default search action
Veena B. Mendiratta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Petra Vizarreta, Kishor S. Trivedi, Veena B. Mendiratta, Wolfgang Kellerer, Carmen Mas Machuca:
DASON: Dependability Assessment Framework for Imperfect Distributed SDN Implementations. IEEE Trans. Netw. Serv. Manag. 17(2): 652-667 (2020) - [c30]Cheolmin Kim, Veena B. Mendiratta, Marina Thottan:
Unsupervised Anomaly Detection and Root Cause Analysis in Mobile Networks. COMSNETS 2020: 176-183 - [c29]Siwar Kriaa, Serge Papillon, Lalita Jagadeesan, Veena B. Mendiratta:
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers. DRCN 2020: 1-6 - [c28]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
When Failure is (Not) an Option: Reliability Models for Microservices Architectures. ISSRE Workshops 2020: 19-24
2010 – 2019
- 2019
- [j7]Marina Thottan, Catello Di Martino, Young-Jin Kim, Gary W. Atkinson, Nakjung Choi, Nishok Mohanasamy, Lalita Jagadeesan, Veena B. Mendiratta, Jesse E. Simsarian, Bartek Kozicki:
The network OS: Carrier-grade SDN control of multi-domain, multi-layer networks. Bell Labs Tech. J. 24: 1-26 (2019) - [c27]Jaehoon Koo, Veena B. Mendiratta, Muntasir Raihan Rahman, Anwar Walid:
Deep Reinforcement Learning for Network Slicing with Heterogeneous Resource Requirements and Time Varying Traffic Dynamics. CNSM 2019: 1-5 - [i1]Jaehoon Koo, Veena B. Mendiratta, Muntasir Raihan Rahman, Anwar Walid:
Deep Reinforcement Learning for Network Slicing with Heterogeneous Resource Requirements and Time Varying Traffic Dynamics. CoRR abs/1908.03242 (2019) - 2018
- [c26]Robert S. Hanmer, Lalita Jagadeesan, Veena B. Mendiratta, Heng Zhang:
Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN. ISSRE Workshops 2018: 59-64 - [c25]Veena B. Mendiratta, Lalita Jategaonkar Jagadeesan, Robert S. Hanmer, Muntasir R. Rahman:
How Reliable Is My Software-Defined Network? Models and Failure Impacts. ISSRE Workshops 2018: 83-88 - 2017
- [c24]Vijay K. Gurbani, Dan Kushnir, Veena B. Mendiratta, Chitra Phadke, Eric Falk, Radu State:
Detecting and predicting outages in mobile networks with log data. ICC 2017: 1-7 - [c23]Veena B. Mendiratta, Marina Thottan:
Rich Network Anomaly Detection Using Multivariate Data. ISSRE Workshops 2017: 48-51 - [c22]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
Analytics-Enhanced Automated Code Verification for Dependability of Software-Defined Networks. ISSRE Workshops 2017: 139-145 - 2016
- [c21]Catello Di Martino, Veena B. Mendiratta, Marina Thottan:
Resiliency Challenges in Accelerating Carrier-Grade Networks with SDN. DSN Workshops 2016: 242-245 - [c20]Antonio Pecchia, Marcello Cinque, Veena B. Mendiratta:
Measuring Resiliency through Field Data: Techniques, Tools and Challenges. DSN Workshops 2016: 265 - [c19]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
Programming the Network: Application Software Faults in Software-Defined Networks. ISSRE Workshops 2016: 125-131 - 2015
- [c18]Poul E. Heegaard, Bjarne E. Helvik, Veena B. Mendiratta:
Achieving dependability in software-defined networking - A perspective. RNDM@WMNC 2015: 63-70 - [p1]Derek Doran, Veena B. Mendiratta:
Propagation Models and Analysis for Mobile Phone Data Analytics. Propagation Phenomena in Real World Networks 2015: 257-292 - 2014
- [c17]Alan Yu Shyang Tan, Ryan Kok Leong Ko, Veena B. Mendiratta:
Virtual Numbers for Virtual Machines? IEEE CLOUD 2014: 972-974 - [c16]David Goergen, Veena B. Mendiratta, Radu State, Thomas Engel:
Analysis of large call data records with big data. IPTComm 2014: 8:1-8:6 - 2013
- [j6]Chitra Phadke, Hüseyin Uzunalioglu, Veena B. Mendiratta, Dan Kushnir, Derek Doran:
Prediction of Subscriber Churn Using Social Network Analysis. Bell Labs Tech. J. 17(4): 63-75 (2013) - [c15]Lance Fiondella, Swapna S. Gokhale, Veena B. Mendiratta:
Cloud Incident Data: An Empirical Analysis. IC2E 2013: 241-249 - [c14]David Goergen, Veena B. Mendiratta, Radu State, Thomas Engel:
Identifying abnormal patterns in cellular communication flows. IPTComm 2013: 5 - 2012
- [c13]Derek Doran, Veena B. Mendiratta, Chitra Phadke, Hüseyin Uzunalioglu:
The Importance of Outlier Relationships in Mobile Call Graphs. ICMLA (2) 2012: 24-29 - 2011
- [j5]Ram Gollakota, Abdol Saleh, Anne Y. Lee, Veena B. Mendiratta, Daisy Su, Guy J. Zenner:
Revenue models for application enablement: The project neuron case study. Bell Labs Tech. J. 16(2): 263-269 (2011) - [j4]Michael Liem, Veena B. Mendiratta:
Mission critical communication networks for railways. Bell Labs Tech. J. 16(3): 29-46 (2011) - 2010
- [c12]Robert S. Hanmer, Veena B. Mendiratta:
Rejuvenation with workload migration. DSN Workshops 2010: 80-85
2000 – 2009
- 2008
- [j3]Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:
Computer systems availability evaluation using a segregated failures model. Qual. Reliab. Eng. Int. 24(4): 447-465 (2008) - [c11]Michael G. Hinchey, Karama Kanoun, Mikael Lindvall, Michael R. Lyu, Tiziana Margaria, Veena B. Mendiratta, Paul Pettersson, Norman F. Schneidewind, W. Eric Wong:
Anything You Want to Ask about Software Reliability Engineering. ISSRE 2008: 6 - [c10]Robert S. Hanmer, Veena B. Mendiratta:
Architecting for Reliability - Recovery Mechanisms. ISSRE 2008: 287-288 - [c9]Swapna S. Gokhale, Veena B. Mendiratta:
Architecture-Based Assessment of Software Reliability. QSIC 2008: 444 - 2007
- [j2]Robert S. Hanmer, Donald T. McBride, Veena B. Mendiratta:
Comparing reliability and security: Concepts, requirements, and techniques. Bell Labs Tech. J. 12(3): 65-78 (2007) - 2006
- [c8]Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:
Segregated failures model for availability evaluation of fault-tolerant systems. ACSC 2006: 55-61 - 2005
- [c7]Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:
Availability Evaluation of Hardware/Software Systems with Several Recovery Procedures. COMPSAC (1) 2005: 473-478 - [c6]Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mendiratta:
Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability. ISAS 2005: 196-211 - 2004
- [j1]Mark C. Baker, Charles A. Witschorik, Jonathan C. Tuch, Waverly Hagey-Espie, Veena B. Mendiratta:
Architectures and disaster recovery strategies for survivable telecommunications services. Bell Labs Tech. J. 9(2): 125-145 (2004) - [c5]Yun Liu, Veena B. Mendiratta, Kishor S. Trivedi:
Survivability Analysis of Telephone Access Network. ISSRE 2004: 367-378 - 2003
- [c4]Veena B. Mendiratta, Charles A. Witschorik:
Telephone service survivability. DRCN 2003: 413-420
1990 – 1999
- 1998
- [c3]Veena B. Mendiratta:
Reliability analysis of clustered computing systems. ISSRE 1998: 268-272 - 1996
- [c2]Veena B. Mendiratta:
Assessing the reliability impacts of software fault-tolerance mechanisms. ISSRE 1996: 99-103
1980 – 1989
- 1987
- [c1]Veena B. Mendiratta:
Simulation of the scheduling algorithm in the Bell Labs network. Simulation of Computer Networks 1987: 73-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint