default search action
Search dblp for Publications
export results for "H. K. Jnanamurthy"
@article{DBLP:journals/ijcat/JnanamurthyHPW21, author = {H. K. Jnanamurthy and Frans Henskens and David J. Paul and Mark Wallis}, title = {Formal specification at model-level of model-driven engineering using modelling techniques}, journal = {Int. J. Comput. Appl. Technol.}, volume = {67}, number = {4}, pages = {340--350}, year = {2021}, url = {https://doi.org/10.1504/IJCAT.2021.122345}, doi = {10.1504/IJCAT.2021.122345}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcat/JnanamurthyHPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/JnanamurthyJHPW20, author = {H. K. Jnanamurthy and Raoul Jetley and Frans Henskens and David J. Paul and Mark Wallis and Sithu D. Sudarsan}, title = {Multi-level analysis of {IEC} 61131-3 languages to detect clones}, journal = {Int. J. Comput. Appl. Technol.}, volume = {63}, number = {4}, pages = {286--299}, year = {2020}, url = {https://doi.org/10.1504/IJCAT.2020.110413}, doi = {10.1504/IJCAT.2020.110413}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcat/JnanamurthyJHPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-04425, author = {Jnanamurthy H. K and Vijay Varadharajan}, title = {Formal Modelling and Verification of Software Defined Network}, journal = {CoRR}, volume = {abs/2004.04425}, year = {2020}, url = {https://arxiv.org/abs/2004.04425}, eprinttype = {arXiv}, eprint = {2004.04425}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-04425.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit2/JnanamurthyJHPW19, author = {H. K. Jnanamurthy and Raoul Jetley and Frans Henskens and David J. Paul and Mark Wallis and Sithu D. Sudarsan}, title = {Analysis of Industrial Control System Software to Detect Semantic Clones}, booktitle = {{IEEE} International Conference on Industrial Technology, {ICIT} 2019, Melbourne, Australia, February 13-15, 2019}, pages = {773--779}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIT.2019.8754957}, doi = {10.1109/ICIT.2019.8754957}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icit2/JnanamurthyJHPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/JnanamurthyS13, author = {H. K. Jnanamurthy and Sanjay Singh}, title = {Detection and filtering of collaborative malicious users in reputation system using quality repository approach}, booktitle = {International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2013, Mysore, India, August 22-25, 2013}, pages = {466--471}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICACCI.2013.6637216}, doi = {10.1109/ICACCI.2013.6637216}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/JnanamurthyS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JnanamurthyS13, author = {H. K. Jnanamurthy and Sanjay Singh}, title = {Detection and Filtering of Collaborative Malicious Users in Reputation System using Quality Repository Approach}, journal = {CoRR}, volume = {abs/1308.3876}, year = {2013}, url = {http://arxiv.org/abs/1308.3876}, eprinttype = {arXiv}, eprint = {1308.3876}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JnanamurthyS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-1638, author = {H. K. Jnanamurthy}, title = {Discovery of Maximal Frequent Item Sets using Subset Creation}, journal = {CoRR}, volume = {abs/1302.1638}, year = {2013}, url = {http://arxiv.org/abs/1302.1638}, eprinttype = {arXiv}, eprint = {1302.1638}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-1638.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccseit/HegdeJS12, author = {Manu S. Hegde and H. K. Jnanamurthy and Sanjay Singh}, editor = {Natarajan Meghanathan and Michal Wozniak}, title = {Formal verification of the Extensible Authentication Protocol using {SPIN}}, booktitle = {The Second International Conference on Computational Science, Engineering and Information Technology, {CCSEIT} '12, Coimbatore, India, October 26-28, 2012}, pages = {365--371}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393216.2393278}, doi = {10.1145/2393216.2393278}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccseit/HegdeJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-8229, author = {H. K. Jnanamurthy and Vishesh H. V. and Vishruth Jain and Preetham Kumar and Radhika M. Pai}, title = {Top Down Approach to find Maximal Frequent Item Sets using Subset Creation}, journal = {CoRR}, volume = {abs/1210.8229}, year = {2012}, url = {http://arxiv.org/abs/1210.8229}, eprinttype = {arXiv}, eprint = {1210.8229}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-8229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.