The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Byrav Ramamurthy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vaidehi Kasarekar, Byrav Ramamurthy
    Distributed Hybrid Agent Based Intrusion Detection and Real Time Response System. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:739-741 [Conf]
  2. Lu Shen, Xi Yang, Byrav Ramamurthy
    A Load-Balancing Spare Capacity Reallocation Approach in Service-Rich SONET Metro Mesh Networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:269-278 [Conf]
  3. Ajay Kumar Todimala, Byrav Ramamurthy
    Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:130-139 [Conf]
  4. Ajay Kumar Todimala, Byrav Ramamurthy, N. V. Vinodchandran
    On computing disjoint paths with dependent cost structure in optical networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:155-166 [Conf]
  5. Wang Yao, Byrav Ramamurthy
    Survivable Traffic Grooming with Path Protection at the Connection Level in WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:310-319 [Conf]
  6. Wang Yao, Gokhan Sahin, Mengke Li, Byrav Ramamurthy
    Analysis of multi-hop traffic grooming in WDM mesh networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:177-186 [Conf]
  7. Xukai Zou, Byrav Ramamurthy
    A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization. [Citation Graph (0, 0)][DBLP]
    CIS, 2004, pp:725-731 [Conf]
  8. Xuehong Gan, Trevor Schroeder, Steve Goddard, Byrav Ramamurthy
    LSMAC and LSNAT: Two Approaches for Cluster-Based Scalable Web Servers. [Citation Graph (0, 0)][DBLP]
    ICC (2), 2000, pp:1164-1168 [Conf]
  9. Ajay Kumar Todimala, Byrav Ramamurthy
    IMSA: An Algorithm for SRLG Diverse Routing in WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:199-204 [Conf]
  10. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:381-385 [Conf]
  11. Anand Visvanathan, Bhagyashree Prabhakar, Byrav Ramamurthy
    GBM: A Grid Layout Based Multicast Routing Protocol for AD Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:355-60 [Conf]
  12. Byrav Ramamurthy, Jason Iness, Biswanath Mukherjee
    Minimizing the Number of Optical Amplifiers Needed to Support a Multi-Wavelength Optical LAN/MAN. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:261-268 [Conf]
  13. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    A GCD attack resistant CRTHACS for secure group communications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:153-154 [Conf]
  14. Xukai Zou, Amandeep Thukral, Byrav Ramamurthy
    An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:509-520 [Conf]
  15. Xukai Zou, Byrav Ramamurthy
    A block-free TGDH key agreement protocol for secure group communications. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:288-293 [Conf]
  16. Nader Mohamed, Amy Davis, Xin Liu, Byrav Ramamurthy
    JOR: A Java Object Router. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:625-630 [Conf]
  17. Yuyan Xue, Byrav Ramamurthy, Ying Lu
    A distributed reliable data transport strategy for event based wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:407-408 [Conf]
  18. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Efficient Key Management for Secure Group Communications with Bursty Behavior. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2002, pp:148-153 [Conf]
  19. Xuehong Gan, Trevor Schroeder, Steve Goddard, Byrav Ramamurthy
    LSMAC vs. LSNAT: Scalable cluster-based Web servers. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2000, v:3, n:3, pp:175-185 [Journal]
  20. Ajay Kumar Todimala, Byrav Ramamurthy
    A Dynamic Partitioning Protection Routing Technique in WDM Networks. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2004, v:7, n:3, pp:259-269 [Journal]
  21. Maher Ali, Byrav Ramamurthy, Jitender S. Deogun
    Routing and wavelength assignment with power considerations in optical networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:32, n:5, pp:539-555 [Journal]
  22. Nader Mohamed, Xin Liu, Amy Davis, Byrav Ramamurthy
    JOR: a content-based object router. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:6, pp:654-663 [Journal]
  23. Byrav Ramamurthy, Jason Iness, Biswanath Mukherjee
    Optimizing amplifier placements in a multiwavelength optical LAN/MAN: the unequally powered wavelengths case. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1998, v:6, n:6, pp:755-767 [Journal]
  24. Lu Shen, Xi Yang, Byrav Ramamurthy
    Shared risk link group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:4, pp:918-931 [Journal]
  25. Xuehong Gan, Byrav Ramamurthy
    LSMAC: An improved load sharing network service dispatcher. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2000, v:3, n:1, pp:53-59 [Journal]
  26. Lu Shen, Ajay Kumar Todimala, Byrav Ramamurthy, Xi Yang
    Dynamic Lightpath Scheduling in Next-Generation WDM Optical Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  27. Mengke Li, Byrav Ramamurthy
    Integrated Intermediate Waveband and Wavelength Switching for Optical WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  28. Ajay Kumar Todimala, Byrav Ramamurthy
    Approximation Algorithms for Survivable Multicommodity Flow Problems with Applications to Network Design. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  29. Dedicated path protection for waveband switching in WDM networks (invited paper). [Citation Graph (, )][DBLP]


  30. A key management protocol for hybrid wireless sensor networks. [Citation Graph (, )][DBLP]


  31. A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations. [Citation Graph (, )][DBLP]


  32. Providing Reliable Data Transport for Dynamic Event Sensing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  33. KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  34. Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  35. A Two-phase Approach for Dynamic Lightpath Scheduling in WDM Optical Networks. [Citation Graph (, )][DBLP]


  36. Joint Computing and Network Resource Scheduling in a Lambda Grid Network. [Citation Graph (, )][DBLP]


  37. A Cooperative Scheme for Dynamic Window Resizing in P2P Live Streaming. [Citation Graph (, )][DBLP]


  38. Layered Clustering Communication Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  39. Channel-Aware Peer Selection in Multi-View Peer-to-Peer Multimedia Streaming. [Citation Graph (, )][DBLP]


  40. Linear Programming Models For Multi-Channel P2P Streaming Systems. [Citation Graph (, )][DBLP]


  41. A service-differentiated real-time communication scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  42. Providing statistically guaranteed streaming quality for peer-to-peer live streaming. [Citation Graph (, )][DBLP]


  43. A Flexible Divide-And-Conquer Protocol for Multi-View Peer-to-Peer Live Streaming. [Citation Graph (, )][DBLP]


  44. A Partial Forwarding Scheme for Dynamic Window Resizing in Live P2P Streaming Systems. [Citation Graph (, )][DBLP]


  45. Rerouting schemes for dynamic traffic grooming in optical WDM networks. [Citation Graph (, )][DBLP]


  46. Packet reordering in high-speed networks and its impact on high-speed TCP variants. [Citation Graph (, )][DBLP]


  47. LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  48. A survey of security issues in wireless sensor networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002