Search Results - "Sharma, K. Venkatesh"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Securing IoT Devices from DDoS Attacks through Blockchain and Multi-Code Trust Framework by Sharma, K. Venkatesh, Sarada, Ch, Vasavi, M., Ambika, K.

    Published in E3S web of conferences (01-01-2024)
    “…In an era where IoT devices are integral components of numerous systems, their security from prevalent DDoS attacks has become imperative. The traditional…”
    Get full text
    Journal Article
  2. 2

    Enhancing query relevance: leveraging SBERT and cosine similarity for optimal information retrieval by Venkatesh Sharma, K., Ayiluri, Pramod Reddy, Betala, Rakesh, Jagdish Kumar, P., Shirisha Reddy, K.

    “…Whether the information is related to a concept or a product, queries are frequently employed to find out information. Different people will use different…”
    Get full text
    Journal Article
  3. 3

    Mining the data using aggregator from the dynamic web page by shankarnayak, Bhukya, Venkatesh sharma, K., rakesh, Betala

    Published in Materials today : proceedings (2018)
    “…Typically a user wishes to acquire the value of some aggregation gathering over distributed data items, for example, to know value of collection for a client;…”
    Get full text
    Journal Article
  4. 4

    Orthogonal Taguchi-Based Grey Wolf Optimization Algorithm for Task Scheduling in Cloud Environment by Mulge, Md. Yusuf, Sharma, K Venkatesh

    “…Recently, Cloud Computing (CC) is a well-developed business model in distributed computing environment. In cloud computing, the user tasks are organized and…”
    Get full text
    Conference Proceeding
  5. 5

    An efficient goal oriented risk analysis in requirement engineering by Sharma, K. Venkatesh, Kumar, P. V.

    “…In the field of software engineering, the requirement engineering is getting special attention as it is based on the stakeholder's interests. The main factors…”
    Get full text
    Conference Proceeding
  6. 6

    Data security in cloud computing and outsourced databases by Bhukya, ShankarNayak, Pabboju, Suresh, Sharma, K. Venkatesh

    “…We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses…”
    Get full text
    Conference Proceeding
  7. 7

    Big-data: Acid versus base for database transactions by Banothu, Narsimha, Bhukya, ShankarNayak, Sharma, K. Venkatesh

    “…Database developers all know the ACID acronym. It says that database transactions should be: Atomic, Consistent, Isolated, and Durable. These qualities seem…”
    Get full text
    Conference Proceeding
  8. 8

    Implementing privacy mechanisms for data using anonymization algorithms by Bhukya, ShankarNayak, Pabboju, Suresh, Sharma, K. Venkatesh

    “…In today's digital world, with the increase of using internet, personal data is collected with online activities for analysis or for surveillance. So there is…”
    Get full text
    Conference Proceeding
  9. 9

    An efficient risk analysis in requirement engineering by Sharma, K. V., Kumar, P. V.

    “…The requirement engineering is one of the emerging sections in software engineering. The main factors that a requirement engineering process considers are…”
    Get full text
    Conference Proceeding
  10. 10

    An Efficient Risk Analysis using Modified Goal Risk Model by Sharma, K.V, Kumar, P.V

    “…In the field of software engineering, the requirement engineering is getting special attention as it is based on the stakeholder's interests. The main factors…”
    Get full text
    Conference Proceeding