Perumalraja Rengaraju

According to our database1, Perumalraja Rengaraju authored at least 11 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Providing Internet Access for Post-Disaster Communications using Balloon Networks.
Proceedings of the PE-WASUN '21: Proceedings of the 18th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Alicante, Spain, November 22, 2021

2017
Detection and prevention of DoS attacks in Software-Defined Cloud networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
A reservation-based call admission control scheme and system modeling in 4G vehicular networks.
EURASIP J. Wirel. Commun. Netw., 2015

2014
QoS-Aware Distributed Security Architecture for 4G Multihop Wireless Networks.
IEEE Trans. Veh. Technol., 2014

2013
QoS and protection of relay nodes in 4G wireless networks using network coding.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
On QoE monitoring and E2E service assurance in 4G wireless networks.
IEEE Wirel. Commun., 2012

Adaptive admission control and packet scheduling schemes for QoS provisioning in multihop WiMAX networks.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Communication requirements and analysis of distribution networks using WiMAX technology for smart grids.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
Measuring and Analyzing WiMAX Security and QoS in Testbed Experiments.
Proceedings of IEEE International Conference on Communications, 2011

2010
QoS Assured Uplink Scheduler for WiMAX Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Design of distributed security architecture for multihop WiMAX networks.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010


  Loading...