The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sudip Misra: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sudip Misra, B. John Oommen
    Adaptive Algorithms for Routing and Traffic Engineering in Stochastic Networks. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:993-994 [Conf]
  2. Sudip Misra, B. John Oommen
    The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:124-129 [Conf]
  3. Sudip Misra, B. John Oommen
    Stochastic Learning Automata-Based Dynamic Algorithms for the Single Source Shortest Path Problem. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2004, pp:239-248 [Conf]
  4. Sudip Misra, B. John Oommen
    Generalized pursuit learning algorithms for shortest path routing tree computation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:891-896 [Conf]
  5. Sudip Misra, B. John Oommen
    New Algorithms for Maintaining All-Pairs Shortest Paths. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:116-121 [Conf]
  6. Sudip Misra, B. John Oommen
    An Efficient Dynamic Algorithm for Maintaining All-Pairs Shortest Paths in Stochastic Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:6, pp:686-702 [Journal]
  7. B. John Oommen, Sudip Misra, Ole-Christoffer Granmo
    Routing Bandwidth-Guaranteed Paths in MPLS Traffic Engineering: A Multiple Race Track Learning Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:7, pp:959-976 [Journal]
  8. Sudip Misra, B. John Oommen
    Dynamic algorithms for the shortest path routing problem: learning automata-based solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:6, pp:1179-1192 [Journal]
  9. B. John Oommen, Sudip Misra, Ole-Christoffer Granmo
    A Stochastic Random-Races Algorithm for Routing in MPLS Traffic Engineering. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  10. Isaac Woungang, Sudip Misra, Mohammad S. Obaidat
    On the problem of capacity allocation and flow assignment in self-healing ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:16, pp:3169-3178 [Journal]

  11. Survivability in Existing ATM-Based Mesh Networks. [Citation Graph (, )][DBLP]


  12. An Efficient Approach for Location Updating in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  13. Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  14. An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms. [Citation Graph (, )][DBLP]


  15. On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  16. Attack Graph Generation with Infused Fuzzy Clustering. [Citation Graph (, )][DBLP]


  17. Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation. [Citation Graph (, )][DBLP]


  18. An efficient power-aware broadcast technique for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  19. A new scheme for distributed channel allocation in cellular networks. [Citation Graph (, )][DBLP]


  20. QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization. [Citation Graph (, )][DBLP]


  21. Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach. [Citation Graph (, )][DBLP]


  22. Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme. [Citation Graph (, )][DBLP]


  23. Algorithmic and theoretical aspects of wireless ad hoc and sensor networks. [Citation Graph (, )][DBLP]


  24. An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks. [Citation Graph (, )][DBLP]


  25. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. [Citation Graph (, )][DBLP]


  26. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002