167 results on '"Verma, Dinesh"'
Search Results
2. Challenges and Opportunities in the Digital Engineering Simulation Curriculum Development
3. Inference for Trustworthy Machine Intelligence: Challenges and Solutions
4. Dynamic Tracing of DoS Attack Over Software-Defined Networks Using Machine Learning
5. Initial Development of a Roadmap for Digital Engineering Simulations Curriculum
6. Network Insights for IoT Solution Resiliency
7. Addressing the Limitations of AI/ML in creating Cognitive Solutions
8. A Security-Constrained Reinforcement Learning Framework for Software Defined Networks
9. A secured automated Attendance Management System implemented with Secret Sharing Algorithm
10. Enabling Discoverable Trusted Services for Highly Dynamic Decentralized Workflows
11. The Need for a Secure Modular Open Systems Approach (MOSA): Building the Case Using Systems Thinking Methodologies
12. ProFact: A Provenance-Based Analytics Framework for Access Control Policies.
13. An AI Enabled System for Distributed System Characterization
14. Generating Client Side Policies for Cyber-Physical Safety
15. Generative Policies for Coalition Systems - A Symbolic Learning Framework
16. Federated AI for the Enterprise: A Web Services Based Implementation
17. Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning
18. On the Impact of Generative Policies on Security Metrics
19. Prediction of Software Effort in the Early Stage of Software Development: A Hybrid Model.
20. Security Issues for Distributed Fusion in Coalition Environments
21. How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management)
22. A Policy System for Control of Data Fusion Processes and Derived Data
23. Edge computing architecture for applying AI to IoT
24. Policy enabled caching for distributed AI
25. Community-based self generation of policies and processes for assets: Concepts and research directions
26. Measures of network centricity for edge deployment of IoT applications
27. Provenance-Based Analytics Services for Access Control Policies
28. A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions
29. Comparing Software Defined architectures for coalition operations
30. Emperical study of defects dependency on software metrics using clustering approach
31. Analysis of approach for predicting software defect density using static metrics
32. Advances in network sciences via collaborative multi-disciplinary research.
33. System of System case study - why the network centric command and control system needed to change: Lessons from army command and control in Operation Iraqi Freedom
34. Dynamic Composition of Services in Sensor Networks
35. Morphogenesis in computer networks
36. Muti-scale temporal segmentation and outlier detection in sensor networks
37. Application of halftoning algorithms to location dependent sensor placement
38. Analyzing finite MANETs by transformations to equivalent static graphs
39. Networking concepts comparison for avionics architecture
40. More is more: The benefits of dense sensor deployment
41. Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors
42. The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment
43. In search of the biology of systems
44. Holistan: A Futuristic Scenario for International Coalition Operations
45. ISE01-4: Deployment Time Performance Optimization of Internet Services
46. I: INTRODUCTION AND GENERAL OBSERVATIONS: CHAPTER 3: AN OVERVIEW OF TECHNIQUES FOR BANDWIDTH OPTIMIZATION: 3.6: FLOW SHARING.
47. III: TECHNIQUES FOR ENTERPRISES AND APPLICATION DEVELOPERS: CHAPTER 13: MOBILE DATA ISSUES FOR THE ENTERPRISE: 13.2: SECURITY ISSUES.
48. III: TECHNIQUES FOR ENTERPRISES AND APPLICATION DEVELOPERS: CHAPTER 12: BANDWIDTH EFFICIENCY FOR MOBILE APPLICATIONS: 12.8: BEST PRACTICES FOR BANDWIDTH EFFICIENCY.
49. III: TECHNIQUES FOR ENTERPRISES AND APPLICATION DEVELOPERS: CHAPTER 11: POWER EFFICIENCY FOR MOBILE APPLICATIONS: 11.6: BEST PRACTICES FOR APPLICATION POWER EFFICIENCY.
50. II: TECHNIQUES FOR MOBILE NETWORK OPERATORS: CHAPTER 7: CONSUMER-ORIENTED DATA MONETIZATION SERVICES: 7.5: LOCATION-BASED SERVICES.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.