza Amir, Bala Srinivasan, Asad I. Khan:
Distributed classification for image spam detection. Multim. Tools Appl. 77(11): 13249-13278 (2018) - [c109]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Parameter Recovery Using Radon Transform. MoMM 2018: 34-43 - [i3]Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan:
Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment. CoRR abs/1806.07057 (2018) - 2017
- [j48]Md. Rakib Hassan, Gour C. Karmakar, Joarder Kamruzzaman, Bala Srinivasan:
Exclusive Use Spectrum Access Trading Models in Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutorials 19(4): 2192-2231 (2017) - [j47]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Trustworthy data delivery in mobile P2P network. J. Comput. Syst. Sci. 86: 33-48 (2017) - [c108]Jishan E. Giti, Bala Srinivasan, Joarder Kamruzzaman:
Impact of Friendly Jammers on Secrecy Multicast Capacity in Presence of Adaptive Eavesdroppers. GLOBECOM Workshops 2017: 1-6 - [c107]Sepehr Minagar, Balasubramaniam Srinivasan, Phu Dung Le:
A Formal Model for an Ideal CFI. ISPEC 2017: 707-726 - [c106]Komal Komal, Nandita Bhattacharjee, David W. Albrecht, Bala Srinivasan:
Transformational Approach for Alignment-free Image Matching Applications. MoMM 2017: 49-57 - 2016
- [j46]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
AnyNovel: detection of novel concepts in evolving data streams. Evol. Syst. 7(2): 73-93 (2016) - [c105]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Trustworthy P2P Data Delivery for Moving Objects in Wireless Ad-Hoc Networks. AINA 2016: 1176-1183 - [c104]Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan:
A network defense system for detecting and preventing potential hacking attempts. ICOIN 2016: 449-454 - [c103]Komal Komal, David W. Albrecht, Nandita Bhattacharjee, Bala Srinivasan:
A Region-based Alignment-free Partial Fingerprint Matching. MoMM 2016: 63-70 - 2015
- [j45]Md. Rakib Hassan, Gour C. Karmakar, Joarder Kamruzzaman, Bala Srinivasan:
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements. Comput. Networks 84: 17-31 (2015) - [j44]Abdullah Mohammed Almuhaideb, Bala Srinivasan:
Authentication in Ubiquitous Networking. Int. J. Inf. Secur. Priv. 9(3): 57-83 (2015) - [j43]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
Adaptive mobile activity recognition system with evolving data streams. Neurocomputing 150: 304-317 (2015) - [j42]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11(2): 151-168 (2015) - [j41]Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [c102]Waleed Alfehaid, Asad I. Khan, Bala Srinivasan, Salem Alkhalaf:
Distributed Pattern Transformation-Invariant Recognition Scheme for Real-Time Sensory Applications. BWCCA 2015: 92-98 - [c101]Amir H. Basirat, Asad I. Khan, Bala Srinivasan:
A Highly Distributable Computational Framework for Fast Cloud Data Retrieval. ICMLA 2015: 246-250 - [c100]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Alignment and Matching Through Region-Based Approach. MoMM 2015: 275-284 - [c99]Amiza Amir, Bala Srinivasan, Asad I. Khan:
A Communication-Efficient Distributed Algorithm for Large-scale Classification within P2P Networks. SoICT 2015: 75-82 - [c98]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid:
A Hybrid Mobile Authentication Model for Ubiquitous Networking. TrustCom/BigDataSE/ISPA (1) 2015: 360-367 - 2014
- [j40]Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Bala Srinivasan:
Time constraint route search over multi-locations. Knowl. Eng. Rev. 29(2): 217-233 (2014) - [c97]Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan:
Design and Implementation of a Mobile Broadcast System. AINA 2014: 449-456 - [c96]Omid Zanganeh, Bala Srinivasan, Nandita Bhattacharjee:
