Search the dblp DataBase
Ratan K. Guha :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shahabuddin Muhammad , Zeeshan Furqan , Ratan K. Guha Understanding the intruder through attacks on cryptographic protocols. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:667-672 [Conf ] Mostafa A. Bassiouni , Ratan K. Guha Modeling and Analysis of Temporal Failure and Degradation Behavior of Critical Infrastructure Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:50- [Conf ] Oleg Kachirski , Ratan K. Guha Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] HICSS, 2003, pp:57- [Conf ] Kiran Anna , Abhishek Karnik , Ratan K. Guha , Mainak Chatterjee Enhancing QoS in 802.11e with Beacon Management. [Citation Graph (0, 0)][DBLP ] HSNMC, 2004, pp:598-608 [Conf ] James Zijun Wang , Ratan K. Guha Proxy Ecology - Cooperative Proxies with Artificial Life. [Citation Graph (0, 0)][DBLP ] IAT, 2003, pp:168-174 [Conf ] Zeeshan Furqan , Ratan K. Guha , Shahabuddin Muhammad A Heuristic State Space Search Model for Security Protocol Verification. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:113-118 [Conf ] Zeeshan Furqan , Shahabuddin Muhammad , Ratan K. Guha Formal Verification of 802.11i using Strand Space Formalism. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:140- [Conf ] Shahabuddin Muhammad , Zeeshan Furqan , Ratan K. Guha Designing Authentication Protocols: Trends and Issues. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:76- [Conf ] Darshan Purandare , Ratan K. Guha Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness. [Citation Graph (0, 0)][DBLP ] ICPADS (1), 2006, pp:561-570 [Conf ] Darshan Purandare , Ratan K. Guha , Joohan Lee An IV Collision Avoidance Algorithm - Strengthening the WEP. [Citation Graph (0, 0)][DBLP ] ICWN, 2005, pp:73-78 [Conf ] Ratan K. Guha , James Zijun Wang Improving Web Access Efficiency Using P2P Proxies. [Citation Graph (0, 0)][DBLP ] IWDC, 2002, pp:24-34 [Conf ] Chun Huang , Mainak Chatterjee , Wei Cui , Ratan K. Guha Multipath Source Routing in Sensor Networks Based on Route Ranking. [Citation Graph (0, 0)][DBLP ] IWDC, 2005, pp:99-104 [Conf ] James Zijun Wang , Ratan K. Guha Data allocation algorithms for distributed video servers. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2000, pp:456-458 [Conf ] Arthur F. Dickinson , Ratan K. Guha Space Efficient List Merging on a Multiprocessor Ring. [Citation Graph (0, 0)][DBLP ] PARBASE / Architectures, 1990, pp:108-123 [Conf ] Joohan Lee , Hua Zhang , Ratan K. Guha Virtual Cluster Computing Architecture. [Citation Graph (0, 0)][DBLP ] PDPTA, 2005, pp:290-293 [Conf ] Ratan K. Guha , Mainak Chatterjee , Jaideep Sarkar A Distributed Security Architecture for ad hoc Networks. [Citation Graph (0, 0)][DBLP ] Wireless Information Systems, 2005, pp:81-91 [Conf ] Darshan Purandare , Ratan K. Guha Enhancing Message Privacy in WEP. [Citation Graph (0, 0)][DBLP ] Wireless Information Systems, 2005, pp:23-32 [Conf ] Abhishek Karnik , Suchandra Goswami , Ratan K. Guha Detecting Obfuscated Viruses Using Cosine Similarity Analysis. [Citation Graph (0, 0)][DBLP ] Asia International Conference on Modelling and Simulation, 2007, pp:165-170 [Conf ] Jaruwan Mesit , Ratan K. Guha Simulation of Soft Bodies with Pressure Force and the Implicit Method. [Citation Graph (0, 0)][DBLP ] Asia International Conference on Modelling and Simulation, 2007, pp:302-307 [Conf ] Ratan K. Guha , Arthur F. Dickinson , Allan Kikawa Analysis of CMH deadlock-detection algorithm using transmission delays. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 1988, v:3, n:4, pp:181-188 [Journal ] Dilip Sarkar , Ratan K. Guha Mapping a class of algorithms from binary tree machines to linear arrays. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 1990, v:5, n:4, pp:202-204 [Journal ] Ratan K. Guha , Raymond T. Yeh Periodic Representation of Equal Matrix Grammars [Citation Graph (0, 0)][DBLP ] Information and Control, 1973, v:22, n:5, pp:435-446 [Journal ] Ratan K. Guha , Raymond T. Yeh Erratum: ``Periodic Representation of Equal Matrix Grammars'' [Citation Graph (0, 0)][DBLP ] Information and Control, 1974, v:24, n:4, pp:399- [Journal ] Ratan K. Guha , Raymond T. Yeh On Periodicity of Sequential Machines. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1974, v:8, n:1, pp:41-70 [Journal ] Ratan K. Guha , Mostafa A. Bassiouni Simulation Methods and Applications. [Citation Graph (0, 0)][DBLP ] Simul. Pr. Theory, 2002, v:9, n:3-5, pp:91-93 [Journal ] James Zijun Wang , Ratan K. Guha A novel data caching scheme for multimedia servers. [Citation Graph (0, 0)][DBLP ] Simul. Pr. Theory, 2002, v:9, n:3-5, pp:193-213 [Journal ] T. G. McDonald , Ratan K. Guha The Two's Complement Quasi-Serial Multiplier. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1975, v:24, n:12, pp:1233-1235 [Journal ] Sudipta Rakshit , Ratan K. Guha Fair Bandwidth Sharing in Distributed Systems: A Game-Theoretic Approach. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:11, pp:1384-1393 [Journal ] James Zijun Wang , Ratan K. Guha Proxy ecology - Cooperative proxies with artificial life. [Citation Graph (0, 0)][DBLP ] Web Intelligence and Agent Systems, 2004, v:2, n:3, pp:201-215 [Journal ] Shahabuddin Muhammad , Zeeshan Furqan , Ratan K. Guha Wireless sensor network security: a secure sink node architecture. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:371-376 [Conf ] BEAM: An Efficient Peer to Peer Media Streaming Framework. [Citation Graph (, )][DBLP ] Demonstrating Automatic Content Generation in the Galactic Arms Race Video Game. [Citation Graph (, )][DBLP ] Soft Body Simulation with Leaking Effect. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.305secs