Aniket Mahanti
Citata da
Citata da
A comparative analysis of web and peer-to-peer traffic
N Basher, A Mahanti, A Mahanti, C Williamson, M Arlitt
Proceedings of the 17th international conference on World Wide Web, 287-296, 2008
Challenges in enterprise adoption of agile methods-A survey
A Mahanti
Journal of Computing and Information technology 14 (3), 197-206, 2006
A tale of the tails: Power-laws in internet measurements
A Mahanti, N Carlsson, A Mahanti, M Arlitt, C Williamson
IEEE Network 27 (1), 59-64, 2013
FOG-Engine: Towards big data analytics in the fog
F Mehdipour, B Javadi, A Mahanti
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
Process automation in an IoT–fog–cloud ecosystem: A survey and taxonomy
H Chegini, RK Naha, A Mahanti, P Thulasiraman
IoT 2 (1), 92-118, 2021
Remote analysis of a distributed WLAN using passive wireless-side measurement
A Mahanti, C Williamson, M Arlitt
Performance Evaluation 64 (9-12), 909-932, 2007
Detecting anomalous energy consumption using contextual analysis of smart meter data
A Sial, A Singh, A Mahanti
Wireless Networks 27 (6), 4275-4292, 2021
Characterizing the file hosting ecosystem: A view from the edge
A Mahanti, C Williamson, N Carlsson, M Arlitt, A Mahanti
Performance Evaluation 68 (11), 1085-1102, 2011
Ambient interference effects in Wi-Fi networks
A Mahanti, N Carlsson, C Williamson, M Arlitt
International Conference on Research in Networking, 160-173, 2010
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti
Computer Communications 162, 212-224, 2020
Fog computing realization for big data analytics
F Mehdipour, B Javadi, A Mahanti, G Ramirez-Prado, EC Principles
Fog and edge computing: Principles and paradigms 1, 259-290, 2019
Comparative performance analysis of high-speed transfer protocols for big data
S Yu, N Brownlee, A Mahanti
38th Annual IEEE Conference on Local Computer Networks, 292-295, 2013
Deep neural learning techniques with long short-term memory for gesture recognition
DK Jain, A Mahanti, P Shamsolmoali, R Manikandan
Neural Computing and Applications 32 (20), 16073-16089, 2020
Heuristics-Based detection of abnormal energy consumption
A Sial, A Singh, A Mahanti, M Gong
International Conference on Smart Grid Inspired Future Technologies, 21-31, 2018
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control
AAN Patwary, RK Naha, S Garg, SK Battula, MAK Patwary, E Aghasian, ...
Electronics 10 (10), 1171, 2021
A framework of automation on context-aware internet of things (IoT) systems
H Chegini, A Mahanti
Proceedings of the 12th ieee/acm international conference on utility and …, 2019
Network steganography and steganalysis-a concise review
JO Seo, S Manoharan, A Mahanti
2016 2nd International Conference on Applied and Theoretical Computing and …, 2016
Workload characterization of a large systems conference web server
A Mahanti, C Williamson, L Wu
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
Internet traffic identification using machine learning techniques
J Eerman, A Mahanti, M Arlitt
Proc. of the 49th IEEE Global Telecomm. Conf.(GLOBECOM), 1-6, 2006
Characterizing intelligence gathering and control on an edge network
M Arlitt, N Carlsson, P Gill, A Mahanti, C Williamson
ACM Transactions on Internet Technology (TOIT) 11 (1), 1-26, 2011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20