Novia Nurain

Orcid: 0009-0007-1820-6129

According to our database1, Novia Nurain authored at least 26 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
How do I compare to the other people?": Older Adults' Perspectives on Personal Smart Home Data for Self-Management".
Proc. ACM Hum. Comput. Interact., 2023

A Rapid, Iterative, and Remote (RIR) Method for Designing Translational Tools: Study Experience and Lessons Learned.
Proceedings of the Companion Publication of the 2023 ACM Designing Interactive Systems Conference, 2023

"I left my legacy, told my story": Understanding Older Adults' Tracking Practices to Promote Active Aging.
Proceedings of the 2023 ACM Designing Interactive Systems Conference, 2023

2022
"I hope I never need one": Unpacking Stigma in Aging in Place Technology.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Hugging with a Shower Curtain: Older Adults' Social Support Realities During the COVID-19 Pandemic.
Proc. ACM Hum. Comput. Interact., 2021

Older Adults' Experiences of Autonomy During COVID-19 Pandemic.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2019
Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials.
Wirel. Networks, 2019

A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks.
J. Netw. Comput. Appl., 2019

A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities.
CoRR, 2019

Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries.
Comput. Secur., 2019

HEliOS: huffman coding based lightweight encryption scheme for data transmission.
Proceedings of the MobiQuitous 2019, 2019

Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs).
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Towards Simulating Non-lane Based Heterogeneous Road Traffic of Less Developed Countries.
Proceedings of the 5th International Conference on Information and Communication Technology for Sustainability, 2018

GMC: Greening MapReduce Clusters Considering Both Computational Energy and Cooling Energy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Network-level performance enhancement in wireless nanosensor networks through multi-layer modifications.
Proceedings of the International Conference on Networking, Systems and Security, 2017

2016
Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2016

Poster: Power Attack in Body Area Networks: Dream or Reality?
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Prottasha: An Attempt to Help the Women Fighting Ovarian Cancer in Rural Areas of Bangladesh.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

2015
General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Group Nearest Neighbor Queries for Fuzzy Geo-Spatial Objects.
Proceedings of the Second International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, 2015

Towards empirical study based mathematical modeling for throughput of MANETs.
Proceedings of the International Conference on Networking Systems and Security, 2015

Pro-AODV (Proactive AODV): Simple modifications to AODV for proactively minimizing congestion in VANETs.
Proceedings of the International Conference on Networking Systems and Security, 2015

FGPGA: An efficient genetic approach for producing feasible graph partitions.
Proceedings of the International Conference on Networking Systems and Security, 2015


  Loading...