Deepali Arora

According to our database1, Deepali Arora authored at least 22 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Network Event Classification for Security of IT Infrastructure.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Detecting Anomalies in the Data Residing over the Cloud.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Big Data Analytics for Classification of Network Enabled Devices.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Identifying Prime Customers Based on MobileUsage Patterns.
Proceedings of the Advances on P2P, 2016

2015
Analytics: Key to Go from Generating Big Data to Deriving Business Value.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Determining Per-Mode Battery Usage within Non-trivial Mobile Device Apps.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Enabling richer statistical MANET simulations through cluster computing.
Clust. Comput., 2013

Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Mining WiFi Data for Business Intelligence.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets.
Proceedings of the 2012 Seventh International Conference on P2P, 2012

2011
Lower bounds on mobile terminal localisation in an urban area.
IET Commun., 2011

On the statistical behaviors of network-level features within MANETs.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs.
Proceedings of the 2011 International Conference on Broadband, 2011

STARS: A Framework for Statistically Rigorous Simulation-Based Network Research.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2009
Beamforming technique to solve the hidden beam problem in wireless communication systems.
IET Commun., 2009

2007
Capacity analysis for a multiuser cross-layer downlink model in the presence of fading and interference.
IET Commun., 2007

2006
Quality of service oriented scheduling algorithms for a cross-layer downlink wireless system.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Multiuser scheduling for downlink in multi-antenna wireless systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005


  Loading...