An Interview with Bharati Mukherjee
AB Carb, B Mukherjee - The Massachusetts Review, 1988 - JSTOR
… Mukherjee describes this paradoxical lifestyle in The Tiger's Daughter. In 1958, Mukherjee's
… Mukherjee's father encouraged her to study writing in the US and in 1961, she left India to …
… Mukherjee's father encouraged her to study writing in the US and in 1961, she left India to …
Wireless sensor network survey
J Yick, B Mukherjee, D Ghosal - Computer networks, 2008 - Elsevier
… Appendix B summarizes the sensor technologies. Appendix C compares sensor … The robots
operate on battery power which last up to 3 hours and uses 802.11b for communication. The …
operate on battery power which last up to 3 hours and uses 802.11b for communication. The …
Global prevalence of post-coronavirus disease 2019 (COVID-19) condition or long COVID: a meta-analysis and systematic review
… b Some studies included populations and outcomes outside the scope of this review. … b
Some studies included populations and outcomes outside the scope of this review. …
Some studies included populations and outcomes outside the scope of this review. …
[PDF][PDF] A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks
This study focuses on the routing and Wavelength-Assignment (RWA) problem in wavelength-routed
optical WDM networks. Most of the attention is devoted to such networks operating …
optical WDM networks. Most of the attention is devoted to such networks operating …
Network intrusion detection
B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
… network itself, an attack that host - h a s e d audit t ra i I an a l y ze rs WO LI Id pro b a h I y …
and B. Mukherjee, "A method to detect intrusive activity in a networked environment. Proc., 14th …
and B. Mukherjee, "A method to detect intrusive activity in a networked environment. Proc., 14th …
Survivable WDM mesh networks. Part I-protection
S Ramamurthy, B Mukherjee - … . The Future is Now (Cat. No …, 1999 - ieeexplore.ieee.org
This investigation considers optical networks which employ wavelength cross-connects that
enable the establishment of wavelength-division-multiplexed (WDM) channels, between …
enable the establishment of wavelength-division-multiplexed (WDM) channels, between …
IPACT a dynamic protocol for an Ethernet PON (EPON)
G Kramer, B Mukherjee… - IEEE Communications …, 2002 - ieeexplore.ieee.org
We investigate design issues for access networks based on passive optical network technology.
A PON based on polling, with data encapsulated in Ethernet frames, possesses many …
A PON based on polling, with data encapsulated in Ethernet frames, possesses many …
Screening of antioxidant activity of three Indian medicinal plants, traditionally used for the management of neurodegenerative diseases
…, F Dajas, PC Tripathi, T Seal, B Mukherjee - Journal of …, 2003 - Elsevier
A number of Indian medicinal plants have been used for thousands of years in the traditional
system of medicine (Ayurveda). Amongst these are plants used for the management of …
system of medicine (Ayurveda). Amongst these are plants used for the management of …
[BOOK][B] Optical WDM networks
B Mukherjee - 2006 - books.google.com
… Finally, I wish to thank my family members for their constant encouragement and support:
my father Dhirendranath Mukherjee, my mother Gita Mukherjee, my wife Supriya, and my …
my father Dhirendranath Mukherjee, my mother Gita Mukherjee, my wife Supriya, and my …
[HTML][HTML] Dids (distributed intrusion detection system)–motivation
…, C Ho, KN Levitt, B Mukherjee… - Architecture, and an …, 1991 - books.google.com
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of
computer systems by both system insiders and external penetrators. The proliferation of …
computer systems by both system insiders and external penetrators. The proliferation of …