|
Search the dblp DataBase
Indranil Sengupta:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Subhayu Basu, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta, Sudipta Bhawmik
Reformatting Test Patterns for Testing Embedded Core Based System Using Test Access Mechanism (TAM) Switch. [Citation Graph (0, 0)][DBLP] ASP-DAC, 2002, pp:598-603 [Conf]
- Varun Arora, Indranil Sengupta
A Unified Approach to Partial Scan Design using Genetic Algorithm. [Citation Graph (0, 0)][DBLP] Asian Test Symposium, 2005, pp:414-421 [Conf]
- Jaydip Sen, Indranil Sengupta
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. [Citation Graph (0, 0)][DBLP] ICDCIT, 2005, pp:125-131 [Conf]
- Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta
Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage. [Citation Graph (0, 0)][DBLP] ICDCIT, 2006, pp:27-40 [Conf]
- Mounita Saha, Indranil Sengupta
A Unified Approach to Designing Reliable Network Topology. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:20- [Conf]
- Parag Kulkarni, Indranil Sengupta
Load Balancing with Multiple Token Policy. [Citation Graph (0, 0)][DBLP] ICPADS, 2000, pp:99-107 [Conf]
- Parag Kulkarni, Indranil Sengupta
A New Approach for Load Balancing Using Differential Load Measurement. [Citation Graph (0, 0)][DBLP] ITCC, 2000, pp:355-359 [Conf]
- Raja Datta, Sujoy Ghose, Indranil Sengupta
New Scheme for Design of Static Virtual Topology in Wide Area Optical Networks. [Citation Graph (0, 0)][DBLP] IWDC, 2002, pp:280-289 [Conf]
- Hemanta Kumar Pati, Rajib Mall, Indranil Sengupta
An Adaptive Resource Reservation and Distributed Admission Control Scheme for Mobile Networks. [Citation Graph (0, 0)][DBLP] IWDC, 2002, pp:214-223 [Conf]
- Reena Agarwal, Indranil Sengupta
On the Synthesis of Gate Matrix Layout. [Citation Graph (0, 0)][DBLP] VLSI Design, 1994, pp:203-206 [Conf]
- Subhayu Basu, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta, Sudipta Bhawmik
Reformatting Test Patterns for Testing Embedded Core Based System Using Test Access Mechanism (TAM) Switch. [Citation Graph (0, 0)][DBLP] VLSI Design, 2002, pp:598-603 [Conf]
- Gosta Pada Biswas, Indranil Sengupta
A Design Technique of TSC Checker for Borden's Code. [Citation Graph (0, 0)][DBLP] VLSI Design, 1997, pp:529-530 [Conf]
- Prabir Dasgupta, Santanu Chattopadhyay, Indranil Sengupta
An ASIC for Cellular Automata Based Message Authentication. [Citation Graph (0, 0)][DBLP] VLSI Design, 2000, pp:538-0 [Conf]
- Prabir Dasgupta, Santanu Chattopadhyay, Indranil Sengupta
Cellular Automata Based Deterministic Test Sequence Generator for Sequential Circuits. [Citation Graph (0, 0)][DBLP] VLSI Design, 2000, pp:544-549 [Conf]
- Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta
A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks. [Citation Graph (0, 0)][DBLP] ICDCN, 2006, pp:139-144 [Conf]
- Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta
A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICCTA, 2007, pp:51-58 [Conf]
- Hemanta Kumar Pati, Rajib Mall, Indranil Sengupta
An efficient bandwidth reservation and call admission control scheme for wireless mobile networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2002, v:25, n:1, pp:74-83 [Journal]
- Parag Kulkarni, Indranil Sengupta
Dual and multiple token based approaches for load balancing. [Citation Graph (0, 0)][DBLP] Journal of Systems Architecture, 2005, v:51, n:2, pp:95-110 [Journal]
- Dipanwita Roy Chowdhury, Indranil Sengupta, Parimal Pal Chaudhuri
CA-Based Byte Error-Correcting Code. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:3, pp:371-382 [Journal]
- Prabir Dasgupta, Santanu Chattopadhyay, Parimal Pal Chaudhuri, Indranil Sengupta
Cellular Automata-Based Recursive Pseudoexhaustive Test Pattern Generator. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2001, v:50, n:2, pp:177-185 [Journal]
- Monjur Alam, Sonai Ray, Debdeep Mukhopadhyay, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta
An area optimized reconfigurable encryptor for AES-Rijndael. [Citation Graph (0, 0)][DBLP] DATE, 2007, pp:1116-1121 [Conf]
Maximal Breach in Wireless Sensor Networks: Geometric Characterization and Algorithms. [Citation Graph (, )][DBLP]
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. [Citation Graph (, )][DBLP]
A secure verifiable key agreement protocol for mobile conferencing. [Citation Graph (, )][DBLP]
A Robust GF(p) Parallel Arithmetic Unit for Public Key Cryptography. [Citation Graph (, )][DBLP]
A GF(p) elliptic curve group operator resistant against side channel attacks. [Citation Graph (, )][DBLP]
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Audio Watermarking Based on Quantization in Wavelet Domain. [Citation Graph (, )][DBLP]
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. [Citation Graph (, )][DBLP]
Routing and Wavelength Assignment in All Optical Networks Based on Clique Partitioning. [Citation Graph (, )][DBLP]
A genetic algorithm based approach for traffic grooming, routing and wavelength assignment in optical WDM mesh networks. [Citation Graph (, )][DBLP]
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|