The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hrushikesha Mohanty: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. Mohanty
    Active and Nomadic Transactions in Mobile Databases. [Citation Graph (0, 0)][DBLP]
    ADBIS-DASFAA Symposium, 2000, pp:99-107 [Conf]
  2. Manas Ranjan Patra, Hrushikesha Mohanty
    A Formal Framework to Build Software Agents. [Citation Graph (0, 0)][DBLP]
    APSEC, 2001, pp:119-126 [Conf]
  3. A. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty
    A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    ICIT, 2006, pp:94-95 [Conf]
  4. Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh, Goutam Chakraborty
    Resilient Dissemination of Events in a Large-Scale Event Notification Service System. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:502-507 [Conf]
  5. H. Mohanty, G. P. Bhattacharjee
    A Distributed Algorithm for Edge-Disjoint Path Problem. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1986, pp:344-361 [Conf]
  6. Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyamasundar
    MOBICHARTS: A Notation to Specify Mobile Computing Applications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:298- [Conf]
  7. Satyajit Acharya, Chris George, Hrushikesha Mohanty
    Specifying a Mobile Computing Infrastructure and Services. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:244-254 [Conf]
  8. Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh
    Just-in-Time Delivery of Events in Event Notification Service Systems for Mobile Users. [Citation Graph (0, 0)][DBLP]
    INTELLCOMM, 2004, pp:190-198 [Conf]
  9. Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh
    Causal Ordering in Event Notification Service Systems for Mobile Users. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:735-740 [Conf]
  10. O. B. V. Ramanaiah, Hrushikesha Mohanty
    NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:730-734 [Conf]
  11. R. K. Ghosh, Saurabh Aggarwala, Hemant Mishra, Ashish Sharma, Hrushikesha Mohanty
    Tracking of Mobile Terminals Using Subscriber Mobility Pattern with Time-Bound Self Purging Indicators and Regional Route Maps. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:512-523 [Conf]
  12. R. K. Ghosh, Hrushikesha Mohanty
    On Restructuring Distributed Algorithms for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IWDC, 2002, pp:224-233 [Conf]
  13. R. K. Ghosh, Shravan K. Rayanchu, Hrushikesha Mohanty
    Location Management by Movement Prediction Using Mobility Patterns and Regional Route Maps. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:153-162 [Conf]
  14. Satyajit Acharya, Chris George, Hrushikesha Mohanty
    Domain Consistency in Requirements Specification. [Citation Graph (0, 0)][DBLP]
    QSIC, 2005, pp:231-240 [Conf]
  15. T. Suman Kumar Reddy, Hrushikesha Mohanty, R. K. Ghosh, Sanjay Kumar Madria
    Two Distributed Algorithms for E-ticket Validation protocols for Mobile Clients. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:223-0 [Conf]
  16. Hrushikesha Mohanty, Jitesh Mulchandani, Deepak Chenthati, R. K. Shyamasundar
    Modeling Web Services with FSM Modules. [Citation Graph (0, 0)][DBLP]
    Asia International Conference on Modelling and Simulation, 2007, pp:100-105 [Conf]

  17. Specification Based Testing of Inheritance: A Framework of a Tool. [Citation Graph (, )][DBLP]


  18. Ensuring Consistency in Relational Repository of UML Models. [Citation Graph (, )][DBLP]


  19. Automated Test Scenario Selection Based on Levenshtein Distance. [Citation Graph (, )][DBLP]


  20. A Framework for Web-Based Negotiation. [Citation Graph (, )][DBLP]


  21. Trust Assessment in Web Services: an Extension to jUDDI. [Citation Graph (, )][DBLP]


  22. Secured Networking by Sandboxing LINUX 2.6. [Citation Graph (, )][DBLP]


  23. Prioritizing Use Cases to Aid Ordering of Scenarios. [Citation Graph (, )][DBLP]


  24. Translating Security Policy to Executable Code for Sandboxing Linux Kernel. [Citation Graph (, )][DBLP]


Search in 0.143secs, Finished in 0.144secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002