default search action
Ratan K. Guha
Person information
- affiliation: University of Central Florida, Orlando, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c60]Sharif Hassan, Ratan Guha:
A Probabilistic Study on the Relationship of Deceptions and Attacker Skills. DASC/PiCom/DataCom/CyberSciTech 2017: 693-698 - 2015
- [j26]Charles Asanya, Ratan Guha:
Direct private query in location-based services with GPU run time analysis. J. Supercomput. 71(2): 537-573 (2015) - [c59]Charles Asanya, Ratan Guha:
Space partitioning for privacy in location-based services continuous nearest neighbor query. ISIE 2015: 1408-1413 - [c58]Hector M. Lugo-Cordero, Ratan K. Guha:
A secured distribution of server loads to clients. MILCOM 2015: 372-377 - 2014
- [j25]Hector M. Lugo-Cordero, Ratan K. Guha, Eduardo I. Ortiz-Rivera:
An Adaptive Cognition System for Smart Grids With Context Awareness and Fault Tolerance. IEEE Trans. Smart Grid 5(3): 1246-1253 (2014) - 2013
- [c57]Hector M. Lugo-Cordero, Ratan K. Guha:
What defines an intruder? An intelligent approach. CICS 2013: 31-36 - 2012
- [j24]Jonathan Cazalas, Ratan K. Guha:
Performance Modeling of Spatio-Temporal Algorithms Over GEDS Framework. Int. J. Grid High Perform. Comput. 4(3): 63-84 (2012) - [j23]Jonathan Cazalas, Ratan K. Guha:
Leveraging computation sharing and parallel processing in location-dependent query processing. J. Supercomput. 61(1): 215-234 (2012) - [j22]Mohammad Zubair Ahmad, Ratan Guha:
Analysis of large scale traceroute datasets in Internet routing overlays by parallel computation. J. Supercomput. 62(3): 1425-1450 (2012) - [c56]Sharif Hassan, Ratan Guha:
Security and Integrity Analysis Using Indicators. CyberSecurity 2012: 127-135 - [c55]Mohammad Zubair Ahmad, Ratan Guha:
Evaluating End-User Network Benefits of Peering with Path Latencies. ICCCN 2012: 1-7 - [c54]Mohammad Zubair Ahmad, Ratan Guha:
A tale of nine Internet exchange points: Studying path latencies through major regional IXPs. LCN 2012: 618-625 - [c53]Mohammad Zubair Ahmad, Ratan Guha:
Analysing global triangle inequality violations due to Internet eXchange Points for future overlay networks. LCN Workshops 2012: 1078-1085 - 2011
- [j21]Shafaq Chaudhry, Victor C. Hung, Ratan K. Guha, Kenneth O. Stanley:
Pareto-based evolutionary computational approach for wireless sensor placement. Eng. Appl. Artif. Intell. 24(3): 409-425 (2011) - [j20]Jonathan Cazalas, Ratan K. Guha:
GEDS: GPU execution of spatio-temporal queries over spatio-temporal data streams. J. Embed. Comput. 4(3-4): 117-130 (2011) - [c52]Hector M. Lugo-Cordero, Abigail Fuentes-Rivera, Ratan K. Guha, Kejie Lu, Domingo Rodríguez:
Multimodal species identification in wireless sensor networks. CAMSAP 2011: 385-388 - [c51]Hector M. Lugo-Cordero, Abigail Fuentes-Rivera, Ratan K. Guha, Eduardo I. Ortiz-Rivera:
Particle Swarm Optimization for load balancing in green smart homes. IEEE Congress on Evolutionary Computation 2011: 715-720 - [c50]Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu:
A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks. GLOBECOM 2011: 1-5 - [c49]Mohammad Zubair Ahmad, Ratan Guha:
Internet exchange points and Internet routing. ICNP 2011: 292-294 - [c48]Hector M. Lugo-Cordero, Ratan K. Guha, Kejie Lu, Domingo Rodríguez:
