Srikanth V. Krishnamurthy

Orcid: 0000-0002-6533-4381

Affiliations:
  • University of California, Riverside, USA


According to our database1, Srikanth V. Krishnamurthy authored at least 238 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FLASH: Federated Learning Across Simultaneous Heterogeneities.
CoRR, 2024

Plug-and-Play Transformer Modules for Test-Time Adaptation.
CoRR, 2024

2023
AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning.
ACM Trans. Cyber Phys. Syst., April, 2023

C2Store: C2 Server Profiles at Your Fingertips.
PACMNET, 2023

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Federated Learning for Massive MIMO Power Allocation.
Proceedings of the 57th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2023, Pacific Grove, CA, USA, October 29, 2023

2022
BigEye: Detection and Summarization of Key Global Events From Distributed Crowdsensed Data.
IEEE Internet Things J., 2022

Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
CoRR, 2022

Blackbox Attacks via Surrogate Ensemble Search.
CoRR, 2022

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022

ADC: Adversarial attacks against object Detection that evade Context consistency checks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Breaking Edge Shackles: Infrastructure-Free Collaborative Mobile Augmented Reality.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

GAMA: Generative Adversarial Multi-Object Scene Attacks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Zero-Query Transfer Attacks on Context-Aware Object Detectors.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Context-Aware Transfer Attacks for Object Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021

SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Boosting Home WiFi Throughputs via Adaptive DAS Clustering of PLC Extenders.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

Eluding ML-based Adblockers With Actionable Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Packet Header Obfuscation Using MIMO.
IEEE/ACM Trans. Netw., 2020

Measurement-driven Security Analysis of Imperceptible Impersonation Attacks.
CoRR, 2020

A4 : Evading Learning-based Adblockers.
CoRR, 2020

UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Characterization of Multi-User Augmented Reality over Cellular Networks.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

WOLT: Auto-Configuration of Integrated Enterprise PLC-WiFi Networks.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020

You do (not) belong here: detecting DPI evasion attacks with context learning.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

Frugal following: power thrifty object detection and tracking for mobile augmented reality.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Employing attack graphs for intrusion detection.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Figment: Fine-grained Permission Management for Mobile Apps.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Edge-Assisted Detection and Summarization of Key Global Events from Distributed Crowd-Sensed Data.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019

PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Principled Unearthing of TCP Side Channel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Characterization of Interference in OFDMA Small-Cell Networks.
IEEE Trans. Veh. Technol., 2018

Off-Path TCP Exploits of the Challenge ACK Global Rate Limit.
IEEE/ACM Trans. Netw., 2018

Adversarial Perturbations Against Real-Time Video Classification Systems.
CoRR, 2018

NEST: Efficient Transport of Data Summaries over Named Data Networks.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

A Framework for MIMO-based Packet Header Obfuscation.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

On the Detection of Adaptive Side-Channel Attackers in Cloud Environments.
Proceedings of the IEEE Global Communications Conference, 2018

IotSan: fortifying the safety of IoT systems.
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018

Droid M+: Developer Support for Imbibing Android's New Permission Model.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
TRINITY: Tailoring Wireless Transmission Strategies to User Profiles in Enterprise Wireless Networks.
IEEE/ACM Trans. Netw., 2017

TIDE: A User-Centric Tool for Identifying Energy Hungry Applications on Smartphones.
IEEE/ACM Trans. Netw., 2017

Managing Redundant Content in Bandwidth Constrained Wireless Networks.
IEEE/ACM Trans. Netw., 2017

Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Netw. Serv. Manag., 2017

ZapDroid: Managing Infrequently Used Applications on Smartphones.
IEEE Trans. Mob. Comput., 2017

Stalling Live Migrations on the Cloud.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Detecting Android Root Exploits by Learning from Root Providers.
Proceedings of the 26th USENIX Security Symposium, 2017

Enhancing WiFi Throughput with PLC Extenders: A Measurement Study.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Accurate and Timely Situation Awareness Retrieval from a Bandwidth Constrained Camera Network.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Your state is not mine: a closer look at evading stateful internet censorship.
Proceedings of the 2017 Internet Measurement Conference, 2017

Energy Efficient Object Detection in Camera Sensor Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Jaal: Towards Network Intrusion Detection at ISP Scale.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

2016
FluidNet: A Flexible Cloud-Based Radio Access Network for Small Cells.
IEEE/ACM Trans. Netw., 2016

Forensic Analysis of Packet Losses in Wireless Networks.
IEEE/ACM Trans. Netw., 2016

A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding.
IEEE/ACM Trans. Netw., 2016

iBUS: An Integrated Beamformer and Uplink Scheduler for OFDMA Small Cells.
IEEE/ACM Trans. Netw., 2016

Jammer localization in wireless networks: An experimentation-driven approach.
Comput. Commun., 2016

Off-Path TCP Exploits: Global Rate Limit Considered Dangerous.
Proceedings of the 25th USENIX Security Symposium, 2016

Resource-aware fusion in multimodal sensing under network constraints.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Network coding efficiency in the presence of an intermittent backhaul network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Optimal Monitor Placement for Detection of Persistent Threats.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks.
IEEE/ACM Trans. Netw., 2015

Self-Organizing Resource Management Framework in OFDMA Femtocells.
IEEE Trans. Mob. Comput., 2015

Adaptive Sub-Carrier Level Power Allocation in OFDMA Networks.
IEEE Trans. Mob. Comput., 2015

Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks.
IEEE Trans. Mob. Comput., 2015

CWC: A Distributed Computing Infrastructure Using Smartphones.
IEEE Trans. Mob. Comput., 2015

Resource Efficient Privacy Preservation of Online Social Media Conversations.
Proceedings of the Security and Privacy in Communication Networks, 2015

TRINITY: A Practical Transmitter Cooperation Framework to Handle Heterogeneous User Profiles in Wireless Networks.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

FlexiWeb: Network-Aware Compaction for Accelerating Mobile Web Transfers.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

A diagnosis based intrusion detection approach.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Streaming Lower Quality Video over LTE: How Much Energy Can You Save?
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

BOLT: realizing high throughput power line communication networks.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

2014
Performance of visible light communications with dimming controls.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Secret message sharing using online social media.
Proceedings of the IEEE Conference on Communications and Network Security, 2014


2013
UVOC-MAC: a MAC protocol for outdoor ultraviolet networks.
Wirel. Networks, 2013

An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks.
Wirel. Networks, 2013

Resource Allocation for QoS Support in Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2013

Realizing the Benefits of Wireless Network Coding in Multirate Settings.
IEEE/ACM Trans. Netw., 2013

Topology Control for Effective Interference Cancellation in Multiuser MIMO Networks.
IEEE/ACM Trans. Netw., 2013

A Resource Management System for Interference Mitigation in Enterprise OFDMA Femtocells.
IEEE/ACM Trans. Netw., 2013

ACORN: An Auto-Configuration Framework for 802.11n WLANs.
IEEE/ACM Trans. Netw., 2013

Secret Key Extraction from Wireless Signal Strength in Real Environments.
IEEE Trans. Mob. Comput., 2013

Twitsper: Tweeting Privately.
IEEE Secur. Priv., 2013

Trading off distortion for delay for video transmissions in wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Wireless network coding: Deciding when to flip the switch.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Mitigating malicious interference via subcarrier-level radio agility in wireless networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

On the trade-offs between collecting packet level forensic evidence and data delivery performance in wireless networks.
Proceedings of IEEE International Conference on Communications, 2013

Resource thrifty secure mobile video transfers on open WiFi networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Obtaining Provably Legitimate Internet Topologies.
IEEE/ACM Trans. Netw., 2012

Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks.
IEEE Trans. Mob. Comput., 2012

Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2012

A distributed resource management framework for interference mitigation in OFDMA femtocell networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

A case for adaptive sub-carrier level power allocation in OFDMA networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Design and implementation of an integrated beamformer and uplink scheduler for OFDMA femtocells.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Inferring user relationship from hidden information in WLANs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

VICO: A framework for configuring indoor visible light communication networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative assessment of functional reliability in wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Experimental characterization of interference in OFDMA femtocell networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Network Coding Aware Queue Management in Multi-Rate Wireless Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

One strategy does not serve all: tailoring wireless transmission strategies to user profiles.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

