Bhed Bahadur Bista

According to our database1, Bhed Bahadur Bista authored at least 58 papers between 1994 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Probabilistic computation offloading for mobile edge computing in dynamic network environment.
Internet Things, 2020

2019
A Probabilistic Offloading Approach in Mobile Edge Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Construction and maintenance of k-hop CDS in MANET with two classes of mobile terminals.
Int. J. Space Based Situated Comput., 2018

Incentive mechanisms for promoting D2D communications in cellular networks.
Int. J. Space Based Situated Comput., 2018

An Analysis of a Defence Method against Slow HTTP DoS Attack.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks.
J. Commun., 2017

On the Performance Enhancement of Vehicular Ad Hoc Network for Transportation Cyber Physical Systems.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference Workshops, 2017

Mechanism for Adopting Device-to-Device Communication in Cellular Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017

EA-PRoPHET: An Energy Aware PRoPHET-Based Routing Protocol for Delay Tolerant Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

A Defense Method against Distributed Slow HTTP DoS Attack.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

A user authentication scheme using keystrokes for smartphones while moving.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Improving Energy Consumption of Epidemic Routing in Delay Tolerant Networks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

2015
Trust On the Security of Wireless Vehicular Ad-hoc Networking.
Ad Hoc Sens. Wirel. Networks, 2015

Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

A Proposal of QoS-aware Power Saving Scheme for SDN-based Networks.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A Robust Energy Efficient Epidemic Routing Protocol for Delay Tolerant Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A proposal of distributed management scheme of content key information for pure P2P networks.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Vehicle-to-Vehicle Connectivity and Communication Framework for Vehicular Ad-Hoc Networks.
Proceedings of the Eighth International Conference on Complex, 2014

2013
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.
Int. J. Space Based Situated Comput., 2013

Special Issue of Ad Hoc Networks on Recent Advances in Vehicular Communications and Networking.
Ad Hoc Networks, 2013

Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Complex, 2013

A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Provisioning vehicular ad hoc networks with quality of service.
Int. J. Space Based Situated Comput., 2012

Towards Secure Vehicular Clouds.
Proceedings of the Sixth International Conference on Complex, 2012

CoR-VANETs: Game Theoretic Approach for Channel and Rate Selection in Cognitive Radio VANETs.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Precoder Adaptation and Power Control in Wireless Ad-Hoc Networks for Rate Maximization.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Securing Vehicular Ad-hoc Networks Against Malicious Drivers: A Probabilistic Approach.
Proceedings of the International Conference on Complex, 2011

General Active Position Detectors Protect VANET Security.
Proceedings of the 2011 International Conference on Broadband, 2011

Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Combined Admission, Power and Rate Control for Cognitive Radios in Dynamic Spectrum Access Ad-Hoc Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

A user authenticaion scheme using multiple passphrases and its arrangement.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A Proactive Fault Resilient Overlay Multicast for Media Streaming.
Proceedings of the NBiS 2009, 2009

Energy efficient layered sensor networks with multihop polling.
Proceedings of the MoMM'2009, 2009

A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.
Proceedings of the Multiagent System Technologies, 7th German Conference, 2009

2007
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

A New Approach to Early Detection of an Unknown Worm.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

AWide Area Log Analyzing System Based on Mobile Agents.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

On a Watermarking Scheme for MusicXML.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

DoS Packet Filter Using DNS Information.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Resource Reservation with Session Time in Multicast Routing.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Development of Security Scanner with High Portability and Usability.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Composition of Service and Protocol Specifications in Asynchronous Communication System.
IEICE Trans. Inf. Syst., 2004

Development of Security Scanner with High Usability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
On Constructing n-Entities Communication Protocol and Service with Alternative and Concurrent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Composition method of communication system specifications in asynchronous model and its support system.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Composition of Service and Protocol Specifications.
Proceedings of the 15th International Conference on Information Networking, 2001

An Intelligent Prediction Based Approach for Mobility Tracking in PCN.
Proceedings of the International Conference on Internet Computing, 2001

Construction of A Multiple Entities Communication Protocol by Compositional Approach.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
Support System for Constructing Communication Services and Protocols Based on Compositional Approach.
Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 2000

1996
A flexible protocol synthesis method for adopting requirement changes.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996

1995
Extension of protocol synthesis to structured entities.
Proceedings of the 1995 International Conference on Network Protocols, 1995

1994
A synthesis algorithm of a protocol model from a single entity.
Proceedings of the Formal Description Techniques VII, 1994


  Loading...