Browsing by Author Puthal, D

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 68  next >
Issue DateTitleAuthor(s)
1-Jun-2018Accurate traffic flow prediction in heterogeneous vehicular networks in an intelligent transport system using a supervised non-parametric classifierEl-Sayed, H; Sankar, S; Daraghmi, YA; Tiwari, P; Rattagan, E; Mohanty, M; Puthal, D; Prasad, M
4-Sep-2018Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheelsBhoi, SK; Puthal, D; Khilar, PM; Rodrigues, JJPC; Panda, SK; Yang, LT
1-Jan-2018An adaptive task allocation technique for green cloud computingMishra, SK; Puthal, D; Sahoo, B; Jena, SK; Obaidat, MS
1-Jan-2014ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTEDrira, W; Puthal, D; Filali, F
1-Feb-2019Analytical Model for Sybil Attack Phases in Internet of ThingsMishra, AK; Tripathy, AK; Puthal, D; Yang, LT
1-Oct-2017Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor NetworksYang, C; Puthal, D; Mohanty, SP; Kougianos, E
1-Mar-2018The Blockchain as a Decentralized Security Framework [Future Directions]Puthal, D; Malik, N; Mohanty, SP; Kougianos, E; Yang, C
5-Sep-2018Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular NetworksMalik, N; Nanda, P; Arora, A; He, X; Puthal, D
1-Mar-2018Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the NeedRoy, SS; Puthal, D; Sharma, S; Mohanty, SP; Zomaya, AY
31-May-2018Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power SensorsLenka, RK; Rath, AK; Tan, Z; Sharma, S; Puthal, D; Simha, NVR; Prasad, M; Raja, R; Tripathi, SS
8-Jan-2019Building Scalable Mobile Edge Computing by Enhancing Quality of ServicesTiwary, M; Sharma, S; Mishra, P; El-Sayed, H; Prasad, M; Puthal, D
1-Oct-2017Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]Puthal, D; Mohanty, SP; Nanda, P; Choppali, U
2-Mar-2015Cloud computing features, issues, and challenges: A big picturePuthal, D; Sahoo, BPS; Mishra, S; Swain, S
2-Mar-2015A comparative analysis of packet scheduling schemes for multimedia services in LTE networksSahoo, BPS; Puthal, D; Swain, S; Mishra, S
28-Jan-2019A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceRajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M
1-Nov-2018A Computing Perspective of Quantum Cryptography [Energy and Security]Nanda, A; Puthal, D; Mohanty, SP; Choppali, U
1-Jan-2013Cross-layer architecture for congestion control in Vehicular Ad-hoc NetworksPuthal, D; Mir, ZH; Filali, F; Menouar, H
27-Jul-2018CTOM: Collaborative task offloading mechanism for mobile cloudlet networksFan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X
12-Sep-2017Deadline-constraint services in cloud with heterogeneous serversSahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS
1-Dec-2016DLSeF: A dynamic key-length-based efficient real-time security verification model for big data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J