Prasant Mohapatra

Orcid: 0000-0002-2768-5308

Affiliations:
  • University of California, Davis, USA


According to our database1, Prasant Mohapatra authored at least 429 papers between 1993 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2010, "For contributions to the quality of service provisioning in computer networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain based secret key management for trusted platform module standard in reconfigurable platform.
Concurr. Comput. Pract. Exp., October, 2024

Introduction to the Special Section on Contact-free Smart Sensing in AIoT.
ACM Trans. Sens. Networks, July, 2024

Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024

Towards System-Level Security Analysis of IoT Using Attack Graphs.
IEEE Trans. Mob. Comput., February, 2024

Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN.
IEEE Trans. Mob. Comput., January, 2024

Identity-Focused Inference and Extraction Attacks on Diffusion Models.
CoRR, 2024

PTQ4ADM: Post-Training Quantization for Efficient Text Conditional Audio Diffusion Models.
CoRR, 2024

FedDM: Enhancing Communication Efficiency and Handling Data Heterogeneity in Federated Diffusion Models.
CoRR, 2024

Assessing LLMs for Zero-shot Abstractive Summarization Through the Lens of Relevance Paraphrasing.
CoRR, 2024

Representation Learning For Efficient Deep Multi-Agent Reinforcement Learning.
CoRR, 2024

Outlier Gradient Analysis: Efficiently Improving Deep Learning Model Performance via Hessian-Free Influence Functions.
CoRR, 2024

Robust Explainable Recommendation.
CoRR, 2024

FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries.
Proceedings of the 33rd USENIX Security Symposium, 2024

Revisiting Zero-Shot Abstractive Summarization in the Era of Large Language Models from the Perspective of Position Bias.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Short Papers, 2024

Augmented Efficiency: Reducing Memory Footprint and Accelerating Inference for 3D Semantic Segmentation Through Hybrid Vision.
Proceedings of the 26th IEEE International Workshop on Multimedia Signal Processing, 2024

"What Data Benefits My Classifier?" Enhancing Model Performance and Interpretability through Influence-Based Data Selection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

2023
Federated Learning Hyperparameter Tuning From a System Perspective.
IEEE Internet Things J., August, 2023

Jamming-Resilient Message Dissemination in Wireless Networks.
IEEE Trans. Mob. Comput., March, 2023

Towards Fair Video Summarization.
Trans. Mach. Learn. Res., 2023

SMedia: social media data analysis for emergency detection and its type identification.
Int. J. Comput. Sci. Eng., 2023

Multi-agent Reinforcement Learning: A Comprehensive Survey.
CoRR, 2023

Fairness Uncertainty Quantification: How certain are you that the model is fair?
CoRR, 2023

Decentralized Multi-agent Filtering.
CoRR, 2023

Characterizing Real-time Radar-assisted Beamforming in mmWave V2V Links.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Stability of Explainable Recommendation.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Robust Fair Clustering: A Novel Fairness Attack and Defense Framework.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

2022
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2022

MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease.
ACM Trans. Internet Things, 2022

Stochastic Zeroth-Order Optimization under Nonstationarity and Nonconvexity.
J. Mach. Learn. Res., 2022

Federated Learning Hyper-Parameter Tuning from a System Perspective.
CoRR, 2022

YouTube, The Great Radicalizer? Auditing and Mitigating Ideological Biases in YouTube Recommendations.
CoRR, 2022

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

FedTune: Automatic Tuning of Federated Learning Hyper-Parameters from System Perspective.
Proceedings of the IEEE Military Communications Conference, 2022

IOTA: A Framework for Analyzing System-Level Security of IoTs.
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022

Fair Algorithms for Hierarchical Agglomerative Clustering.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021

Mobile Cloud Computing and Wireless Sensor Networks: A review, integration architecture, and future directions.
IET Networks, 2021

Fairness Degrading Adversarial Attacks Against Clustering Algorithms.
CoRR, 2021

Automatic Tuning of Federated Learning Hyper-Parameters from System Perspective.
CoRR, 2021

Blockchain based secure smart city architecture using low resource IoTs.
Comput. Networks, 2021

An Overview of Fairness in Clustering.
IEEE Access, 2021

Vulnerabilities in Federated Learning.
IEEE Access, 2021

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

How BlockChain Can Help Enhance The Security And Privacy in Edge Computing?
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

Moving Target Defense against Adversarial Machine Learning.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

Fair Clustering Using Antidote Data.
Proceedings of the Algorithmic Fairness through the Lens of Causality and Robustness Workshop, 2021

2020
High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation.
IEEE Trans. Mob. Comput., 2020

Escaping Saddle-Points Faster under Interpolation-like Conditions.
CoRR, 2020

Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System.
CoRR, 2020

Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks.
CoRR, 2020

Smart Contract-based Computing ResourcesTrading in Edge Computing.
CoRR, 2020

iOceanSee: A Novel Scheme for Ocean State Estimation Using 3D Mobile Convolutional Neural Network.
IEEE Access, 2020

Towards Learning-automation IoT Attack Detection through Reinforcement Learning.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Smart Contract-based Computing Resources Trading in Edge Computing.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

IoTSpy: Uncovering Human Privacy Leakage in IoT Networks via Mining Wireless Context.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

Escaping Saddle-Point Faster under Interpolation-like Conditions.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Slimmer: Accelerating 3D Semantic Segmentation for Mobile Augmented Reality.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Poster Abstract: Passive Activity Classification of Smart Homes through Wireless Packet Sniffing.
Proceedings of the 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2020

IoTGaze: IoT Security Enforcement via Wireless Context Analysis.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Toward Mobile 3D Vision.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Suspicion-Free Adversarial Attacks on Clustering Algorithms.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
StrLight: An Imperceptible Visible Light Communication System with String Lights.
IEEE Trans. Mob. Comput., 2019

<i>DATALET</i>: An approach to manage big volume of data in cyber foraged environment.
J. Parallel Distributed Comput., 2019

Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives.
ACM Comput. Surv., 2019

Online and Bandit Algorithms for Nonstationary Stochastic Saddle-Point Optimization.
CoRR, 2019

Multi-Point Bandit Algorithms for Nonstationary Online Nonconvex Optimization.
CoRR, 2019

Efficient target detection in maritime search and rescue wireless sensor network using data fusion.
Comput. Commun., 2019

RangingNet: A convolutional deep neural network based ranging model for wireless sensor networks (WSN).
Comput. Commun., 2019

Quantifying and Visualizing the Demand and Supply Gap from E-commerce Search Data using Topic Models.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

AIDE: Augmented Onboarding of IoT Devices at Ease.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Learning to Diversify for E-commerce Search with Multi-Armed Bandit.
Proceedings of the SIGIR 2019 Workshop on eCommerce, 2019

BeamSniff: Enabling Seamless Communication under Mobility and Blockage in 60 GHz Networks.
Proceedings of the 2019 IFIP Networking Conference, 2019

mmSense: Multi-Person Detection and Identification via mmWave Sensing.
Proceedings of the 3rd ACM Workshop on Millimeter-wave Networks and Sensing Systems, 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Wireless access to ultimate virtual reality 360-degree video: poster abstract.
Proceedings of the International Conference on Internet of Things Design and Implementation, 2019

On the feasibility of estimating soluble sugar content using millimeter-wave.
Proceedings of the International Conference on Internet of Things Design and Implementation, 2019

Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A moving target defense against adversarial machine learning.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
An Acoustic-Based Encounter Profiling System.
IEEE Trans. Mob. Comput., 2018

Prediction based opportunistic routing for maritime search and rescue wireless sensor network.
J. Parallel Distributed Comput., 2018

Wireless Access to Ultimate Virtual Reality 360-Degree Video At Home.
CoRR, 2018

Missing data recovery using reconstruction in ocean wireless sensor networks.
Comput. Commun., 2018

A Holistic Approach to Reconstruct Data in Ocean Sensor Network Using Compression Sensing.
IEEE Access, 2018

Towards Optimization of e-Commerce Search and Discovery.
Proceedings of the SIGIR 2018 Workshop On eCommerce co-located with the 41st International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2018), 2018

Contactless Breathing Rate Monitoring in Vehicle Using UWB Radar.
Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks, 2018

FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Learning to Rank and Discover for E-Commerce Search.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

Exploiting Knowledge Across Distinct Domains: Learning Event Details from Network Logs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Sense and Deploy: Blockage-Aware Deployment of Reliable 60 GHz mmWave WLANs.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Game Theoretic Characterization of Collusive Behavior Among Attackers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

WiFi and Multiple Interfaces: Adequate for Virtual Reality?
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis.
ACM Trans. Web, 2017

Vital Sign and Sleep Monitoring Using Millimeter Wave.
ACM Trans. Sens. Networks, 2017

TIDE: A User-Centric Tool for Identifying Energy Hungry Applications on Smartphones.
IEEE/ACM Trans. Netw., 2017

Farewell Editorial.
IEEE Trans. Mob. Comput., 2017

Throughput, energy efficiency and interference characterisation of 802.11ac.
Trans. Emerg. Telecommun. Technol., 2017

Privacy-aware contextual localization using network traffic analysis.
Comput. Networks, 2017

WearIA: Wearable device implicit authentication based on activity information.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

Non-Intrusive Multi-Modal Estimation of Building Occupancy.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

MU-MIMO-Aware AP Selection for 802.11ac Networks.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Accurate and Timely Situation Awareness Retrieval from a Bandwidth Constrained Camera Network.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

iType: Using eye gaze to enhance typing privacy.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A signaling game model for moving target defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

BoLTE: Efficient network-wide LTE broadcasting.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

On the Limits of Subsampling of Location Traces.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A Stackelberg Game and Markov Modeling of Moving Target Defense.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

When to Reset Your Keys: Optimal Timing of Security Updates via Learning.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.
IEEE/ACM Trans. Netw., 2016

Processor-Network Speed Scaling for Energy-Delay Tradeoff in Smartphone Applications.
IEEE/ACM Trans. Netw., 2016

Characterization of Wireless Multidevice Users.
ACM Trans. Internet Techn., 2016

MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers.
IEEE Trans. Inf. Forensics Secur., 2016

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications.
IEEE Trans. Dependable Secur. Comput., 2016

Type, Talk, or Swype: Characterizing and comparing energy consumption of mobile input modalities.
Pervasive Mob. Comput., 2016

QoE prediction model for mobile video telephony.
Multim. Tools Appl., 2016

Optimal System Maneuver for Trust Management in Social Networks.
CoRR, 2016

Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

MotionSync: Personal Energy Analytics through Motion Tags and Wearable Sensing.
Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, 2016

Verification of User-Reported Context Claims with Context Correlation Model.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Monitoring vital signs using millimeter wave.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

DopEnc: acoustic-based encounter profiling using smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

PLiFi: hybrid wifi-VLC networking using power lines.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016

Trust exploitation and attention competition: A game theoretical model.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Stealthy attacks with insider information: A game theoretic model with asymmetric feedback.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Poster Abstract: Human Tracking and Activity Monitoring Using 60 GHz mmWave.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

WiWho: WiFi-Based Person Identification in Smart Spaces.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

Resource-aware fusion in multimodal sensing under network constraints.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

VSync: Cloud based video streaming service for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Efficient MAC for Real-Time Video Streaming over Wireless LAN.
ACM Trans. Multim. Comput. Commun. Appl., 2015

On Availability-Performability Tradeoff in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2015

EIC Editorial.
IEEE Trans. Mob. Comput., 2015

State of the Journal Editorial.
IEEE Trans. Mob. Comput., 2015

Live Video Forensics: Source Identification in Lossy Wireless Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges.
IEEE Commun. Surv. Tutorials, 2015

Distributed Optimal Channel Access in Cognitive Radio Networks.
Computer, 2015

Early Detection of Spam Mobile Apps.
Proceedings of the 24th International Conference on World Wide Web, 2015

Keynote 2: Smart-Sensing using Smart-Sensors.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Finger-writing with Smartwatch: A Case for Finger and Hand Gesture Recognition using Smartwatch.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Enabling privacy-preserving first-person cameras using low-power sensors.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Characterization of wireless multi-device users.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

When to type, talk, or Swype: Characterizing energy consumption of mobile input modalities.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Characterizing Instant Messaging Apps on Smartphones.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Demo: Finger and Hand Gesture Recognition using Smartwatch.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

AccelWord: Energy Efficient Hotword Detection through Accelerometer.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Analyzing Shopper's Behavior through WiFi Signals.
Proceedings of the 2nd workshop on Workshop on Physical Analytics, 2015

Stealthy attacks meets insider threats: A three-player game model.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Sensor-Assisted Codebook-Based Beamforming for Mobility Management in 60 GHz WLANs.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

CLIP: Continuous Location Integrity and Provenance for Mobile Phones.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Long-Term Privacy Profiling through Smartphone Sensors.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Mitigating macro-cell outage in LTE-Advanced deployments.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Dynamic defense strategy against advanced persistent threat with insiders.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Video acuity assessment in mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

AnonAD: Privacy-Aware Micro-Targeted Mobile Advertisements without Proxies.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Monitoring building door events using barometer sensor in smartphones.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Using Deep Learning for Energy Expenditure Estimation with wearable sensors.
Proceedings of the 17th International Conference on E-health Networking, 2015

ColorBars: increasing data rate of LED-to-camera communication using color shift keying.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
Simultaneously Reducing Latency and Power Consumption in OpenFlow Switches.
IEEE/ACM Trans. Netw., 2014

Efficient Data Capturing for Network Forensics in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Routing-as-a-Service (RaaS): A Framework for Tenant-Directed Route Control in Data Center.
IEEE/ACM Trans. Netw., 2014

Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing.
IEEE Trans. Mob. Comput., 2014

Hardware Architecture for Video Authentication Using Sensor Pattern Noise.
IEEE Trans. Circuits Syst. Video Technol., 2014

Your Installed Apps Reveal Your Gender and More!
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

Predicting user traits from a snapshot of apps installed on a smartphone.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

SWIM: A Switch Manager for Datacenter Networks.
IEEE Internet Comput., 2014

Channel Bonding in Evolving Wireless LANs.
Computer, 2014

Resource allocation using Link State Propagation in OFDMA femto networks.
Comput. Commun., 2014

Editorial: Wireless Technologies for Humanitarian Relief.
Ad Hoc Networks, 2014

Architecture for Blocking Detection in Wireless Video Source Authentication.
Proceedings of the 2014 27th International Conference on VLSI Design, 2014

Improving mobile video telephony.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Time and energy efficient localization.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Characterizing Mobile Open APIs in smartphone apps.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

A first look at 802.11ac in action: Energy efficiency and interference characterization.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

Demo: Crowd-cache - popular content for free.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Your AP knows how you move: fine-grained device motion recognition through WiFi.
Proceedings of the 1st ACM workshop on Hot topics in wireless, HotWireless 2014, Maui, 2014

Navigating in Signal Space: A Crowd-Sourced Sensing Map Construction for Navigation.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014


Provenance logic: Enabling multi-event based trust in mobile sensing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Contextual localization through network traffic analysis.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Recommendation Systems for Markets with Two Sided Preferences.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

Secret message sharing using online social media.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

MagPairing: Exploiting magnetometers for pairing smartphones in close proximity.
Proceedings of the IEEE Conference on Communications and Network Security, 2014


2013
A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies.
ACM Trans. Internet Techn., 2013

Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller.
IEEE Trans. Mob. Comput., 2013

Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space.
IEEE Trans. Mob. Comput., 2013

Trusted Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Toward Deployable Methods for Assessment of Quality for Scalable IPTV Services.
IEEE Trans. Broadcast., 2013

On insider misbehavior detection in cognitive radio networks.
IEEE Netw., 2013

RECOG: A Sensing-Based Cognitive Radio System with Real-Time Application Support.
IEEE J. Sel. Areas Commun., 2013

Quality-Oriented Video Delivery over LTE.
J. Comput. Sci. Eng., 2013

Securing Multimedia Content Using Joint Compression and Encryption.
IEEE Multim., 2013

Using Social Information for Flow Allocation in MANETs.
CoRR, 2013

Mobile video chat: issues and challenges.
IEEE Commun. Mag., 2013

Accurate energy expenditure estimation using smartphone sensors.
Proceedings of the Wireless Health 2013, 2013

An adaptive privacy-preserving scheme for location tracking of a mobile user.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Design and implementation of a frequency-aware wireless video communication system.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Joint carrier aggregation and packet scheduling in LTE-advanced networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Trust and independence aware decision fusion in distributed networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Spatio-temporal provenance: Identifying location information from unstructured text.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Spectrum-aware radio resource management for scalable video multicast in LTE-advanced systems.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Efficient health data compression on mobile devices.
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare, 2013

Characterizing WiFi connection and its impact on mobile users: practical insights.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Evaluating perceptual video quality for mobile clients in 802.11n WLAN.
Proceedings of the 8th ACM International Workshop on Wireless Network Testbeds, 2013

Received signal strength indicator and its analysis in a typical WLAN system (short paper).
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

ARTSense: Anonymous reputation and trust in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Characterizing privacy leakage of public WiFi networks for users on travel.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

RSS-Ratio for enhancing performance of RSS-based applications.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Video source identification in lossy wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

STAMP: Ad hoc spatial-temporal provenance assurance for mobile users.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Network Characterization and Perceptual Evaluation of Skype Mobile Videos.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Resource Allocation in OFDMA Femto Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

Energy Expenditure Estimation using Smartphone Body Sensors.
Proceedings of the 8th International Conference on Body Area Networks, 2013

Experimental Work Versus Simulation in the Study of Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, 2013

2012
Soft-TDMAC: A Software-Based 802.11 Overlay TDMA MAC with Microsecond Synchronization.
IEEE Trans. Mob. Comput., 2012

How expensive are free smartphone apps?
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2012

Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2012

Quantifying DNS namespace influence.
Comput. Networks, 2012

Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Message from the general chair.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Improving crowd-sourced Wi-Fi localization systems using Bluetooth beacons.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Transmit power estimation with a single monitor in multi-band networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Fast rendezvous for cognitive radios by exploiting power leakage at adjacent channels.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Temporal quality assessment for mobile videos.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Chaining for securing data provenance in distributed information networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Inferring user relationship from hidden information in WLANs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Detecting spectrum misuse in wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Cross-layer coordination for efficient contents delivery in LTE eMBMS traffic.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Throughput-constrained scheduling in OFDMA wireless networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Trusted collaborative spectrum sensing for mobile cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Architectural impact of secure socket layer on Internet servers.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

Architectural impact of secure socket layer on Internet servers: A retrospect.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

Quality-optimized downlink scheduling for video streaming applications in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Seeker: A bandwidth-based association control framework for wireless mesh networks.
Wirel. Networks, 2011

Probability Density of the Received Power in Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

ProgME: towards programmable network measurement.
IEEE/ACM Trans. Netw., 2011

Integration Gain of Heterogeneous WiFi/WiMAX Networks.
IEEE Trans. Mob. Comput., 2011

RRR: Rapid Ring Recovery Submillisecond Decentralized Recovery for Ethernet Ring.
IEEE Trans. Computers, 2011

Comparing simulation tools and experimental testbeds for wireless mesh networks.
Pervasive Mob. Comput., 2011

Rendezvous based trust propagation to enhance distributed network security.
Int. J. Secur. Networks, 2011

Special section on wireless mobile and multimedia networks.
Comput. Commun., 2011

QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations.
Ad Hoc Networks, 2011

Recent advances on practical aspects of Wireless Mesh Networks.
Ad Hoc Networks, 2011

Scheduling granularity in underwater acoustic networks.
Proceedings of the Sixth ACM International Workshop on Underwater Networks, 2011

Investigation of scalable video delivery using H.264 SVC on an LTE network.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Opportunistic spectrum scheduling for mobile cognitive radio networks in white space.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Retransmission-aware queuing and routing for video streaming in wireless mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Collusion-resilient quality of information evaluation based on information provenance.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Quality-of-information aware networking for tactical military networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

PRONET: Network trust assessment based on incomplete provenance.
Proceedings of the MILCOM 2011, 2011

Evaluation of network trust using provenance based on distributed local intelligence.
Proceedings of the MILCOM 2011, 2011

Detecting Route Attraction Attacks in Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Architectures for Simultaneous Coding and Encryption Using Chaotic Maps.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2011

Using Chaotic Maps for Encrypting Image and Video Content.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

DustDoctor: A self-healing sensor data collection system.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Identity-based attack detection in mobile wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Adaptive wireless channel probing for shared key generation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Improving energy efficiency of Wi-Fi sensing on smartphones.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Hearing is believing: Detecting mobile primary user emulation attack in white space.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining.
Proceedings of the International Conference on Parallel Processing, 2011

Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Quantifying and Improving DNSSEC Availability.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Quality-Oriented Video Delivery over LTE Using Adaptive Modulation and Coding.
Proceedings of the Global Communications Conference, 2011

Experimental Evaluation of the Impact of Packet Capturing Tools for Web Services.
Proceedings of the Global Communications Conference, 2011

Security and quality provisioning in wireless networks.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
Non-cryptographic authentication and identification in wireless networks.
IEEE Wirel. Commun., 2010

Scheduling Prioritized Services in Multihop OFDMA Networks.
IEEE/ACM Trans. Netw., 2010

A study of overheads and accuracy for efficient monitoring of wireless mesh networks.
Pervasive Mob. Comput., 2010

Resilience technologies in Ethernet.
Comput. Networks, 2010

QuRiNet: a wireless testbed for network and ecological research.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Measuring Availability in the Domain Name System.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Diagnosing Failures in Wireless Networks Using Fault Signatures.
Proceedings of IEEE International Conference on Communications, 2010

Jamming-Resistant Communication: Channel Surfing without Negotiation.
Proceedings of IEEE International Conference on Communications, 2010

Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks.
Proceedings of the Global Communications Conference, 2010

Distributed Scheduling and Routing in Underwater Wireless Networks.
Proceedings of the Global Communications Conference, 2010

QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
Practical Rate and Route Adaptation with Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks
CoRR, 2009

BGP convergence delay after multiple simultaneous router failures: Characterization and solutions.
Comput. Commun., 2009

Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS.
Comput. Commun., 2009

Adaptive per hop differentiation for end-to-end delay assurance in multihop wireless networks.
Ad Hoc Networks, 2009

Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Experimental Anatomy of Packet Losses in Wireless Mesh Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Quality of Name Resolution in the Domain Name System.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
A framework for self-healing and optimizing routing techniques for mobile ad hoc networks.
Wirel. Networks, 2008

Scheduling in multihop WiMAX networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks.
Mob. Networks Appl., 2008

Design and deployment considerations for high performance MIMO testbeds.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

The impact of link-layer retransmissions on video streaming in wireless mesh networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

A cross-layer dropping attack in video streaming over ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Performance evaluation of video streaming in multihop wireless mesh networks.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2008

Heterogeneous wireless access in large mesh networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Efficient monitoring in wireless mesh networks: Overheads and accuracy trade-offs.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Determining 802.11 link quality with passive measurements.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

MARIA: Interference-Aware Admission Control and QoS Routing in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2008

Packet prediction for speculative cut-through switching.
Proceedings of the 2008 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2008

2007
Overlay multicast for MANETs using dynamic virtual mesh.
Wirel. Networks, 2007

LAKER: learning from past actions to guide future behaviors in ad hoc routing.
Wirel. Commun. Mob. Comput., 2007

On the deployment of wireless data back-haul networks.
IEEE Trans. Wirel. Commun., 2007

Analytical modeling and mitigation techniques for the energy hole problem in sensor networks.
Pervasive Mob. Comput., 2007

On the analysis of overlay failure detection and recovery.
Comput. Networks, 2007

On investigating overlay service topologies.
Comput. Networks, 2007

Medium access control in wireless sensor networks.
Comput. Networks, 2007

Metropolitan Ethernet Network: A move from LAN to MAN.
Comput. Networks, 2007

A survey on ultra wide band medium access control schemes.
Comput. Networks, 2007

Quail Ridge Wireless Mesh Network: Experiences, Challenges and Findings.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Energy Consumption and Conservation in WiFi Based Phones: A Measurement-Based Study.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Dynamic Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A hybrid medium access control protocol for underwater wireless networks.
Proceedings of the Second Workshop on Underwater Networks, 2007

Experimental Study of Measurement-based Admission Control for Wireless Mesh Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Admission Control and Interference-Aware Scheduling in Multi-hop WiMAX Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

A Scalable Hybrid Approach to Switching in Metro Ethernet Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

A Proxy View of Quality of Domain Name Service.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Scheduling Multiple Partially Overlapped Channels in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2007

Improving Packet Delivery Performance of BGP During Large-Scale Failures.
Proceedings of the Global Communications Conference, 2007

Cross-over spanning trees Enhancing metro ethernet resilience and load balancing.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
PANDA: A novel mechanism for flooding based route discovery in ad hoc networks.
Wirel. Networks, 2006

Hierarchical multicast techniques and scalability in mobile Ad Hoc networks.
Ad Hoc Networks, 2006

A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

An Efficient Overlay Link Performance Monitoring Technique.
Proceedings of the NETWORKING 2006, 2006

APHD: End-to-End Delay Assurance in 802.11e Based MANETs.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

QuRiNet: quail ridge natural reserve wireless mesh network.
Proceedings of the First ACM Workshop on Wireless Network Testbeds, 2006

WDS-based layer 2 routing for wireless mesh networks.
Proceedings of the First ACM Workshop on Wireless Network Testbeds, 2006

Experimental characterization of an 802.11b wireless mesh network.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Speculative Route Invalidation to Improve BGP Convergence Delay under Large-Scale Failures.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks.
Proceedings of IEEE International Conference on Communications, 2006

Characterization of BGP Recovery Time under Large-Scale Failures.
Proceedings of IEEE International Conference on Communications, 2006

Etherlay: An Overlay Enhancement for Metro Ethernet Networks.
Proceedings of IEEE International Conference on Communications, 2006

Characterizing Quality of Time and Topology in a Time Synchronization Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Improving BGP Convergence Delay for Large-Scale Failures.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Exploiting multi-channel clustering for power efficiency in sensor networks.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

Securing Sensor Networks Using A Novel Multi-Channel Architecture.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
A Context-Aware HTML/XML Document Transmission Process for Mobile Wireless Clients.
World Wide Web, 2005

Using service brokers for accessing backend servers for web applications.
J. Netw. Comput. Appl., 2005

Scalable Testbed for Next-Generation Wireless Networking Technologies Mineo Takai.
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005

Analysis of Windowing and Peering Schemes for Cache Coherency in Mobile Devices.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Virtual Multi-Homing: On the Feasibility of Combining Overlay Routing with BGP Routing.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Experimental characterization of multi-hop communications in vehicular ad hoc network.
Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, 2005

Virtual patrol: a new power conservation design for surveillance using sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

Heterogeneous QoS multicast in Diffserv-like networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2004
QRON: QoS-aware routing in overlay networks.
IEEE J. Sel. Areas Commun., 2004

DiffServ-Aware Multicasting.
J. High Speed Networks, 2004

Group Communications in Mobile Ad Hoc Networks.
Computer, 2004

Guest Editors' Introduction: Internet Data Centers.
Computer, 2004

Multicasting in MPLS domains.
Comput. Commun., 2004

QoS-aware multicasting in DiffServ domains.
Comput. Commun. Rev., 2004

Power conservation and quality of surveillance in target tracking sensor networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

RACE: time series compression with rate adaptivity and error bound for sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Impact of Topology On Overlay Routing Service.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable Multicasting in Mobile Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Qos in mobile a hoc networks.
IEEE Wirel. Commun., 2003

Multicasting: an enabling technology.
IEEE Netw., 2003

Characterization of E-Commerce Traffic.
Electron. Commer. Res., 2003

QMBF: a QoS-aware multicast routing protocol.
Comput. Commun., 2003

ACES: An efficient admission control scheme for QoS-aware web servers.
Comput. Commun., 2003

Overload control in QoS-aware web servers.
Comput. Networks, 2003

LAKER: location aided knowledge extraction routing for mobile ad hoc networks.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Efficient overlay multicast for mobile ad hoc networks.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

CATP: A Context-Aware Transportation Protocol for HTTP.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

HostCast: a new overlay multicasting protocol.
Proceedings of IEEE International Conference on Communications, 2003

A Tree Building Technique for Overlay Multicasting in DiffServ Domains.
Proceedings of the International Conference on Internet Computing, 2003

A novel mechanism for flooding based route discovery in ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Performance Evaluation of Service Differentiating Internet Servers.
IEEE Trans. Computers, 2002

WebGraph: a framework for managing and improving performance of dynamic Web content.
IEEE J. Sel. Areas Commun., 2002

An efficient bandwidth management scheme for real-time Internet applications.
Comput. Commun., 2002

Session-Based Overload Control in QoS-Aware Web Servers.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Edge router multicasting with MPLS traffic engineering.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

QoS-aware multicast protocol using bounded flooding (QMBF) technique.
Proceedings of the IEEE International Conference on Communications, 2002

Multicasting in differentiated service domains.
Proceedings of the Global Telecommunications Conference, 2002

2001
Current research trends in internet servers.
SIGMETRICS Perform. Evaluation Rev., 2001

Using differentiated services to support Internet telephony.
Comput. Commun., 2001

An admission control scheme for predictable server response time for web accesses.
Proceedings of the Tenth International World Wide Web Conference, 2001

Improving Cache Performance of Network Intensive Workloads.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

A framework for managing QoS and improving performance of dynamic Web content.
Proceedings of the Global Telecommunications Conference, 2001

2000
Workshop on Performance and Architecture of Web Servers (PAWS-2000, held in conjection with SIGMETRICS-2000).
SIGMOD Rec., 2000

Scalable internet servers: issues and challenges.
SIGMETRICS Perform. Evaluation Rev., 2000

A random early demotion and promotion marker for assured services.
IEEE J. Sel. Areas Commun., 2000

An application based differentiated service model.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
Asynchronous Tree-Based Multicasting in Wormhole-Switched MINs.
IEEE Trans. Parallel Distributed Syst., 1999

Efficient Admission Control Algorithms for Multimedia Servers.
Multim. Syst., 1999

Dynamic Branch Decoupled Architecture.
Proceedings of the IEEE International Conference On Computer Design, 1999

Providing differentiated service from an Internet server.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
An Efficient Method for Approximating Submesh Reliability of Two-Dimensional Meshes.
IEEE Trans. Parallel Distributed Syst., 1998

Performance Improvement of Allocation Schemes for Mesh-Connected Computers.
J. Parallel Distributed Comput., 1998

Wormhole Routing Techniques for Directly Connected Multicomputer Systems.
ACM Comput. Surv., 1998

Stream Scheduling Algorithms for Multimedia Storage Servers.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Processor allocation using user directives in mesh-connected multicomputer systems.
Proceedings of the 5th International Conference On High Performance Computing, 1998

1997
A Traffic-Balanced Adaptive Wormhole-Routing Scheme for Two-Dimensional Meshes.
IEEE Trans. Computers, 1997

Dynamic Real-Time Task Scheduling on Hypercubes.
J. Parallel Distributed Comput., 1997

Tree-Based Multicasting on Wormhole Routed Multistage Interconnection Networks.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

An Integrated Processor Management Scheme for the Mesh-Connected Multicomputer Systems.
Proceedings of the 1997 International Conference on Parallel Processing (ICPP '97), 1997

An Aggressive Admission Control Algorithms for Multimedia Servers.
Proceedings of the International Conference on Multimedia Computing and Systems, 1997

1996
Performance Analysis of Finite-Buffered Asynchronous Multistage Interconnection Networks.
IEEE Trans. Parallel Distributed Syst., 1996

Allocation and Mapping Based Reliability Analysis of Multistage Interconnection Networks.
IEEE Trans. Computers, 1996

Processor Allocation Using Partitioning in Mesh Connected Parallel Computers.
J. Parallel Distributed Comput., 1996

A hardware multicast routing algorithm for two-dimensional meshes.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

On-line real-time task scheduling on partitionable multiprocessors.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

Performance Study of RAID-5 Disk Arrays with Data and Parity Cache.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

An Adaptive Job Allocation Method for Directly-Connected Multicomputer Systems.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
On Dependability Evaluation of Mesh-Connected Processors.
IEEE Trans. Computers, 1995

A Lazy Scheduling Scheme for Hypercube Computers.
J. Parallel Distributed Comput., 1995

An efficient processor allocation scheme for mesh connected parallel computers.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Dual-Crosshatch Disk Array: A Highly Reliable Hybrid-RAID Architecture.
Proceedings of the 1995 International Conference on Parallel Processing, 1995

Efficient and Balanced Adaptive Routing in Two-Dimensional Meshes.
Proceedings of the 1st IEEE Symposium on High-Performance Computer Architecture (HPCA 1995), 1995

1994
Performance Analysis of Cluster-Based Multiprocessors.
IEEE Trans. Computers, 1994

Performance Analysis of Combining Multistage Interconnection Networks.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

1993
An Availability Model for MIN-Based Multiprocessors.
IEEE Trans. Parallel Distributed Syst., 1993

A Lazy Scheduling Scheme for Improving Hypercube Performance.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

A Queuing Model for Finite-Buffered Multistage Interconnection Networks.
Proceedings of the 1993 International Conference on Parallel Processing, 1993


  Loading...