default search action
V. Rhymend Uthariaraj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]S. Irene, A. John Prakash, V. Rhymend Uthariaraj:
Person search over security video surveillance systems using deep learning methods: A review. Image Vis. Comput. 143: 104930 (2024) - 2023
- [j26]R. Madhura, Vaidheyanathan Rhymend Uthariaraj, Lydia Elizabeth Benjamin:
An efficient list-based task scheduling algorithm for heterogeneous distributed computing environment. Softw. Pract. Exp. 53(2): 390-412 (2023) - 2022
- [j25]Narayanamoorthi Thilagavathi, John Prakash Arockiasamy, Sridevi Sridhar, Vaidheyanathan Rhymend Uthariaraj:
TARA: temperature aware online dynamic resource allocation scheme for energyoptimization in cloud data centres. Turkish J. Electr. Eng. Comput. Sci. 30(3): 1050-1066 (2022) - [j24]R. Sathia Priya, A. John Prakash, V. Rhymend Uthariaraj:
An Analytic solution for the Hadoop Configuration Combinatorial Puzzle based on General Factorial Design. KSII Trans. Internet Inf. Syst. 16(11): 3619-3637 (2022) - 2021
- [j23]R. Madhura, B. Lydia Elizabeth, V. Rhymend Uthariaraj:
An improved list-based task scheduling algorithm for fog computing environment. Computing 103(7): 1353-1389 (2021) - [j22]S. Mary Virgil Nithya, V. Rhymend Uthariaraj:
Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation. KSII Trans. Internet Inf. Syst. 15(9): 3322-3347 (2021) - [j21]John Prakash Arockiasamy, Lydia Elizabeth Benjamin, Vaidheyanathan Rhymend Uthariaraj:
Beyond Statistical Analysis in Chaos-Based CSPRNG Design. Secur. Commun. Networks 2021: 5597720:1-5597720:14 (2021) - 2020
- [j20]Deepika Roselind Johnson, V. Rhymend Uthariaraj:
A Novel Parameter Initialization Technique Using RBM-NN for Human Action Recognition. Comput. Intell. Neurosci. 2020: 8852404:1-8852404:30 (2020) - [j19]S. Mary Virgil Nithya, V. Rhymend Uthariaraj:
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. Secur. Commun. Networks 2020: 4838497:1-4838497:13 (2020)
2010 – 2019
- 2019
- [j18]N. Thilagavathi, D. Divya Dharani, R. Sasilekha, Vasundhara Suruliandi, V. Rhymend Uthariaraj:
Energy Efficient Load Balancing in Cloud Data Center Using Clustering Technique. Int. J. Intell. Inf. Technol. 15(1): 84-100 (2019) - 2016
- [j17]N. Kayarvizhy, S. Kanmani, V. Rhymend Uthariaraj:
Enhancing the fault prediction accuracy of CK metrics using high precision cohesion metric. Int. J. Comput. Appl. Technol. 54(4): 290-296 (2016) - [c24]A. John Prakash, V. Rhymend Uthariaraj, Lydia Elizabeth Benjamin:
Efficient Key Management Protocol with Predictive Rekeying for Dynamic Networks. ICGHPC 2016: 1-6 - 2015
- [j16]P. Shunmuga Perumal, V. Rhymend Uthariaraj, V. R. Elgin Christo:
WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 9(3): 901-920 (2015) - [j15]R. Varalakshmi, V. Rhymend Uthariaraj:
Huffman based conditional access system for key distribution in digital TV multicast. Multim. Tools Appl. 74(9): 2899-2912 (2015) - 2014
- [j14]VijayaKumar G. Dhas, S. Saibharath, V. Rhymend Uthariaraj:
Using Mobile Agents for Load Balancing in Peer-to-Peer Systems Hosting Virtual Servers. J. Comput. Sci. 10(6): 948-960 (2014) - [j13]R. Varalakshmi, V. Rhymend Uthariaraj:
Huddle hierarchy based group key management protocol using gray code. Wirel. Networks 20(4): 695-704 (2014) - [c23]Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Fair-Trust Evaluation Approach (F-TEA) for Cloud Environment. SSCC 2014: 81-91 - 2013
- [j12]J. Valarmathi, V. Rhymend Uthariaraj:
An integrated approach for trust management based on policy, community adherence and reputation. Int. J. Ad Hoc Ubiquitous Comput. 13(2): 132-139 (2013) - 2012
- [j11]K. Gopalakrishnan, V. Rhymend Uthariaraj:
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks. Wirel. Pers. Commun. 67(4): 829-857 (2012) - [c22]J. Valarmathi, K. Lakshmi, R. S. Menaga, K. V. Abirami, V. Rhymend Uthariaraj:
SLA for a Pervasive Healthcare Environment. ACITY (1) 2012: 141-149 - [i2]J. Hannah Monisha, V. Rhymend Uthariaraj:
User profile based proportional share scheduling and mac protocol for manets. CoRR abs/1202.1691 (2012) - [i1]J. Hannah Monisha, V. Rhymend Uthariaraj:
Enhanced MAC Parameters to Support Hybrid Dynamic Prioritization in MANETs. CoRR abs/1206.5505 (2012) - 2011
- [j10]R. Gunasekaran, V. P. Divya, V. Rhymend Uthariaraj:
Mitigating channel usage in cooperative caching for Mobile Ad hoc Networks. Int. J. Ad Hoc Ubiquitous Comput. 7(2): 87-99 (2011) - [j9]K. Vidya, V. Rhymend Uthariaraj:
Throughput optimisation of inter- and intra-domain autonomous systems traffic engineering. Int. J. Commun. Networks Distributed Syst. 6(1): 45-58 (2011) - [j8]Nandagopal Malarvizhi, S. Gajalakshmi, V. Rhymend Uthariaraj:
Scheduling with Job Checkpoint in Computational Grid Environment. Int. J. Model. Simul. Sci. Comput. 2(3) (2011) - 2010
- [j7]R. Gunasekaran, S. Siddharth, P. Krishnaraj, M. Kalaiarasan, V. Rhymend Uthariaraj:
Efficient algorithms to solve Broadcast Scheduling problem in WiMAX mesh networks. Comput. Commun. 33(11): 1325-1333 (2010) - [j6]Vincent Charles, A. Udhayakumar, V. Rhymend Uthariaraj:
An approach to find redundant objective function(s) and redundant constraint(s) in multi-objective nonlinear stochastic fractional programming problems. Eur. J. Oper. Res. 201(2): 390-398 (2010) - [c21]B. Vanathi, V. Rhymend Uthariaraj:
Context representation using hierarchical method and heuristic based context selection in context aware computing. A2CWiC 2010: 32:1-32:7 - [c20]Nandagopal Malarvizhi, Kandaswamy Gokulnath, V. Rhymend Uthariaraj:
Sender initiated decentralized dynamic load balancing for multi cluster computational grid environment. A2CWiC 2010: 63:1-63:4 - [c19]R. Srivathsan, S. Siddharth, Raghavan Muthuregunathan, R. Gunasekaran, V. Rhymend Uthariaraj:
Enhanced Genetic algorithm for solving broadcast scheduling problem in TDMA based wireless networks. COMSNETS 2010: 1-10 - [c18]K. Gopalakrishnan, V. Rhymend Uthariaraj:
Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks. ICT 2010: 344-349 - [c17]B. Vanathi, V. Rhymend Uthariaraj:
Context Representation and Management in a Pervasive Environment. ICT 2010: 543-548
2000 – 2009
- 2009
- [j5]Gunasekaran Raja, Vaidheyanathan Rhymend Uthariaraj, Uamapathy Yamini, Sudharsan Rajagopalan, Selvaraj Sujitha Priyadarshini:
A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks. J. Comput. Sci. Technol. 24(3): 472-481 (2009) - [c16]Nandagopal Malarvizhi, V. Rhymend Uthariaraj:
A New Mechanism for Job Scheduling in Computational Grid Network Environments. AMT 2009: 490-500 - [c15]R. Gunasekaran, V. Rhymend Uthariaraj:
Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks. ITNG 2009: 640-645 - [c14]Nandagopal Malarvizhi, V. Rhymend Uthariaraj:
A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment. NCM 2009: 13-18 - [c13]A. John Prakash, V. Rhymend Uthariaraj:
Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. NetCoM 2009: 246-253 - [c12]A. John Prakash, V. Rhymend Uthariaraj:
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. NSS 2009: 87-94 - 2008
- [c11]A. John Prakash, V. Rhymend Uthariaraj:
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. NPC Workshops 2008: 119-124 - 2007
- [j4]S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai:
Object-oriented software fault prediction using neural networks. Inf. Softw. Technol. 49(5): 483-492 (2007) - [j3]V. Rhymend Uthariaraj, Mahesh Babu M.:
Graduate Courses in Embedded and Real-Time Systems. IEEE Pervasive Comput. 6(2): 101-104 (2007) - [c10]V. Rhymend Uthariaraj, T. C. Rangarajan, S. Srinivasan:
A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols. CNSR 2007: 192-202 - [c9]Mary Vennila, G. Vinoth, C. Vinoth, V. Sankaranarayanan, V. Rhymend Uthariaraj:
G-LeaSel: A Secure Multicast Model for Grid. COMSWARE 2007 - 2006
- [c8]M. Aramudhan, V. Rhymend Uthariaraj:
LDMA: Load Balancing Using Decentralized Decision Making Mobile Agents. International Conference on Computational Science (4) 2006: 388-395 - 2005
- [c7]V. Parthasarathy, S. Aram valartha Bharathi, V. Rhymend Uthariaraj:
Performance Analysis of Embedded Media Applications in Newer ARM Architectures. ICPP Workshops 2005: 210-214 - [c6]R. Gunasekaran, V. Rhymend Uthariaraj:
An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing. IWUC 2005: 49-59 - 2004
- [j2]S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai:
Investigation into the exploitation of Object-Oriented features. ACM SIGSOFT Softw. Eng. Notes 29(2): 7 (2004) - [j1]S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai:
Object oriented software quality prediction using general regression neural networks. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-6 (2004) - [c5]M. Aramudhan, V. Rhymend Uthariaraj:
End-to-End Web service Performance comparison with Web Server Stress Tool. iiWAS 2004 - [c4]S. Kanmani, V. Rhymend Uthariaraj, V. Sankaranarayanan, P. Thambidurai:
Measuring the Object-Oriented Properties in Small Sized C++ Programs? An Empirical Investigation. PROFES 2004: 185-202 - [c3]R. Elijah Blessing, V. Rhymend Uthariaraj:
Design of Secure Multicast Models for Mobile Services. SOFSEM 2004: 163-173 - 2003
- [c2]R. Elijah Blessing, V. Rhymend Uthariaraj:
Evaluation and Analysis of Computational Complexity for Secure Multicast Models. ICCSA (2) 2003: 684-694 - [c1]D. George Washington, T. R. Natesan, V. Rhymend Uthariaraj:
Models for Implementation of Online Real Time It-Enabled Service for Entry to Professional Education. ICEIS (1) 2003: 260-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint