Ratan K. Guha

Affiliations:
  • University of Central Florida, Orlando, USA


According to our database1, Ratan K. Guha authored at least 85 papers between 1973 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
A Probabilistic Study on the Relationship of Deceptions and Attacker Skills.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2015
Direct private query in location-based services with GPU run time analysis.
J. Supercomput., 2015

A secured distribution of server loads to clients.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Space partitioning for privacy in location-based services continuous nearest neighbor query.
Proceedings of the 24th IEEE International Symposium on Industrial Electronics, 2015

2014
An Adaptive Cognition System for Smart Grids With Context Awareness and Fault Tolerance.
IEEE Trans. Smart Grid, 2014

2013
What defines an intruder? An intelligent approach.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

2012
Leveraging computation sharing and parallel processing in location-dependent query processing.
J. Supercomput., 2012

Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation.
J. Supercomput., 2012

Performance Modeling of Spatio-Temporal Algorithms Over GEDS Framework.
Int. J. Grid High Perform. Comput., 2012

Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

A tale of nine Internet exchange points: Studying path latencies through major regional IXPs.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Evaluating End-User Network Benefits of Peering with Path Latencies.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Security and Integrity Analysis Using Indicators.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
GEDS: GPU execution of spatio-temporal queries over spatio-temporal data streams.
J. Embed. Comput., 2011

Pareto-based evolutionary computational approach for wireless sensor placement.
Eng. Appl. Artif. Intell., 2011

A general model for soft body simulation in motion.
Proceedings of the Winter Simulation Conference 2011, 2011

Enhancing network security education with research and development content.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

Evolution of optimal heterogeneous wireless mesh networks.
Proceedings of the MILCOM 2011, 2011

Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Internet exchange points and Internet routing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2011

Particle Swarm Optimization for load balancing in green smart homes.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

Multimodal species identification in wireless sensor networks.
Proceedings of the 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, 2011

2010
Experimenting with real time simulation parameters for fluid model of soft bodies.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Studying the effect of internet eXchange points on internet link delays.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Impact of Internet exchange points on Internet topology evolution.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Simulation of Lung Respiration Function Using Soft Body Model.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

OFDMA Extension of NS-3 WiMAX Module.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

Understanding the impact of internet exchange points on internet topology and routing performance.
Proceedings of the ACM CoNEXT Student Workshop, 2010

2009
Interactive Evolution of Particle Systems for Computer Graphics and Animation.
IEEE Trans. Evol. Comput., 2009

Automatic Content Generation in the Galactic Arms Race Video Game.
IEEE Trans. Comput. Intell. AI Games, 2009

Editorial.
J. Comput., 2009

Efficient Virus Detection Using Dynamic Instruction Sequences.
J. Comput., 2009

Simulation of 3D-deformable Objects Using Stable and Accurate Euler Method.
Proceedings of the UKSim'11, 2009

Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Feature set selection in data mining techniques for unknown virus detection: a comparison study.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Evolving content in the Galactic Arms Race video game.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence and Games, 2009

Demonstrating Automatic Content Generation in the Galactic Arms Race Video Game.
Proceedings of the Fifth Artificial Intelligence and Interactive Digital Entertainment Conference, 2009

2008
VCluster: a thread-based Java middleware for SMP and heterogeneous clusters with thread migration support.
Softw. Pract. Exp., 2008

Dynamic instruction sequences monitor for virus detection.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Soft Body Simulation with Leaking Effect.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
An Alliance Based Peering Scheme for P2P Live Media Streaming.
IEEE Trans. Multim., 2007

3D Soft Body Simulation Using Mass-spring System with Internal Pressure Force and Simplified Implicit Integration.
J. Comput., 2007

A Scalable Technique for Large Scale, Real-Time Range Monitoring of Heterogeneous Clients.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

NEAT Particles: Design, Representation, and Animation of Particle System Effects.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, 2007

Simulation of Soft Bodies with Pressure Force and the Implicit Method.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007

Detecting Obfuscated Viruses Using Cosine Similarity Analysis.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007

2006
Determining scale and sea state from water video.
IEEE Trans. Image Process., 2006

Selfish Users and Fair Sharing of Bandwidth in Distributed Medium Access.
Int. J. Enterp. Inf. Syst., 2006

Optimal Placement of Wireless Sensor Nodes with Fault Tolerance and Minimal Energy Consumption.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

BEAM: An Efficient Peer to Peer Media Streaming Framework.
Proceedings of the LCN 2006, 2006

Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Logic-Based Formal Analysis of Cryptographic Protocols.
Proceedings of the 14th IEEE International Conference on Networks, 2006

A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Designing Authentication Protocols: Trends and Issues.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Formal Verification of 802.11i using Strand Space Formalism.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Understanding the intruder through attacks on cryptographic protocols.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Fair Bandwidth Sharing in Distributed Systems: A Game-Theoretic Approach.
IEEE Trans. Computers, 2005

Enhancing Message Privacy in WEP.
Proceedings of the Wireless Information Systems, 2005

A Distributed Security Architecture for ad hoc Networks.
Proceedings of the Wireless Information Systems, 2005

Virtual Cluster Computing Architecture.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Multipath Source Routing in Sensor Networks Based on Route Ranking.
Proceedings of the Distributed Computing, 2005

Wireless sensor network security: a secure sink node architecture.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

An IV Collision Avoidance Algorithm - Strengthening the WEP.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
Proxy ecology - Cooperative proxies with artificial life.
Web Intell. Agent Syst., 2004

A Heuristic State Space Search Model for Security Protocol Verification.
Proceedings of the ICETE 2004, 2004

Optimal strategies in MAC protocols.
Proceedings of IEEE International Conference on Communications, 2004

Enhancing QoS in 802.11e with Beacon Management.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

2003
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
A novel data caching scheme for multimedia servers.
Simul. Pract. Theory, 2002

Simulation Methods and Applications.
Simul. Pract. Theory, 2002

Improving Web Access Efficiency Using P2P Proxies.
Proceedings of the Distributed Computing, 2002

Modeling and Analysis of Temporal Failure and Degradation Behavior of Critical Infrastructure Systems.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Managing QoS for wireless cells supporting critical load.
Proceedings of the Global Telecommunications Conference, 2001

2000
Data allocation algorithms for distributed video servers.
Proceedings of the 8th ACM International Conference on Multimedia 2000, Los Angeles, CA, USA, October 30, 2000

1991
Stochistic Petri Net Models of Distributed Simulation Systems.
Proceedings of the Dynamic Modelling of Information Systems II, 1991

1990
Mapping a class of algorithms from binary tree machines to linear arrays.
Comput. Syst. Sci. Eng., 1990

Space Efficient List Merging on a Multiprocessor Ring.
Proceedings of the Parallel Architectures (Postconference PARBASE-90)., 1990

1988
Analysis of CMH deadlock-detection algorithm using transmission delays.
Comput. Syst. Sci. Eng., 1988

1977
Dynamic microprogramming in a time sharing environment.
Proceedings of the 10th annual workshop on Microprogramming, 1977

1975
The Two's Complement Quasi-Serial Multiplier.
IEEE Trans. Computers, 1975

1974
Erratum: "Periodic Representation of Equal Matrix Grammars"
Inf. Control., April, 1974

On Periodicity of Sequential Machines.
J. Comput. Syst. Sci., 1974

1973
Periodic Representation of Equal Matrix Grammars
Inf. Control., June, 1973


  Loading...