Computing while charging: building a distributed computing infrastructure using smartphones.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Enabling private conversations on Twitter.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks.
Wirel. Networks, 2011

A measurement-driven anti-jamming system for 802.11 networks.
IEEE/ACM Trans. Netw., 2011

MAC Layer Throughput Estimation in Impulse-Radio UWB Networks.
IEEE Trans. Mob. Comput., 2011

Special Section on A World of Wireless, Mobile and Multimedia Networks.
Pervasive Mob. Comput., 2011

Directional neighbor discovery in 60 GHz indoor wireless networks.
Perform. Evaluation, 2011

Neighbor Discovery for Ultraviolet Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2011

Denial of Service Attacks in Wireless Networks: The Case of Jammers.
IEEE Commun. Surv. Tutorials, 2011

Coping with packet replay attacks in wireless networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Quality-of-information aware networking for tactical military networks.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

A novel neighbor discovery protocol for ultraviolet wireless networks.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

FERMI: a femtocell resource management system forinterference mitigation in OFDMA networks.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Detecting Route Attraction Attacks in Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2010
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks.
IEEE Trans. Wirel. Commun., 2010

Downlink capacity of hybrid cellular ad hoc networks.
IEEE/ACM Trans. Netw., 2010

Measurement-Driven Guidelines for 802.11 WLAN Design.
IEEE/ACM Trans. Netw., 2010

Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

A simple conceptual generator for the Internet graph.
Proceedings of the 17th IEEE Workshop on Local and Metropolitan Area Networks, 2010

A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Network Coding aware Rate Selection in multi-rate IEEE 802.11.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

On the Impact of MIMO Diversity on Higher Layer Performance.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Auto-configuration of 802.11n WLANs.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Lord of the links: a framework for discovering missing links in the internet topology.
IEEE/ACM Trans. Netw., 2009

Topology Management in Directional Antenna-Equipped Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2009

A measurement driven, 802.11 anti-jamming system
CoRR, 2009

Gaming the jammer: Is frequency hopping effective?
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

Joint resource allocation and admission control in wireless mesh networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

FIJI: Fighting Implicit Jamming in 802.11 WLANs.
Proceedings of the Security and Privacy in Communication Networks, 2009

Cross-layer Enhanced Source Location Privacy in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

On the effectiveness of secret key extraction from wireless signal strength in real environments.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009

Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Lightweight Jammer Localization in Wireless Networks: System Design and Implementation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

ARES: an anti-jamming reinforcement system for 802.11 networks.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Cluster-based congestion control for sensor networks.
ACM Trans. Sens. Networks, 2008

Design and deployment considerations for high performance MIMO testbeds.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric?
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Capacity of Hybrid Cellular-Ad Hoc Data Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

CTU: Capturing Throughput Dependencies in UWB Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
An Integrated Neighbor Discovery and MAC Protocol for Ad Hoc Networks Using Directional Antennas.
IEEE Trans. Wirel. Commun., 2007

DART: dynamic address routing for scalable ad hoc and mesh networks.
IEEE/ACM Trans. Netw., 2007

Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Multiband Media Access Control in Impulse-Based UWB Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

On broadcasting with cooperative diversity in multi-hop wireless networks.
IEEE J. Sel. Areas Commun., 2007

Predictive channel reservation for handoff prioritization in wireless cellular networks.
Comput. Networks, 2007

Handling asymmetry in power heterogeneous ad hoc networks.
Comput. Networks, 2007

A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks.
Comput. Networks, 2007

A Blueprint for a Manageable and Affordable Wireless Testbed: Design, Pitfalls and Lessons Learned.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Implications of Power Control in Wireless Networks: A Quantitative Study.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

A Systematic Framework for Unearthing the Missing Links: Measurements and Impact.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Revisiting minimum cost reliable routing in wireless mesh networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

MDG: measurement-driven guidelines for 802.11 wlan design.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Routing amid Colluding Attackers.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
A new binary conflict resolution-based MAC protocol for impulse-based UWB ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Cross-layer issues in MAC protocol design for MIMO ad hoc networks.
IEEE Wirel. Commun., 2006

Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol.
Ad Hoc Networks, 2006

Topology Control to Simultaneously Achieve Near-Optimal Node Degree and Low Path Stretch in Ad hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

