Nael B. Abu-Ghazaleh

Orcid: 0000-0002-9485-5370

Affiliations:
  • University of California, Riverside, USA


According to our database1, Nael B. Abu-Ghazaleh authored at least 217 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Spectre Returns! Speculation Attacks Using the Return Stack Buffer.
IEEE Des. Test, 2024

Token-based Vehicular Security System (TVSS): Scalable, Secure, Low-latency Public Key Infrastructure for Connected Vehicles.
CoRR, 2024

Core Graph: Exploiting Edge Centrality to Speedup the Evaluation of Iterative Graph Queries.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
Microarchitectural Attacks in Heterogeneous Systems: A Survey.
ACM Comput. Surv., 2023

May the Noise be with you: Adversarial Training without Adversarial Examples.
CoRR, 2023

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems.
CoRR, 2023

Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches.
CoRR, 2023

Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks.
CoRR, 2023

Graph Analytics on Evolving Data (Abstract).
CoRR, 2023

That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications.
CoRR, 2023

Plug and Pray: Exploiting off-the-shelf components of Multi-Modal Models.
CoRR, 2023

Learn to Compress (LtC): Efficient Learning-based Streaming Video Analytics.
CoRR, 2023

DeepMem: ML Models as storage channels and their (mis-)applications.
CoRR, 2023

It's all in your head(set): Side-channel attacks on AR/VR systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Going through the motions: AR/VR keylogging from user head motions.
Proceedings of the 32nd USENIX Security Symposium, 2023

MEGA Evolving Graph Accelerator.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems.
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023

CommonGraph: Graph Analytics on Evolving Data (Abstract).
Proceedings of the 2023 ACM Workshop on Highlights of Parallel Computing, 2023

Jedi: Entropy-Based Localization and Removal of Adversarial Patches.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

CommonGraph: Graph Analytics on Evolving Data.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
DNS Poisoning of Operating System Caches: Attacks and Mitigations.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion.
IEEE Trans. Computers, 2022

Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks.
CoRR, 2022

EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

CVGuard: Mitigating Application Attacks on Connected Vehicles.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Side Channel Attacks on GPUs.
IEEE Trans. Dependable Secur. Comput., 2021

Beyond the CPU: Side-Channel Attacks on GPUs.
IEEE Des. Test, 2021

SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments.
Proceedings of the 30th USENIX Security Symposium, 2021

DisCo: Combining Disassemblers for Improved Performance.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

JetStream: Graph Analytics on Streaming Data with Event-Driven Hardware Accelerator.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Securing Connected Vehicle Applications with an Efficient Dual Cyber- Physical Blockchain Framework.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Secure Ramp Merging using Blockchain.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

BlockMaestro: Enabling Programmer-Transparent Task-based Execution in GPU Systems.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

MSS: Lightweight network authentication for resource constrained devices via Mergeable Stateful Signatures.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Defensive approximation: securing CNNs using approximate computing.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers.
IEEE Trans. Dependable Secur. Comput., 2020

Defensive Approximation: Enhancing CNNs Security through Approximate Computing.
CoRR, 2020

Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SpecROP: Speculative Exploitation of ROP Chains.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

GraphPulse: An Event-Driven Hardware Accelerator for Asynchronous Graph Processing.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

BOW: Breathing Operand Windows to Exploit Bypassing in GPUs.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

Securing Machine Learning Architectures and Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
SDSense: An Agile and Flexible SDN-Based Framework for Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2019

PDES-A: Accelerators for Parallel Discrete Event Simulation Implemented on FPGAs.
ACM Trans. Model. Comput. Simul., 2019

Locality-Aware GPU Register File.
IEEE Comput. Archit. Lett., 2019

IDAPro for IoT Malware analysis?
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Application level attacks on Connected Vehicle Protocols.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

LATCH: A Locality-Aware Taint CHecker.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019

Collaborative Client-Side DNS Cache Poisoning Attack.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

GPUGuard: mitigating contention based side and covert channel attacks on GPUs.
Proceedings of the ACM International Conference on Supercomputing, 2019

PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

CORF: Coalescing Operand Register File for GPUs.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications.
IEEE Trans. Dependable Secur. Comput., 2018

In-Register Parameter Caching for Dynamic Neural Nets with Virtual Persistent Processor Specialization.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018

Performance Implications of Global Virtual Time Algorithms on a Knights Landing Processor.
Proceedings of the 22nd IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2018

Rendered Insecure: GPU Side Channel Attacks are Practical.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

BranchScope: A New Side-Channel Attack on Directional Branch Predictor.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
Covert Channels on GPGPUs.
IEEE Comput. Archit. Lett., 2017

Performance Characterization of Parallel Discrete Event Simulation on Knights Landing Processor.
Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, 2017

PDES-A: a Parallel Discrete Event Simulation Accelerator for FPGAs.
Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, 2017

Constructing and characterizing covert channels on GPGPUs.
Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, 2017

RHMD: evasion-resilient hardware malware detectors.
Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, 2017

Hardening extended memory access control schemes with self-verified address spaces.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks.
Proceedings of the 54th Annual Design Automation Conference, 2017

2016
Efficient and Consistent Path Loss Model for Mobile Network Simulation.
IEEE/ACM Trans. Netw., 2016

Hardware-Based Malware Detection Using Low-Level Architectural Features.
IEEE Trans. Computers, 2016

Understanding and Mitigating Covert Channels Through Branch Predictors.
ACM Trans. Archit. Code Optim., 2016

Rethinking Memory Permissions for Protection Against Cross-Layer Attacks.
ACM Trans. Archit. Code Optim., 2016

Wireless Software Defined Networking: A Survey and Taxonomy.
IEEE Commun. Surv. Tutorials, 2016

Jump over ASLR: Attacking branch predictors to bypass ASLR.
Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, 2016

CTCV: A protocol for Coordinated Transport of Correlated Video in Smart Camera Networks.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A high-resolution side-channel attack on last-level cache.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
AIR: Application-Level Interference Resilience for PDES on Multicore Systems.
ACM Trans. Model. Comput. Simul., 2015

Signature-Based Protection from Code Reuse Attacks.
IEEE Trans. Computers, 2015

Ensemble Learning for Low-Level Hardware-Supported Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Covert channels through branch predictors: a feasibility study.
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015

Controlled Contention: Balancing Contention and Reservation in Multicore Application Scheduling.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium, 2015

Malware-aware processors: A framework for efficient online malware detection.
Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture, 2015

2014
Parallel Discrete Event Simulation for Multi-Core Systems: Analysis and Optimization.
IEEE Trans. Parallel Distributed Syst., 2014

Interaction Engineering: Achieving Perfect CSMA Handshakes in Wireless Networks.
IEEE Trans. Mob. Comput., 2014

SIFT: Low-Complexity Energy-Efficient Information Flow Tracking on SMT Processors.
IEEE Trans. Computers, 2014

Efficiently Securing Systems from Code Reuse Attacks.
IEEE Trans. Computers, 2014

Exploring many-core architecture design space for parallel discrete event simulation.
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2014

Iso-X: A Flexible Architecture for Hardware-Managed Isolated Execution.
Proceedings of the 47th Annual IEEE/ACM International Symposium on Microarchitecture, 2014

On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014

2013
Coverage algorithms for visual sensor networks.
ACM Trans. Sens. Networks, 2013

Can PDES scale in environments with heterogeneous delays?
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2013

Interference resilient PDES on multi-core systems: towards proportional slowdown.
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2013

A File System Abstraction for Sense and Respond Systems.
Proceedings of the Workshop on End-to-End, 2013

Double Regression: Efficient spatially correlated path loss model for wireless network simulation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SCRAP: Architecture for signature-based protection from Code Reuse Attacks.
Proceedings of the 19th IEEE International Symposium on High Performance Computer Architecture, 2013

2012
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks.
ACM Trans. Archit. Code Optim., 2012

Analysis of TCP performance on multi-hop wireless networks: A cross layer approach.
Ad Hoc Networks, 2012

Packet aggregation in multi-rate wireless LANs.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Performance Analysis of a Multithreaded PDES Simulator on Multicore Clusters.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

Characterizing and Understanding PDES Behavior on Tilera Architecture.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

Partitioning on Dynamic Behavior for Parallel Discrete Event Simulation.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

Coverage management for mobile targets in visual sensor networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Branch regulation: Low-overhead protection from code reuse attacks.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

Optimization of Parallel Discrete Event Simulator for Multi-core Systems.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium, 2012

2011
The effect of contention in CSMA networks: Model and fairness protocol.
Perform. Evaluation, 2011

Link quality analysis and measurement in wireless mesh networks.
Ad Hoc Networks, 2011

Target-oriented coverage maximization in visual sensor networks.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

Is there a need for multiple APs in home networks?
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

Getting CS undergraduates to communicate effectively.
Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2011

TPM-SIM: a framework for performance evaluation of trusted platform modules.
Proceedings of the 48th Design Automation Conference, 2011

SIFT: a low-overhead dynamic information flow tracking architecture for SMT processors.
Proceedings of the 8th Conference on Computing Frontiers, 2011

2010
Exploiting slack time for just-in-time scheduling in wireless sensor networks.
Real Time Syst., 2010

Modeling and analysis of two-flow interactions in wireless networks.
Ad Hoc Networks, 2010

A MAC interaction aware routing metric in wireless network.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

Interaction engineering: taming of the CSMA.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010

A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors.
Proceedings of the Computer Network Security, 2010

A realistic model of co-located interference for wireless network packet simulation.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Scalable target coverage in smart camera networks.
Proceedings of the 2010 Fourth ACM/IEEE International Conference on Distributed Smart Cameras, Atlanta, GA, USA - August 31, 2010

Performance Evaluation of PDES on Multi-core Clusters.
Proceedings of the DS-RT '10 Proceedings of the 2010 IEEE/ACM 14th International Symposium on Distributed Simulation and Real Time Applications, 2010

2009
Congestion and Flow Control in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Congestion Control in Wireless Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

Modeling and analysis of wireless networks: Selected papers from MSWiM 2007.
Perform. Evaluation, 2009

Backoff Algorithms for Fading Wireless Channels?
Ad Hoc Sens. Wirel. Networks, 2009

TARP: Timing Analysis Resilient Protocol for Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Interference across Multi-hop Wireless Chains.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Estimated Measurement-Based Markov Models: Towards Flexible and Accurate Modeling of Wireless Channels.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

On the Accuracy of RFID-based Localization in a Mobile Wireless Network Testbed.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

How do wireless chains behave?: the impact of MAC interactions.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Contention in multi-hop wireless networks: model and fairness analysis.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2009

TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

2008
An application-driven approach to designing secure wireless sensor networks.
Wirel. Commun. Mob. Comput., 2008

Globally Aware Routing in Multi-Hop Wireless Networks: a Formulation and Analysis.
J. Interconnect. Networks, 2008

Aligned virtual coordinates for greedy geometric routing in WSNs.
Int. J. Sens. Networks, 2008

Stateless and Delivery Guaranteed Geometric Routing on Virtual Coordinate System
CoRR, 2008

Guest Editorial.
Comput. Networks, 2008

Scheduling aware network flow models for multi-hop wireless networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Stateless and guaranteed geometric routing on virtual coordinate systems.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks.
Proceedings of the LCN 2008, 2008

Self-interference in Multi-hop Wireless Chains: Geometric Analysis and Performance Study.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

On Backoff in Fading Wireless Channels.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Location verification and trust management for resilient geographic routing.
J. Parallel Distributed Comput., 2007

Proxy-based Grid Information Dissemination.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Towards Interference-Aware Routing for Real-time Traffic in Multi-hop Wireless Networks.
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications, 2007

2006
The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks
CoRR, 2006

The Aligned-Coordinated Geographical Routing for Multihop Wireless Networks
CoRR, 2006

TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks
CoRR, 2006

JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

An application-driven perspective on wireless sensor network security.
Proceedings of the Q2SWinet'06, 2006

Aligned Virtual Coordinates for Greedy Routing in WSNs.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Adaptive Approach to Information Dissemination in Self-Organizing Grids.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

Toward Self Organizing Grids.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

An Adaptive Algorithm for Information Dissemination in Self-Organizing Grids.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Limiting Optimism: Time or Event Count?
Proceedings of the 10th IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT 2006), 2006

Automatic Clustering for Self-Organizing Grids.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

Analysis of Query Matching Criteria and Resource Monitoring Models for Grid Application Scheduling.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

File System Support for Adjustable Resolution Applications in Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

Virtual Coordinates with Backtracking for Void Traversal in Geographic Routing.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
Collaborative storage management in sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2005

Virtual Coordinate Backtracking for Void Traversal in Geographic Routing
CoRR, 2005

On the Effect of Fading on Ad hoc Networking
CoRR, 2005

Analysis of micro-level behavior of ad hoc network MAC.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Directed broadcast: a MAC level primitive for robust network broadcast.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Route compaction for directional route discovery in MANETs.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Controlling the Coverage of Grid Information Dissemination Protocols.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Towards resilient geographic routing in WSNs.
Proceedings of the Q2SWinet'05, 2005

Robustness of network-wide broadcasts in MANETs.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent.
Proceedings of the 13th International Symposium on Modeling, 2005

Dynamic localization control for mobile sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Dynamic Resource Discovery for Sensor Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Dynamic Localization Protocols for Mobile Sensor Networks
CoRR, 2004

Non-uniform Information Dissemination for Sensor Networks
CoRR, 2004

Towards Reliable Network Wide Broadcast in Mobile Ad Hoc Networks
CoRR, 2004

Non-Uniform Information Dissemination for Dynamic Grid Resource Discovery.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Avoiding Head of Line Blocking in Directional Antenna.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Message from the Chairs: International Workshop on Mobile and Wireless Networking.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2003
Preemptive routing in ad hoc networks.
J. Parallel Distributed Comput., 2003

2002
A taxonomy of wireless micro-sensor network models.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002

Verification caching: towards efficient and secure mobile code execution environments.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Early cancellation: an active NIC optimization for time-warp.
Proceedings of the 16th Workshop on Parallel and Distributed Simulation, 2002

Infrastructure tradeoffs for sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

Using Programmable NICs for Time-Warp Optimization.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

On the Structure of Concurrent Interpreters.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
A performance and scalability analysis framework for parallel discrete event simulators.
Simul. Pract. Theory, 2001

A concurrent migration extension to an end-to-end host mobility architecture.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001

The Shared Control Parallel Architecture Model.
J. Parallel Distributed Comput., 2001

Architectural Support for Data-intensive Applications.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

A Distributed Multiple-SIMD Intelligent Memory.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

Analysis of TCP Performance on Wireless Ad Hoc Networks Utilizing Preemptive Maintenance Routing.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

Parallel Standard Cell Placement on a Cluster of Workstations.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001

PPIM-SIM: An Efficient Simulator for a Parallel Processor in Memory.
Proceedings of the Proceedings 34th Annual Simulation Symposium (SS 2001), 2001

2000
On the Design of ORBIT.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000

1999
Managing control asynchrony on SIMD machines - A survey.
Adv. Comput., 1999

Time Warp Simulation on Clumps.
Proceedings of the Thirteenth Workshop on Parallel and Distributed Simulation, 1999

Performance Benefits of Optimism in Fossil Collection.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Optimizing Message Delivery in Asynchronous Distributed Applications.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

Using Automatable Proof Obligations for Component-Based Design Checking.
Proceedings of the 6th Symposium on Engineering of Computer-Based Systems (ECBS '99), 1999

ORBIT: An Environment for Component-Based Heterogeneous Design and Analysis.
Proceedings of the 6th Symposium on Engineering of Computer-Based Systems (ECBS '99), 1999

1998
Models for Control Unit Synchronization on Shared Control Architectures.
J. Parallel Distributed Comput., 1998

OFC: A Distributed Fossil-Collection Algorithm for Time-Warp.
Proceedings of the Distributed Computing, 12th International Symposium, 1998

An Active Layer Extension to MPI.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 1998

Optimizing Communication in Time-Warp Simulators.
Proceedings of the 12th Workshop on Parallel and Distributed Simulation, 1998

On-line Configuration of a Time Warp Parallel Discrete Event Simulator.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Shared Control - Supporting Control Parallelism Using a SIMD-like Architecture.
Proceedings of the Euro-Par '98 Parallel Processing, 1998

1997
Synthesizing Variable Instruction Issue Interpreters for Implementing Functional Parallelism on SIMD Computers.
IEEE Trans. Parallel Distributed Syst., 1997

Variable Instruction Scheduling for MIMD Interpretation on Pipelined SIMD Machines and for Compositional Instruction Sets.
Concurr. Pract. Exp., 1997

A Framework for Performance Analysis of Parallel Discrete Event Simulators.
Proceedings of the 29th conference on Winter simulation, 1997

1995
On the Complexity of Scheduling MIMD Operations for SIMD Interpreation.
J. Parallel Distributed Comput., 1995

1994
Variable Instruction Issue for Efficient MIMD Interpretation on SIMD Machines.
Proceedings of the 8th International Symposium on Parallel Processing, 1994

Composing Functional Unit Blocks for Efficient Interpretation of MIMD Code Sequences on SIMD Processors.
Proceedings of the Parallel Processing: CONPAR 94, 1994


  Loading...