![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jeril Kuriakose
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]M. Saiful Bari, Yazeed Alnumay, Norah A. Alzahrani, Nouf M. Alotaibi, Hisham Abdullah Alyahya, Sultan Alrashed, Faisal Mirza, Shaykhah Alsubaie, Hassan A. Alahmed, Ghadah Alabduljabbar, Raghad Alkhathran, Yousef Almushayqih, Raneem Alnajim, Salman Alsubaihi, Maryam Al Mansour, Majed Alrubaian, Ali Alammari, Zaki Alawami, Abdulmohsen Al-Thubaity, Ahmed Abdelali, Jeril Kuriakose, Abdalghani Abujabal, Nora Al-Twairesh, Areeb Alowisheq, Haidar Khan:
ALLaM: Large Language Models for Arabic and English. CoRR abs/2407.15390 (2024) - 2023
- [j3]Jeril Kuriakose
, Sandeep Joshi
, Amit Kumar Bairwa:
EMBN-MANET: A method to Eliminating Malicious Beacon Nodes in Ultra-Wideband (UWB) based Mobile Ad-Hoc Network. Ad Hoc Networks 140: 103063 (2023)
2010 – 2019
- 2016
- [j2]Jeril Kuriakose, Sandeep Joshi:
Secured MPR node selection in the presence of cheating nodes. Int. J. Trust. Manag. Comput. Commun. 3(3): 246-268 (2016) - [c5]Jeril Kuriakose
, Sandeep Joshi
:
Removing the Outliers of Diverse Zero-Knowledge Proof Systems using Mahalanobis Distance. ICCCNT 2016: 15:1-15:7 - 2015
- [j1]Jeril Kuriakose
, Sandeep Joshi:
A Comparative Review of Moveable Sensor Location Identification. Int. J. Robotics Appl. Technol. 3(2): 20-37 (2015) - [c4]Jeril Kuriakose
, V. Amruth, R. Vikram Raju
:
Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. SSCC 2015: 402-411 - 2014
- [c3]Jeril Kuriakose
, Sandeep Joshi
, R. Vikram Raju
, Aravind Kilaru:
A Review on Localization in Wireless Sensor Networks. SIRS 2014: 599-610 - [c2]Jeril Kuriakose
, V. Amruth, A. G. Sandesh, V. Abhilash, G. Prasanna Kumar, K. Nithin:
A Review on Mobile Sensor Localization. SSCC 2014: 30-44 - [c1]Zeba Syed, R. Vikram Raju
, Sandeep Joshi
, Jeril Kuriakose
:
A novel approach to naval architecture using 1G VLAN with RSTP. WOCN 2014: 1-5 - [i4]Jeril Kuriakose, Sandeep Joshi, V. I. George:
Localization in Wireless Sensor Networks: A Survey. CoRR abs/1410.8713 (2014) - [i3]Jeril Kuriakose, V. Amruth, Swathy Nandhini, V. Abhilash:
Sequestration of Malevolent Anchor Nodes in Wireless Sensor Networks using Mahalanobis Distance. CoRR abs/1411.4437 (2014) - [i2]Jeril Kuriakose, V. Amruth, Swathy Nandhini, V. Abhilash:
Identifying Cheating Anchor Nodes using Maximum Likelihood and Mahalanobis Distance. CoRR abs/1411.5465 (2014) - [i1]Jeril Kuriakose, V. Amruth, A. G. Sandesh, Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty:
Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes. CoRR abs/1412.2857 (2014)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint