A performance comparison of SQL and NoSQL databases Y Li, S Manoharan 2013 IEEE Pacific Rim conference on communications, computers and signal …, 2013 | 504 | 2013 |
A security analysis of the OAuth protocol F Yang, S Manoharan 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2013 | 95 | 2013 |
A comparison of search mechanisms for structural optimization S Manoharan, S Shanmuganathan Computers & Structures 73 (1-5), 363-372, 1999 | 83 | 1999 |
Cheat-resistant multiple-choice examinations using personalization S Manoharan Computers & Education 130, 139-151, 2019 | 55 | 2019 |
Personalized assessment as a means to mitigate plagiarism S Manoharan IEEE Transactions on Education 60 (2), 112-119, 2016 | 39 | 2016 |
On GPS tracking of mobile devices S Manoharan 2009 Fifth International Conference on Networking and Services, 415-418, 2009 | 38 | 2009 |
Assigning dependency graphs onto processor networks S Manoharan, P Thanisch Parallel Computing 17 (1), 63-73, 1991 | 35 | 1991 |
An empirical analysis of RS steganalysis S Manoharan 2008 The third international conference on internet monitoring and …, 2008 | 26 | 2008 |
On the fairness of multiple-variant multiple-choice examinations P Denny, S Manoharan, U Speidel, G Russello, A Chang Proceedings of the 50th ACM technical symposium on computer science …, 2019 | 22 | 2019 |
Network steganography and steganalysis-a concise review JO Seo, S Manoharan, A Mahanti 2016 2nd International Conference on Applied and Theoretical Computing and …, 2016 | 22 | 2016 |
A collaborative code review platform for github A Kalyan, M Chiam, J Sun, S Manoharan 2016 21st International Conference on Engineering of Complex Computer …, 2016 | 21 | 2016 |
Effect of task duplication on the assignment of dependency graphs S Manoharan Parallel Computing 27 (3), 257-268, 2001 | 19 | 2001 |
Providing automated grading and personalized feedback X Ye, S Manoharan Proceedings of the International Conference on Artificial Intelligence …, 2019 | 18 | 2019 |
An assessment of assignment schemes for dependency graphs S Manoharan, NP Topham Parallel Computing 21 (1), 85-107, 1995 | 18 | 1995 |
Contract cheating in computer science: A case study S Manoharan, U Speidel 2020 IEEE International Conference on Teaching, Assessment, and Learning for …, 2020 | 14 | 2020 |
A discussion and review of network steganography JO Seo, S Manoharan, A Mahanti 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 14 | 2016 |
A demerit point strategy to reduce free-riding in BitTorrent S Manoharan, T Ge Computer Communications 36 (8), 875-880, 2013 | 14 | 2013 |
A comparative review of steganalysis techniques T Qian, S Manoharan 2015 2nd International Conference on Information Science and Security (ICISS …, 2015 | 12 | 2015 |
Automated conversion of engineering rules: Towards flexible manufacturing collaboration X Ye, Y Lu, S Manoharan Results in Engineering 16, 100680, 2022 | 11 | 2022 |
On upholding academic integrity in online examinations S Manoharan, X Ye 2020 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), 33-37, 2020 | 11 | 2020 |