default search action
Johnson P. Thomas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Varun Puram, Krishnageetha Karuppasamy, Johnson P. Thomas:
Optimizing Quantum Circuits Using Algebraic Expressions. ICCS (6) 2024: 268-276 - [i3]Varun Puram, Ruthvik Rao Bobbili, Johnson P. Thomas:
Quantum Algorithm for Jaccard Similarity. CoRR abs/2408.08940 (2024) - [i2]Geetha Karuppasamy, Varun Puram, Stevens Johnson, Johnson P. Thomas:
Quantum Circuit Optimization: Current trends and future direction. CoRR abs/2408.08941 (2024) - 2023
- [j22]Goutam Mylavarapu, Kannan Ashwin Viswanathan, Johnson P. Thomas:
Context-aware automated quality assessment of textual data. Int. J. Bus. Intell. Data Min. 22(4): 451-469 (2023) - [i1]Kannan Ashwin Viswanathan, Goutam Mylavarapu, Johnson P. Thomas:
Unsupervised Spiking Neural Network Model of Prefrontal Cortex to study Task Switching with Synaptic deficiency. CoRR abs/2305.14394 (2023) - 2022
- [j21]Doyel Pal, Praveen Khethavath, Johnson P. Thomas, Utpal Mangla:
KeyPIn - mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive. J. Cloud Comput. 11: 8 (2022) - [c52]Varun Puram, Dingyi Kang, K. M. George, Johnson P. Thomas:
Algorithm to build quantum circuit from classical description of DFSM. QCE 2022: 745-748 - 2020
- [j20]Gurjinder S. Baath, Harpinder K. Baath, Prasanna H. Gowda, Johnson P. Thomas, Brian K. Northup, Srinivas C. Rao, Hardeep Singh:
Predicting Forage Quality of Warm-Season Legumes by Near Infrared Spectroscopy Coupled with Machine Learning Techniques. Sensors 20(3): 867 (2020) - [c51]Mounika Kasaraneni, Johnson P. Thomas:
A Self-learning Personal Privacy Assistant. AINA 2020: 276-287 - [c50]Kannan Ashwin Viswanathan, Goutam Mylavarapu, Kun Chen, Johnson P. Thomas:
A Study of Prefrontal Cortex Task Switching Using Spiking Neural Networks. ICACI 2020: 199-206
2010 – 2019
- 2019
- [c49]Goutam Mylavarapu, Kannan Ashwin Viswanathan, Johnson P. Thomas:
Assessing Context-Aware Data Consistency. AICCSA 2019: 1-6 - 2018
- [c48]Kannan Ashwin Viswanathan, Goutam Mylavarapu, Johnson P. Thomas:
Biologically Inspired Augmented Memory Recall Model for Pattern Recognition. ICCC 2018: 147-154 - 2017
- [j19]T. K. Ashwin Kumar, Hong Liu, Johnson P. Thomas, Xiaofeh Hou:
Content sensitivity based access control framework for Hadoop. Digit. Commun. Networks 3(4): 213-225 (2017) - [j18]Ashwin Kumar T. K, Johnson P. Thomas, Saikiran Parepally:
An efficient and secure information retrieval framework for content centric networks. J. Parallel Distributed Comput. 104: 223-233 (2017) - [j17]Praveenkumar Khethavath, Johnson P. Thomas, Eric Chan-Tin:
Towards an efficient distributed cloud computing architecture. Peer-to-Peer Netw. Appl. 10(5): 1152-1168 (2017) - [c47]Goutam Mylavarapu, Johnson P. Thomas:
A multi-task machine learning approach for comorbid patient prioritization. IEEE BigData 2017: 3877-3881 - [c46]Xiaofei Hou, T. K. Ashwin Kumar, Johnson P. Thomas, Hong Liu:
Dynamic deadline-constraint scheduler for Hadoop YARN. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [c45]Xiaofei Hou, Doyel Pal, Ashwin Kumar T. K, Johnson P. Thomas, Hong Liu:
Privacy Preserving Rack-Based Dynamic Workload Balancing for Hadoop MapReduce. BigDataSecurity/HPSC/IDS 2016: 30-35 - [c44]Hong Liu, Ashwin Kumar T. K, Johnson P. Thomas, Xiaofei Hou:
Cleaning Framework for BigData: An Interactive Approach for Data Cleaning. BigDataService 2016: 174-181 - 2015
- [c43]Doyel Pal, Tingting Chen, Johnson P. Thomas:
Privacy Preserving Sequential Pattern Mining Across Multiple Medical Sites. AMIA 2015 - [c42]Ashwin Kumar T. K, K. M. George, Johnson P. Thomas:
An Empirical Approach to Detection of Topic Bubbles in Tweets. BDC 2015: 31-40 - [c41]Hong Liu, Ashwin Kumar T. K, Johnson P. Thomas:
Cleaning Framework for Big Data - Object Identification and Linkage. BigData Congress 2015: 215-221 - [c40]Ashwin Kumar T. K, Hong Liu, Johnson P. Thomas, Goutam Mylavarapu:
Identifying Sensitive Data Items within Hadoop. HPCC/CSS/ICESS 2015: 1308-1313 - [c39]Goutam Mylavarapu, Johnson P. Thomas, Ashwin Kumar T. K:
Real-Time Hybrid Intrusion Detection System Using Apache Storm. HPCC/CSS/ICESS 2015: 1436-1441 - [c38]Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:
Multilevel Threshold Secret Sharing in Distributed Cloud. SSCC 2015: 13-23 - [c37]Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen:
Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique. SSCC 2015: 146-156 - 2014
- [c36]Xiaofei Hou, Ashwin Kumar T. K, Johnson P. Thomas, Vijay Varadharajan:
Dynamic Workload Balancing for Hadoop MapReduce. BDCloud 2014: 56-62 - [c35]T. K. Ashwin Kumar, Hong Liu, Johnson P. Thomas:
Efficient structuring of data in big data. ICDSE 2014: 1-5 - [c34]Dileep Nagireddygari, Johnson P. Thomas:
MAC-TCP cross-layer attack and its defense in cognitive radio networks. Q2SWinet 2014: 71-78 - 2013
- [c33]Hong Liu, Johnson P. Thomas, Praveen Khethavath:
Moving Target with Load Balancing in P2P Cloud. IEEE CLOUD 2013: 359-366 - [c32]Jie Yuan, Ted Ward, Sam Honarvar, Tingting Chen, Johnson P. Thomas:
HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi. PerCom Workshops 2013: 348-351 - [c31]Praveen Khethavath, Johnson P. Thomas, Eric Chan-Tin, Hong Liu:
Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation. SERVICES 2013: 386-392 - 2012
- [c30]Yihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish:
Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. TrustCom 2012: 777-784 - 2010
- [c29]Johnson P. Thomas, Vinay Abburi, Mathews Thomas, Ajith Abraham:
Secure protocol for ad hoc transportation system. IAS 2010: 288-293 - [c28]Sejin Choi, Venkatesh Sarangan, Johnson P. Thomas, Sridhar Radhakrishnan:
Secure access control protocol for WSNs with inter-network roaming. LCN 2010: 256-259 - [c27]Ruiyi Zhang, Johnson P. Thomas, Qiurui Zhu, Mathews Thomas:
Manipulation as a Security Mechanism in Sensor Networks. SBP 2010: 290-297
2000 – 2009
- 2008
- [j16]Sudha Chinni, Johnson P. Thomas, Gheorghita Ghinea, Zhengming Shen:
Trust model for certificate revocation in ad hoc networks. Ad Hoc Networks 6(3): 441-457 (2008) - [j15]Ashrar A. Omer, Johnson P. Thomas, Ling Zhu:
Mutual authentication protocols for RFID systems. Int. J. Autom. Comput. 5(4): 348-365 (2008) - [j14]Zhengming Shen, Johnson P. Thomas:
Security and QoS Self-Optimization in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 7(9): 1138-1151 (2008) - 2007
- [j13]Ajith Abraham, Ravi Jain, Johnson P. Thomas, Sang-Yong Han:
D-SCIDS: Distributed soft computing intrusion detection system. J. Netw. Comput. Appl. 30(1): 81-98 (2007) - [j12]Sandhya Peddabachigari, Ajith Abraham, Crina Grosan, Johnson P. Thomas:
Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1): 114-132 (2007) - [c26]Anuradha Gasikanti, Johnson P. Thomas, Mathews Thomas:
Information Discovery across Organizational Boundaries through Local Caching. IEEE SCC 2007: 522-529 - [c25]Ruiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru:
Deception framework for sensor networks. SecureComm 2007: 361-369 - 2006
- [c24]Johnson P. Thomas, Sudha Chinni, George Ghinea:
Trust determination in ad hoc networks. PST 2006: 52 - [c23]Sudheer K. Chimbli, Johnson P. Thomas, Venkatesh Sarangan, Ruiyi Zhang:
Sector-based routing for secure energy efficient communications. WCNC 2006: 457-462 - 2005
- [j11]George Ghinea, Johnson P. Thomas:
Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol. J. Comput. Inf. Technol. 13(2): 149-161 (2005) - [j10]Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas:
Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4): 295-307 (2005) - [j9]Gheorghita Ghinea, Johnson P. Thomas, George D. Magoulas, Saeed Heravi:
Adaptation as a premise for perceptual-based multimedia communications. Int. J. Inf. Technol. Manag. 4(4): 405-422 (2005) - [j8]Ajith Abraham, Johnson P. Thomas, Sugata Sanyal, Lakhmi C. Jain:
Information Assurance and Security. J. Univers. Comput. Sci. 11(1): 1-3 (2005) - [j7]In Joe Khor, Johnson P. Thomas, Istvan Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks. J. Univers. Comput. Sci. 11(1): 37-55 (2005) - [j6]George Ghinea, Johnson P. Thomas:
Quality of perception: user quality of service in multimedia presentations. IEEE Trans. Multim. 7(4): 786-789 (2005) - [c22]M. Bilal, Johnson P. Thomas, Mathews Thomas, Subil Abraham:
Fair BPEL Processes Transaction using Non-Repudiation Protocols. IEEE SCC 2005: 337-342 - [c21]Istvan Jonyer, Prach Apiratikul, Johnson P. Thomas:
Source Code Fingerprinting Using Graph Grammar Induction. FLAIRS 2005: 468-473 - [c20]In Joe Khor, Johnson P. Thomas, Istvan Jonyer:
Sliding Window Protocol for Group Communication in Ad-Hoc Networks. HICSS 2005 - [c19]Subil Abraham, Mathews Thomas, Johnson P. Thomas:
Enhancing Web Services Availability. ICEBE 2005: 352-355 - [c18]Brent Doeksen, Ajith Abraham, Johnson P. Thomas, Marcin Paprzycki:
Real Stock Trading Using Soft Computing Models. ITCC (2) 2005: 162-167 - [c17]P. Muppala, Johnson P. Thomas, Ajith Abraham:
QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. ITCC (2) 2005: 651-656 - [c16]P. Muppala, Johnson P. Thomas, Ajith Abraham:
QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. ITCC (1) 2005: 709-714 - 2004
- [j5]L. M. Guard, M. D. Crossland, Marcin Paprzycki, Johnson P. Thomas:
Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing. Ann. UMCS Informatica 2(1): 414-424 (2004) - [c15]Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas:
Hybrid Feature Selection for Modeling Intrusion Detection Systems. ICONIP 2004: 1020-1025 - [c14]Johnson P. Thomas, Istvan Jonyer, Muhammad Tanvir Alam:
Reducing Latency in Ad Hoc Networks by Pre-Fetching. International Conference on Wireless Networks 2004: 952-958 - [c13]Zhengming Shen, Johnson P. Thomas:
Location-Triggered Routing Protocol in Mobile Ad Hoc Networks. NCA 2004: 261-268 - [c12]Austin Gilbert, Johnson P. Thomas, Istvan Jonyer:
Modeling Work Flow in Hierarchically Cluster Distributed Systems. PDPTA 2004: 1403-1409 - 2003
- [c11]Munirul Islam, Johnson P. Thomas, Vijay Varadharajan:
Reducing the scope of denial of service attacks in QoS routing. GLOBECOM 2003: 1368-1373 - [c10]Johnson P. Thomas, Mathews Thomas, George Ghinea:
Modeling of Web Services Flow. CEC 2003: 391-398 - 2001
- [j4]George Ghinea, Johnson P. Thomas:
Crossing the Man-Machine Divide: A Mapping Based on Empirical Results. J. VLSI Signal Process. 29(1-2): 139-147 (2001) - 2000
- [j3]Johnson P. Thomas:
Design and verification of a coordination protocol for cooperating systems. Soft Comput. 4(2): 130-140 (2000) - [c9]George Ghinea, Johnson P. Thomas:
Impact of Protocol Stacks on Quality of Perception. IEEE International Conference on Multimedia and Expo (II) 2000: 847-854
1990 – 1999
- 1999
- [c8]George Ghinea, Johnson P. Thomas, Robert S. Fish:
Multimedia, network protocols and users - bridging the gap. ACM Multimedia (1) 1999: 473-476 - [c7]George Ghinea, Johnson P. Thomas:
An approach towards mapping quality of perception to quality of service in multimedia communications. MMSP 1999: 497-501 - 1998
- [c6]George Ghinea, Johnson P. Thomas:
QoS Impact on User Perception and Understanding of Multimedia Video Clips. ACM Multimedia 1998: 49-54 - 1996
- [j2]Johnson P. Thomas, P. Nimal Nissanke, Keith D. Baker:
A hierarchical Petri net framework for the representation and analysis of assembly. IEEE Trans. Robotics Autom. 12(2): 268-279 (1996) - [j1]Johnson P. Thomas, P. Nimal Nissanke, Keith D. Baker:
Boundary models for assembly knowledge representation. IEEE Trans. Robotics Autom. 12(2): 302-312 (1996) - [c5]Johnson P. Thomas:
Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations. MMM 1996: 253-268 - 1995
- [c4]Johnson P. Thomas, P. Nimal Nissanke:
A Graph-Based Formalism for Modelling Assembly Tasks. ICRA 1995: 1296-1301 - [c3]Johnson P. Thomas, P. Nimal Nissanke:
Properties of assembly Petri net. IROS (3) 1995: 191-196 - 1993
- [c2]Johnson P. Thomas, Keith D. Baker:
Modelling of Assembly Partitions for a Distributed Environment. ICRA (2) 1993: 52-57 - [c1]Johnson P. Thomas:
Constructing Assembly Plans. ICRA (2) 1993: 515-520
Coauthor Index
aka: Gheorghita Ghinea
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint