Browsing by Author Jena, S K

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 11 to 30 of 55 < previous   next >
Issue DateTitleAuthor(s)
2008An Efficient Palmimprint Image Recognition SystemPanigrahy, S K; Jena, D; Jena, S K
Feb-2011Evaluation of Web Application Security Risks and Secure Design PatternsDalai, A K; Jena, S K
Jul-2010An Extended Approach to Personalize the Web Search by Measuring the User RelevanceJena, S K; Kumar, V; Ashok, S O
Dec-2009A Fault Model for Testing the Access Control Policies using Classified Mutation OperatorSharma, S; Jena, S K
1982Free Convection in the Laminar Boundary Layer Flow of a Thermomicropolar Fluid past a Vertical Flat Plate with Suction/InjectionJena, S K; Mathur, M N
2008A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed SystemsSahoo, Bibhudatta; Mohapatra, Sudipta; Jena, S K
2008Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
2008Improved Offline Signature Verification Scheme using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
16-Aug-2008Improved Offline Signature Verification Scheme Using Feature Point Extraction MethodJena, D; Majhi, B; Panigrahy, S K; Jena, S K
Dec-2009Improved query plans for unnesting nested SQL queriesKhaitan, P; Satish, K M; Korra, S B; Jena, S K
Dec-2016Improving Energy Usage in Cloud Computing Using DVFSMishra, S K; Parida, P P; Sahoo, S; Sahoo, B; Jena, S K
Jun-2014Intruder Identiļ¬cation in IEEE 802.11 Wireless Infrastructure using LocalizationDalai, A K; Jena, S K
Sep-2011Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc NetworksSingh, Y; Jena, S K
2011Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMutchukota, T R; Panigrahy, S K; Jena, S K
Aug-2011Man-in-the-Middle Attack and its Countermeasure in Bluetooth Secure Simple PairingMuchukota, T R; Panigrahy, S K; Jena, S K
1984Mixed convection flow of a micropolar fluid from an isothermal vertical plateJena, S K; Mathur, M N
2009Modeling and Analysis to Estimate the Performance of Heterogeneous ClusterChandra, Pushpendra Kumar; Sahoo, Bibhudatta; Jena, S K
Dec-2009A Modified Remote User Authentication Scheme using Smart Card based on ECDLPJena, D; Panigrahy, S K; Jena, S K; Pani, S K
2009New Approach for Testing the Correctness of Access Control PoliciesSharma, S; Jena, S K; Korra, S B
Dec-2009A Novel and Efficient Cryptosystem for Long Message EncryptionJena, D; Panigrahy, S K; Jena, S K