
Pethuru Raj Chelliah
Person information
- affiliation: Reliance Jio Infocomm Ltd., Bangalore, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j19]Pethuru Raj, Jenn-Wei Lin:
Chapter One - Stepping into the digitally instrumented and interconnected era. Adv. Comput. 117: 1-34 (2020) - [j18]Janet Barnabas
, Pethuru Raj:
Chapter Nine - The human body: A digital twin of the cyber physical systems. Adv. Comput. 117: 219-246 (2020) - [j17]Pethuru Raj, Chellammal Surianarayanan:
Chapter Twelve - Digital twin: The industry use cases. Adv. Comput. 117: 285-320 (2020) - [j16]Nithya Chidambaram, Pethuru Raj, Karruppuswamy Thenmozhi, Rengarajan Amirtharajan
:
Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. 14(13): 3143-3153 (2020) - [j15]Malarvizhi N
, P. Selvarani, Pethuru Raj:
Adaptive fuzzy genetic algorithm for multi biometric authentication. Multim. Tools Appl. 79(13-14): 9131-9144 (2020) - [j14]Parvathy Arulmozhi, N. Hemavathi
, John Bosco Balaguru Rayappan, Pethuru Raj:
ALRC: A Novel Adaptive Linear Regression Based Classification for Grade based Student Learning using Radio Frequency Identification. Wirel. Pers. Commun. 112(4): 2091-2107 (2020)
2010 – 2019
- 2019
- [b4]Chellammal Surianarayanan, Pethuru Raj Chelliah:
Essentials of Cloud Computing - A Holistic Perspective. Texts in Computer Science, Springer 2019, ISBN 978-3-030-13133-3, pp. 1-304 - [j13]Jenn-Wei Lin
, Pethuru Raj Chelliah
, Meng-Chieh Hsu
, Jia-Xin Hou:
Efficient Fault-Tolerant Routing in IoT Wireless Sensor Networks Based on Bipartite-Flow Graph Modeling. IEEE Access 7: 14022-14034 (2019) - [j12]Veeramuthu Venkatesh, Pethuru Raj, K. Kannan, P. Balakrishnan:
Precision centric framework for activity recognition using Dempster Shaffer theory and information fusion algorithm in smart environment. J. Intell. Fuzzy Syst. 36(3): 2117-2124 (2019) - [j11]Nithya Chidambaram, Pethuru Raj, Karuppusamy Thenmozhi, Sundararaman Rajagopalan, Rengarajan Amirtharajan
:
A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multim. Tools Appl. 78(23): 33837-33863 (2019) - 2018
- [b3]Pethuru Raj, Anupama Raman:
Software-Defined Cloud Centers - Operational and Management Technologies and Tools. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-78636-0, pp. 1-240 - [j10]Pethuru Raj:
Chapter One - A Detailed Analysis of NoSQL and NewSQL Databases for Bigdata Analytics and Distributed Computing. Adv. Comput. 109: 1-48 (2018) - [j9]Pethuru Raj:
Chapter Seven - The Hadoop Ecosystem Technologies and Tools. Adv. Comput. 109: 279-320 (2018) - [j8]Pethuru Raj, Ganesh Chandra Deka:
Preface. Adv. Comput. 109: ix-x (2018) - [j7]Pethuru Raj, Ganesh Chandra Deka:
Preface. Adv. Comput. 111: ix-x (2018) - [j6]N. Mohanapriya, G. Kousalya, P. Balakrishnan, Pethuru Raj Chelliah:
Energy efficient workflow scheduling with virtual machine consolidation for green cloud computing. J. Intell. Fuzzy Syst. 34(3): 1561-1572 (2018) - [j5]Sathish A. P. Kumar, R. Madhumathi
, Pethuru Raj Chelliah, Lei Tao, Shangguang Wang:
A novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance. J. Reliab. Intell. Environ. 4(4): 199-209 (2018) - [p1]Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj:
A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services. Computer and Network Security Essentials 2018: 237-261 - 2017
- [b2]G. Kousalya, P. Balakrishnan, Pethuru Raj Chelliah:
Automated Workflow Scheduling in Self-Adaptive Clouds - Concepts, Algorithms and Methods. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-56981-9, pp. 1-221 - [j4]S. Rajaraajeswari, R. Selvarani, Pethuru Raj, P. Mohanavadivu:
Fuzzy logic for decision-enablement: a novel context-awareness framework for smarter environments. Int. J. High Perform. Comput. Netw. 10(1/2): 64-77 (2017) - [c7]Pethuru Raj Chelliah, Sathish A. P. Kumar:
A Cloud-Based Service Delivery Platform for Effective Homeland Security. CSCloud 2017: 157-162 - 2016
- [j3]B. B. Gupta
, Shingo Yamaguchi, Pethuru Raj Chelliah:
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking. EURASIP J. Inf. Secur. 2016: 27 (2016) - [j2]Nithya Chidambaram
, Pethuru Raj, Karuppusamy Thenmozhi
, Rengarajan Amirtharajan
:
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique. Int. J. Digit. Multim. Broadcast. 2016: 8789397:1-8789397:6 (2016) - [c6]Jeeva Chelladhurai, Pethuru Raj Chelliah, Sathish Alampalayam Kumar:
Securing Docker Containers from Denial of Service (DoS) Attacks. SCC 2016: 856-859 - [c5]Pethuru Raj:
Deciphering the Growing Docker Ecosystem. Intelligent Environments (Workshops) 2016: 590-603 - 2015
- [b1]Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala:
High-Performance Big-Data Analytics - Computing Systems and Approaches. Computer Communications and Networks, Springer 2015, ISBN 978-3-319-20743-8, pp. 1-424 - [c4]Sumitra Binu, Pethuru Raj, Mohammed Misbahuddin:
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment. ACSS (1) 2015: 183-202 - [c3]Sumitra Binu, Mohammed Misbahuddin, Pethuru Raj:
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services. WCI 2015: 502-509 - 2014
- [j1]Pethuru Raj Chelliah:
Elucidating the Cloud Enterprise Architecture for Smarter Enterprises. IT Prof. 16(6): 33-37 (2014) - [c2]Rathnakar Achary, V. Vityanathan, Pethuru Raj Chelliah
, S. Nagarajan:
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing. ISI (2) 2014: 71-82 - 2013
- [c1]Devasia Kurian, Pethuru Raj Chelliah:
Upgradation of business applications with autonomic computing. COMPUTE 2013: 7:1-7:7 - 2010
- [i1]C. Ravichandiran, Pethuru Raj Chelliah, V. Vaidhyanathan:
Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX). CoRR abs/1003.1479 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-31 01:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint