Douglas C. Sicker

Affiliations:
  • Carnegie Mellon University, Department of Engineering and Public Policy, Pittsburgh, PA, USA
  • University of Colorado, Boulder, CO, USA (former)


According to our database1, Douglas C. Sicker authored at least 105 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective.
Proceedings of the American Control Conference, 2022

2020
An Analytical Model for Efficient Indoor THz Access Point Deployment.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SHINE (Strategies for High-frequency INdoor Environments) with Efficient THz-AP Placement.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Polarizing Tweets on Climate Change.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Ultra-dense low data rate (UDLD) communication in the THz.
Proceedings of the NANOCOM '20: The Seventh Annual ACM International Conference on Nanoscale Computing and Communication, 2020

Reliable THz Communications for Outdoor based Applications- Use Cases and Methods.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Generalized Hybrid Beamforming for Vehicular Connectivity Using THz Massive MIMO.
IEEE Trans. Veh. Technol., 2019

On the Application of Blockchains to Spectrum Management.
IEEE Trans. Cogn. Commun. Netw., 2019

Part 15++: An Enhanced ID-Based Approach for Etiquette and Enforcement Management in Unlicensed Band.
IEEE Trans. Cogn. Commun. Netw., 2019

Terahertz-Enabled Wireless System for Beyond-5G Ultra-Fast Networks: A Brief Survey.
IEEE Netw., 2019

Policy and Regulatory Issues.
IEEE Internet Things Mag., 2019

The Breadth of Policy and Regulatory Issues Facing IoT.
IEEE Internet Things Mag., 2019

Cybersecurity education in a developing nation: the Ecuadorian environment.
J. Cybersecur., 2019

Can Privacy Nudges be Tailored to Individuals' Decision Making and Personality Traits?
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Parameter Modeling for Small-Scale Mobility in Indoor THz Communication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Policy and Regulatory Issues.
IEEE Internet Things Mag., 2018

Cybersecurity incident response capabilities in the Ecuadorian financial sector.
J. Cybersecur., 2018

Identifier Based Greedy Approach for Mitigating Harmful Interference.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Improving Spectrum Efficiency in Heterogeneous Networks Using Granular Identification.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2018

2017
Analysis of the experimental licenses of the Federal Communications Commission (FCC).
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

2016
Transmission Schemes for Multicasting Hard Deadline Constrained Prioritized Data in Wireless Multimedia Streaming.
IEEE Trans. Wirel. Commun., 2016

Dynamic data center load response to variability in private and public electricity costs.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

2015
GRaTIS: Free Bits in the Network.
IEEE Trans. Mob. Comput., 2015

2014
Optimization Decomposition for Scheduling and System Configuration in Wireless Networks.
IEEE/ACM Trans. Netw., 2014

Measuring Broadband Internet Prices.
J. Telecommun. High Technol. Law, 2014

Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors.
Int. J. Strateg. Inf. Technol. Appl., 2014

Hybrid cellular-MANETs: An energy-aware routing design.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014

Hybrid cellular-MANETs in practice: A microblogging system for smart devices in disaster areas.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

WASP: a software-defined communication layer for hybrid wireless networks.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
A Survey on Biologically Inspired Algorithms for Computer Networking.
IEEE Commun. Surv. Tutorials, 2013

A Survey of Wireless Path Loss Prediction and Coverage Mapping Methods.
IEEE Commun. Surv. Tutorials, 2013

Self-organized context-aware hybrid MANETs.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

CODIPHY: composing on-demand intelligent physical layers.
Proceedings of the second workshop on Software radio implementation forum, 2013

2012
A smartphone-based traffic information service platform for pedestrian and bicycle systems.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

Secret Agent Radio: Covert Communication through Dirty Constellations.
Proceedings of the Information Hiding - 14th International Conference, 2012

Practical radio environment mapping with geostatistics.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

GRaTIS: Sensing and intelligence for performance in the presence of legacy networks.
Proceedings of the 7th International Conference on Cognitive Radio Oriented Wireless Networks, 2012

2011
Modeling environmental effects on directionality in wireless networks.
Math. Comput. Model., 2011

The Stability of The Longley-Rice Irregular Terrain Model for Typical Problems
CoRR, 2011

Finding Event-Specific Influencers in Dynamic Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

The Efficacy of Path Loss Models for Fixed Rural Wireless Links.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

2010
Modeling and Performance Analysis of the Movement-Based Registration with Implicit Registration.
IEICE Trans. Commun., 2010

Challenges in Deploying Steerable Wireless Testbeds.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010

Understanding the joint application of wireless optimizations.
Proceedings of the Fifth ACM International Workshop on Wireless Network Testbeds, 2010

Practical implementation of blind synchronization in NC-OFDM based cognitive radio networks.
Proceedings of the 2010 ACM Workshop on Cognitive Radio Networks, CoRoNet@MOBICOM 2010, 2010

Active radar - A cooperative approach using multicarrier communication.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

Practical Defenses for Evil Twin Attacks in 802.11.
Proceedings of the Global Communications Conference, 2010

An architecture for software defined cognitive radio.
Proceedings of the 2010 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2010

2009
Low Latency in Wireless Mesh Networks.
Proceedings of the Guide to Wireless Mesh Networks, 2009

Wireless innovation through software radios.
Comput. Commun. Rev., 2009

Local control of cognitive radio networks.
Ann. des Télécommunications, 2009

Techniques for simulation of realistic infrastructure wireless network traffic.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

The impact of directional antenna models on simulation accuracy.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

BitStalker: Accurately and efficiently monitoring bittorrent traffic.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Performing traffic analysis on a wireless identifier-free link layer.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Physical Layer Attacks on Unlinkability in Wireless LANs.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

SniffMob: inferring human contact patterns using wireless devices.
Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements, 2009

Predicting Tor path compromise by exit port.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

PHY Aided MAC - A New Paradigm.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Examining the Viability of Broadband Wireless Access under Alternative Licensing Models in the TV Broadcast Bands.
EURASIP J. Wirel. Commun. Netw., 2008

An intelligent physical layer for cognitive radio networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Multichannel Wormhole Switching vs. CSMA/CA for Wireless Mesh Networking.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Enhancing Cognitive Radio Algorithms Through Efficient, Automatic Adaptation Management.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Modeling directionality in wireless networks: extended abstract.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

BitBlender: Light-Weight Anonymity for BitTorrent.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Shining Light in Dark Places: Understanding the Tor Network.
Proceedings of the Privacy Enhancing Technologies, 2008

Applying models of user activity for dynamic power management in wireless devices.
Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, 2008

Scalability of cognitive radio control algorithms.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Dynamic Control Channel Assignment in Cognitive Radio Networks Using Swarm Intelligence.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Interference Mitigation In Wireless Mesh Networks Through STDMA Wormhole Switching.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

Local Independent Control of Cognitive Radio Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

Robust Coverage and Performance Testing for Large-Area Wireless Networks.
Proceedings of the AccessNets, Third International Conference on Access Networks, 2008

2007
A Statistical Method for Reconfiguration of Cognitive Radios.
IEEE Wirel. Commun., 2007

The Analog Hole and the Price Of Music: An Empirical Study.
J. Telecommun. High Technol. Law, 2007

The technology of dynamic spectrum access and its challenges [Guest Editorial].
IEEE Commun. Mag., 2007

Modeling and Optimization of Zone-Based Registration for Mobile Communication Network.
Asia Pac. J. Oper. Res., 2007

Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems.
Adv. Multim., 2007

Low-resource routing attacks against tor.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

What a cognitive radio network could learn from a school of fish.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Legal issues surrounding monitoring during network research.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Low-Latency Multichannel Wireless Mesh Networks.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Experiences Implementing Cognitive Radio Control Algorithms.
Proceedings of the Global Communications Conference, 2007

Optimizing for sparse training of Cognitive Radio networks.
Proceedings of the First International Workshop on Cognitive Wireless Networks, 2007

Implementation of a Reconfiguration Algorithm for Cognitive Radio.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

Frame shared memory: line-rate networking on commodity hardware.
Proceedings of the 2007 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2007

2006
Trait-Based Authorization Requirements for the Session Initiation Protocol (SIP).
RFC, August, 2006

Using SAML to protect the session initiation protocol (SIP).
IEEE Netw., 2006

Misunderstanding the Layered Model(s).
J. Telecommun. High Technol. Law, 2006

Safety and certification for new radio technologies.
IEEE Commun. Mag., 2006

IEEE Optical Communications [Guest editorial].
IEEE Commun. Mag., 2006

MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs.
Proceedings of the 4th International Conference on Mobile Systems, 2006

2005
Performance Analysis and Optimization of an Improved Dynamic Movement-Based Location Update Scheme in Mobile Cellular Networks.
Proceedings of the Computational Science and Its Applications, 2005

Multi layer rules based framework for vertical handoff.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

2004
Security and Lock-In.
Proceedings of the Economics of Information Security, 2004

VoIP Security: Not an Afterthought.
ACM Queue, 2004

An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment.
Inf. Syst. Frontiers, 2004

Selective encryption for consumer applications.
IEEE Commun. Mag., 2004

2003
A Federated Model for Secure Web-Based Videoconferencing.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Applying a Layered Policy Model to IP Based Voice Services.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Refinements of a Layered Model for Telecommunications Policy.
J. Telecommun. High Technol. Law, 2002


  Loading...