Aaron Striegel

According to our database1, Aaron Striegel authored at least 98 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Long-term Compliance Habits: What Early Data Tells Us.
CoRR, 2018

SEWS: A Channel-Aware Stall-Free WiFi Video Streaming Mechanism.
Proceedings of the 28th ACM SIGMM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2018

2017
Discovering places of interest using sensor data from smartphones and wearables.
Proceedings of the 2017 IEEE SmartWorld, 2017

Leveraging Frame Aggregation for Estimating WiFi Available Bandwidth.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Leveraging frame aggregation to improve access point selection.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Redundancy elimination might be overrated: A quantitative study on wireless traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

PASS: Content Pre-Staging through Provider Accessible Storage Service.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Estimating dining hall usage using bluetooth low energy beacons.
Proceedings of the Adjunct Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, 2017

RadioHound: A pervasive sensing platform for sub-6 GHz dynamic spectrum monitoring.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

Exploring Compliance: Observations from a Large Scale Fitbit Study.
Proceedings of the 2nd International Workshop on Social Sensing, 2017

2016
On the Interplay Between Individuals' Evolving Interaction Patterns and Traits in Dynamic Multiplex Social Networks.
IEEE Trans. Network Science and Engineering, 2016

Guest Editorial: Special Issue on Cognitive, Cellular and Mobile Networks.
EAI Endorsed Trans. Wireless Spectrum, 2016

Gender Differences in Communication Behaviors, Spatial Proximity Patterns, and Mobility Habits.
CoRR, 2016

RadioHound: A Pervasive Sensing Network for Sub-6 GHz Dynamic Spectrum Monitoring.
CoRR, 2016

Redundancy Elimination Might Be Overrated: A Quantitative Study on Real-World Wireless Traffic.
CoRR, 2016

Local versus global biological network alignment.
Bioinformatics, 2016

FMNC - rapid and accurate wifi characterization: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Experiences measuring sleep and physical activity patterns across a large college cohort with fitbits.
Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scans.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On the economics of mobile content pre-staging.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

The 7th international workshop on hot topics in planet-scale measurement (HotPlanet '16).
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

2015
Is There WiFi Yet? How Aggressive WiFi Probe Requests Deteriorate Energy and Throughput.
CoRR, 2015

Toward a System for Longitudinal Emotion Sensing.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
Face-to-Face Proximity EstimationUsing Bluetooth On Smartphones.
IEEE Trans. Mob. Comput., 2014

An exploratory investigation of message-person congruence in information security awareness campaigns.
Computers & Security, 2014

Analyzing the impact of proximity, location, and personality on smartphone usage.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Characterizing the utility of smartphone background traffic.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Is more P2P always bad for ISPs? An analysis of P2P and ISP business models.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A management system for motion-based gaming peripherals for physical therapy instrumentation.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

LTE and WiFi: Experiences with Quality and Consumption.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Evaluating the Raw Potential for Device-to-Device Caching via Co-location.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Systematic Dynamic and Heterogeneous Analysis of Rich Social Network Data.
Proceedings of the Complex Networks V, 2014

2013
Lessons learned from the netsense smartphone study.
Computer Communication Review, 2013

Modifying smartphone user locking behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Lessons learned from the netsense smartphone study.
Proceedings of the 5th ACM workshop on Hot topics in planet-scale measurement, 2013

Exploring the potential in practice for opportunistic networks amongst smart mobile devices.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Save for Later: A Technique for Improving End-to-End Mesh Network Performance.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Re-Thinking 802.11 Rate Selection in the Face of Non-Altruistic Behavior.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Preserving location privacy on the release of large-scale mobility data.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Could firewall rules be public - a game theoretical perspective.
Security and Communication Networks, 2012

Intelligent network management using graph differential anomaly visualization.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Fighting botnets with economic uncertainty.
Security and Communication Networks, 2011

Visualizing anomalies in sensor networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

SAVE: Sensor anomaly visualization engine.
Proceedings of the 2011 IEEE Conference on Visual Analytics Science and Technology, 2011

Accurate Extraction of Face-to-Face Proximity Using Smartphones and Bluetooth.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Managing networks through context: Graph visualization and exploration.
Computer Networks, 2010

Visualizing graph dynamics and similarity for enterprise network security and management.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

2009
An Exploration of the Effects of State Granularity through (m, k) Real-Time Streams.
IEEE Trans. Computers, 2009

Reflections on the virtues of modularity: a case study in linux security modules.
Softw., Pract. Exper., 2009

End-wise admission control delegation for effective end-to-end quality of service.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Is High Definition a natural DRM?
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Fast Admission Control for Short TCP Flows.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning.
ACM Trans. Inf. Syst. Secur., 2008

Using selective, short-term memory to improve resilience against DDoS exhaustion attacks.
Security and Communication Networks, 2008

Biomolecular committor probability calculation enabled by processing in network storage.
Parallel Computing, 2008

Making the best of a bad situation: Prioritized storage management in GEMS.
Future Generation Comp. Syst., 2008

Wireless reliability: Rethinking 802.11 packet loss.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Power and performance characteristics of USB flash drives.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Botnet Economics: Uncertainty Matters.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

ENAVis: Enterprise Network Activities Visualization.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium.
Proceedings of the LCN 2008, 2008

A Light Weight Method for Maintaining Clock Synchronization for Networked Systems.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
A case for Passive Application Layer Multicast.
Computer Networks, 2007

JumboGen: dynamic jumbo frame generation for network performance scalability.
Computer Communication Review, 2007

DETOUR: Delay- and Energy-Aware Multi-Path Routing in Wireless Ad Hoc Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Authentication anomaly detection: a case study on a virtual private network.
Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, 2007

Biomolecular Path Sampling Enabled by Processing in Network Storage.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Improving medium-sized media clip distribution through transparent tail synchronization.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

SAABCOT: Secure application-agnostic bandwidth conservation techniques.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

Effects of Low-Quality Computation Time Estimates in Policed Schedulers.
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007

2006
CLog: Low Cost Gigabit Full Packet Logging.
JCM, 2006

A distributed traffic control scheme based on edge-centric resource management.
Computer Communication Review, 2006

Resolving WPA limitations in SOHO and open public wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Granularity Aware (m, k) Queue Management for Real-time Media Servers.
Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2006), 2006

High Speed Packet Logging on a Budget.
Proceedings of the NETWORKING 2006, 2006

Improving Packet Caching Scalability Through the Concept of an Explicit End of Data Marker.
Proceedings of the 1st IEEE Workshop on Hot Topics in Web Systems and Technologies, 2006

Combating imbalance in network intrusion datasets.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
Separating Abstractions from Resources in a Tactical Storage System.
Proceedings of the ACM/IEEE SC2005 Conference on High Performance Networking and Computing, 2005

A Novel Approach for Transparent Bandwidth Conservation.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Trusted Security Devices for Bandwidth Conservation in IPSec Environments.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Generosity and gluttony in GEMS: grid enabled molecular simulations.
Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, 2005

GIPSE: Streamlining the Management of Simulation on the Grid.
Proceedings of the Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 2005

2004
DSMCast: a scalable approach for DiffServ multicasting.
Computer Networks, 2004

Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment.
Proceedings of the NETWORKING 2004, 2004

2003
Dynamic class-based queue management for scalable media servers.
Journal of Systems and Software, 2003

EBM: A New Approach for Scalable DiffServ Multicasting.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

2002
Packet scheduling with delay and loss differentiation.
Computer Communications, 2002

Dynamic DSCPs for heterogeneous QoS in DiffServ multicasting.
Proceedings of the Global Telecommunications Conference, 2002

Edge-Based Fault Detection in a DiffServ Network.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
A Protocol Independent Internet Gateway for Ad Hoc Wireless Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

A Scalable Protocol for Member Join/Leave in DiffServ Multicast.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

A Scalable QoS Adaptation Scheme for Media Servers.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

A scalable approach for DiffServ multicasting.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Best-effort scheduling of (m, k)-firm real-time streams in multihop networks.
Computer Communications, 2000

Dynamic Class-Based Queue Management for Scalable Media Servers.
Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium, RTAS 2000, Washington, DC, USA, May 31, 2000

Best-Effort Scheduling of (m, k)-Firm Real-Time Streams in Multihop Networks.
Proceedings of the Parallel and Distributed Processing, 2000


  Loading...