Analysis of legacy system in software application development: A comparative survey M Srinivas, G Ramakrishna, KR Rao, ES Babu International Journal of Electrical and Computer Engineering 6 (1), 292, 2016 | 39 | 2016 |
A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks KP Manikandan, R Satyaprasad, DK Rajasekhararao International Journal of Advanced Computer Science and Applications 2 (3), 2011 | 37 | 2011 |
An analysis of learner satisfaction and needs on e-learning systems VM Sunkara, RR Kurra International Journal of Computational Intelligence Research 13 (3), 433-444, 2017 | 33 | 2017 |
Routing protocols for wireless sensor networks: a comparative study S Parvin, MS Rahim International Conference on Electronics, Computer and Communication, 891-894, 2008 | 26 | 2008 |
Rule mining framework for students performance evaluation P Ajith, B Tejaswi, MSS Sai International Journal of Soft Computing and Engineering 2 (6), 201-6, 2013 | 20 | 2013 |
Multi objective particle swarm optimization for software cost estimation GS Rao, CVP Krishna, KR Rao ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014 | 19 | 2014 |
Knowledge discovery and retrieval on World Wide Web using web structure mining SB Boddu, VPK Anne, RR Kurra, DK Mishra 2010 Fourth Asia International Conference on Mathematical/Analytical …, 2010 | 16 | 2010 |
An approach to identify data leakage in secure communication S Sodagudi, RR Kurra Proceedings of 2nd International Conference on Intelligent Computing and …, 2017 | 14 | 2017 |
Evaluation of student performance: an outlier detection perspective P Ajith, M Sai, B Tejaswi Int. J. Innov. Technol. Explor. Eng 2 (2), 40-44, 2013 | 13 | 2013 |
Energy efficient load balanced optimal resource allocation scheme for cloud environment KA Kumari, JKR Sastry, KR Rao International Journal of Recent Technology and Engineering (IJRTE) 8 (1S3), 2019 | 11 | 2019 |
A Learner-Centric Personalized and Adaptive E-Learning Framework for Higher Education. VM Sunkara, RR Kurra International Journal of Advanced Research in Computer Science 8 (5), 2017 | 11 | 2017 |
Multi-level secret sharing scheme for mobile ad-hoc networks PVS Kumar, RR Kurra, AN Tentu, G Padmavathi International Journal of Advanced Networking and Applications 6 (2), 2253, 2014 | 10 | 2014 |
Frequent negative sequential patterns: A survey S Kamepalli, R Kurra Int. J. Comput. Eng. Technol 5 (3), 15-121, 2014 | 10 | 2014 |
Recent Trends in Networks and Communications: International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010, Chennai, India, July 23-25, 2010. Proceedings N Meghanathan, S Boumerdassi, N Chaki, D Nagamalai Springer, 2010 | 10 | 2010 |
Similarity of inference face matching on angle oriented face recognition N Remani, SR Rachakonda, RSR Kurra J Inf Eng Appl 1 (1), 2011 | 9 | 2011 |
Analysis and Diminution of Security Attacks on Mobile Ad hoc Network AP Chirala IJCA Special Issue on “Mobile Ad-Hoc Networks”, MANETs, 105-110, 2010 | 9 | 2010 |
Inclination and pressure based authentication for touch devices KR Rao, VPK Anne, U Sai Chand, V Alakananda, K Navya Rachana ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014 | 8 | 2014 |
Enforcing the security within mobile devices using clouds and its infrastructure VPK Anne, JV Rao, RR Kurra 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 1-4, 2012 | 8 | 2012 |
Artificial bee colony based image clustering K Manda, SC Satapathy, K Rajasekhara Rao Proceedings of the International Conference on Information Systems Design …, 2012 | 8 | 2012 |
Privacy preserving distributed data mining using steganography MS D. Aruna Kumari, K. Raja Sekhar Rao International Conference on Network Security and Applications 89 (1), 263, 2010 | 7* | 2010 |