Huzur Saran

Affiliations:
  • ERNET, India


According to our database1, Huzur Saran authored at least 49 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multi-Agent Packet Routing (MAPR): Co-Operative Packet Routing Algorithm with Multi-Agent Reinforcement Learning.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

FedNSE: Optimal Node Selection for Federated Learning with Non-IID Data.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

2022
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds.
Ad Hoc Networks, 2022

FedFM: Towards a Robust Federated Learning Approach For Fault Mitigation at the Edge Nodes.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Development of MEC system for indigenous 5G Test-Bed.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Layered Architecture and Virtualization for 5G Slicing.
Proceedings of the 4th IEEE 5G World Forum, 2021

2020
New Vision for 5G Backbone Network Architecture.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2018
NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access.
IEEE Trans. Consumer Electron., 2018

CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder.
Int. J. Netw. Secur., 2018

2017
Towards repeatability & verifiability in networking experiments: A stochastic framework.
J. Netw. Comput. Appl., 2017

Optimized MapFile based Storage of Small files in Hadoop.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Security framework for portable NFC mobile based health record system.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

2014
NFC based secure mobile healthcare system.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
UniTIME: Timestamp interpretation engine for developing unified timelines.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

RODMAC: A RObust and Distributed MAC protocol for efficient use of white spaces.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
RODEO: Robust and rapidly deployable TDM mesh with QoS differentiation.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Strap-down Pedestrian Dead-Reckoning system.
Proceedings of the 2011 International Conference on Indoor Positioning and Indoor Navigation, 2011

Design and Implementation of the Workflow of an Academic Cloud.
Proceedings of the Databases in Networked Information Systems - 7th International Workshop, 2011

An Empirical study of clock skew behavior in modern mobile and hand-held devices.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2008
Anti-DDoS Virtualized Operating System.
Proceedings of the The Third International Conference on Availability, 2008

2006
Error Resilient Video Streaming for Heterogeneous Networks.
Proceedings of the High Performance Computing, 2006

Enhanced distributed hash tables for complex queries.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
PISA: Automatic Extraction of Traffic Signatures.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

2004
Fair adaptive bandwidth allocation: a rate control based active queue management discipline.
Comput. Networks, 2004

LOCATOR: location estimation system For wireless LANs.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

2003
Controlling malicious sources at Internet gateways.
Proceedings of IEEE International Conference on Communications, 2003

2002
XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
Enhancing Performance of Asynchronous Data Traffic over the Bluetooth Wireless Ad-hoc Network.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

QoS based scheduling for incorporating variable rate coded voice in Bluetooth.
Proceedings of the IEEE International Conference on Communications, 2001

MAC scheduling policies with reduced power consumption and bounded packet delays for centrally controlled TDD wireless networks.
Proceedings of the IEEE International Conference on Communications, 2001

TCP k-SACK: a simple protocol to improve performance over lossy links.
Proceedings of the Global Telecommunications Conference, 2001

2000
Capacity management and routing policies for voice over IP traffic.
IEEE Netw., 2000

Fair Bandwidth Sharing Among Virtual Networks: A Capacity Resizing Approach.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
Finding Separator Cuts in Planar Graphs within Twice the Optimal.
SIAM J. Comput., 1999

MobiDAT: Mobile Data Access and Transactions.
Proceedings of the High Performance Computing, 1999

1996
Design, implementation, and performance measurement of a native-mode ATM transport layer (extended version).
IEEE/ACM Trans. Netw., 1996

An efficient algorithm for constructing minimal trellises for codes over finite abelian groups.
IEEE Trans. Inf. Theory, 1996

Design, Implementation, and Performance of a Native Mode ATM Transport Layer.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1995
Finding k Cuts within Twice the Optimal.
SIAM J. Comput., 1995

An Empirical Evaluation of Virtual Circuit Holding Time Policies in IP-Over-ATM Networks.
IEEE J. Sel. Areas Commun., 1995

1994
Randomized Parallel Algorithms for Matroid Union and Intersection, With Applications to Arboresences and Edge-Disjoint Spanning Trees.
SIAM J. Comput., 1994

A Scheduling Discipline and Admission Control Policy for Xunet 2.
Multim. Syst., 1994

An Empirical Evaluation of Virtual Circuit Holding Times in IP-Over-ATM Networks.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

A Limited-Backtrack Greedy Schema for Approximation Algorithms.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1994

1993
A Scheduling Discipline and Admission Control Policy for Xunet 2.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1993

1991
Is the Shuffle-Exchange Better Than the Butterfly?
Proceedings of the ISA '91 Algorithms, 1991

1990
Covering Orthogonal Polygons with Star Polygons: The Perfect Graph Approach.
J. Comput. Syst. Sci., 1990

1989
Perfect Graphs and Orthogonally Convex Covers.
SIAM J. Discret. Math., 1989

1988
Constructive Results from Graph Minors: Linkless Embeddings
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988


  Loading...