default search action
Jaipal Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j9]Omar Khadeer Hussain, Zia-ur Rahman, Farookh Khadeer Hussain, Jaipal Singh, Naeem Khalid Janjua, Elizabeth Chang:
A User-Based Early Warning Service Management Framework in Cloud Computing. Comput. J. 58(3): 472-496 (2015) - 2014
- [j8]David Forbes, Pornpit Wongthongtham, Jaipal Singh, Sandra C. Thompson:
Ontology Supported Assistive Communications in Healthcare. Commun. Assoc. Inf. Syst. 34: 14 (2014) - 2013
- [j7]Kit Yan Chan, Tharam S. Dillon, Elizabeth Chang, Jaipal Singh:
Prediction of Short-Term Traffic Variables Using Intelligent Swarm-Based Neural Networks. IEEE Trans. Control. Syst. Technol. 21(1): 263-274 (2013) - [c22]Zia ur Rehman, Farookh Khadeer Hussain, Omar Khadeer Hussain, Jaipal Singh:
Is There Self-Similarity in Cloud QoS Data? ICEBE 2013: 76-81 - 2012
- [j6]Kit Yan Chan, Saghar Khadem, Tharam S. Dillon, Vasile Palade, Jaipal Singh, Elizabeth Chang:
Selection of Significant On-Road Sensor Data for Short-Term Traffic Flow Forecasting Using the Taguchi Method. IEEE Trans. Ind. Informatics 8(2): 255-266 (2012) - [j5]Kit Yan Chan, Tharam S. Dillon, Jaipal Singh, Elizabeth Chang:
Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg-Marquardt Algorithm. IEEE Trans. Intell. Transp. Syst. 13(2): 644-654 (2012) - [c21]Vidyasagar M. Potdar, Farida Ridzuan, Jaipal Singh:
Spam 2.0. CUBE 2012: 724-731 - [c20]Bambang Harjito, Vidyasagar M. Potdar, Jaipal Singh:
Watermarking technique for wireless multimedia sensor networks: a state of the art. CUBE 2012: 832-840 - [c19]Tharam S. Dillon, Elizabeth Chang, Jaipal Singh, Omar Khadeer Hussain:
Semantics of Cyber-Physical Systems. Intelligent Information Processing 2012: 3-12 - [c18]Jaipal Singh, Omar Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon:
Event Handling for Distributed Real-Time Cyber-Physical Systems. ISORC 2012: 23-30 - [c17]Bambang Harjito, Vidyasagar M. Potdar, Jaipal Singh:
Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity. MoMM 2012: 208-217 - [c16]Le Sun, Jaipal Singh, Omar Khadeer Hussain:
Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective. MoMM 2012: 263-266 - [c15]Jaipal Singh, Omar Khadeer Hussain:
Cyber-Physical Systems as an Enabler for Next Generation Applications. NBiS 2012: 417-422 - [c14]Bambang Harjito, Vidyasagar M. Potdar, Jaipal Singh:
Watermarking Technique for Wireless Sensor Networks: A State of the Art. SKG 2012: 253-256 - 2011
- [j4]Tharam S. Dillon, Hai Zhuge, Chen Wu, Jaipal Singh, Elizabeth Chang:
Web-of-things framework for cyber-physical systems. Concurr. Comput. Pract. Exp. 23(9): 905-923 (2011) - [j3]Pedram Radmand, Jaipal Singh, Marc Domingo-Prieto, Joan Arnedo-Moreno, Alex Talevski:
The Impact of Security on VoIP Call Quality. J. Mobile Multimedia 7(1&2): 113-128 (2011) - [c13]Farida Ridzuan, Vidyasagar M. Potdar, Jaipal Singh:
Storage cost of spam 2.0 in a web discussion forum. CEAS 2011: 200-209 - [c12]Jaipal Singh:
Technique for privacy preserving real-time vehicle tracking using 802.11p technology. MoMM 2011: 206-209 - 2010
- [c11]Pedram Radmand, Marc Domingo-Prieto, Jaipal Singh, Joan Arnedo-Moreno, Alex Talevski, Stig Petersen, Simon Carlsen:
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys. 3PGCIC 2010: 465-470 - [c10]Jaipal Singh:
Multicast QoS Routing Using Collaborative Path Exploration. AINA 2010: 120-125 - [c9]David Forbes, Amandeep S. Sidhu, Jaipal Singh:
An Aboriginal English ontology framework for Patient-Practitioner Interview Encounters. CBMS 2010: 156-161 - [c8]David Forbes, Amandeep S. Sidhu, Jaipal Singh:
A framework for patient practitioner information exchange. CBMS 2010: 408-414 - [c7]Pedram Radmand, Jaipal Singh, Marc Domingo-Prieto, Joan Arnedo-Moreno, Alex Talevski:
VoIP: making secure calls and maintaining high call quality. MoMM 2010: 56-62 - [c6]Omar Khadeer Hussain, Hai Dong, Jaipal Singh:
Semantic Similarity Model for Risk Assessment in Forming Cloud Computing SLAs. OTM Conferences (2) 2010: 843-860
2000 – 2009
- 2009
- [j2]Ashley Chonka, Jaipal Singh, Wanlei Zhou:
Chaos theory based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 13(9): 717-719 (2009) - [c5]Jaipal Singh, Prakash Veeraraghavan, Samar Singh, Vidyasagar M. Potdar:
Real-Time Public Group Collaboration using IP Multicast Label Filters. NBiS 2009: 525-531 - [c4]Atif Sharif, Rana Fayyaz Ahmad, Malaya Kumar Nath, Vidyasagar M. Potdar, Jaipal Singh, Yan Yang:
Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance. NBiS 2009: 597-602 - 2008
- [c3]Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. NPC Workshops 2008: 210-217 - [c2]Ashley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang:
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. PerCom 2008: 578-583 - 2006
- [j1]Jaipal Singh, Prakash Veeraraghavan, Samar Singh:
QoS multicast routing using Explore Best Path. Comput. Commun. 29(15): 2881-2894 (2006) - 2004
- [c1]Jaipal Singh, Prakash Veeraraghavan, Samar Singh:
Core based tree multicast (M-CBT) approach in supporting mobility. Parallel and Distributed Computing and Networks 2004: 147-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint