Soumya K. Ghosh
Cited by
Cited by
iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments
H Gupta, A Vahid Dastjerdi, SK Ghosh, R Buyya
Software: Practice and Experience 47 (9), 1275-1296, 2017
Fog computing: Principles, architectures, and applications
AV Dastjerdi, H Gupta, RN Calheiros, SK Ghosh, R Buyya
Internet of things, 61-75, 2016
Enhancement of lifetime using duty cycle and network coding in wireless sensor networks
RR Rout, SK Ghosh
IEEE Transactions on Wireless Communications 12 (2), 656-667, 2012
SelCSP: A framework to facilitate selection of cloud service providers
N Ghosh, SK Ghosh, SK Das
IEEE transactions on cloud computing 3 (1), 66-79, 2014
A review on telemedicine-based WBAN framework for patient monitoring
C Chakraborty, B Gupta, SK Ghosh
Telemedicine and e-Health 19 (8), 619-626, 2013
Optical character recognition systems
A Chaudhuri, K Mandaviya, P Badelia, SK Ghosh
Optical Character Recognition Systems for Different Languages with Soft …, 2017
An approach for service oriented discovery and retrieval of spatial data
M Paul, SK Ghosh
Proceedings of the 2006 international workshop on Service-oriented software …, 2006
Spatial interpolation to predict missing attributes in GIS using semantic kriging
S Bhattacharjee, P Mitra, SK Ghosh
IEEE Transactions on Geoscience and Remote Sensing 52 (8), 4771-4780, 2013
Conditional random field based named entity recognition in geological text
N Sobhana, P Mitra, SK Ghosh
International Journal of Computer Applications 1 (3), 143-147, 2010
Adaptive data aggregation and energy efficiency using network coding in a clustered wireless sensor network: An analytical approach
RR Rout, SK Ghosh
Computer Communications 40, 65-75, 2014
A planner-based approach to generate and analyze minimal attack graph
N Ghosh, SK Ghosh
Applied Intelligence 36 (2), 369-390, 2012
Deep-STEP: A deep learning approach for spatiotemporal prediction of remote sensing data
M Das, SK Ghosh
IEEE Geoscience and Remote Sensing Letters 13 (12), 1984-1988, 2016
An approach for security assessment of network configurations using attack graph
N Ghosh, SK Ghosh
2009 First International Conference on Networks & Communications, 283-288, 2009
Heartbeat message based misbehavior detection scheme for vehicular ad-hoc networks
RP Barnwal, SK Ghosh
2012 International Conference on Connected Vehicles and Expo (ICCVE), 29-34, 2012
An intelligent technique for generating minimal attack graph
N Ghosh, SK Ghosh
First Workshop on Intelligent Security (Security and Artificial Intelligence …, 2009
STACRP: a secure trusted auction oriented clustering based routing protocol for MANET
P Chatterjee, I Sengupta, SK Ghosh
Cluster Computing 15 (3), 303-320, 2012
A probabilistic nonlinear model for forecasting daily water level in reservoir
M Das, SK Ghosh, VM Chowdary, A Saikrishnaveni, RK Sharma
Water Resources Management 30 (9), 3107-3122, 2016
On network lifetime expectancy with realistic sensing and traffic generation model in wireless sensor networks
A Chakraborty, RR Rout, A Chakrabarti, SK Ghosh
IEEE Sensors Journal 13 (7), 2771-2779, 2013
An approach to identify and monitor sla parameters for storage-as-a-service cloud delivery model
N Ghosh, SK Ghosh
2012 IEEE Globecom Workshops, 724-729, 2012
Fractal image compression: a randomized approach
SK Ghosh, J Mukherjee, PP Das
Pattern Recognition Letters 25 (9), 1013-1024, 2004
The system can't perform the operation now. Try again later.
Articles 1–20