A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding G Maddodi, A Awad, D Awad, M Awad, B Lee Multimedia tools and applications 77, 24701-24725, 2018 | 82 | 2018 |
Data leakage detection using system call provenance A Awad, S Kadry, G Maddodi, S Gill, B Lee 2016 International Conference on Intelligent Networking and Collaborative …, 2016 | 23 | 2016 |
Aggregate architecture simulation in event-sourcing applications using layered queuing networks G Maddodi, S Jansen, M Overeem Proceedings of the ACM/SPEC International Conference on Performance …, 2020 | 8 | 2020 |
Generating workload for erp applications through end-user organization categorization using high level business operation data G Maddodi, S Jansen, R de Jong Proceedings of the 2018 ACM/SPEC International Conference on Performance …, 2018 | 8 | 2018 |
Responsive Software Architecture Patterns for Workload Variations: A Case-study in a CQRS-based Enterprise Application. G Maddodi, S Jansen BENEVOL, 30, 2017 | 8 | 2017 |
Integrity assurance in the cloud by combined pba and provenance A Awad, S Kadry, B Lee, G Maddodi, E O'Meara 2016 10th International Conference on Next Generation Mobile Applications …, 2016 | 6 | 2016 |
The daily crash: a reflection on continuous performance testing G Maddodi, S Jansen, JP Guelen, R de Jong ICSEA 2016, 113, 2016 | 6 | 2016 |
A simplified approach to perceptual quality adaptation of multi-dimensional scalable video G Maddodi, B Lee, Y Qiao 24th IET Irish Signals and Systems Conference (ISSC 2013), 1-7, 2013 | | 2013 |
Resource Prediction for Applications Generated From Enterprise Models G Maddodi, S Jansen, R de Jong BSR winter school Big Software on the Run: Where Software meets Data, 51, 0 | | |