Partial Fingerprint Matching through Region-Based Similarity. DICTA 2014: 1-8 - [c95]Wilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan:
Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data. iiWAS 2014: 152-158 - [c94]Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Identification Through Correlation-based Approach. SECRYPT 2014: 275-284 - [i2]Orhio Mark Creado, Bala Srinivasan, Phu Dung Le, Jefferson Tan:
An Explicit Trust Model Towards Better System Security. CoRR abs/1403.0282 (2014) - 2013
- [j39]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Ailixier Aikebaier, Makoto Takizawa, Bala Srinivasan:
Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks. Inf. Sci. 230: 3-20 (2013) - [j38]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Mobile query services in a participatory embedded sensing environment. ACM Trans. Embed. Comput. Syst. 12(2): 31:1-31:24 (2013) - [j37]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Clustering-Based Index and Data Broadcasting for Mobile Nearest Neighbor Query Processing. IEEE Trans. Ind. Informatics 9(4): 1964-1974 (2013) - [c93]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan:
Empowering Data Placement for Ad-hoc Queries in Mobile Broadcast Environments. AINA 2013: 993-1000 - [c92]Amir Hossein Basirat, Asad I. Khan, Balasubramaniam Srinivasan:
Highly Distributable Associative Memory Based Computational Framework for Parallel Data Processing in Cloud. MobiQuitous 2013: 66-77 - [c91]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan:
The Convergence of Big Data and Mobile Computing. NBiS 2013: 79-84 - 2012
- [j36]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Ailixier Aikebaier, Makoto Takizawa, Bala Srinivasan:
Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments. J. Comput. Syst. Sci. 78(6): 1716-1736 (2012) - [c90]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
CBARS: Cluster Based Classification for Activity Recognition Systems. AMLTA 2012: 82-91 - [c89]Zahraa Said Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy:
StreamAR: Incremental and Active Learning with Evolving Sensory Data for Activity Recognition. ICTAI 2012: 1163-1170 - [c88]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
Increasing level of confidence of iris biometric matching. IJCNN 2012: 1-8 - [c87]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
Fingerprint reference point detection based on local ridge orientation patterns of fingerprints. IJCNN 2012: 1-8 - [c86]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A method for fingerprint alignment and matching. MoMM 2012: 297-301 - [c85]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
How confident are you to counter uncertainty? SECURIT 2012: 116-125 - [c84]Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra:
Analysis of mobile authentication protocols by SVO logic. SECURIT 2012: 126-134 - 2011
- [j35]Kefeng Xuan, Geng Zhao, David Taniar, Maytham Safar, Bala Srinivasan:
Constrained range search query processing on road networks. Concurr. Comput. Pract. Exp. 23(5): 491-504 (2011) - [j34]Kefeng Xuan, Geng Zhao, David Taniar, J. Wenny Rahayu, Maytham Safar, Bala Srinivasan:
Voronoi-based range and continuous range query processing in mobile databases. J. Comput. Syst. Sci. 77(4): 637-651 (2011) - [j33]Li Wang, Bala Srinivasan, Nandita Bhattacharjee:
Security Analysis and Improvements on WLANs. J. Networks 6(3): 470-481 (2011) - [j32]Kefeng Xuan, Geng Zhao, David Taniar, Maytham Safar, Bala Srinivasan:
Voronoi-based multi-level range search in mobile navigation. Multim. Tools Appl. 53(2): 459-479 (2011) - [j31]Agustinus Borgy Waluyo, J. Wenny Rahayu, David Taniar, Bala Srinivasan:
A Novel Structure and Access Mechanism for Mobile Data Broadcast in Digital Ecosystems. IEEE Trans. Ind. Electron. 58(6): 2173-2182 (2011) - [j30]Geng Zhao, Kefeng Xuan, J. Wenny Rahayu, David Taniar, Maytham Safar, Maytham L. Gavrilova, Bala Srinivasan:
Voronoi-Based Continuous k Nearest Neighbor Search in Mobile Navigation. IEEE Trans. Ind. Electron. 58(6): 2247-2257 (2011) - [j29]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Mobile broadcast services with MIMO antennae in 4G wireless networks. World Wide Web 14(4): 351-375 (2011) - [c83]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu, Makoto Takizawa:
Adaptive and Efficient Data Dissemination in Mobile P2P Environments. AINA Workshops 2011: 861-866 - [c82]Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan, Bala Srinivasan:
An Efficient Localized Chain Construction Scheme for Chain Oriented Wireless Sensor Networks. ISADS 2011: 3-9 - [c81]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique. ISPA 2011: 262-269 - [c80]Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Evaluating the Functionality of the Token Filtering Technique in Filtering Denial of Service Packets Using a New Formal Evaluation Model. ISPA 2011: 318-323 - [c79]Li Wang, Nandita Bhattacharjee, Bala Srinivasan:
A novel technique for singular point detection based on Poincaré index. MoMM 2011: 12-18 - [c78]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
On the commonality of iris biometrics. MoMM 2011: 19-25 - [c77]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks. NCA 2011: 285-288 - 2010
- [j28]Geng Zhao, Kefeng Xuan, David Taniar, Bala Srinivasan:
LookAhead continuous KNN mobile query processing. Comput. Syst. Sci. Eng. 25(3) (2010) - [j27]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan:
Dynamic Key Cryptography and Applications. Int. J. Netw. Secur. 10(3): 161-174 (2010) - [j26]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Bala Srinivasan, Huamei Qi:
Novel Hybrid Group Key Agreement for Sensitive Information Systems. J. Convergence Inf. Technol. 5(1): 69-81 (2010) - [j25]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Individual and Group Authentication Model for Wireless Network Services. J. Convergence Inf. Technol. 5(1): 82-94 (2010) - [j24]Alex Tze Hiang Sim, Maria Indrawan, Samar Zutshi, Bala Srinivasan:
Logic-Based Pattern Discovery. IEEE Trans. Knowl. Data Eng. 22(6): 798-811 (2010) - [c76]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Information Security Threats Classification Pyramid. AINA Workshops 2010: 208-213 - [c75]Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Authentication Model for Wireless Network Services. AINA 2010: 996-1003 - [c74]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. AINA 2010: 1047-1053 - [c73]Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
An Enhanced Global Index for Location-Based Mobile Broadcast Services. AINA 2010: 1173-1180 - [c72]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Framework to Measure the Effectiveness of Image Representations. IPCV 2010: 41-46 - [c71]Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. MobiQuitous 2010: 224-236 - [c70]Li Wang, Nandita Bhattacharjee, Gopal Gupta, Bala Srinivasan:
Adaptive approach to fingerprint image enhancement. MoMM 2010: 42-49 - [c69]Parman Sukarno, Mieng Phu, Nandita Bhattacharjee, Bala Srinivasan:
Increasing error tolerance in biometric systems. MoMM 2010: 50-55 - [c68]Kefeng Xuan, David Taniar, Maytham Safar, Bala Srinivasan:
Time constrained range search queries over moving objects in road networks. MoMM 2010: 329-336 - [c67]Geng Zhao, David Taniar, J. Wenny Rahayu, Maytham Safar, Bala Srinivasan:
Path branch points in mobile navigation. MoMM 2010: 337-344 - [c66]Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A New Holistic Security Approach for Government Critical Systems: Flooding Prevention. ISA 2010: 249-264 - [c65]Mohammed A. Alhabeeb, Saad Alsunbul, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers. SNPD 2010: 49-54 - [c64]Abdullah Mohammed Almuhaideb, Talal Alharbi, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Toward a Ubiquitous Mobile Access Model: A Roaming Agreement-Less Approach. SNPD 2010: 143-148 - [c63]Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan, Bala Srinivasan:
Selecting Member Nodes in a Chain Oriented WSN. WCNC 2010: 1-6 - [i1]Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens. CoRR abs/1003.5619 (2010)
2000 – 2009
- 2009
- [j23]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers. Int. J. Bus. Data Commun. Netw. 5(3): 67-90 (2009) - [j22]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. Int. J. Comput. Sci. Appl. 6(3): 57-74 (2009) - [j21]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Continuous range search based on network Voronoi diagram. Int. J. Grid Util. Comput. 1(4): 328-335 (2009) - [j20]Agustinus Borgy Waluyo, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Mobile service oriented architectures for NN-queries. J. Netw. Comput. Appl. 32(2): 434-447 (2009) - [c62]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Network Voronoi Diagram Based Range Search. AINA 2009: 741-748 - [c61]Samar Zutshi, Campbell Wilson, Bala Srinivasan:
Proto-reduct Fusion Based Relevance Feedback in CBIR. ICAPR 2009: 121-124 - [c60]Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina L. Gavrilova, Bala Srinivasan:
Multiple Object Types KNN Search Using Network Voronoi Diagram. ICCSA (2) 2009: 819-834 - [c59]Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
An effective crypto-biometric system for secure email in wireless environment. MoMM 2009: 241-245 - [c58]Yiling Wang, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
Multicasting Key Management in Wireless Networks. NBiS 2009: 234-239 - [c57]Huy Hoang Ngo, Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan, Vishv Malhotra:
A Membership-Oriented Group Key Management for Application Services. NBiS 2009: 240-245 - [p3]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Information Processing Involving Multiple Non-Collaborative Sources. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 1108-1126 - [p2]Say Ying Lim, David Taniar, Bala Srinivasan:
A Taxonomy of Database Operations on Mobile Devices. Database Technologies: Concepts, Methodologies, Tools, and Applications 2009: 1235-1256 - 2008
- [j19]Alex Tze Hiang Sim, Maria Indrawan, Bala Srinivasan:
The importance of negative associations and the discovery of association rule pairs. Int. J. Bus. Intell. Data Min. 3(2): 158-176 (2008) - [j18]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Indexing schemes for multichannel data broadcasting in mobile databases. Int. J. Wirel. Mob. Comput. 3(1/2): 79-90 (2008) - [j17]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
Fraudulent Internet Banking Payments Prevention using Dynamic Key. J. Networks 3(1): 25-34 (2008) - [j16]Geng Zhao, Kefeng Xuan, David Taniar, Bala Srinivasan:
Incremental k-Nearest-Neighbor Search on Road Networks. J. Interconnect. Networks 9(4): 455-470 (2008) - [c56]Aparna Kanakatte, Nallasamy Mani, Bala Srinivasan, Jayavardhana Gubbi:
Pulmonary Tumor Volume Detection from Positron Emission Tomography Images. BMEI (2) 2008: 213-217 - [c55]Xianping Wu, Huy Hoang Ngo, Phu Dung Le, Balasubramaniam Srinivasan:
A Novel Group Key Management Scheme for Privacy Protection Sensitive Information Systems. Security and Management 2008: 93-99 - [c54]Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan:
Continuous Range Search Query Processing in Mobile Navigation. ICPADS 2008: 361-368 - [c53]Xianping Wu, Phu Dung Le, Balasubramaniam Srinivasan:
