Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Articles by S.K. Srivatsa (23)

Experiences in Developing Learning Management System E-Guru and Content Production Acquisition, Creation of Learning Objects in Sankara School of Education and Learning

N.R. Ananthanarayanan, S.K. Srivatsa and R. VasanthKumar Mehta

Asian Journal of Information Technology 8 ( 2 ): 47 - 54 , 2009

Electronic Copyright Management System

C. Parthasarathy and S.K. Srivatsa

Asian Journal of Information Technology 8 ( 3 ): 67 - 73 , 2009

Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work

M.K. Jayanthi, S.K. Srivatsa and T. Ramesh

Information Technology Journal 7 ( 4 ): 667 - 672 , 2008

Network Border Patrol, a Novel Congestion Avoidance Mechanism for Improving QOS in Wireless Networks

T. Sasipraba and S.K. Srivatsa

Information Technology Journal 5 ( 3 ): 427 - 432 , 2006

Healthcare Administration Using Distributed Knowledge

T. Bhuvaneswari, K. Prathiba and S.K. Srivatsa

Information Technology Journal 6 ( 2 ): 271 - 274 , 2007

Hardware Implementation of Hybrid Dynamic Voltage Scaling

R. Seshasayanan and S.K. Srivatsa

Information Technology Journal 6 ( 3 ): 338 - 344 , 2007

Distributed Virtual Patient Record System

T. Bhuvaneswari, Nabajit Dutta and S.K. Srivatsa

Information Technology Journal 6 ( 5 ): 766 - 770 , 2007

Software Quality in Artificial Intelligence System

B. Vinayagasundaram and S.K. Srivatsa

Information Technology Journal 6 ( 6 ): 835 - 842 , 2007

Object Oriented Analysis and Design of e-Learning System

M.K. Jayanthi, S.K. Srivatsa and T. Ramesh

Information Technology Journal 6 ( 6 ): 818 - 826 , 2007

Learning Objects and e-Learning System: A Research Review

M.K. Jayanthi, S.K. Srivatsa and T. Ramesh

Information Technology Journal 6 ( 7 ): 1114 - 1119 , 2007

A Distributed Framework with less False Positive Ratio Against Distributed Denial of Service Attack

S. Meenakshi and S.K. Srivatsa

Information Technology Journal 6 ( 8 ): 1139 - 1145 , 2007

A Hybrid Path Matching Algorithm For XML Schemas

A. Rajesh and S.K. Srivatsa

Information Technology Journal 8 ( 3 ): 378 - 382 , 2009

Semi Automatic Method for String Matching

R. Manivannan and S.K. Srivatsa

Information Technology Journal 10 ( 1 ): 195 - 200 , 2011

Identity Based Encryption Using mRSA in Electronic Transactions

S. Rajalakshmi and S.K. Srivatsa

Information Technology Journal 6 ( 3 ): 435 - 440 , 2007

Proportional Share Resource Scheduler with Processor Affinity in Multiprocessor Systems

V.L. Jyothi and S.K. Srivatsa

Information Technology Journal 6 ( 4 ): 561 - 566 , 2007

Notice of Retraction: Automatic Incremental View Maintenance in SchemaSQL

K.R. Reshmy, S.K. Srivatsa and B. Surendrababu

Information Technology Journal 5 ( 2 ): 314 - 321 , 2006

Simulation of Improved MODFET Characteristics under Backside Illumination

V. Kannan, P.E. Sankarnarayanan and S.K. Srivatsa

Information Technology Journal 5 ( 3 ): 503 - 506 , 2006

A Research Study: Using Data Mining in Knowledge Base Business Strategies

N. Girija and S.K. Srivatsa

Information Technology Journal 5 ( 3 ): 590 - 600 , 2006

Hardware Implementation of Instruction Level Parallel Architecture Incorporating Special Functional Units for Image Processing Algorithms

M. Kannan and S.K. Srivatsa

Information Technology Journal 5 ( 3 ): 416 - 421 , 2006

Simulated Time Dependent Characteristics of MODFET under Backside Illumination

V. Kannan, P.E. Sankarnarayanan and S.K. Srivatsa

Information Technology Journal 5 ( 4 ): 661 - 667 , 2006

A Handoff Technique to Improve TCP Performance in Next Generation Wireless Networks

A. Ezil Sam Leni and S.K. Srivatsa

Information Technology Journal 7 ( 3 ): 504 - 509 , 2008

A Novel Anonymous and Certificate less Public Key Infrastructure for MANETS

G. Anandhi and S.K. Srivatsa

International Journal of Soft Computing 11 ( 3 ): 114 - 119 , 2016

Low Power Hardware Implementation of High Speed FFT Core

M. Kannan and S.K. Srivatsa

Journal of Computer Science 3 ( 6 ): 376 - 382 , 2007