Arun Pujari
Cited by
Cited by
Data mining techniques
AK Pujari
Universities press, 2001
N-gram analysis for computer virus detection
DKS Reddy, AK Pujari
Journal in computer virology 2, 231-239, 2006
INDu: An Interval & Duration Network
AK Pujari, G Vijaya Kumari, A Sattar
Australasian Joint Conference on Artificial Intelligence, 291-303, 1999
Intrusion detection using text processing techniques with a kernel based similarity measure
A Sharma, AK Pujari, KK Paliwal
computers & security 26 (7-8), 488-495, 2007
QROCK: A quick version of the ROCK algorithm for clustering of categorical data
M Dutta, AK Mahanta, AK Pujari
Pattern Recognition Letters 26 (15), 2364-2373, 2005
Q-coverage problem in wireless sensor networks
M Chaudhary, AK Pujari
Distributed Computing and Networking: 10th International Conference, ICDCN …, 2009
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory
AK Pujari, CD Naidu, MS Rao, BC Jinaga
Image and Vision Computing 22 (14), 1221-1227, 2004
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
Recognition of Telugu characters using neural networks
MB Sukhaswami, P Seetharamulu, AK Pujari
International journal of neural systems 6 (03), 317-357, 1995
A modified Gabor function for content based image retrieval
CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu
Pattern Recognition Letters 28 (2), 293-300, 2007
Virtual user approach for group recommender systems using precedence relations
VR Kagita, AK Pujari, V Padmanabhan
Information Sciences 294, 15-30, 2015
Collaborative filtering using multiple binary maximum margin matrix factorizations
V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan
Information Sciences 380, 1-11, 2017
New Malicious Code Detection Using Variable Length n-grams
DKS Reddy, SK Dash, AK Pujari
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
Volume intersection with optimal set of directions
K Shanmukh, AK Pujari
Pattern Recognition Letters 12 (3), 165-170, 1991
Adaptive Naive Bayes method for masquerade detection
SK Dash, KS Reddy, AK Pujari
Security and Communication Networks 4 (4), 410-417, 2011
Progress in advanced computing and intelligent engineering
B Pati, CR Panigrahi, S Misra, AK Pujari, S Bakshi
Advances in Intelligent Systems and Computing 713, 2017
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
Conformal matrix factorization based recommender system
TVR Himabindu, V Padmanabhan, AK Pujari
Information Sciences 467, 685-707, 2018
A new framework for reasoning about points, intervals and durations
AK Pujari, A Sattar
IJCAI, 1259-1267, 1999
Group preserving label embedding for multi-label classification
V Kumar, AK Pujari, V Padmanabhan, VR Kagita
Pattern Recognition 90, 23-34, 2019
The system can't perform the operation now. Try again later.
Articles 1–20