Dynamic Keys Based Sensitive Information System. ICYCS 2008: 1895-1901 - [c52]Minh Viet Le, Phu Dung Le, Balasubramaniam Srinivasan:
A Study of Wavelets-Based Image Representations and Their Effectiveness. IPCV 2008: 638-642 - 2007
- [j15]Say Ying Lim, David Taniar, Bala Srinivasan:
Mobile Information Processing Involving Multiple Non-collaborative Sources. Int. J. Bus. Data Commun. Netw. 3(2): 72-93 (2007) - [j14]Murali Muniyandi, Shonali Krishnaswamy, Bala Srinivasan:
Improving the quality of business and quality of experience in web services through prioritising and scheduling. Int. J. Bus. Process. Integr. Manag. 2(3): 156-171 (2007) - [c51]Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan:
Hybrid Group Key Management Scheme for Secure Wireless Multicast. ACIS-ICIS 2007: 346-351 - [c50]Samar Zutshi, Campbell Wilson, Bala Srinivasan:
Reduct-Based Result Set Fusion for Relevance Feedback in CBIR. ACIS-ICIS 2007: 918-923 - [c49]Agustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
Multiple Entity Types Wireless Broadcast Database System. AINA 2007: 179-186 - [c48]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection. ICEIS (4) 2007: 57-62 - [c47]Ehsan A. Aghdaee, Nallasamy Mani, Bala Srinivasan:
An Enhanced Bandwidth Allocation Algorithms for QoS Provision in IEEE 802.16 BWA. ICOIN 2007: 709-718 - [c46]Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan:
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. ITNG 2007: 83-88 - [c45]Flora Dilys Salim, Seng Wai Loke, Andry Rakotonirainy, Bala Srinivasan, Shonali Krishnaswamy:
Collision Pattern Modeling and Real-Time Collision Detection at Road Intersections. ITSC 2007: 161-166 - [c44]Bala Srinivasan, Asad I. Khan, Raja Azlina Raja Mahmood:
Abnormal Behaviour Detection within Mobile Networks. MoMM 2007: 3-10 - [c43]Minh Viet Le, P. D. Le, Balasubramaniam Srinivasan:
A methodology for deriving objective image comparison metrics. SIP 2007: 87-91 - [c42]Osama Dandash, Phu Dung Le, Bala Srinivasan:
Security Analysis for Internet Banking Models. SNPD (3) 2007: 1141-1146 - 2006
- [c41]Xianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan:
The design and implementation of a wireless payment system. COMSWARE 2006 - [c40]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar, J. Wenny Rahayu, Bernady O. Apduhan:
Performance Analysis of Unified Data Broadcast Model for Multi-channel Wireless Databases. UIC 2006: 698-707 - 2005
- [j13]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Research on location-dependent queries in mobile databases. Comput. Syst. Sci. Eng. 20(2) (2005) - [j12]Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan:
On Building a Data Broadcast System in a Wireless Environment. Int. J. Bus. Data Commun. Netw. 1(4): 15-37 (2005) - [j11]Say Ying Lim, David Taniar, Bala Srinivasan:
On-Mobile Query Processing Incorporating Multiple Non-Collaborative Servers. Ingénierie des Systèmes d Inf. 10(5): 9-38 (2005) - [j10]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Efficient Broadcast Indexing Scheme for Location-dependent Queries in Multi Channels Wireless Environment. J. Interconnect. Networks 6(3): 303-322 (2005) - [j9]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Research in mobile database query optimization and processing. Mob. Inf. Syst. 1(4): 225-252 (2005) - [c39]Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan:
On Building a Data Broadcasting System for Mobile Databases. AINA 2005: 538-543 - [c38]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment. AINA 2005: 1011-1016 - [c37]Salahadin Mohammed, Bala Srinivasan:
