Gururaj Maddodi
Title
Cited by
Cited by
Year
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding
G Maddodi, A Awad, D Awad, M Awad, B Lee
Multimedia Tools and Applications 77 (19), 24701-24725, 2018
232018
Data leakage detection using system call provenance
A Awad, S Kadry, G Maddodi, S Gill, B Lee
2016 International Conference on Intelligent Networking and Collaborative …, 2016
72016
Generating workload for erp applications through end-user organization categorization using high level business operation data
G Maddodi, S Jansen, R de Jong
Proceedings of the 2018 ACM/SPEC International Conference on Performance …, 2018
52018
The daily crash: a reflection on continuous performance testing
G Maddodi, S Jansen, JP Guelen, R de Jong
ICSEA 2016, 113, 2016
52016
Integrity assurance in the cloud by combined PBA and provenance
A Awad, S Kadry, B Lee, G Maddodi, E O'Meara
2016 10th International Conference on Next Generation Mobile Applications …, 2016
42016
Responsive Software Architecture Patterns for Workload Variations: A Case-study in a CQRS-based Enterprise Application.
G Maddodi, S Jansen
BENEVOL, 30, 2017
32017
Aggregate architecture simulation in event-sourcing applications using layered queuing networks
G Maddodi, S Jansen, M Overeem
Proceedings of the ACM/SPEC International Conference on Performance …, 2020
12020
A simplified approach to perceptual quality adaptation of multi-dimensional scalable video
G Maddodi, B Lee, Y Qiao
IET Digital Library, 2013
2013
Resource Prediction for Applications Generated From Enterprise Models
G Maddodi, S Jansen, R de Jong
BSR winter school Big Software on the Run: Where Software meets Data, 51, 0
The system can't perform the operation now. Try again later.
Articles 1–9