BibTeX records: S. Sumithra

download as .bib file

@article{DBLP:journals/wpc/SumithraV22,
  author       = {S. Sumithra and
                  R. Vadivel},
  title        = {Analyzing the Effectiveness of {TCA-CBB} by Comparing Various {VANET}
                  Broadcasting Algorithms in Terms of Quality of Service},
  journal      = {Wirel. Pers. Commun.},
  volume       = {124},
  number       = {1},
  pages        = {261--282},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-09337-8},
  doi          = {10.1007/S11277-021-09337-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SumithraV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amcs/SumithraV21,
  author       = {S. Sumithra and
                  R. Vadivel},
  title        = {An optimal innovation based adaptive estimation Kalman filter for
                  accurate positioning in a vehicular ad-hoc network},
  journal      = {Int. J. Appl. Math. Comput. Sci.},
  volume       = {31},
  number       = {1},
  pages        = {45--57},
  year         = {2021},
  url          = {https://doi.org/10.34768/amcs-2021-0004},
  doi          = {10.34768/AMCS-2021-0004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amcs/SumithraV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/RajamohamedJSV18,
  author       = {R. Rajamohamed and
                  T. Justin Jose and
                  S. Sumithra and
                  J. Vijaya},
  title        = {Multi Model Mitigation Approach for Network Threats on Cluster Based
                  Linear Chain Routing Protocol in Wireless Sensor Networks at QoS Development},
  journal      = {Wirel. Pers. Commun.},
  volume       = {102},
  number       = {4},
  pages        = {3205--3224},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11277-018-5346-9},
  doi          = {10.1007/S11277-018-5346-9},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/RajamohamedJSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/SumithraV18,
  author       = {S. Sumithra and
                  R. Vadivel},
  title        = {An Overview of Various Trust Models for {VANET} Security Establishment},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8494009},
  doi          = {10.1109/ICCCNT.2018.8494009},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/SumithraV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}