Dipak Ghosal
Dipak Ghosal
Professor of Computer Science, University of California, Davis
Verified email at - Homepage
Cited by
Cited by
Wireless sensor network survey
J Yick, B Mukherjee, D Ghosal
Computer networks 52 (12), 2292-2330, 2008
Multipath routing in mobile ad hoc networks: Issues and challenges
S Mueller, RP Tsang, D Ghosal
International workshop on modeling, analysis, and simulation of computer andá…, 2003
Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks
J LeBrun, CN Chuah, D Ghosal, M Zhang
2005 IEEE 61st Vehicular Technology Conference 4, 2289-2293, 2005
Platoon management with cooperative adaptive cruise control enabled by VANET
M Amoozadeh, H Deng, CN Chuah, HM Zhang, D Ghosal
Vehicular communications 2 (2), 110-123, 2015
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
M Amoozadeh, A Raghuramu, CN Chuah, D Ghosal, HM Zhang, J Rowe, ...
IEEE Communications Magazine 53 (6), 126-132, 2015
Adaptive traffic signal control with vehicular ad hoc networks
K Pandit, D Ghosal, HM Zhang, CN Chuah
IEEE Transactions on Vehicular Technology 62 (4), 1459-1471, 2013
Analysis of a prediction-based mobility adaptive tracking algorithm
J Yick, B Mukherjee, D Ghosal
2nd International Conference on Broadband Networks, 2005., 753-760, 2005
The processor working set and its use in scheduling multiprocessor systems
D Ghosal, G Serazzi, SK Tripathi
IEEE Transactions on Software Engineering 17 (5), 443, 1991
Approximate analysis of single and multiple ring networks
LN Bhuyan, D Ghosal, Q Yang
IEEE Transactions on Computers 38 (7), 1027-1040, 1989
VGrid: vehicular adhoc networking and computing grid for intelligent traffic control
J Anda, J LeBrun, D Ghosal, CN Chuah, M Zhang
2005 IEEE 61st Vehicular Technology Conference 5, 2905-2909, 2005
Systems and methods to identify target video content
Z Li, C Ou, R Savoor, D Ghosal
US Patent 9,984,369, 2018
Hide and seek in time—robust covert timing channels
Y Liu, D Ghosal, F Armknecht, AR Sadeghi, S Schulz, S Katzenbeisser
Computer Security–ESORICS 2009: 14th European Symposium on Research iná…, 2009
SIDD: A framework for detecting sensitive data exfiltration by an insider attack
Y Liu, C Corbett, K Chiang, R Archibald, B Mukherjee, D Ghosal
2009 42nd Hawaii international conference on system sciences, 1-10, 2009
Hierarchical architectures in the third-generation cellular network
X Wu, B Murherjee, D Ghosal
IEEE Wireless communications 11 (3), 62-71, 2004
CaDAR: an efficient routing algorithm for a wireless–optical broadband access network (WOBAN)
AS Reaz, V Ramamurthi, S Sarkar, D Ghosal, S Dixit, B Mukherjee
Journal of Optical Communications and Networking 1 (5), 392-403, 2009
Impact of mobility on TCP/IP: An integrated performance study
P Manzoni, D Ghosal, G Serazzi
IEEE Journal on Selected Areas in Communications 13 (5), 858-867, 1995
System and method of managing protected video content
D Ghosal, C Ou, Z Li
US Patent 8,312,558, 2012
Secure IP Telephony using Multi-layered Protection.
B Reynolds, D Ghosal
NDSS 3, 1-13, 2003
A survey of timing channels and countermeasures
AK Biswas, D Ghosal, S Nagaraja
ACM Computing Surveys (CSUR) 50 (1), 1-39, 2017
Smoothing vehicular traffic flow using vehicular-based ad hoc networking & computing grid (VGrid)
A Chen, B Khorashadi, CN Chuah, D Ghosal, M Zhang
2006 IEEE Intelligent Transportation Systems Conference, 349-354, 2006
The system can't perform the operation now. Try again later.
Articles 1–20