Seguir
Arun Pujari
Arun Pujari
Dirección de correo verificada de uohyd.ac.in
Título
Citado por
Citado por
Año
Data mining techniques
AK Pujari
Universities press, 2001
7432001
N-gram analysis for computer virus detection
DKS Reddy, AK Pujari
Journal in computer virology 2, 231-239, 2006
1702006
INDu: An Interval & Duration Network
AK Pujari, G Vijaya Kumari, A Sattar
Australasian Joint Conference on Artificial Intelligence, 291-303, 1999
1241999
QROCK: A quick version of the ROCK algorithm for clustering of categorical data
M Dutta, AK Mahanta, AK Pujari
Pattern Recognition Letters 26 (15), 2364-2373, 2005
1082005
Intrusion detection using text processing techniques with a kernel based similarity measure
A Sharma, AK Pujari, KK Paliwal
computers & security 26 (7-8), 488-495, 2007
1072007
Q-coverage problem in wireless sensor networks
M Chaudhary, AK Pujari
Distributed Computing and Networking: 10th International Conference, ICDCN …, 2009
842009
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory
AK Pujari, CD Naidu, MS Rao, BC Jinaga
Image and Vision Computing 22 (14), 1221-1227, 2004
75*2004
Intrusion detection using text processing techniques with a binary-weighted cosine metric
S Rawat, VP Gulati, AK Pujari, VR Vemuri
Journal of Information Assurance and Security 1 (1), 43-50, 2006
692006
Recognition of Telugu characters using neural networks
MB Sukhaswami, P Seetharamulu, AK Pujari
International Journal of Neural Systems 6 (03), 317-357, 1995
681995
A modified Gabor function for content based image retrieval
CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu
Pattern Recognition Letters 28 (2), 293-300, 2007
602007
Virtual user approach for group recommender systems using precedence relations
VR Kagita, AK Pujari, V Padmanabhan
Information Sciences 294, 15-30, 2015
592015
Conformal matrix factorization based recommender system
TVR Himabindu, V Padmanabhan, AK Pujari
Information Sciences 467, 685-707, 2018
532018
Collaborative filtering using multiple binary maximum margin matrix factorizations
V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan
Information Sciences 380, 1-11, 2017
532017
New Malicious Code Detection Using Variable Length n-grams
DKS Reddy, SK Dash, AK Pujari
Information Systems Security: Second International Conference, ICISS 2006 …, 2006
512006
Volume intersection with optimal set of directions
K Shanmukh, AK Pujari
Pattern Recognition Letters 12 (3), 165-170, 1991
501991
Adaptive Naive Bayes method for masquerade detection
SK Dash, KS Reddy, AK Pujari
Security and Communication Networks 4 (4), 410-417, 2011
482011
On the use of singular value decomposition for a fast intrusion detection system
S Rawat, AK Pujari, VP Gulati
Electronic Notes in Theoretical Computer Science 142, 215-228, 2006
482006
Group preserving label embedding for multi-label classification
V Kumar, AK Pujari, V Padmanabhan, VR Kagita
Pattern Recognition 90, 23-34, 2019
442019
A new framework for reasoning about points, intervals and durations
AK Pujari, A Sattar
IJCAI, 1259-1267, 1999
421999
Episode based masquerade detection
SK Dash, KS Reddy, AK Pujari
Information Systems Security: First International Conference, ICISS 2005 …, 2005
392005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20