Spatio-temporal similarity of network-constrained moving object trajectories using sequence alignment of travel locations S Abraham, PS Lal Transportation research part C: emerging technologies 23, 109-123, 2012 | 49 | 2012 |
Trajectory similarity of network constrained moving objects and applications to traffic security S Abraham, PS Lal Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010 …, 2010 | 12 | 2010 |
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes P Sivadasan, P SojanLal, N Sivadasan Proceedings of the 2nd Bangalore Annual Compute Conference, 1-4, 2009 | 11 | 2009 |
Array data transformation for source code obfuscation S Praveen, PS Lal International Journal of Computer and Information Engineering 1 (12), 3808-3812, 2007 | 11 | 2007 |
Fingerprint reference point identification based on chain encoded discrete curvature and bending energy GC Zacharias, MS Nair, PS Lal Pattern Analysis and Applications 20, 253-267, 2017 | 9 | 2017 |
Application of ARIMA (1, 1, 0) model for predicting time delay of search engine crawlers. J Jose, PS Lal Informatica Economica 17 (4), 2013 | 9 | 2013 |
Trigger based security alarming scheme for moving objects on road networks S Abraham, PS Lal Intelligence and Security Informatics: IEEE ISI 2008 International Workshops …, 2008 | 9 | 2008 |
Parallel implementation of octtree generation algorithm PS Lal, A Unnikrishnan, KP Jacob Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998 | 8 | 1998 |
A Compact Deep Learning Model for Robust Facial Expression Recognition. R Reji, PS Lal | 7 | 2019 |
Singularity detection in fingerprint image using orientation consistency GC Zacharias, PS Lal 2013 International Mutli-Conference on Automation, Computing, Communication …, 2013 | 5 | 2013 |
Spatio-temporal similarity of web user session trajectories and applications in dark web research S Abraham, PS Lal Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011 …, 2011 | 5 | 2011 |
Array based Java source code obfuscation using classes with restructured arrays P Sivadasan, PS Lal arXiv preprint arXiv:0807.4309, 2008 | 5 | 2008 |
Region Based 3D Face Recognition R Reji, PS Lal | 4 | 2017 |
REVIEW ON LIQUEFIED PETROLEUM GAS CYLINDER DESIGN AND MANUFACTURING PROCESS AS PER INDIAN STANDARD, IS 3196 (PART1): 2006 A Ramakrishna, NA Siddiqui, PS Lal International Journal of Advanced Engineering Technology. 4 (2), 124-127, 2013 | 4* | 2013 |
Combining singular point and co-occurrence matrix for fingerprint classification GC Zacharias, PS Lal Proceedings of the Third Annual ACM Bangalore Conference, 1-6, 2010 | 4 | 2010 |
Combining singular point and co-occurrence matrix for fingerprint classification GC Zacharias, PS Lal Proceedings of the Third Annual ACM Bangalore Conference, 1-6, 2010 | 4 | 2010 |
JConstHide: A Framework for Java Source Code Constant Hiding P Sivadasan, PS Lal arXiv preprint arXiv:0904.3458, 2009 | 4 | 2009 |
Pre-and post-fingerprint skeleton enhancement for minutiae extraction GC Zacharias, MS Nair, P Sojan Lal Proceedings of International Conference on Computer Vision and Image …, 2017 | 3 | 2017 |
A Forecasting Model for the Pages Crawled by Search Engine Crawlers at a Web Site J Jose, PS Lal International Journal of Computer Applications 68 (13), 2013 | 3 | 2013 |
Securing SQLJ source codes from business logic disclosure by data hiding obfuscation P Sivadasan, PS Lal arXiv preprint arXiv:1205.4813, 2012 | 3 | 2012 |