Остановите войну!
for scientists:
default search action
Debashis Saha
- > Home > Persons > Debashis Saha
Publications
- 2009
- [j30]Madhubanti Maitra, Amitava Mukherjee, Debashis Saha:
Integrated Interswitch Cable and Handoff Cost Minimizing Heuristics for Cell-to-Switch Assignment in Wireless Cellular Networks. IEEE Trans. Veh. Technol. 58(9): 5074-5082 (2009) - 2008
- [j29]Sahadeb Jana, Debashis Saha, Amitava Mukherjee, Pranay Chaudhuri:
A novel approach for assigning wavelengths in multihop WDM optical networks. Comput. Commun. 31(9): 1751-1762 (2008) - [j28]Anup K. Ghosh, Amitava Mukherjee, Debashis Saha:
TCP throughput enhancement in wired-cum-wireless network. Comput. Commun. 31(17): 4162-4166 (2008) - [j27]Madhubanti Maitra, Debashis Saha, Partha Sarathi Bhattacharjee, Amitava Mukherjee:
An Intelligent Paging Strategy Using Rule-Based AI Technique for Locating Mobile Terminals in Cellular Wireless Networks. IEEE Trans. Veh. Technol. 57(3): 1834-1845 (2008) - 2007
- [j26]Debashis Saha, Partha Sarathi Bhattacharjee, Amitava Mukherjee:
Time efficient heuristics for cell-to-switch assignment in quasi-static/dynamic location area planning of mobile cellular networks. Comput. Commun. 30(2): 326-340 (2007) - [j25]Mohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee:
TLMM: MIP-based Three Level Mobility Model. Comput. Commun. 30(6): 1244-1257 (2007) - 2006
- [c31]Iti Saha Misra, Mohuya Chakraborty, Debashis Saha, Amitava Mukherjee:
An Approach for Optimal Hierarchical Mobility, Management Network Architecture. VTC Spring 2006: 481-485 - 2005
- [c25]Madhubanti Maitra, Debashis Saha, C. Esakkiappan, Partha Sarathi Bhattacharjee, Amitava Mukherjee:
An intelligent location management strategy for next generation wireless networks: a rule base approach. WCNC 2005: 1365-1370 - 2004
- [j20]Debashis Saha, Amitava Mukherjee, Iti Saha Misra, Mohuya Chakraborty:
Mobility support in IP: a survey of related protocols. IEEE Netw. 18(6): 34-40 (2004) - [j19]Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee:
An approach for location area planning in a personal communication services network (PCSN). IEEE Trans. Wirel. Commun. 3(4): 1176-1187 (2004) - [c21]Mohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee:
QoS Support in TLMM: Three Level Mobility Model for IP-Based Networks. IWDC 2004: 192-197 - 2003
- [j18]Debashis Saha, Amitava Mukherjee:
Pervasive Computing: A Paradigm for the 21st Century. Computer 36(3): 25-31 (2003) - [j17]Sajal K. Das, Amitava Mukherjee, Somprakash Bandyopadhyay, Debashis Saha, Krishna Paul:
An adaptive framework for QoS routing through multiple paths in ad hoc wireless networks. J. Parallel Distributed Comput. 63(2): 141-153 (2003) - [c17]Iti Saha Misra, Mohuya Chakraborty, Debashis Saha, Amitava Mukherjee, Billawdeep Deb, Bitihotra Chatterjee:
Global Mobility Management: A Three Level Architecture for Next Generation Wireless Networks. IWDC 2003: 184-193 - 2002
- [c15]Madhubanti Maitra, Ranjan Kumar Pradhan, Debashis Saha, Amitava Mukherjee:
Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique. EurAsia-ICT 2002: 755-765 - [c14]Iti Saha Misra, S. Karmakar, M. S. Mahapatra, Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee:
Intelligent Paging Strategy in 3G Personal Communication Systems. EurAsia-ICT 2002: 899-906 - [c13]Sahadeb Jana, Debashis Saha, Amitava Mukherjee, Pranay Chaudhuri:
A Fast Technique for Assigning Wavelengths in WDM All-Optical Networks (AONs). IWDC 2002: 290-299 - [c12]Loknath Ghosh, Amitava Mukherjee, Debashis Saha:
Design of 1-FT Communication Network under Budget Constraint. IWDC 2002: 300-311 - 2001
- [j15]Krishna Paul, Somprakash Bandyopadhyay, Amitava Mukherjee, Debashis Saha:
A stability-based distributed routing mechanism to support unicast and multicast routing in ad hoc wireless network. Comput. Commun. 24(18): 1828-1845 (2001) - 2000
- [j14]Amitava Mukherjee, Debashis Saha, Sajal K. Das, Somprakash Bandyopadhyay:
Recent advances in mobile communication networks. Comput. Commun. 23(5-6): 439-440 (2000) - [j13]Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee:
Intelligent Paging Strategies for Third Generation Personal Communication Services Networks. J. Interconnect. Networks 1(3): 153-171 (2000) - [j10]Debashis Saha, Amitava Mukherjee, Partha Sarathi Bhattacharya:
A Simple Heuristic for Assignment of Cells to Switches in a PCS Network. Wirel. Pers. Commun. 12(3): 209-223 (2000) - [c11]Sajal K. Das, Amitava Mukherjee, Somprakash Bandyopadhyay, Krishna Paul, Debashis Saha:
Improving quality-of-service in ad hoc wireless networks with adaptive multi-path routing. GLOBECOM 2000: 261-265 - 1999
- [c8]Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee:
Paging Strategies for Future Personal Communication Services Network. HiPC 1999: 322-328 - [c6]Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee:
Intelligent Paging Strategies for Personal Communication Services Network. MobiDE 1999: 36-43 - [c5]Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee, Madhubanti Maitra:
Location area planning for personal communication services networks. MSWiM 1999: 95-98 - 1997
- [j7]Debashis Saha, Amitava Mukherjee:
On the multidensity gateway location problem for a multilevel high speed internetwork. Comput. Commun. 20(7): 576-585 (1997) - 1996
- [j5]Debashis Saha, Amitava Mukherjee:
Managing the Topological Expansion of Computer Networks in an Optimal Way. Int. J. Netw. Manag. 6(4): 206-211 (1996) - 1995
- [j4]Debashis Saha, Amitava Mukherjee:
Computational analysis of an optimal routing strategy in a hierarchical computer communication network. Comput. Commun. 18(7): 507-511 (1995) - 1994
- [j3]Debashis Saha, Amitava Mukherjee, Sourav K. Dutta:
Capacity assignment in computer communication networks with unreliable links. Comput. Commun. 17(12): 871-875 (1994) - [j2]Debashis Saha, Amitava Mukherjee:
An Optimal File Allocation Policy in a Networked Database Management System. Int. J. Netw. Manag. 4(4): 218-223 (1994)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-08 00:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint