Остановите войну!
for scientists:
default search action
Hrushikesha Mohanty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c51]Hrushikesha Mohanty:
Digital Life: An Advent of Transhumanism. MIWAI 2023: 1-24 - 2020
- [c50]Hrushikesha Mohanty:
Trust: Anthropomorphic Algorithmic. ICDCIT 2020: 50-72
2010 – 2019
- 2019
- [c49]Hrushikesha Mohanty:
Digital Society: A Computing Science Prospective. ICDCIT 2019: 60-70 - [c48]Abhaya Kumar Pradhan, Hrushikesha Mohanty, Rajendra Prasad Lal:
Event Detection and Aspects in Twitter: A BoW Approach. ICDCIT 2019: 194-211 - 2015
- [c47]A. Vani Vathsala, Hrushikesha Mohanty:
Time and Cost Aware Checkpointing of Choreographed Web Services. ICDCIT 2015: 207-219 - [c46]Lakshmi H. N., Hrushikesha Mohanty:
A Preprocessing of Service Registry: Based on I/O Parameter Similarity. ICDCIT 2015: 220-232 - [c45]Hrushikesha Mohanty:
A Theory on Genesis and Spread of Corruption. ICDCIT 2015: 448-451 - [i1]Lakshmi H. N., Hrushikesha Mohanty:
Usages of Composition Search Tree in Web Service Composition. CoRR abs/1504.01257 (2015) - 2014
- [c44]A. Vani Vathsala, Hrushikesha Mohanty:
A survey on checkpointing web services. PESOS 2014: 11-17 - [c43]A. Vani Vathsala, Hrushikesha Mohanty:
Interaction patterns based checkpointing of choreographed web services. PESOS 2014: 28-37 - [c42]Lakshmi H. N., Hrushikesha Mohanty:
Clustering Web Services on Frequent Output Parameters for I/O Based Service Search. MIWAI 2014: 161-171 - [c41]A. B. Sagar, Hrushikesha Mohanty:
A Trust Metric for Online Virtual Teams and Work Groups. MIWAI 2014: 184-195 - [c40]Supriya Vaddi, Hrushikesha Mohanty:
Web Service Composition Using Service Maps. MIWAI 2014: 196-207 - 2013
- [c39]Hrushikesha Mohanty:
Network of Social Listeners. ICDCIT 2013: 302-318 - [c38]Hrushikesha Mohanty:
Computational Social Science: A Bird's Eye View. ICDCIT 2013: 319-333 - [c37]Supriya Vaddi, Hrushikesha Mohanty:
Querying a Service from Repository of SMaps. ICDCIT 2013: 535-546 - 2012
- [c36]A. Vani Vathsala, Hrushikesha Mohanty:
Using HMM for predicting response time of web services. CUBE 2012: 520-525 - [c35]Supriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. CUBE 2012: 635-640 - [c34]Hrushikesha Mohanty:
An Algebra of Social Distance. ICDCIT 2012: 153-165 - [c33]Hrushikesha Mohanty:
Modeling social directory- A formal approach. RAIT 2012: 867-872 - 2011
- [c32]Hrushikesha Mohanty:
Socially Responsive Resource Usage: A Protocol. ICDCIT 2011: 243-254 - [c31]Sapna P. G., Hrushikesha Mohanty:
An Ontology Based Approach for Test Scenario Management. ICISTM 2011: 91-100 - 2010
- [c30]Sapna P. G., Hrushikesha Mohanty:
Clustering test cases to achieve effective test selection. A2CWiC 2010: 15:1-15:8 - [c29]Hrushikesha Mohanty, Rajesh Kurra, R. K. Shyamasundar:
A Framework for Web-Based Negotiation. ICDCIT 2010: 140-151 - [c28]Sapna P. G., Hrushikesha Mohanty:
Automated Test Scenario Selection Based on Levenshtein Distance. ICDCIT 2010: 255-266 - [e3]Tomasz Janowski, Hrushikesha Mohanty:
Distributed Computing and Internet Technology, 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010. Proceedings. Lecture Notes in Computer Science 5966, Springer 2010, ISBN 978-3-642-11658-2 [contents]
2000 – 2009
- 2009
- [j1]A. Tripathi, T. Suman Kumar Reddy, Sanjay Madria, Hrushikesha Mohanty, R. K. Ghosh:
Algorithms for validating E-tickets in mobile computing environment. Inf. Sci. 179(11): 1678-1693 (2009) - [c27]Sapna P. G., Hrushikesha Mohanty:
Prioritization of Scenarios Based on UML Activity Diagrams. CICSyN 2009: 271-276 - [c26]Hrushikesha Mohanty, Martha VenkataSwamy, Srini Ramaswamy, R. K. Shyamasundar:
Translating Security Policy to Executable Code for Sandboxing Linux Kernel. EMS 2009: 124-129 - [c25]Sapna P. G., Hrushikesha Mohanty:
Prioritizing Use Cases to Aid Ordering of Scenarios. EMS 2009: 136-141 - [c24]Hrushikesha Mohanty, Martha VenkataSwamy, Pillalamarri Thilak, Srinivasan Ramaswamy:
Secured Networking by Sandboxing LINUX 2.6. SMC 2009: 3669-3574 - 2008
- [c23]A. Murali M. Rao, Hrushikesha Mohanty:
Design Issues of a Policy Enforcer to Secure Multi-domain Environment. ICIT 2008: 199-200 - [c22]Sapna P. G., Hrushikesha Mohanty:
Automated Scenario Generation Based on UML Activity Diagrams. ICIT 2008: 209-214 - [c21]Sumagna Patnaik, Hrushikesha Mohanty:
On Specification of Treatment Modules. ICIT 2008: 215-220 - [c20]Hrushikesha Mohanty, Deepak Chenthati, Supriya Vaddi, R. K. Shyamsundar:
HUMSAT for State Based Web Service Composition. ICIT 2008: 273-278 - 2007
- [c19]Hrushikesha Mohanty, Jitesh Mulchandani, Deepak Chenthati, R. K. Shyamasundar:
Modeling Web Services with FSM Modules. Asia International Conference on Modelling and Simulation 2007: 100-105 - [c18]Sapna P. G., Hrushikesha Mohanty:
Ensuring Consistency in Relational Repository of UML Models. ICIT 2007: 217-222 - [c17]G. Satya Reddy, Hrushikesha Mohanty:
Specification Based Testing of Inheritance: A Framework of a Tool. ICIT 2007: 237-239 - [c16]Hrushikesha Mohanty, Kakarlamudi Prasad, R. K. Shyamasundar:
Trust Assessment in Web Services: an Extension to jUDDI. ICEBE 2007: 759-762 - [e2]Tomasz Janowski, Hrushikesha Mohanty:
Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings. Lecture Notes in Computer Science 4882, Springer 2007, ISBN 978-3-540-77112-8 [contents] - 2006
- [c15]A. K. Prajapati, R. K. Ghosh, Hrushikesha Mohanty:
A Self-Adaptive Hybrid Channel Assignment Scheme forWireless Communication Systems. ICIT 2006: 94-95 - 2005
- [c14]Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh, Goutam Chakraborty:
Resilient Dissemination of Events in a Large-Scale Event Notification Service System. EEE 2005: 502-507 - [c13]R. K. Ghosh, Saurabh Aggarwala, Hemant Mishra, Ashish Sharma, Hrushikesha Mohanty:
Tracking of Mobile Terminals Using Subscriber Mobility Pattern with Time-Bound Self Purging Indicators and Regional Route Maps. IWDC 2005: 512-523 - [c12]Satyajit Acharya, Chris George, Hrushikesha Mohanty:
Domain Consistency in Requirements Specification. QSIC 2005: 231-240 - 2004
- [c11]Satyajit Acharya, Chris George, Hrushikesha Mohanty:
Specifying a Mobile Computing Infrastructure and Services. ICDCIT 2004: 244-254 - [c10]Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh:
Just-in-Time Delivery of Events in Event Notification Service Systems for Mobile Users. INTELLCOMM 2004: 190-198 - [c9]O. B. V. Ramanaiah, Hrushikesha Mohanty:
NICD: A Novel Indexless Wireless On-Demand Data Broadcast Algorithm. ITCC (2) 2004: 730-734 - [c8]Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh:
Causal Ordering in Event Notification Service Systems for Mobile Users. ITCC (2) 2004: 735-740 - [e1]R. K. Ghosh, Hrushikesha Mohanty:
Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings. Lecture Notes in Computer Science 3347, Springer 2004, ISBN 3-540-24075-6 [contents] - 2003
- [c7]Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyamasundar:
MOBICHARTS: A Notation to Specify Mobile Computing Applications. HICSS 2003: 298 - [c6]R. K. Ghosh, Shravan K. Rayanchu, Hrushikesha Mohanty:
Location Management by Movement Prediction Using Mobility Patterns and Regional Route Maps. IWDC 2003: 153-162 - [c5]T. Suman Kumar Reddy, Hrushikesha Mohanty, R. K. Ghosh, Sanjay Madria:
Two Distributed Algorithms for E-ticket Validation protocols for Mobile Clients. CEC 2003: 223- - 2002
- [c4]R. K. Ghosh, Hrushikesha Mohanty:
On Restructuring Distributed Algorithms for Mobile Computing. IWDC 2002: 224-233 - 2001
- [c3]Manas Ranjan Patra, Hrushikesha Mohanty:
A Formal Framework to Build Software Agents. APSEC 2001: 119-126 - 2000
- [c2]Hrushikesha Mohanty:
Active and Nomadic Transactions in Mobile Databases. ADBIS-DASFAA Symposium 2000: 99-107
1980 – 1989
- 1986
- [c1]Hrushikesha Mohanty, G. P. Bhattacharjee:
A Distributed Algorithm for Edge-Disjoint Path Problem. FSTTCS 1986: 344-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint