scispace - formally typeset
A

Arzad A. Kherani

Researcher at Indian Institutes of Technology

Publications -  104
Citations -  1488

Arzad A. Kherani is an academic researcher from Indian Institutes of Technology. The author has contributed to research in topics: Throughput & Network packet. The author has an hindex of 20, co-authored 97 publications receiving 1399 citations. Previous affiliations of Arzad A. Kherani include Indian Institute of Technology Delhi & Indian Institute of Science.

Papers
More filters
Proceedings ArticleDOI

Performance analysis and stochastic stability of congestion control protocols

TL;DR: It is observed that Highspeed TCP can be used to approximate almost any kind of window behavior by varying only one design parameter.
Patent

Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes

TL;DR: In this article, the authors proposed a method for improving the reliability and performance of V2V networks where digital certificates are necessary for message authentication and some messages may be lost in transmission.
Book ChapterDOI

Route lifetime based optimal hop selection in VANETs on highway: an analytical viewpoint

TL;DR: A monotone variation property of the speed of relay nodes under the optimal policy is proved and the optimal policies and their structures can assist in enhancing the performance of existing VANET routing protocols.
Proceedings ArticleDOI

Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

TL;DR: The results include the results that the relay throughput depends on the node mobility pattern only via its (stationary) node position distribution and that a nodes mobility pattern that results in a uniform steady-state distribution for all nodes achieves the lowest relay throughput.
Proceedings ArticleDOI

Secure V2V communications: Performance impact of computational overheads

TL;DR: This paper provides an evaluation of the performance of secure V2V communications, while explicitly modeling the computational and storage overheads due to security, and proposes a fixed point based approach which essentially assumes the two layers at a given node independent from each other and from those at other nodes.