Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    IP Mobility Protocols for Wireless Internet

    Research in mobile communications has gained a lot of importance since the rapid growth of wireless networks and portable devices. The proliferation of Internet in every aspect of life has urged the service pr...

    Sajal K. Das, Nilanjan Banerjee, Wu Wei, Smitha Ganeshan in Mobile and Wireless Internet (2003)

  2. No Access

    Chapter and Conference Paper

    Multicriteria Network Design Using Evolutionary Algorithm

    In this paper, we revisit a general class of multi-criteria multi-constrained network design problems and attempt to solve, in a novel way, with Evolutionary Algorithms (EAs). A major challenge to solving such...

    Rajeev Kumar, Nilanjan Banerjee in Genetic and Evolutionary Computation — GECCO 2003 (2003)

  3. No Access

    Chapter and Conference Paper

    Expected Running Time Analysis of a Multiobjective Evolutionary Algorithm on Pseudo-boolean Functions

    In this paper we suggest a multiobjective evolutionary algorithm based on a restricted mating pool (REMO) with a separate archive for storing the remaining population. Such archive based algorithms have been u...

    Nilanjan Banerjee, Rajeev Kumar in Neural Information Processing (2004)

  4. No Access

    Chapter and Conference Paper

    Running Time Analysis of a Multiobjective Evolutionary Algorithm on Simple and Hard Problems

    In this paper, we suggest a multiobjective evolutionary algorithm based on a restricted mating pool (REMO) with a separate archive for storing the remaining population. Such archive based algorithms have been ...

    Rajeev Kumar, Nilanjan Banerjee in Foundations of Genetic Algorithms (2005)

  5. No Access

    Article

    Multihop Virtual Topology Design in WDM Optical Networks for Self-Similar Traffic

    In this paper, we consider the problem of designing virtual topologies for multihop optical WDM networks when the traffic is self-similar in nature. Studies over the last few years suggest that the network tra...

    Sujoy Ghose, Rajeev Kumar, Nilanjan Banerjee, Raja Datta in Photonic Network Communications (2005)

  6. No Access

    Chapter and Conference Paper

    Users and Batteries: Interactions and Adaptive Energy Management in Mobile Systems

    Battery lifetime has become one of the top usability concerns of mobile systems. While many endeavors have been devoted to improving battery lifetime, they have fallen short in understanding how users interact...

    Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner in UbiComp 2007: Ubiquitous Computing (2007)

  7. No Access

    Article

    Enabling SIP-based sessions in ad hoc networks

    The deployment of infrastructure-less ad hoc networks is suffering from the lack of applications in spite of active research over a decade. This problem can be solved to a certain extent by porting successful ...

    Nilanjan Banerjee, Arup Acharya, Sajal K. Das in Wireless Networks (2007)

  8. No Access

    Article

    Tracking transaction footprints for non-intrusive end-to-end monitoring

    Existing transaction monitoring solutions are either platform-specific or rely on instrumentation techniques, which limit their applicability. Consequently, transaction monitoring in enterprise environments of...

    Bikram Sengupta, Nilanjan Banerjee, Chatschik Bisdikian, Paul Hurley in Cluster Computing (2009)

  9. No Access

    Chapter and Conference Paper

    Virtual Compass: Relative Positioning to Sense Mobile Social Interactions

    There are endless possibilities for the next generation of mobile social applications that automatically determine your social context. A key element of such applications is ubiquitous and precise sensing of t...

    Nilanjan Banerjee, Sharad Agarwal, Paramvir Bahl, Ranveer Chandra in Pervasive Computing (2010)

  10. No Access

    Article

    Service Control Layer (SCL): Enabling Rule-based Control and Enrichment in Next-Generation Telecom Service Delivery

    Telecom operators have started to make significant investments towards evolving their Service Delivery Platforms (SDPs) to a next-generation architecture, based on IP technologies and standards such as Session...

    Nilanjan Banerjee, Seema Nagar in Journal of Network and Systems Management (2013)

  11. No Access

    Article

    Finite Element Method-Based Machining Simulation for Analyzing Surface Roughness During Turning Operation with HSS and Carbide Insert Tool

    In this paper, FEM is used to investigate turning process on AISI 1020 steel by considering the effect of cutting speed, depth of cut, and feed on the surface roughness. Two different tools are used for turnin...

    M. R. Stalin John, Karuna Shrivastava in Arabian Journal for Science and Engineering (2013)

  12. No Access

    Chapter

    Multi-modal Sensing for Distracted Driving Mitigation Using Cameras and Crowdsourcing

    Driving-related accidents and human casualties are on the rise in the US and around the globe (Brace et al. in Analysis of the literature: the use of mobile phones while driving, 2007). The US government spend...

    Amol Deshpande, Mahbubur Rahaman, Nilanjan Banerjee in Distributed Embedded Smart Cameras (2014)

  13. No Access

    Chapter and Conference Paper

    Detection of Real-Time Intentions from Micro-blogs

    Micro-blog forums, such as Twitter, constitute a powerful medium today that people use to express their thoughts and intentions on a daily, and in many cases, hourly, basis. Extracting ‘Real-Time Intention’ (R...

    Nilanjan Banerjee, Dipanjan Chakraborty in Mobile and Ubiquitous Systems: Computing, … (2014)

  14. No Access

    Chapter and Conference Paper

    How’s My Driving? A Spatio-Semantic Analysis of Driving Behavior with Smartphone Sensors

    Road accident is one of the major reasons for loss of human lives, especially in develo** nations with poor road infrastructure and a driver needs to constantly negotiate with several adverse conditions to e...

    Dipyaman Banerjee, Nilanjan Banerjee in Mobile and Ubiquitous Systems: Computing, … (2014)

  15. No Access

    Chapter and Conference Paper

    A Data Distribution Model for Large-Scale Context Aware Systems

    Very large scale context aware systems are becoming a reality with the emerging paradigms such as machine-to-machine communications, crowdsensing, etc. Scalable data distribution is a critical requirement in s...

    Soumi Chattopadhyay, Ansuman Banerjee in Mobile and Ubiquitous Systems: Computing, … (2014)

  16. No Access

    Article

    Customer on-boarding strategies for cloud computing services with dynamic service-level agreements

    A multi-tenant software as a service (SaaS) provider has to meet the needs of several tenants which adopt its services with diverse business requirements. The tenant needs vary widely with time, and the provid...

    Bipin B. Nandi, Sasthi C. Ghosh in Service Oriented Computing and Applications (2017)

  17. No Access

    Article

    Optimization of roller burnishing process on EN-9 grade alloy steel using response surface methodology

    The roller burnishing tool is used in computer numerical control lathe to superfinish the turning process. The tool and workpiece materials considered are tungsten carbide (69 HRC) and EN-9 Grade Alloy Steel (...

    M. R. Stalin John, Nilanjan Banerjee in Journal of the Brazilian Society of Mechan… (2017)

  18. No Access

    Article

    Cross-Level Detection Framework for Attacks on Cyber-Physical Systems

    Anomaly detection is critical in thwarting malicious attacks on Cyber-Physical Systems. This work presents a novel inference engine that integrates two heterogeneous anomaly detectors, working at different lev...

    Brien Croteau, Deepak Krishnankutty in Journal of Hardware and Systems Security (2017)

  19. No Access

    Chapter and Conference Paper

    Influencing Participant Behavior Through a Notification-Based Recommendation System

    Behavioral recommendations for achieving energy savings in the home are extremely common, however how to effectively influence users to adopt such recommendations is not well understood. In this work, we prese...

    Venkata Reddy, Brian Bushree, Marcus Chong, Matthew Law in Persuasive Technology (2018)

  20. No Access

    Chapter and Conference Paper

    Understanding Home Energy Saving Recommendations

    Energy recommender systems attempt to help users attain energy saving goals at home, however previous systems fall short of tailoring these recommendations to users’ devices and behaviors. In this paper we exp...

    Matthew Law, Mayank Thirani, Sami Rollins, Alark Joshi in Persuasive Technology (2018)

previous disabled Page of 2