Johnson P. Thomas

According to our database1, Johnson P. Thomas authored at least 74 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Context-aware automated quality assessment of textual data.
Int. J. Bus. Intell. Data Min., 2023

Unsupervised Spiking Neural Network Model of Prefrontal Cortex to study Task Switching with Synaptic deficiency.
CoRR, 2023

2022
KeyPIn - mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive.
J. Cloud Comput., 2022

Algorithm to build quantum circuit from classical description of DFSM.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

2020
Predicting Forage Quality of Warm-Season Legumes by Near Infrared Spectroscopy Coupled with Machine Learning Techniques.
Sensors, 2020

A Study of Prefrontal Cortex Task Switching Using Spiking Neural Networks.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

A Self-learning Personal Privacy Assistant.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Assessing Context-Aware Data Consistency.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Biologically Inspired Augmented Memory Recall Model for Pattern Recognition.
Proceedings of the Cognitive Computing - ICCC 2018, 2018

2017
Towards an efficient distributed cloud computing architecture.
Peer-to-Peer Netw. Appl., 2017

An efficient and secure information retrieval framework for content centric networks.
J. Parallel Distributed Comput., 2017

Content sensitivity based access control framework for Hadoop.
Digit. Commun. Networks, 2017

Dynamic deadline-constraint scheduler for Hadoop YARN.
Proceedings of the 2017 IEEE SmartWorld, 2017

A multi-task machine learning approach for comorbid patient prioritization.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Cleaning Framework for BigData: An Interactive Approach for Data Cleaning.
Proceedings of the Second IEEE International Conference on Big Data Computing Service and Applications, 2016

Privacy Preserving Rack-Based Dynamic Workload Balancing for Hadoop MapReduce.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique.
Proceedings of the Security in Computing and Communications, 2015

Multilevel Threshold Secret Sharing in Distributed Cloud.
Proceedings of the Security in Computing and Communications, 2015

Real-Time Hybrid Intrusion Detection System Using Apache Storm.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Identifying Sensitive Data Items within Hadoop.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Cleaning Framework for Big Data - Object Identification and Linkage.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

An Empirical Approach to Detection of Topic Bubbles in Tweets.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015

Privacy Preserving Sequential Pattern Mining Across Multiple Medical Sites.
Proceedings of the AMIA 2015, 2015

2014
MAC-TCP cross-layer attack and its defense in cognitive radio networks.
Proceedings of the Q2SWinet'14, 2014

Efficient structuring of data in big data.
Proceedings of the International Conference on Data Science & Engineering, 2014

Dynamic Workload Balancing for Hadoop MapReduce.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation.
Proceedings of the IEEE Ninth World Congress on Services, 2013

HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Moving Target with Load Balancing in P2P Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2010
Manipulation as a Security Mechanism in Sensor Networks.
Proceedings of the Advances in Social Computing, 2010

Secure access control protocol for WSNs with inter-network roaming.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Secure protocol for ad hoc transportation system.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2008
Security and QoS Self-Optimization in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2008

Mutual authentication protocols for RFID systems.
Int. J. Autom. Comput., 2008

Trust model for certificate revocation in ad hoc networks.
Ad Hoc Networks, 2008

2007
Modeling intrusion detection system using hybrid intelligent systems.
J. Netw. Comput. Appl., 2007

D-SCIDS: Distributed soft computing intrusion detection system.
J. Netw. Comput. Appl., 2007

Deception framework for sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Information Discovery across Organizational Boundaries through Local Caching.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Sector-based routing for secure energy efficient communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Trust determination in ad hoc networks.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
Quality of perception: user quality of service in multimedia presentations.
IEEE Trans. Multim., 2005

Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks.
J. Univers. Comput. Sci., 2005

Information Assurance and Security.
J. Univers. Comput. Sci., 2005

Adaptation as a premise for perceptual-based multimedia communications.
Int. J. Inf. Technol. Manag., 2005

Feature deduction and ensemble design of intrusion detection systems.
Comput. Secur., 2005

Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol.
J. Comput. Inf. Technol., 2005

QoS-Based Authentication Scheme for Ad Hoc Wireless Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Real Stock Trading Using Soft Computing Models.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Enhancing Web Services Availability.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Sliding Window Protocol for Group Communication in Ad-Hoc Networks.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Source Code Fingerprinting Using Graph Grammar Induction.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

Fair BPEL Processes Transaction using Non-Repudiation Protocols.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing.
Ann. UMCS Informatica, 2004

Modeling Work Flow in Hierarchically Cluster Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

Location-Triggered Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Reducing Latency in Ad Hoc Networks by Pre-Fetching.
Proceedings of the International Conference on Wireless Networks, 2004

Hybrid Feature Selection for Modeling Intrusion Detection Systems.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

2003
Modeling of Web Services Flow.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

Reducing the scope of denial of service attacks in QoS routing.
Proceedings of the Global Telecommunications Conference, 2003

2001
Crossing the Man-Machine Divide: A Mapping Based on Empirical Results.
J. VLSI Signal Process., 2001

2000
Design and verification of a coordination protocol for cooperating systems.
Soft Comput., 2000

Impact of Protocol Stacks on Quality of Perception.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
An approach towards mapping quality of perception to quality of service in multimedia communications.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999

Multimedia, network protocols and users - bridging the gap.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

1998
QoS Impact on User Perception and Understanding of Multimedia Video Clips.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

1996
Boundary models for assembly knowledge representation.
IEEE Trans. Robotics Autom., 1996

A hierarchical Petri net framework for the representation and analysis of assembly.
IEEE Trans. Robotics Autom., 1996

Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations.
Proceedings of the 1996 MultiMedia Modeling: Towards The Information Society Superhighway, 1996

1995
Properties of assembly Petri net.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, 1995

A Graph-Based Formalism for Modelling Assembly Tasks.
Proceedings of the 1995 International Conference on Robotics and Automation, 1995

1993
Modelling of Assembly Partitions for a Distributed Environment.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993

Constructing Assembly Plans.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993


  Loading...