Trustworthy Cloud Service Provider Selection using Multi Criteria Decision Making Methods. M Supriya, K Sangeeta, GK Patra Engineering Letters 24 (1), 2016 | 47 | 2016 |
Numerical simulation of converging nonlinear wavefronts P Prasad, K Sangeeta Journal of Fluid Mechanics 385, 1-20, 1999 | 23 | 1999 |
A review: Information extraction techniques from research papers K Jayaram, K Sangeeta 2017 International Conference on Innovative Mechanisms for Industry …, 2017 | 22 | 2017 |
Analysis of neural synchronization using genetic approach for secure key generation S Santhanalakshmi, K Sangeeta, GK Patra International Symposium on Security in Computing and Communication, 207-216, 2015 | 19 | 2015 |
Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services M Supriya, K Sangeeta, GK Patra 2015 International Conference on Computer, Control, Informatics and its …, 2015 | 18 | 2015 |
Comparison of cloud service providers based on direct and recommended trust rating M Supriya, K Sangeeta, GK Patra 2013 IEEE International Conference on Electronics, Computing and …, 2013 | 17 | 2013 |
Estimation of Trust values for Varying Levels of Trustworthiness based on Infrastructure as a Service M Supriya, K Sangeeta, GK Patra Proceedings of the 2014 International Conference on Interdisciplinary …, 2014 | 13 | 2014 |
A Fuzzy based Hierarchical Trust Framework to rate the Cloud Service Providers based on Infrastructure Facilities. M Supriya, K Sangeeta, GK Patra International Journal of Performability Engineering 12 (1), 2016 | 11 | 2016 |
Design of stream cipher for text encryption using soft computing based techniques S Santhanalakshmi, K Sangeeta, GK Patra IJCSNS International Journal of Computer Science and Network Security 12 (12 …, 2012 | 10 | 2012 |
Design of group key agreement protocol using neural key synchronization S Santhanalakshmi, K Sangeeta, GK Patra Journal of Interdisciplinary Mathematics 23 (2), 435-451, 2020 | 8 | 2020 |
Deep Reinforcement Learning based Load Balancing Policy for balancing network traffic in datacenter environment. AR Doke, K Sangeeta | 8* | |
Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach AAT Innocent, K Sangeeta The Fifth International Conference on the Applications of Digital …, 2014 | 6 | 2014 |
Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach AAT Innocent, K Sangeeta JISR 5 (1), 19-27, 2014 | 6 | 2014 |
Generalization of the projection theorem for finite element analysis K Sangeeta, S Mukherjee, G Prathap Research Report C-MMACS, 2003 | 4 | 2003 |
An IOT based network management system for enterprise network N Vignesh, R Lohith, SA Kumar, H Dagale, K Sangeeta 2017 International Conference On Smart Technologies For Smart Nation …, 2017 | 2 | 2017 |
Effect of Spam Filter on SPOT Algorithm KVLP Padmini, V Guduru, K Sangeeta Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 2* | 2015 |
Anomalies in Landsat Imagery and Imputation S Goswami, K Sangeeta Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 1 | 2015 |
Conservation of Best-Fit Paradigm at an Element Level K Sangeeta, S Mukherjee, G Prathap International Journal for Computational Methods in Engineering Science and …, 2006 | 1 | 2006 |
A function space approach to study rank deficiency and spurious modes in finite elements K Sangeeta, S Mukherjee, G Prathap Structural Engineering and Mechanics 21 (5), 539-551, 2005 | 1 | 2005 |
Analysis and comparison of various compression methods used for storing massive geodata objects S Sahoo, K Sangeeta 2017 International Conference on Computational Intelligence in Data Science …, 2017 | | 2017 |