default search action
P. Sojan Lal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j2]Geevar C. Zacharias, Madhu S. Nair, P. Sojan Lal:
Fingerprint reference point identification based on chain encoded discrete curvature and bending energy. Pattern Anal. Appl. 20(1): 253-267 (2017) - 2016
- [c11]Geevar C. Zacharias, Madhu S. Nair, P. Sojan Lal:
Pre- and Post-fingerprint Skeleton Enhancement for Minutiae Extraction. CVIP (1) 2016: 453-465 - 2013
- [j1]Jeeva Jose, P. Sojan Lal:
Mining Web Logs to Identify Search Engine Behaviour at Websites. Informatica (Slovenia) 37(4) (2013) - 2012
- [c10]Jeeva Jose, P. Sojan Lal:
Extracting Extended Web Logs to Identify the Origin of Visits and Search Keywords. ISI 2012: 435-441 - [i4]Praveen Sivadasan, P. Sojan Lal:
Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation. CoRR abs/1205.4813 (2012) - 2011
- [c9]C. Zacharias Geevar, P. Sojan Lal:
Combining Chain-Code and Fourier Descriptors for Fingerprint Matching. ACC (3) 2011: 460-468 - [c8]Sajimon Abraham, P. Sojan Lal:
Spatio-temporal Similarity of Web User Session Trajectories and Applications in Dark Web Research. PAISI 2011: 1-14 - [c7]Sajimon Abraham, P. Sojan Lal, Dais George:
WEBTRACLUS: a spatio-temporal trajectory clustering tool for personalization in healthcare web portals. PETRA 2011: 65 - 2010
- [c6]C. Zacharias Geevar, P. Sojan Lal:
Combining singular point and co-occurrence matrix for fingerprint classification. Bangalore Compute Conf. 2010: 11:1-11:6 - [c5]Sajimon Abraham, Paulose Sojan Lal:
Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security. PAISI 2010: 31-43
2000 – 2009
- 2009
- [c4]Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan:
JDATATRANS for array obfuscation in Java source codes to defeat reverse engineering from decompiled codes. Bangalore Compute Conf. 2009: 13 - [i3]Praveen Sivadasan, P. Sojan Lal:
JConstHide: A Framework for Java Source Code Constant Hiding. CoRR abs/0904.3458 (2009) - 2008
- [c3]Sajimon Abraham, P. Sojan Lal:
Trigger Based Security Alarming Scheme for Moving Objects on Road Networks. ISI Workshops 2008: 92-101 - [i2]Praveen Sivadasan, P. Sojan Lal:
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays. CoRR abs/0807.4309 (2008) - [i1]Praveen Sivadasan, P. Sojan Lal, Naveen Sivadasan:
JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes. CoRR abs/0809.3503 (2008) - 2001
- [c2]P. Sojan Lal, A. Unnikrishnan, K. Poulose Jacob:
Generation of Octrees from Raster Scan with Reduced Information Loss. VIIP 2001: 366-370
1990 – 1999
- 1998
- [c1]P. Sojan Lal, A. Unnikrishnan, K. Poulose Jacob:
Parallel Implementation of Octtree Generation Algorithm. ICIP (3) 1998: 1005-1009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint