A comparative analysis of web and peer-to-peer traffic N Basher, A Mahanti, A Mahanti, C Williamson, M Arlitt Proceedings of the 17th international conference on World Wide Web, 287-296, 2008 | 182 | 2008 |
Challenges in enterprise adoption of agile methods-A survey A Mahanti Journal of Computing and Information technology 14 (3), 197-206, 2006 | 120 | 2006 |
A tale of the tails: Power-laws in internet measurements A Mahanti, N Carlsson, A Mahanti, M Arlitt, C Williamson IEEE Network 27 (1), 59-64, 2013 | 104 | 2013 |
FOG-Engine: Towards big data analytics in the fog F Mehdipour, B Javadi, A Mahanti 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 45 | 2016 |
Remote analysis of a distributed WLAN using passive wireless-side measurement A Mahanti, C Williamson, M Arlitt Performance Evaluation 64 (9-12), 909-932, 2007 | 37 | 2007 |
Characterizing the file hosting ecosystem: A view from the edge A Mahanti, C Williamson, N Carlsson, M Arlitt, A Mahanti Performance Evaluation 68 (11), 1085-1102, 2011 | 32 | 2011 |
Detecting anomalous energy consumption using contextual analysis of smart meter data A Sial, A Singh, A Mahanti Wireless Networks 27 (6), 4275-4292, 2021 | 31 | 2021 |
Ambient interference effects in Wi-Fi networks A Mahanti, N Carlsson, C Williamson, M Arlitt International Conference on Research in Networking, 160-173, 2010 | 31 | 2010 |
Process automation in an IoT–fog–cloud ecosystem: A survey and taxonomy H Chegini, RK Naha, A Mahanti, P Thulasiraman IoT 2 (1), 92-118, 2021 | 27 | 2021 |
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti Computer Communications 162, 212-224, 2020 | 26 | 2020 |
Fog computing realization for big data analytics F Mehdipour, B Javadi, A Mahanti, G Ramirez-Prado, EC Principles Fog and edge computing: Principles and paradigms 1, 259-290, 2019 | 22 | 2019 |
Comparative performance analysis of high-speed transfer protocols for big data S Yu, N Brownlee, A Mahanti 38th Annual IEEE Conference on Local Computer Networks, 292-295, 2013 | 22 | 2013 |
Heuristics-Based detection of abnormal energy consumption A Sial, A Singh, A Mahanti, M Gong International Conference on Smart Grid Inspired Future Technologies, 21-31, 2018 | 21 | 2018 |
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control AAN Patwary, RK Naha, S Garg, SK Battula, MAK Patwary, E Aghasian, ... Electronics 10 (10), 1171, 2021 | 18 | 2021 |
Deep neural learning techniques with long short-term memory for gesture recognition DK Jain, A Mahanti, P Shamsolmoali, R Manikandan Neural Computing and Applications 32 (20), 16073-16089, 2020 | 16 | 2020 |
Network steganography and steganalysis-a concise review JO Seo, S Manoharan, A Mahanti 2016 2nd International Conference on Applied and Theoretical Computing and …, 2016 | 16 | 2016 |
A framework of automation on context-aware internet of things (IoT) systems H Chegini, A Mahanti Proceedings of the 12th ieee/acm international conference on utility and …, 2019 | 15 | 2019 |
Workload characterization of a large systems conference web server A Mahanti, C Williamson, L Wu 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 15 | 2009 |
Characterizing intelligence gathering and control on an edge network M Arlitt, N Carlsson, P Gill, A Mahanti, C Williamson ACM Transactions on Internet Technology (TOIT) 11 (1), 1-26, 2011 | 14 | 2011 |
Content sharing dynamics in the global file hosting landscape A Mahanti, N Carlsson, C Williamson 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation …, 2012 | 13 | 2012 |