Optimizing Physical Design of Multidimensional Files for Join Queries. Databases and Applications 2005: 128-133 - [c36]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar, J. Wenny Rahayu:
Incorporating Global Index with Data Placement Scheme for Multi Channels Mobile Broadcast Environment. EUC 2005: 755-764 - [c35]Murali Muniyandi, Bala Srinivasan, Shonali Krishnaswamy:
Filter-Predict-Schedule: Balancing the Needs of Users and Web Service Providers. iiWAS 2005: 35-46 - [c34]Huy Hoang To, Shonali Krishnaswamy, Bala Srinivasan:
Mobile agents for network management: when and when not! SAC 2005: 47-53 - [p1]Campbell Wilson, Bala Srinivasan:
Multiple Feature Relevance Feedback in Content- Based Image Retrieval using Probabilistic Inference Networks. Computational Intelligence for Modelling and Prediction 2005: 197-208 - [r1]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Data Dissemination in Mobile Databases. Encyclopedia of Information Science and Technology (II) 2005: 691-697 - 2004
- [c33]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
A Taxonomy of Broadcast Indexing Schemes for Multi Channel Data Dissemination in Mobile Database. AINA (1) 2004: 213-218 - [c32]Agustinus Borgy Waluyo, Raymond Hsieh, David Taniar, J. Wenny Rahayu, Bala Srinivasan:
Utilising Push and Pull Mechanism in Wireless E-Health Environment. EEE 2004: 271-274 - [c31]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Allocation of Data Items for Multi Channel Data Broadcasting in a Mobile Computing Environment. EUC 2004: 409-418 - [c30]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Optimizing Query Access Time over Broadcast Channel in a Mobile Computing Environment. EUC 2004: 439-449 - [c29]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Wireless Prepaid Micropayment Protocol With Extension to Postpaid Micropayment. iiWAS 2004 - [c28]Maria Indrawan, Chin Min Teoh, Shan Chen, Bala Srinivasan:
Profiling System. IKE 2004: 266-274 - [c27]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Location Dependent Queries in Mobile Databases. IKE 2004: 362-370 - [c26]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Account-Based Mobile Payment Protocol. ITCC (1) 2004: 35-39 - [c25]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
Accountability Logic for Mobile Payment Protocols. ITCC (1) 2004: 40-44 - [c24]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
A Secure Prepaid Wireless Micropayment Protocol. WOSIS 2004: 104-113 - [c23]Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan:
A Limited-Used Key Generation Scheme for Internet Transactions. WISA 2004: 302-316 - 2003
- [c22]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Optimal Broadcast Channel for Data Dissemination in Mobile Database Environment. APPT 2003: 655-664 - [c21]Thalerngsak Kijthaweesinpoon, Maria Indrawan, Bala Srinivasan:
A Unified Framework for E-commerce Negotiation Agents. iiWAS 2003 - [c20]Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
Lightweight Mobile Credit-Card Payment Protocol. INDOCRYPT 2003: 295-308 - [c19]Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Global Index for Multi Channel Data Dissemination in Mobile Databases. ISCIS 2003: 212-219 - [c18]A. Viranga Ratnaike, Bala Srinivasan, Surya Nepal:
Making sense of video content. ACM Multimedia 2003: 650-651 - 2002
- [c17]Campbell Wilson, Bala Srinivasan:
Multiple Feature Relevance Feedback in Content Based Image Retrieval using Probabilistic Inference Networks. FSKD 2002: 651- - 2000
- [j8]Damminda Alahakoon, Saman K. Halgamuge, Bala Srinivasan:
Dynamic self-organizing maps with controlled growth for knowledge discovery. IEEE Trans. Neural Networks Learn. Syst. 11(3): 601-614 (2000) - [c16]Campbell Wilson, Bala Srinivasan, Maria Indrawan:
A General Inference Network Based Architecture for Multimedia Information Retrieval. IEEE International Conference on Multimedia and Expo (I) 2000: 347-350
1990 – 1999
- 1999
- [c15]Monzurur Rahman, Xinghuo Yu, Bala Srinivasan:
A Neural Networks Based Approach for Fast Mining Characteristic Rules. Australian Joint Conference on Artificial Intelligence 1999: 36-47 - [c14]Rosanne Price, Kotagiri Ramamohanarao, Bala Srinivasan:
Spatiotemporal Extensions to Unified Modeling Language. DEXA Workshop 1999: 460-461 - [c13]Santosh Kulkarni, Bala Srinivasan, M. V. Ramakrishna:
Vector-Space Image Model (VSIM) for Content-Based Retrieval. DEXA Workshop 1999: 899-903 - [c12]Rosanne Price, Bala Srinivasan, Kotagiri Ramamohanarao:
Extending the Unified Modeling Language to Support Spatiotemporal Applications. TOOLS (32) 1999: 163- - 1998
- [c11]Phu Dung Le, Bala Srinivasan, Santosh Kulkarni:
Multi Level Browsing for Efficient Image Transmission. DEXA Workshop 1998: 373-378 - [c10]Damminda Alahakoon, Saman K. Halgamuge, Bala Srinivasan:
A Structure Adapting Feature Map for Optimal Cluster Representation. ICONIP 1998: 809-812 - [c9]Phu Dung Le, Bala Srinivasan, Salahadin Mohammed, Santosh Kulkarni, Campbell Wilson:
A measure for image quality. SAC 1998: 513-519 - [c8]Maria Indrawan, Bala Srinivasan, Campbell Wilson, Robert Redpath:
Optimising Bayesian belief networks: a case study of information retrieval systems. SMC 1998: 2273-2278 - 1997
- [j7]Xiao Yan Su, Leslie M. Goldschlager, Bala Srinivasan:
Integrating gestures into the user-interface management system. Vis. Comput. 13(4): 168-183 (1997) - 1996
- [j6]Vishv M. Malhotra, Bala Srinivasan, Santosh Kulkarni:
Storage-Efficient Data Structure for Large Lookup Dictionaries. Inf. Process. Lett. 58(4): 201-206 (1996) - [c7]Nguyen Tran, Phu Dung Le, Bala Srinivasan, Bob Sier:
Performance Evaluation of Tree-Based Structures. DEXA 1996: 845-854 - [c6]Salahadin Mohammed, Balasubramaniam Srinivasan, M. Bozyigit, Phu Dung Le:
Novel parallel join algorithms for grid files. HiPC 1996: 144-149 - [c5]Arkady B. Zaslavsky, Mohamed Faiz, Bala Srinivasan, Aamir Rasheed, Simon J. Lai:
Primary Copy Method and its Modifications for Database Replication in Distributed Mobile Computing Environment. SRDS 1996: 178-187 - [c4]Maria Indrawan, Desra Ghazfan, Bala Srinivasan:
Using Bayesian Networks as Retrieval Engines. TREC 1996 - 1995
- [c3]Phu Dung Le, Bala Srinivasan:
A Tool for Resource and Load Sharing in Heterogeneous Environments. Parallel and Distributed Computing and Systems 1995: 187-192 - 1994
- [j5]Millist W. Vincent, Bala Srinivasan:
Update Anomalies and the Justification for 4NF in Relational Databases. Inf. Sci. 81(1-2): 87-102 (1994) - [j4]Desra Ghazfan, Mark Nolan, Bala Srinivasan:
Distribution algorithms for document allocation in multiprocessor information retrieval systems. Microprocess. Microprogramming 40(5): 327-354 (1994) - [c2]Millist W. Vincent, Bala Srinivasan:
Key-Based Update Anomalies and the Justification for 4NF in Database Design. Australasian Database Conference 1994: 346-359 - 1993
- [j3]Millist W. Vincent, Bala Srinivasan:
Redundancy and the Justification for Fourth Normal Form in Relational Databases. Int. J. Found. Comput. Sci. 4(4): 355-365 (1993) - [j2]Millist W. Vincent, Bala Srinivasan:
A Note on Relation Schemes which are in 3NF but not in BCNF. Inf. Process. Lett. 48(6): 281-283 (1993) - [c1]Millist W. Vincent, Bala Srinivasan:
Armstrong Relations for Functional and Multivalued Dependencies in Relational Databases. Australian Database Conference 1993: 317-328
1980 – 1989
- 1986
- [j1]Gopal K. Gupta, Bala Srinivasan:
Approximate Storage Utilization of B-Trees. Inf. Process. Lett. 22(5): 243-246 (1986)
Coauthor Index
aka: J. Wenny Rahayu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint