Research Output 1996 2020

Filter
Conference contribution
2008
16 Citations (Scopus)

Audio watermarking based on quantization in wavelet domain

Bhat K., V., Sengupta, I. & Das, A., 01-12-2008, Information Systems Security - 4th International Conference, ICISS 2008, Proceedings. p. 235-242 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5352 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Audio Watermarking
Audio watermarking
Quantization
Wavelets
Wavelet Coefficients
17 Citations (Scopus)

Automated detection of anatomical structures in retinal images

Siddalingaswamy, P. C. & Prabhu, G. K., 2008, Proceedings - International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007. Vol. 3. p. 164-168 5 p. 4426361

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optics
Image analysis
1 Citation (Scopus)

Business offer driven dynamic web service selection

D́Mello, D. A., Ananthanarayana, V. S. & Achar, R., 2008, Proceedings of the 2008 16th International Conference on Networks, ICON 2008. 4772649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web services
Industry
Marketing
3 Citations (Scopus)

Illumination invariant character recognition using binarized gabor features

Urolagin, S., Prema, K. V. & Subba Reddy, N. V., 31-03-2008, Proceedings - International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007. Vol. 2. p. 423-430 8 p. 4426733

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Character recognition
Lighting
Invariance
Feature extraction
Scanning

Improved C-fuzzy decision tree with controllable membership characteristics for intrusion detection

Makkithaya, K., Subba Reddy, N. V. & Dinesh Acharya, U., 2008, International Conference on Artificial Intelligence and Pattern Recognition 2008, AIPR 2008. p. 140-145 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Decision trees
Clustering algorithms

Key management using k-dimensional trees

A, R. & Shet, K. C., 01-12-2008, Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008. p. 52-57 6 p. 4760427

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary trees
Mobile ad hoc networks
Data structures
Data storage equipment
management
2006
1 Citation (Scopus)

A two-stage hybrid model for intrusion detection

Krishnamoorthi, Reddy, N. V. S. & Acharya, U. D., 2006, Proceedings - 2006 14th International Conference on Advanced Computing and Communications, ADCOM 2006. p. 163-165 3 p. 4289875

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Classifiers
Intelligent systems
performance
2005
3 Citations (Scopus)

Linear models of Cumulative Distribution Function for content based medical image retrieval

Manjunath, K. N. & Niranjan, U. C., 01-12-2005, Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005. Vol. 7 VOLS. p. 6472-6475 4 p. 1615981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image retrieval
Distribution functions
Linear Models
Databases
Least-Squares Analysis

Support vector machines for face recognition

Hareesha, K. S., Gangashetty, S. V. & Ramaswamy, V., 2005, Proceedings of the 2nd Indian International Conference on Artificial Intelligence, IICAI 2005. p. 570-575 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Support vector machines
Human computer interaction
Pattern recognition