Design & development of location identification using RFID with WiFi positioning systems K Deepika, J Usha 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017 | 12 | 2017 |
Performance Analysis of Kernel-based Virtual Machine M Sudha, GM Harish, A Nandan, J Usha AIRCC's International Journal of Computer Science and Information Technology …, 2013 | 10 | 2013 |
Investigations & implications on location tracking using RFID with global positioning systems K Deepika, J Usha 2016 3rd International Conference on Computer and Information Sciences …, 2016 | 9 | 2016 |
Queuing strategies for self overload control in SIP servers KK Guduru, J Usha 2014 International Conference on Contemporary Computing and Informatics …, 2014 | 8 | 2014 |
Performance Analysis of Linux Containers-An Alternative Approach to Virtual Machines. Software Engineering, 4 (1), 820ā?? 824 M Sudha, GM Harish, J Usha International Journal of Advanced Research in Computer Science and Software …, 2014 | 7 | 2014 |
Location Based Services-Positioning Techniques and its applications B Ashwini, J Usha International Journal of Application or Innovation in Engineering …, 2014 | 6 | 2014 |
Cache management issues in mobile computing environment C Chakravorty, J Usha International Journal of Mobile Network Communications and Telematics …, 2012 | 6 | 2012 |
Implementation of personnel localization & automation network (PLAN) using internet of things (IoT) K Deepika, J Usha Procedia Computer Science 171, 868-877, 2020 | 5 | 2020 |
A comprehensive review of energy efficiency in cloud computing environment SR Jayasimha, J Usha, SG Srivani Iyengar Int. J. Eng. Technol 7, 249-252, 2018 | 5 | 2018 |
Clustering approach for congestion in mobile networks J Usha, A Kumar, AD Shaligram IJCSNS International Journal of Computer Science and Network Security 10 (2 …, 2010 | 4 | 2010 |
Efficient power management using fuzzy logic for cloud computing environment SR Jayasimha, J Usha, SG Srivani 2018 3rd International Conference on Computational Systems and Information …, 2018 | 3 | 2018 |
MIME Type for ICE Candidates to Reduce the Size of SIP Session Setup Signaling Messages KK Guduru, J Usha 2015 Fifth International Conference on Communication Systems and Network …, 2015 | 3 | 2015 |
Controlling overload in networks with SIP redirect servers KK Guduru, J Usha International Journal of Advanced Research in Computer Science and Software …, 2013 | 3 | 2013 |
A Novel Fault Tolerant Approach using Patterns for Private Cloud Environment M Sudha, J Usha Int. J. Comput. Sci. Inf. Secur. IJCSIS 17, 2019 | 2 | 2019 |
Reliable Session Initiation Protocol (RSIP) signaling with UDP transport using piggybacking method KK Guduru, J Usha Telecommunication Systems 68, 479-491, 2018 | 2 | 2018 |
Automata approach to reduce power consumption in smart grid cloud data center J Usha, SR Jayasimha, SG Srivani International Conference on Cognitive Computing and Information Processing …, 2017 | 2 | 2017 |
Automation of smart monitoring for person localisation and alerting network K Deepika, J Usha International Journal of Information Technology and Management 20 (1-2), 145-159, 2021 | 1 | 2021 |
Minimizing Power Consumption and Improve the Quality of Service in the Data Center SR Jayasimha, J Usha, SG Srivani Indian Journal of Science and Technology, 2016 | 1 | 2016 |
Identification of UHF Gen 2 RFID privacy and security issues K Deepika, J Usha Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET …, 2015 | 1 | 2015 |
Load Balancing using Backpropagation in Mobile Networks J Usha, A Kumar, AD Shaligram Wireless Communication, 33-40, 2010 | 1 | 2010 |