Deep Medhi
Cited by
Cited by
Routing, flow, and capacity design in communication and computer networks
M Pióro, D Medhi, ScienceDirect (Online service)
Elsevier/Morgan Kaufmann, 2004
Network routing: algorithms, protocols, and architectures (2nd Edition)
D Medhi, K Ramasamy
Morgan Kaufmann/Elsevier, 2017
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
Measurement of quality of experience of video-on-demand services: A survey
P Juluri, V Tamarapalli, D Medhi
IEEE Communications Surveys & Tutorials 18 (1), 401-418, 2015
SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP
P Juluri, V Tamarapalli, D Medhi
2015 IEEE International Conference on Communication Workshop (ICCW), 1765-1770, 2015
Dependability and security models
KS Trivedi, DS Kim, A Roy, D Medhi
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
Performance analysis of IPSec protocol: encryption and authentication
O Elkeelany, MM Matalgah, KP Sheikh, M Thaker, G Chaudhry, D Medhi, ...
2002 IEEE International Conference on Communications. Conference Proceedings …, 2002
A unified approach to network survivability for teletraffic networks: Models, algorithms and analysis
D Medhi
IEEE Transactions on Communications 42 (234), 534-548, 1994
Multi-hour, multi-traffic class network design for virtual path-based dynamically reconfigurable wide-area ATM networks
D Medhi
IEEE/ACM Transactions on Networking 3 (6), 809-818, 1995
A secure microservice framework for iot
D Lu, D Huang, A Walenstein, D Medhi
2017 IEEE Symposium on Service-Oriented System Engineering (SOSE), 9-18, 2017
Estimating optimal cost of allocating virtualized resources with dynamic demand
H Qian, D Medhi
2011 23rd International Teletraffic Congress (ITC), 320-321, 2011
ARCH-based traffic forecasting and dynamic bandwidth provisioning for periodically measured nonstationary traffic
B Krithikaivasan, Y Zeng, K Deka, D Medhi
IEEE/ACM Transactions on networking 15 (3), 683-696, 2007
SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds
T Xing, Z Xiong, D Huang, D Medhi
10th international conference on network and service management (CNSM) and …, 2014
Real-time network anomaly detection system using machine learning
S Zhao, M Chandrashekar, Y Lee, D Medhi
2015 11th international conference on the design of reliable communication …, 2015
Multi-layered network survivability-models, analysis, architecture, framework and implementation: An overview
D Medhi, D Tipper
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
A novel strategy to achieve bandwidth cost reduction and load balancing in a cooperative three-layer fog-cloud computing environment
MMS Maswood, MDR Rahman, AG Alharbi, D Medhi
IEEE Access 8, 113737-113750, 2020
Some approaches to solving a multihour broadband network capacity design problem with single-path routing
D Medhi, D Tipper
Telecommunication Systems 13, 269-291, 2000
Probability-based adaptive forwarding strategy in named data networking
H Qian, R Ravindran, GQ Wang, D Medhi
2013 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2013
Server operational cost optimization for cloud computing service providers over a time horizon
H Qian, D Medhi
Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise …, 2011
A secure group key management scheme for hierarchical mobile ad hoc networks
D Huang, D Medhi
Ad Hoc Networks 6 (4), 560-577, 2008
The system can't perform the operation now. Try again later.
Articles 1–20