![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2023
- Riman Mandal, Manash Kumar Mondal, Sourav Banerjee, Gautam Srivastava
, Waleed S. Alnumay, Uttam Ghosh, Utpal Biswas:
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing. Clust. Comput. 26(1): 651-665 (2023) - Abhiman Debnath, Siddhartha Kar
, Uttam Kumar Mandal, Vidyut Dey:
Experimental investigation and multi-response optimisation of end milling in aluminium-5083 alloy using desirability analysis. Int. J. Manuf. Res. 18(3): 284-310 (2023) - Pushparenu Bhattacharjee
, Syed Abou Iltaf Hussain, Vidyut Dey, Uttam Kumar Mandal:
Failure mode and effects analysis for submersible pump component using proportionate risk assessment model: a case study in the power plant of Agartala. Int. J. Syst. Assur. Eng. Manag. 14(5): 1778-1798 (2023) - 2022
- Pushparenu Bhattacharjee, Vidyut Dey, Uttam Kumar Mandal, Susmita Paul:
Quantitative risk assessment of submersible pump components using Interval number-based Multinomial Logistic Regression(MLR) model. Reliab. Eng. Syst. Saf. 226: 108703 (2022) - Pushparenu Bhattacharjee, Vidyut Dey, Uttam Kumar Mandal:
Failure Mode and Effects Analysis (FMEA) using interval number based BWM - MCDM approach: Risk Expected Value (REV) method. Soft Comput. 26(22): 12667-12688 (2022) - 2021
- Amiya Das, Uttam Kumar Mandal:
Integrability, bilinearization, solitons and exact three wave solutions for a forced Korteweg-de Vries equation. Commun. Nonlinear Sci. Numer. Simul. 102: 105936 (2021) - Uttam Kr. Mondal, Shamayita Pal, AmitRanjan Dutta, J. K. Mandal:
A New Approach to Enhance Security of Visual Cryptography Using Steganography (VisUS). CoRR abs/2103.09477 (2021) - 2019
- Binayak Sen
, Mozammel Mia
, Uttam Kumar Mandal
, Bapi Dutta
, Sankar Prasad Mondal
:
Multi-objective optimization for MQL-assisted end milling operation: an intelligent hybrid strategy combining GEP and NTOPSIS. Neural Comput. Appl. 31(12): 8693-8717 (2019) - Syed Abou Iltaf Hussain
, Debasish Baruah, Bapi Dutta
, Uttam Kumar Mandal
, Sankar Prasad Mondal
, Thuleswar Nath:
Evaluating the impact of service quality on the dynamics of customer satisfaction in the telecommunication industry of Jorhat, Assam. Telecommun. Syst. 71(1): 31-53 (2019) - Madhan E. S., Uttam Ghosh
, Deepak K. Tosh
, Mandal K., E. Murali, Soumalya Ghosh:
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications. SECON 2019: 1-6 - 2018
- Abhishek Gupta
, M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore
, Biswanath Mukherjee:
On service-chaining strategies using Virtual Network Functions in operator networks. Comput. Networks 133: 1-16 (2018) - Syed Abou Iltaf Hussain
, Uttam Kumar Mandal
, Sankar Prasad Mondal
:
Decision Maker Priority Index and Degree of Vagueness Coupled Decision Making Method: A Synergistic Approach. Int. J. Fuzzy Syst. 20(5): 1551-1566 (2018) - Uttam Mandal
, Pulak Chowdhury, Massimo Tornatore
, Charles U. Martel
, Biswanath Mukherjee
:
Bandwidth Provisioning for Virtual Machine Migration in Cloud: Strategy and Application. IEEE Trans. Cloud Comput. 6(4): 967-976 (2018) - 2017
- Pushparenu Bhattacharjee, Abhiman Debnath
, Sujoy Chakraborty
, Uttam Kumar Mandal
:
Selection of optimal aluminum alloy using TOPSIS method under fuzzy environment. J. Intell. Fuzzy Syst. 32(1): 871-876 (2017) - 2016
- Abhishek Gupta, M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore, Biswanath Mukherjee:
On Service-Chaining Strategies using Virtual Network Functions in Operator Networks. CoRR abs/1611.03453 (2016) - 2015
- Abhishek Gupta, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore, Biswanath Mukherjee:
Cost-efficient live VM migration based on varying electricity cost in optical cloud networks. Photonic Netw. Commun. 30(3): 376-386 (2015) - 2014
- Uttam Mandal, M. Farhan Habib, Shuqiang Zhang, Christoph Lange, Andreas Gladisch, Biswanath Mukherjee:
Adopting Hybrid CDN-P2P in IP-Over-WDM Networks: An Energy-Efficiency Perspective. JOCN 6(3): 303-314 (2014) - Abhishek Gupta, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore, Biswanath Mukherjee:
Cost-efficient live VM migration based on varying electricity cost in optical cloud networks. IEEE ANTS 2014: 1-3 - Uttam Mandal, M. Farhan Habib, Shuqiang Zhang, Pulak Chowdhury, Massimo Tornatore
, Biswanath Mukherjee:
Heterogeneous bandwidth provisioning for virtual machine migration over SDN-enabled optical networks. OFC 2014: 1-3 - 2013
- Uttam Mandal, M. Farhan Habib, Shuqiang Zhang, Biswanath Mukherjee, Massimo Tornatore
:
Greening the cloud using renewable-energy-aware service migration. IEEE Netw. 27(6): 36-43 (2013) - Uttam Mandal, Pulak Chowdhury, Christoph Lange, Andreas Gladisch, Biswanath Mukherjee:
Energy-efficient networking for content distribution over telecom network infrastructure. Opt. Switch. Netw. 10(4): 393-405 (2013) - Shuqiang Zhang, Rui Wang, Uttam Mandal, M. Farhan Habib, Biswanath Mukherjee:
Connecting the clouds with low-latency, low-cost virtual private lines enabled by sliceable optical networks. GLOBECOM 2013: 2370-2375 - 2012
- Uttam Mandal, Christoph Lange, Andreas Gladisch, Biswanath Mukherjee:
Should ISPs adopt hybrid CDN-P2P in IP-over-WDM networks: An energy-efficiency perspective? IEEE ANTS 2012: 6-11 - Uttam Kr. Mondal
, Jyotsna Kumar Mandal
:
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). ACITY (1) 2012: 199-208 - Uttam Kr. Mondal, J. K. Mandal:
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC). CoRR abs/1202.5194 (2012) - 2011
- Uttam Kr. Mondal
, Jyotsna Kumar Mandal
:
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). CISIM 2011: 305-313 - Uttam Kr. Mondal
, J. K. Mandal:
A Message Embedded Authentication of Songs to Verify Intellectual Property Right (MEAS). ISED 2011: 313-317
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-30 11:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint