purusothaman T
purusothaman T
Verified email at gct.ac.in - Homepage
TitleCited byYear
Utility sentient frequent itemset mining and association rule mining: a literature survey and comparative study
S Shankar, T Purusothaman
International Journal of Soft Computing Applications 4 (1), 81-95, 2009
522009
A fast algorithm for mining high utility itemsets
S Shankar, N Babu, T Purusothaman, S Jayanthi
2009 IEEE International Advance Computing Conference, 1459-1464, 2009
482009
Dr. A. Balamurugan
PT Selvy
European Journal of Scientific Research 62 (3), 321-330, 2011
452011
Efficient multimodal biometric authentication using fast fingerprint verification and enhanced iris features
UFF Verification
Journal of Computer Science 7 (5), 698-706, 2011
202011
GLS with secure routing in ad-hoc networks
V Sumathy, P Narayanasmy, K Baskaran, T Purusothaman
TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region 3 …, 2003
162003
An efficient routing protocol design for distributed wireless sensor networks
K Manikandan, T Purusothaman
International Journal of Computer Applications 10 (4), 5-10, 2010
152010
A new scalable and reliable cost effective key agreement protocol for secure group communication
SJ Begum, T Purusothaman
Journal of Computer Science, 2011
132011
Fault-tolerant adaptive mobile agent system using dynamic role based access control
P Marikkannu, JJA Jovin, T Purusothaman
International Journal of Computer Applications 20 (2), 1-6, 2011
122011
Novel algorithm for mining high utility itemsets
S Shankar, T Purusothaman, S Jayanthi
2008 International Conference on Computing, Communication and Networking, 1-6, 2008
112008
Genetic algorithm for optimal design of delay bounded WDM multicast networks
AE Jeyakumar, K Baskaran, V Sumathy
TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region 3 …, 2003
112003
Multilevel access control in a MANET for a defense messaging system using elliptic curve cryptography
JN Begum, K Kumar, V Sumathy
International Journal of Computer Science & Security (IJCSS) 4 (2), 208, 2010
102010
Classification of substitution ciphers using neural networks
G Sivagurunathan, V Rajendran, T Purusothaman
International Journal of computer science and network Security 10 (3), 274-279, 2010
102010
Performance Evaluation of Exponential TCP/IP Congestion Control Algorithm
M Kalpana, T Purusothaman
IJCSNS 9 (3), 312, 2009
102009
Enhanced AES algorithm for strong encryption
V Sumathy, C Navaneethan
International Journal of Advances in Engineering & Technology 4 (2), 547-553, 2012
92012
Efficient star topology based multicast key management algorithm
K Saravanan, T Purusothaman
Journal of Computer Science 8 (6), 951, 2012
92012
IPSD: New coverage preserving and connectivity maintenance scheme for improving lifetime of wireless sensor networks
A Balamurugan, T Purusothaman
WTOC 11, 26-36, 2012
92012
Reduction of key search space of vigenere cipher using particle swarm optimization
G Sivagurunathan, T Purusothaman
92011
A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer-to-Peer Information Sharing in Mobile Ad Hoc Networks
K Kumar, JN Begum, V Sumathy
arXiv preprint arXiv:1011.0363, 2010
92010
Efficient region-based group key agreement protocol for ad hoc networks using elliptic curve cryptography
K Kumar, V Sumathy, JN Begum
2009 IEEE International Advance Computing Conference, 1052-1060, 2009
92009
A generic interface for resource aggregation in grid of grids
D Surendran, T Purusothaman, RA Balachandar
International Journal of Information Technology, Communications and …, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20