Aniket Mahanti
Aniket Mahanti
Подтвержден адрес электронной почты в домене auckland.ac.nz
A comparative analysis of web and peer-to-peer traffic
N Basher, A Mahanti, A Mahanti, C Williamson, M Arlitt
Proceedings of the 17th international conference on World Wide Web, 287-296, 2008
Challenges in enterprise adoption of agile methods-A survey
A Mahanti
Journal of Computing and Information technology 14 (3), 197-206, 2006
A tale of the tails: Power-laws in internet measurements
A Mahanti, N Carlsson, A Mahanti, M Arlitt, C Williamson
IEEE Network 27 (1), 59-64, 2013
FOG-Engine: Towards big data analytics in the fog
F Mehdipour, B Javadi, A Mahanti
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
Process automation in an IoT–fog–cloud ecosystem: A survey and taxonomy
H Chegini, RK Naha, A Mahanti, P Thulasiraman
IoT 2 (1), 92-118, 2021
Detecting anomalous energy consumption using contextual analysis of smart meter data
A Sial, A Singh, A Mahanti
Wireless Networks 27 (6), 4275-4292, 2021
Remote analysis of a distributed WLAN using passive wireless-side measurement
A Mahanti, C Williamson, M Arlitt
Performance Evaluation 64 (9-12), 909-932, 2007
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti
Computer Communications 162, 212-224, 2020
Characterizing the file hosting ecosystem: A view from the edge
A Mahanti, C Williamson, N Carlsson, M Arlitt, A Mahanti
Performance Evaluation 68 (11), 1085-1102, 2011
Ambient interference effects in Wi-Fi networks
A Mahanti, N Carlsson, C Williamson, M Arlitt
International Conference on Research in Networking, 160-173, 2010
Fog computing realization for big data analytics
F Mehdipour, B Javadi, A Mahanti, G Ramirez-Prado, EC Principles
Fog and edge computing: Principles and paradigms 1, 259-290, 2019
Comparative performance analysis of high-speed transfer protocols for big data
S Yu, N Brownlee, A Mahanti
38th Annual IEEE Conference on Local Computer Networks, 292-295, 2013
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control
AAN Patwary, RK Naha, S Garg, SK Battula, MAK Patwary, E Aghasian, ...
Electronics 10 (10), 1171, 2021
Heuristics-Based detection of abnormal energy consumption
A Sial, A Singh, A Mahanti, M Gong
International Conference on Smart Grid Inspired Future Technologies, 21-31, 2018
Deep neural learning techniques with long short-term memory for gesture recognition
DK Jain, A Mahanti, P Shamsolmoali, R Manikandan
Neural Computing and Applications 32 (20), 16073-16089, 2020
A framework of automation on context-aware internet of things (IoT) systems
H Chegini, A Mahanti
Proceedings of the 12th ieee/acm international conference on utility and …, 2019
Network steganography and steganalysis-a concise review
JO Seo, S Manoharan, A Mahanti
2016 2nd International Conference on Applied and Theoretical Computing and …, 2016
Blockchain technology and its applications across multiple domains: a survey
W Baiod, J Light, A Mahanti
Journal of International Technology and Information Management 29 (4), 78-119, 2021
Workload characterization of a large systems conference web server
A Mahanti, C Williamson, L Wu
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
Internet traffic identification using machine learning techniques
J Eerman, A Mahanti, M Arlitt
Proc. of the 49th IEEE Global Telecomm. Conf.(GLOBECOM), 1-6, 2006
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20