The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ratan K. Guha: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
    Understanding the intruder through attacks on cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:667-672 [Conf]
  2. Mostafa A. Bassiouni, Ratan K. Guha
    Modeling and Analysis of Temporal Failure and Degradation Behavior of Critical Infrastructure Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:50- [Conf]
  3. Oleg Kachirski, Ratan K. Guha
    Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:57- [Conf]
  4. Kiran Anna, Abhishek Karnik, Ratan K. Guha, Mainak Chatterjee
    Enhancing QoS in 802.11e with Beacon Management. [Citation Graph (0, 0)][DBLP]
    HSNMC, 2004, pp:598-608 [Conf]
  5. James Zijun Wang, Ratan K. Guha
    Proxy Ecology - Cooperative Proxies with Artificial Life. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:168-174 [Conf]
  6. Zeeshan Furqan, Ratan K. Guha, Shahabuddin Muhammad
    A Heuristic State Space Search Model for Security Protocol Verification. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:113-118 [Conf]
  7. Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha
    Formal Verification of 802.11i using Strand Space Formalism. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:140- [Conf]
  8. Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
    Designing Authentication Protocols: Trends and Issues. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:76- [Conf]
  9. Darshan Purandare, Ratan K. Guha
    Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2006, pp:561-570 [Conf]
  10. Darshan Purandare, Ratan K. Guha, Joohan Lee
    An IV Collision Avoidance Algorithm - Strengthening the WEP. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:73-78 [Conf]
  11. Ratan K. Guha, James Zijun Wang
    Improving Web Access Efficiency Using P2P Proxies. [Citation Graph (0, 0)][DBLP]
    IWDC, 2002, pp:24-34 [Conf]
  12. Chun Huang, Mainak Chatterjee, Wei Cui, Ratan K. Guha
    Multipath Source Routing in Sensor Networks Based on Route Ranking. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:99-104 [Conf]
  13. James Zijun Wang, Ratan K. Guha
    Data allocation algorithms for distributed video servers. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2000, pp:456-458 [Conf]
  14. Arthur F. Dickinson, Ratan K. Guha
    Space Efficient List Merging on a Multiprocessor Ring. [Citation Graph (0, 0)][DBLP]
    PARBASE / Architectures, 1990, pp:108-123 [Conf]
  15. Joohan Lee, Hua Zhang, Ratan K. Guha
    Virtual Cluster Computing Architecture. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:290-293 [Conf]
  16. Ratan K. Guha, Mainak Chatterjee, Jaideep Sarkar
    A Distributed Security Architecture for ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2005, pp:81-91 [Conf]
  17. Darshan Purandare, Ratan K. Guha
    Enhancing Message Privacy in WEP. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2005, pp:23-32 [Conf]
  18. Abhishek Karnik, Suchandra Goswami, Ratan K. Guha
    Detecting Obfuscated Viruses Using Cosine Similarity Analysis. [Citation Graph (0, 0)][DBLP]
    Asia International Conference on Modelling and Simulation, 2007, pp:165-170 [Conf]
  19. Jaruwan Mesit, Ratan K. Guha
    Simulation of Soft Bodies with Pressure Force and the Implicit Method. [Citation Graph (0, 0)][DBLP]
    Asia International Conference on Modelling and Simulation, 2007, pp:302-307 [Conf]
  20. Ratan K. Guha, Arthur F. Dickinson, Allan Kikawa
    Analysis of CMH deadlock-detection algorithm using transmission delays. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 1988, v:3, n:4, pp:181-188 [Journal]
  21. Dilip Sarkar, Ratan K. Guha
    Mapping a class of algorithms from binary tree machines to linear arrays. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 1990, v:5, n:4, pp:202-204 [Journal]
  22. Ratan K. Guha, Raymond T. Yeh
    Periodic Representation of Equal Matrix Grammars [Citation Graph (0, 0)][DBLP]
    Information and Control, 1973, v:22, n:5, pp:435-446 [Journal]
  23. Ratan K. Guha, Raymond T. Yeh
    Erratum: ``Periodic Representation of Equal Matrix Grammars'' [Citation Graph (0, 0)][DBLP]
    Information and Control, 1974, v:24, n:4, pp:399- [Journal]
  24. Ratan K. Guha, Raymond T. Yeh
    On Periodicity of Sequential Machines. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1974, v:8, n:1, pp:41-70 [Journal]
  25. Ratan K. Guha, Mostafa A. Bassiouni
    Simulation Methods and Applications. [Citation Graph (0, 0)][DBLP]
    Simul. Pr. Theory, 2002, v:9, n:3-5, pp:91-93 [Journal]
  26. James Zijun Wang, Ratan K. Guha
    A novel data caching scheme for multimedia servers. [Citation Graph (0, 0)][DBLP]
    Simul. Pr. Theory, 2002, v:9, n:3-5, pp:193-213 [Journal]
  27. T. G. McDonald, Ratan K. Guha
    The Two's Complement Quasi-Serial Multiplier. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1975, v:24, n:12, pp:1233-1235 [Journal]
  28. Sudipta Rakshit, Ratan K. Guha
    Fair Bandwidth Sharing in Distributed Systems: A Game-Theoretic Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:11, pp:1384-1393 [Journal]
  29. James Zijun Wang, Ratan K. Guha
    Proxy ecology - Cooperative proxies with artificial life. [Citation Graph (0, 0)][DBLP]
    Web Intelligence and Agent Systems, 2004, v:2, n:3, pp:201-215 [Journal]
  30. Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
    Wireless sensor network security: a secure sink node architecture. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:371-376 [Conf]

  31. BEAM: An Efficient Peer to Peer Media Streaming Framework. [Citation Graph (, )][DBLP]


  32. Demonstrating Automatic Content Generation in the Galactic Arms Race Video Game. [Citation Graph (, )][DBLP]


  33. Soft Body Simulation with Leaking Effect. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002