default search action
V. Suma 0001
Person information
- affiliation: Dayananda Sagar Institutions, RIIC, Bangalore, India
Other persons with the same name
- V. Suma 0002 — Visvesvaraya Technological University, Belagavi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Sharon Christa, V. Suma, Uma Mohan:
Regression and decision tree approaches in predicting the effort in resolving incidents. Int. J. Bus. Inf. Syst. 39(3): 379-399 (2022) - [j9]S. M. Bindu Bhargavi, V. Suma:
A Survey of the Software Test Methods and Identification of Critical Success Factors for Automation. SN Comput. Sci. 3(6): 449 (2022) - 2021
- [j8]V. Suma, Xavier Fernando, Ram Palanisamy, Robert Bestak:
Special issue on "Ubiquitous clouds and communication networks". Int. J. Commun. Syst. 34(6) (2021) - 2020
- [j7]M. S. Narasimha Murthy, V. Suma, C. N. Chandrappa, M. Mepparambath Shankar:
Factors influencing effectiveness of testing applications in cloud using regression testing: a statistical analysis. Int. J. Adv. Intell. Paradigms 17(1/2): 109-126 (2020)
2010 – 2019
- 2019
- [j6]V. Suma, Joy Iong-Zong Chen, Zubair A. Baig:
Introduction to the Special Section on Software Engineering for Intelligent Systems and Control. Comput. Electr. Eng. 73: 383-384 (2019) - [j5]M. S. Narasimha Murthy, V. Suma:
Factors influencing regression testing on cloud and on-premises: an analysis. Int. J. Intell. Syst. Technol. Appl. 18(1/2): 69-83 (2019) - 2018
- [j4]K. Lakshmi Madhuri, V. Suma, Uma Mohan Mokashi:
A triangular perception of scope creep influencing the project success. Int. J. Bus. Inf. Syst. 27(1): 69-85 (2018) - [j3]Raghavi K. Bhujang, V. Suma:
A comprehensive solution for risk management in software development projects. Int. J. Intell. Syst. Technol. Appl. 17(1/2): 153-175 (2018) - 2016
- [c13]V Madhusudhan, V. Suma:
Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data. FICTA (2) 2016: 483-489 - [c12]S. D. Thilothame, M. Mashetty Chitralekha, U. S. Poornima, V. Suma:
Estimation of Degree of Connectivity to Predict Quality of Software Design. FICTA (2) 2016: 587-593 - [c11]C. P. Anandkumar, A. M. Prasad, V. Suma:
Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs. FICTA (2) 2016: 595-601 - [c10]Sharon Christa, V. Suma:
Significance of Ticket Analytics in Effective Software Maintenance: Awareness. WIR 2016: 126-130 - 2014
- [c9]Chintureena, V. Suma:
Effective Disaster Management to Enhance the Cloud Performance. FICTA (2) 2014: 153-163 - [c8]Phuritshabam Robert, B. Naveen Kumar, U. S. Poornima, V. Suma:
Implementation of Technology in Indian Agricultural Scenario. FICTA (2) 2014: 165-174 - [c7]U. S. Poornima, V. Suma:
An Investigation on Coupling and Cohesion as Contributory Factors for Stable System Design and Hence the Influence on System Maintainability and Reusability. FICTA (2) 2014: 645-650 - [c6]Bhagavant Deshpande, Jawahar J. Rao, V. Suma:
Comprehension of Defect Pattern at Code Construction Phase during Software Development Process. FICTA (2) 2014: 659-666 - [c5]Divakar Harekal, Jawahar J. Rao, V. Suma:
Pattern Analysis of Post Production Defects in Software Industry. FICTA (2) 2014: 667-671 - [c4]S. Sumathi, A. M. Prasad, V. Suma:
Optimized Heap Sort Technique (OHS) to Enhance the Performance of the Heap Sort by Using Two-Swap Method. FICTA (1) 2014: 693-700 - [i25]N. Rashmi, V. Suma:
Defect Detection Efficiency A Combined Approach. CoRR abs/1401.8069 (2014) - [i24]U. S. Poornima, V. Suma, H. Vasanth Kumar:
Design Patterns as Quality Influencing Factor in Object Oriented Design Approach. CoRR abs/1402.2372 (2014) - [i23]U. S. Poornima, V. Suma:
Visualization of Object Oriented Modeling from the Perspective of Set theory. CoRR abs/1402.2373 (2014) - [i22]U. S. Poornima, V. Suma:
Factors Modulating Software Design Quality. CoRR abs/1402.2374 (2014) - [i21]U. S. Poornima, V. Suma:
Significance of Coupling and Cohesion on Design Quality. CoRR abs/1402.2375 (2014) - [i20]T. R. Gopalakrishnan Nair, V. Suma, N. R. Shashi Kumar:
Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects. CoRR abs/1407.5319 (2014) - [i19]N. R. Shashi Kumar, T. R. Gopalakrishnan Nair, V. Suma:
A Parametric Analysis of Project Management Performance to Enhance Software Development Process. CoRR abs/1407.5323 (2014) - [i18]N. R. Shashi Kumar, T. R. Gopalakrishnan Nair, V. Suma:
SLI, a New Metric to determine Success of a Software Project. CoRR abs/1407.8377 (2014) - 2013
- [c3]B. R. Shubhamangala, V. Suma, P. Amarendra Reddy, C. Goodluck Singh:
Quality attribute focused multilayer requirement elicitation: Judicious approach to drive business value. ICACCI 2013: 2069-2075 - 2012
- [j2]T. R. Gopalakrishnan Nair, V. Suma, Pranesh Kumar Tiwari:
Significance of depth of inspection and inspection performance metrics for consistent defect management in software industry. IET Softw. 6(6): 524-535 (2012) - [c2]Rashmi KrishnaIyengar Srinivasan, V. Suma, Vaidehi Nedu:
An Enhanced Load Balancing Technique for Efficient Load Distribution in Cloud-Based IT Industries. ISI 2012: 479-485 - [i17]T. R. Gopalakrishnan Nair, Vithal J. Sampagar, V. Suma, Ezhilarasan Maharajan:
A Scheme for Automation of Telecom Data Processing for Business Application. CoRR abs/1203.6438 (2012) - [i16]T. R. Gopalakrishnan Nair, V. Suma, N. R. Shashi Kumar:
An Analytical Approach for Project Managers in Effective Defect Management in Software Process. CoRR abs/1203.6439 (2012) - [i15]T. R. Gopalakrishnan Nair, V. Suma, Pranesh Kumar Tiwari:
Analysis of Test Efficiency during Software Development Process. CoRR abs/1203.6445 (2012) - [i14]V. Suma, Bhagavant Deshpande, M. Vaidehi, T. R. Gopalakrishnan Nair:
Cloud Computing For Microfinances. CoRR abs/1204.2613 (2012) - [i13]T. R. Gopalakrishnan Nair, V. Suma, S. Manas:
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis. CoRR abs/1204.2616 (2012) - [i12]T. R. Gopalakrishnan Nair, V. Suma:
Defect Management Using Depth of Inspection and the Inspection Performance Metric. CoRR abs/1206.0361 (2012) - [i11]U. S. Poornima, V. Suma:
Significance of Quality Metrics in Software Development Process. CoRR abs/1207.0592 (2012) - [i10]V. Suma, T. R. Gopalakrishnan Nair:
Defect Management Strategies in Software Development. CoRR abs/1209.5573 (2012) - [i9]V. Suma, T. R. Gopalakrishnan Nair:
Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development. CoRR abs/1209.6466 (2012) - [i8]K. S. Rashmi, V. Suma, M. Vaidehi:
Enhanced Load Balancing Approach to Avoid Deadlocks in Cloud. CoRR abs/1209.6470 (2012) - [i7]K. S. Rashmi, V. Suma, M. Vaidehi:
Factors Influencing Job Rejections in Cloud Environment. CoRR abs/1209.6476 (2012) - [i6]Sharon Christa, K. Lakshmi Madhuri, V. Suma:
A Comparative Analysis of Data Mining Tools in Agent Based Systems. CoRR abs/1210.1040 (2012) - 2011
- [i5]T. R. Gopalakrishnan Nair, V. Suma:
Estimation of Characteristics of a. CoRR abs/1107.3201 (2011) - 2010
- [j1]T. R. Gopalakrishnan Nair, V. Suma:
A paradigm for metric based inspection process for enhancing defect management. ACM SIGSOFT Softw. Eng. Notes 35(3): 1 (2010) - [i4]V. Suma, T. R. Gopalakrishnan Nair:
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels. CoRR abs/1001.3552 (2010) - [i3]V. Suma, T. R. Gopalakrishnan Nair:
Effectiveness Of Defect Prevention In I.T. For Product Development. CoRR abs/1001.3725 (2010) - [i2]V. Suma, T. R. Gopalakrishnan Nair:
Defect Prevention Approaches in Medium Scale it Enterprises. CoRR abs/1001.3918 (2010) - [i1]V. Suma, T. R. Gopalakrishnan Nair:
Defect Prevention Approaches In Medium Scale It Enterprises. CoRR abs/1001.4129 (2010)
2000 – 2009
- 2008
- [c1]V. Suma, T. R. Gopalakrishnan Nair:
Enhanced Approaches in Defect Detection and Prevention Strategies in Small and Medium Scale Industries. ICSEA 2008: 389-393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint