Prakash Kolan

According to our database1, Prakash Kolan authored at least 15 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A holistic survey of multipath wireless video streaming.
J. Netw. Comput. Appl., March, 2023

2021
Multipath MMT-based approach for streaming high quality video over multiple wireless access networks.
Comput. Networks, 2021

2019
A Holistic Survey of Wireless Multipath Video Streaming.
CoRR, 2019

2018
Ad-Net: Audio-Visual Convolutional Neural Network for Advertisement Detection In Videos.
CoRR, 2018

A Novel Scheduling Strategy for MMT-Based Multipath Video Streaming.
Proceedings of the IEEE Global Communications Conference, 2018

2012
Real-time Incremental Speech-to-Speech Translation of Dialogs.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2012

2009
Network risk management using attacker profiling.
Secur. Commun. Networks, 2009

2008
Nuisance level of a voice call.
ACM Trans. Multim. Comput. Commun. Appl., 2008

Call Algebra.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Socio-technical defense against voice spamming.
ACM Trans. Auton. Adapt. Syst., 2007

Classification of Attributes and Behavior in Risk Management Using Bayesian Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Automatic Calibration Using Receiver Operating Characteristics Curves.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2005
Detecting Spam in VoIP Networks.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

Risk Management Using Behavior Based Bayesian Networks.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Risk Management using Behavior based Attack Graphs.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004


  Loading...