default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 173 matches
- 2025
- Biswajit Paul, Gopal Chandra Sikdar, Uttam Ghosh:
Effect of fear and non-linear predator harvesting on a predator-prey system in presence of environmental variability. Math. Comput. Simul. 227: 442-460 (2025) - 2024
- Dun Cao, Meihua Wu, Ning Gu, R. Simon Sherratt, Uttam Ghosh, Pradip Kumar Sharma:
Joint Optimization of Computation Offloading and Resource Allocation Considering Task Prioritization in ISAC-Assisted Vehicular Network. IEEE Internet Things J. 11(18): 29523-29532 (2024) - Sourav Chowdhury, Jayanta Kumar Ghosh, Uttam Ghosh:
Co-infection dynamics between HIV-HTLV-I disease with the effects of Cytotoxic T-lymphocytes, saturated incidence rate and study of optimal control. Math. Comput. Simul. 223: 195-218 (2024) - Soumik Pandey, Uttam Ghosh, Debashis Das, Sarbani Chakraborty, Abhijit Sarkar:
Rich dynamics of a delay-induced stage-structure prey-predator model with cooperative behaviour in both species and the impact of prey refuge. Math. Comput. Simul. 216: 49-76 (2024) - Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. Secur. Priv. 7(1) (2024) - Rituparna Pakhira, Bapin Mondal, Uttam Ghosh, Susmita Sarkar:
An EOQ model with fractional order rate of change of inventory level and time-varying holding cost. Soft Comput. 28(5): 3859-3877 (2024) - Dazhou Li, Xingchi Chen, Qing Li, Fa Zhu, Xiaoyang Lu, Sidheswar Routray, Uttam Ghosh, Mohammed S. Al-Numay:
Intelligent Biomedical Photoplethysmography Signal Cycle Division With Digital Twin in Metaverse for Consumer Health. IEEE Trans. Consumer Electron. 70(1): 2116-2128 (2024) - Manash Kumar Mondal, Sourav Banerjee, Debashis Das, Uttam Ghosh, Mohammed S. Al-Numay, Utpal Biswas:
Toward Energy-Efficient and Cost-Effective Task Offloading in Mobile Edge Computing for Intelligent Surveillance Systems. IEEE Trans. Consumer Electron. 70(1): 4087-4094 (2024) - Pavan D. Paikrao, Amrit Mukherjee, Uttam Ghosh, Pratik Goswami, Milan Novak, Deepak Kumar Jain, Mohammed S. Al-Numay, Pradeep Narwade:
Data Driven Neural Speech Enhancement for Smart Healthcare in Consumer Electronics Applications. IEEE Trans. Consumer Electron. 70(2): 4828-4838 (2024) - Sidheswar Routray, Uttam Ghosh, Xingwang Li, Khaled M. Rabie:
Editorial AI Driven Internet of Medical Things for Smart Healthcare Applications: Challenges and Future Trends. IEEE J. Biomed. Health Informatics 28(6): 3279-3281 (2024) - Sourav Banerjee, Debashis Das, Pushpita Chatterjee, Benjamin A. Blakely, Uttam Ghosh:
A Blockchain-Enabled Sustainable Safety Management Framework for Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 25(6): 5271-5281 (2024) - Nirmal Kr. Biswas, Sourav Banerjee, Uttam Ghosh:
Design and Development of a Novel Bio-Inspired VM Placement in Green Cloud Computing Environment. CCGridW 2024: 144-149 - Uttam Ghosh, Debashis Das, Sourav Banerjee, Saraju P. Mohanty:
Blockchain-Based Device Identity Management and Authentication in Cyber-Physical Systems. CCNC 2024: 1-6 - Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:
A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. CCNC 2024: 982-985 - Debashis Das, Uttam Ghosh, Nate Evans, Sachin Shetty:
Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking. ICC Workshops 2024: 1450-1455 - Uttam Ghosh, Laurent Njilla, Debashis Das, Eugene Levin:
FLAS: A Federated Learning Framework for Adaptive Security in Edge-Driven UAV Networks. ICC 2024: 1298-1303 - Debashis Das, Laurent Njilla, Uttam Ghosh, Sachin Shetty, Eugene Levin:
An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks. INFOCOM (Workshops) 2024: 1-6 - 2023
- Anand Motwani, Piyush Kumar Shukla, Mahesh Kumar Pawar, Manoj Kumar, Uttam Ghosh, Waleed S. Alnumay, Soumya Ranjan Nayak:
Enhanced framework for COVID-19 prediction with computed tomography scan images using dense convolutional neural network and novel loss function. Comput. Electr. Eng. 105: 108479 (2023) - Sricheta Parui, Debasis Samanta, Nishant Chakravorty, Uttam Ghosh, Joel J. P. C. Rodrigues:
Artificial intelligence and sensor-based autism spectrum disorder diagnosis using brain connectivity analysis. Comput. Electr. Eng. 108: 108720 (2023) - Uttam Ghosh, Hellen Maziku, Hari Prabhat Gupta, Biplab Sikdar, Joel J. P. C. Rodrigues:
Security, Trust and Privacy Solutions for Intelligent Internet of Vehicular Things - Part II. IEEE Consumer Electron. Mag. 12(1): 68-69 (2023) - Riman Mandal, Manash Kumar Mondal, Sourav Banerjee, Gautam Srivastava, Waleed S. Alnumay, Uttam Ghosh, Utpal Biswas:
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing. Clust. Comput. 26(1): 651-665 (2023) - Lianthuamluaia Lianthuamluaia, Suman Kumari, Uttam Kumar Sarkar, Simanku Borah, Mishal Puthiyottil, Gunjan Karnatak, Basanta Kumar Das, Bandana Das Ghosh, Arijit Das, Sanjeet Debnath, Aneek Ray, Canciyal Johnson:
Improving approaches and modeling framework for assessing vulnerability of Asian leaf fish in the major river basin floodplains of India in changing climate. Ecol. Informatics 73: 101926 (2023) - Deepak Kumar Sharma, Vidhi Jain, Bhavya Dhingra, Koyel Datta Gupta, Uttam Ghosh, Waleed S. Alnumay:
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - Nirmal Kr. Biswas, Sourav Banerjee, Uttam Ghosh, Utpal Biswas:
Design of an energy efficient dynamic virtual machine consolidation model for smart cities in urban areas. Intell. Data Anal. 27(5): 1409-1431 (2023) - Deborsi Basu, Soumyadeep Kal, Uttam Ghosh, Raja Datta:
DRIVE: Dynamic Resource Introspection and VNF Embedding for 5G Using Machine Learning. IEEE Internet Things J. 10(21): 18971-18979 (2023) - Debashis Das, Sourav Banerjee, Pushpita Chatterjee, Uttam Ghosh, Utpal Biswas:
Blockchain for Intelligent Transportation Systems: Applications, Challenges, and Opportunities. IEEE Internet Things J. 10(21): 18961-18970 (2023) - Youcef Djenouri, Asma Belhadi, Gautam Srivastava, Uttam Ghosh, Pushpita Chatterjee, Jerry Chun-Wei Lin:
Fast and Accurate Deep Learning Framework for Secure Fault Diagnosis in the Industrial Internet of Things. IEEE Internet Things J. 10(4): 2802-2810 (2023) - Moinak Maiti, Uttam Ghosh:
Next-Generation Internet of Things in Fintech Ecosystem. IEEE Internet Things J. 10(3): 2104-2111 (2023) - Aaisha Makkar, Uttam Ghosh, Pradip Kumar Sharma, Amir Javed:
A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. IEEE Internet Things J. 10(3): 2079-2086 (2023) - Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi, Uttam Ghosh, Waleed S. Alnumay:
DeCrypt: a 3DES inspired optimised cryptographic algorithm. J. Ambient Intell. Humaniz. Comput. 14(5): 4745-4755 (2023)
skipping 143 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-14 01:41 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint