A hybrid database approach using graph and relational database HR Vyawahare, PP Karde, VM Thakare 2018 International Conference on Research in Intelligent and Computing in …, 2018 | 43 | 2018 |
Improved CBIR system using edge histogram descriptor (EHD) and support vector machine (SVM) P Vikhar, P Karde 2016 International Conference on ICT in Business Industry & Government …, 2016 | 30 | 2016 |
A vertical handover decision approaches in next generation wireless networks: a survey HA Bhute, PP Karde, VM Thakare Int. J. Mob. Netw. Commun. Telemat.(IJMNCT) 4 (2), 2014 | 20 | 2014 |
Selection & Maintenance of Materialized View and It’s Application for Fast Query Processing: A Survey PP Karde, VM Thakare International Journal of Computer Science & Engineering Survey 1 (2), 16-29, 2010 | 15 | 2010 |
Selection of materialized views using query optimization in database management: An efficient methodology P Karde, VM Thakare International Journal of Management Systems 2 (4), 116-130, 2010 | 15 | 2010 |
Vertical handover decision strategies in heterogeneous wireless networks HA Bhute, PP Karde, VM Thakare International Conference on Recent Trends in Information, Telecommunication …, 2014 | 12 | 2014 |
An overview on graph database model HR Vyawahare, PP Karde International Journal of Innovative Research in Computer and Communication …, 2015 | 11 | 2015 |
DoS attack detection in vehicular ad-hoc network using malicious node detection algorithm SA Ghorsad, PP Karde, VM Thakare, RV Dharaskar International Journal of Electronics, Communication and Soft Computing …, 2014 | 10 | 2014 |
Hybrid Database Model For Efficient Performance HR Vyawahare, PP Karde, VM Thakare Procedia Computer Science 152, 172-178, 2019 | 7 | 2019 |
An efficient graph database model HR Vyawahare, PP Karde, VM Thakare Int. J. Innov. Technol. Explor. Eng 88 (10), 1292-1295, 2019 | 6 | 2019 |
Detection and prevention of Android malware thru permission analysis SK Tidke, PP Karde, V Thakare 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 6 | 2018 |
Vertical handover decision strategies in heterogeneous wireless networks AB Harsha, PP Karde, VM Thakare International Conference on Recent Trends in Information, Telecommunication …, 2014 | 6 | 2014 |
Study of various perspectives of android security CJ Shelke, P Karde, VM Thakre International Journal of Innovative Research in Computer and Communication …, 2015 | 5 | 2015 |
Performance of CSS cognitive radio networks under primary user emulation attack RD Kadu, PP Karde, VM Thakare 2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017 | 3 | 2017 |
Improving performance of CSS cognitive radio networks under jamming attack RD Kadu, PP Karde 2017 2nd International Conference on Communication Systems, Computing and IT …, 2017 | 3 | 2017 |
An Efficient Materialized View Selection Approach for Query Processing in Database Management PP Karde, VM Thakare International Journal of Computer Science and Network Security 10 (9), 26-33, 2010 | 3 | 2010 |
Identification of Botnet hidden behind smartphone applications SK Tidke, P Karde, V Thakare 2017 International Conference on Energy, Communication, Data Analytics and …, 2017 | 2 | 2017 |
NoSql Database HR Vyawahare, PP Karde, VM Thakare no. June, 2017 | 2 | 2017 |
Permission based malware detection by using k means algorithm in Android OS CJ Shelke, P Karde, VM Thakre Asian J Comput Sci Eng 2 (2), 24-27, 2017 | 2 | 2017 |
An efficient network selection algorithms in next-generation heterogeneous wireless networks HA Bhute, PP Karde, VM Thakare International Journal of Image Mining 2 (3-4), 261-276, 2017 | 2 | 2017 |