S.No | Name(s) of the Author | Title | National / International | Conf/Jur Name | Year |
---|
1 | M.Suman | An Iterated extended Risk Sensitive Filters for Non linear Filtering problems | INT | ICCC 2008 | 2011 |
2 | D.Aruna Kumari | Mining Frequent Phrase Patterns from Text Data and Representation Using Finite Automaton | INT | IJCICT -2010 | 2011 |
3 | M.Suman | A systematic approach to generate & conduct destructive security test sets | INT | International conference on CRC 11 | 2011 |
4 | P.Sindhu | Security in wired and wireless networks | NAT | National conference on emerging trends in VLSI | 2011 |
5 | M.Suman | Speech enhancement and recognition of compressed speech signal in noisy reverberant conditions | INT | International Conference on Information Systems Design and Intelligent Applications | 2011 |
6 | M.Suman | Speech enhancement and recognition of compressed speech signal in noisy reverberant conditions | INT | International Conference on Information Systems Design and Intelligent Applications | 2011 |
7 | D.Aruna Kumari , K.Rajasekhara Rao, M.Suman | Privacy Preserving distributed data mining using steganography | INT | SPRINGER LNCS | 2011 |