Secure service distribution for VErsatile Service-Oriented Wireless Mesh Networks. MALWARE 2011: 88-94 - [c47]Hector M. Lugo-Cordero, Ratan K. Guha:
Evolution of optimal heterogeneous wireless mesh networks. MILCOM 2011: 1422-1427 - [c46]Mostafa A. Bassiouni, Ratan Guha:
Enhancing network security education with research and development content. SIGITE Conference 2011: 293-298 - [c45]Jaruwan Mesit, Ratan K. Guha:
A general model for soft body simulation in motion. WSC 2011: 2690-2702 - 2010
- [c44]Mohammad Zubair Ahmad, Ratan Guha:
Understanding the impact of internet exchange points on internet topology and routing performance. StudentWorkshop@CoNEXT 2010: 18:1-18:2 - [c43]Jaruwan Mesit, Ratan K. Guha, William P. Furlong:
Simulation of Lung Respiration Function Using Soft Body Model. EMS 2010: 102-107 - [c42]William P. Furlong, Ratan Guha:
OFDMA Extension of NS-3 WiMAX Module. EMS 2010: 426-431 - [c41]Jonathan Cazalas, Ratan K. Guha:
GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams. EUC 2010: 112-119 - [c40]Mohammad Zubair Ahmad, Ratan Guha:
Impact of Internet exchange points on Internet topology evolution. LCN 2010: 332-335 - [c39]Mohammad Zubair Ahmad, Ratan Guha:
Studying the effect of internet eXchange points on internet link delays. SpringSim 2010: 103 - [c38]Jaruwan Mesit, Ratan K. Guha:
Experimenting with real time simulation parameters for fluid model of soft bodies. SpringSim 2010: 158
2000 – 2009
- 2009
- [j19]Luca Spalazzi, Ratan Guha:
Editorial. J. Comput. 4(5): 355-356 (2009) - [j18]Jianyong Dai, Ratan K. Guha, Joohan Lee:
Efficient Virus Detection Using Dynamic Instruction Sequences. J. Comput. 4(5): 405-414 (2009) - [j17]Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanley:
Automatic Content Generation in the Galactic Arms Race Video Game. IEEE Trans. Comput. Intell. AI Games 1(4): 245-263 (2009) - [j16]Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanley:
Interactive Evolution of Particle Systems for Computer Graphics and Animation. IEEE Trans. Evol. Comput. 13(2): 418-432 (2009) - [c37]Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanley:
Demonstrating Automatic Content Generation in the Galactic Arms Race Video Game. AIIDE 2009 - [c36]Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanley:
Evolving content in the Galactic Arms Race video game. CIG 2009: 241-248 - [c35]Jianyong Dai, Ratan K. Guha, Joohan Lee:
Feature set selection in data mining techniques for unknown virus detection: a comparison study. CSIIRW 2009: 56 - [c34]Noah Guilbault, Ratan Guha:
Experiment setup for temporal distributed intrusion detection system on Amazon's elastic compute cloud. ISI 2009: 300-302 - [c33]Jaruwan Mesit, Ratan K. Guha, Matthias R. Brust:
Simulation of 3D-deformable Objects Using Stable and Accurate Euler Method. UKSim 2009: 425-430 - 2008
- [j15]Hua Zhang, Joohan Lee, Ratan K. Guha:
VCluster: a thread-based Java middleware for SMP and heterogeneous clusters with thread migration support. Softw. Pract. Exp. 38(10): 1049-1071 (2008) - [c32]Jaruwan Mesit, Ratan K. Guha:
Soft Body Simulation with Leaking Effect. Asia International Conference on Modelling and Simulation 2008: 390-395 - [c31]Jianyong Dai, Ratan Guha, Joohan Lee:
Dynamic instruction sequences monitor for virus detection. CSIIRW 2008: 18:1-18:3 - 2007
- [j14]Jaruwan Mesit, Ratan K. Guha, Shafaq Chaudhry:
3D Soft Body Simulation Using Mass-spring System with Internal Pressure Force and Simplified Implicit Integration. J. Comput. 2(8): 34-43 (2007) - [j13]Darshan Purandare, Ratan K. Guha:
An Alliance Based Peering Scheme for P2P Live Media Streaming. IEEE Trans. Multim. 9(8): 1633-1644 (2007) - [c30]Abhishek Karnik, Suchandra Goswami, Ratan K. Guha:
Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Asia International Conference on Modelling and Simulation 2007: 165-170 - [c29]Jaruwan Mesit, Ratan K. Guha:
Simulation of Soft Bodies with Pressure Force and the Implicit Method. Asia International Conference on Modelling and Simulation 2007: 302-307 - [c28]Erin J. Hastings, Ratan K. Guha, Kenneth O. Stanley:
NEAT Particles: Design, Representation, and Animation of Particle System Effects. CIG 2007: 154-160 - [c27]Erin J. Hastings, Jaruwan Mesit, Ratan K. Guha:
A Scalable Technique for Large Scale, Real-Time Range Monitoring of Heterogeneous Clients. TRIDENTCOM 2007: 1-6 - 2006
- [j12]Ratan K. Guha, Sudipta Rakshit:
Selfish Users and Fair Sharing of Bandwidth in Distributed Medium Access. Int. J. Enterp. Inf. Syst. 2(2): 28-44 (2006) - [j11]Lisa Spencer, Mubarak Shah, Ratan K. Guha:
Determining scale and sea state from water video. IEEE Trans. Image Process. 15(6): 1525-1535 (2006) - [c26]Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
Understanding the intruder through attacks on cryptographic protocols. ACM Southeast Regional Conference 2006: 667-672 - [c25]Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
Designing Authentication Protocols: Trends and Issues. ICN/ICONS/MCL 2006: 76 - [c24]Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha:
Formal Verification of 802.11i using Strand Space Formalism. ICN/ICONS/MCL 2006: 140 - [c23]Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5. ICON 2006: 1-6 - [c22]Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
Logic-Based Formal Analysis of Cryptographic Protocols. ICON 2006: 1-6 - [c21]Darshan Purandare, Ratan K. Guha:
Preferential and Strata based P2P Model: Selfishness to Altruism and Fairness. ICPADS (1) 2006: 561-570 - [c20]Darshan Purandare, Ratan K. Guha:
BEAM: An Efficient Peer to Peer Media Streaming Framework. LCN 2006: 513-514 - [c19]Shafaq Chaudhry, Victor C. Hung, Ratan K. Guha:
Optimal Placement of Wireless Sensor Nodes with Fault Tolerance and Minimal Energy Consumption. MASS 2006: 610-615 - 2005
- [j10]Sudipta Rakshit, Ratan K. Guha:
Fair Bandwidth Sharing in Distributed Systems: A Game-Theoretic Approach. IEEE Trans. Computers 54(11): 1384-1393 (2005) - [c18]Darshan Purandare, Ratan K. Guha, Joohan Lee:
An IV Collision Avoidance Algorithm - Strengthening the WEP. ICWN 2005: 73-78 - [c17]Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha:
Wireless sensor network security: a secure sink node architecture. IPCCC 2005: 371-376 - [c16]Chun Huang, Mainak Chatterjee, Wei Cui, Ratan K. Guha:
Multipath Source Routing in Sensor Networks Based on Route Ranking. IWDC 2005: 99-104 - [c15]Joohan Lee, Hua Zhang, Ratan K. Guha:
Virtual Cluster Computing Architecture. PDPTA 2005: 290-293 - [c14]Darshan Purandare, Ratan K. Guha:
Enhancing Message Privacy in WEP. Wireless Information Systems 2005: 23-32 - [c13]Ratan K. Guha, Mainak Chatterjee, Jaideep Sarkar:
A Distributed Security Architecture for ad hoc Networks. Wireless Information Systems 2005: 81-91 - 2004
- [j9]James Zijun Wang, Ratan K. Guha:
Proxy ecology - Cooperative proxies with artificial life. Web Intell. Agent Syst. 2(3): 201-215 (2004) - [c12]Kiran Anna, Abhishek Karnik, Ratan K. Guha, Mainak Chatterjee:
Enhancing QoS in 802.11e with Beacon Management. HSNMC 2004: 598-608 - [c11]Sudipta Rakshit, Ratan K. Guha:
Optimal strategies in MAC protocols. ICC 2004: 1907-1911 - [c10]Zeeshan Furqan, Ratan K. Guha, Shahabuddin Muhammad:
A Heuristic State Space Search Model for Security Protocol Verification. ICETE (2) 2004: 113-118 - 2003
- [c9]Oleg Kachirski, Ratan K. Guha:
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. HICSS 2003: 57 - [c8]James Zijun Wang, Ratan K. Guha:
Proxy Ecology - Cooperative Proxies with Artificial Life. IAT 2003: 168-174 - 2002
- [j8]Ratan K. Guha, Mostafa A. Bassiouni:
Simulation Methods and Applications. Simul. Pract. Theory 9(3-5): 91-93 (2002) - [j7]James Zijun Wang, Ratan K. Guha:
A novel data caching scheme for multimedia servers. Simul. Pract. Theory 9(3-5): 193-213 (2002) - [c7]Mostafa A. Bassiouni, Ratan K. Guha:
Modeling and Analysis of Temporal Failure and Degradation Behavior of Critical Infrastructure Systems. HICSS 2002: 50 - [c6]Ratan K. Guha, James Zijun Wang:
Improving Web Access Efficiency Using P2P Proxies. IWDC 2002: 24-34 - 2001
- [c5]Sudipta Rakshit, Ratan K. Guha:
Managing QoS for wireless cells supporting critical load. GLOBECOM 2001: 1928-1932 - 2000
- [c4]James Zijun Wang, Ratan K. Guha:
Data allocation algorithms for distributed video servers. ACM Multimedia 2000: 456-458
1990 – 1999
- 1991
- [c3]Ratan K. Guha, Mostafa A. Bassiouni, Arthur F. Dickinson, D. Roy, M. C. Fisher:
Stochistic Petri Net Models of Distributed Simulation Systems. DMIS 1991: 109-130 - 1990
- [j6]Dilip Sarkar, Ratan K. Guha:
Mapping a class of algorithms from binary tree machines to linear arrays. Comput. Syst. Sci. Eng. 5(4): 202-204 (1990) - [c2]Arthur F. Dickinson, Ratan K. Guha:
Space Efficient List Merging on a Multiprocessor Ring. PARBASE / Architectures 1990: 108-123
1980 – 1989
- 1988
- [j5]Ratan K. Guha, Arthur F. Dickinson, Allan Kikawa:
Analysis of CMH deadlock-detection algorithm using transmission delays. Comput. Syst. Sci. Eng. 3(4): 181-188 (1988)
1970 – 1979
- 1977
- [c1]Ratan K. Guha:
Dynamic microprogramming in a time sharing environment. MICRO 1977: 55-60 - 1975
- [j4]T. G. McDonald, Ratan K. Guha:
The Two's Complement Quasi-Serial Multiplier. IEEE Trans. Computers 24(12): 1233-1235 (1975) - 1974
- [j3]Ratan K. Guha, Raymond T. Yeh:
Erratum: "Periodic Representation of Equal Matrix Grammars". Inf. Control. 24(4): 399 (1974) - [j2]Ratan K. Guha, Raymond T. Yeh:
On Periodicity of Sequential Machines. J. Comput. Syst. Sci. 8(1): 41-70 (1974) - 1973
- [j1]Ratan K. Guha, Raymond T. Yeh:
Periodic Representation of Equal Matrix Grammars. Inf. Control. 22(5): 435-446 (1973)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint