Gururaj Maddodi
Cited by
Cited by
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding
G Maddodi, A Awad, D Awad, M Awad, B Lee
Multimedia tools and applications 77, 24701-24725, 2018
Data leakage detection using system call provenance
A Awad, S Kadry, G Maddodi, S Gill, B Lee
2016 International Conference on Intelligent Networking and Collaborative …, 2016
Generating workload for erp applications through end-user organization categorization using high level business operation data
G Maddodi, S Jansen, R de Jong
Proceedings of the 2018 ACM/SPEC International Conference on Performance …, 2018
Responsive Software Architecture Patterns for Workload Variations: A Case-study in a CQRS-based Enterprise Application.
G Maddodi, S Jansen
BENEVOL, 30, 2017
Integrity assurance in the cloud by combined PBA and provenance
A Awad, S Kadry, B Lee, G Maddodi, E O'Meara
2016 10th International Conference on Next Generation Mobile Applications …, 2016
The daily crash: a reflection on continuous performance testing
G Maddodi, S Jansen, JP Guelen, R de Jong
ICSEA 2016, 113, 2016
Aggregate architecture simulation in event-sourcing applications using layered queuing networks
G Maddodi, S Jansen, M Overeem
Proceedings of the ACM/SPEC International Conference on Performance …, 2020
A simplified approach to perceptual quality adaptation of multi-dimensional scalable video
G Maddodi, B Lee, Y Qiao
24th IET Irish Signals and Systems Conference (ISSC 2013), 1-7, 2013
Resource Prediction for Applications Generated From Enterprise Models
G Maddodi, S Jansen, R de Jong
BSR winter school Big Software on the Run: Where Software meets Data, 51, 0
The system can't perform the operation now. Try again later.
Articles 1–9