An Integrated Scheme for Fully-Directional Neighbor Discovery and Topology Management in Mobile Ad hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Overcoming the challenge of security in a mobile environment.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Framework for Distributed Spatio-Temporal Communications in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

On the MAC Layer Performance of Time-Hopped UWB Ad Hoc Networks.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Improving TCP performance in ad hoc networks using signal strength based link management.
Ad Hoc Networks, 2005

Local versus global power adaptive broadcasting in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Scalable Testbed for Next-Generation Wireless Networking Technologies Mineo Takai.
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005

A multiband mac protocol for impulse-based UWB ad hoc networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

A Rate Control Framework for Supporting Multiple Classes of Traffic in Sensor Networks.
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005

Handling asymmetry in gain in directional antenna equipped ad hoc networks.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Fireworks: An Adaptive Group Communications Protocol for Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Justice: Flexible and Enforceable Per-Source Bandwidth Allocation.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

On routing asymmetry in the Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

A Lightweight framework for source-to-sink data transfer in wireless sensor networks.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Routing Scalability in MANETs.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Distributed and intelligent information access in manufacturing enterprises through mobile devices.
J. Intell. Manuf., 2004

A routing framework for providing robustness to node failures in mobile ad hoc networks.
Ad Hoc Networks, 2004

Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communication Networks, 2004

Use of congestion-aware routing to spatially separate TCP connections in wireless ad hoc networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

TCP-friendly medium access control for ad-hoc wireless networks: alleviating self-contention.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Improving the reliability of event reports in wireless sensor networks.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Understanding the Effects of Hotspots in Wireless Cellular Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable Ad Hoc Routing: The Case for Dynamic Addressing.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Improving the MAC layer performance in ad hoc networks of nodes with heterogeneous transmit power capabilities.
Proceedings of IEEE International Conference on Communications, 2004

Effects of multipath routing on TCP performance in ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Quantifying routing asymmetry in the Internet at the AS level.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
On the radio capacity of TDMA and CDMA for broadband wireless packet communications.
IEEE Trans. Veh. Technol., 2003

PeerNet: Pushing Peer-to-Peer Down the Stack.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

A Framework for Reliable Routing in Mobile Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks Using Signal Strength Based Link Management.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

Power Adaptive Broadcasting with Local Information in Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

Synchronization of multiple levels of data fusion in wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
On tolerating single link, double link, and nodal failures in symmetric grid networks.
J. High Speed Networks, 2002

Provision of guaranteed services in broadband LEO satellite networks.
Comput. Networks, 2002

Trajectory control of mobile gateways for range extension in ad hoc networks.
Comput. Networks, 2002

Capacity of a multihop mesh arrangement of radio cells connected by free-space optical links.
Proceedings of the 12th IEEE International Symposium on Personal, 2002

An architecture for providing range extension by deploying mobile gateways in ad hoc networks.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

Distributed power control in ad-hoc wireless networks.
Proceedings of the 12th IEEE International Symposium on Personal, 2002

A New Adaptive Channel Reservation Scheme for Handoff Calls in Wireless Cellular Networks.
Proceedings of the NETWORKING 2002, 2002

Split TCP for mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2002

Using Mobile Agents to Facilitate Mobile Information Access: An XML-based Approach.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
Polling-based media access protocols for use with smart adaptive array antennas.
IEEE/ACM Trans. Netw., 2001

Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities.
Proceedings of the IEEE International Conference on Communications, 2001

A framework to facilitate mobile data access in a manufacturing environment.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

A Mobile Agent Architecture to enable Enterprise Information Access for Mobile Devices.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001

2000
A new adaptive MAC layer protocol for broadband packet wireless networks in harsh fading and interference environments.
IEEE/ACM Trans. Netw., 2000

Scalable unidirectional routing with zone routing protocol (ZRP) extensions for mobile ad-hoc networks.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

A predictive QoS routing scheme for broadband low Earth orbit satellite networks.
Proceedings of the 11th IEEE International Symposium on Personal, 2000

Multicasting Sustained CBR and VBR Traffic in Wireless Ad-Hoc Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

1999
A broadband wireless access network based on mesh-connected free-space optical links.
IEEE Wirel. Commun., 1999

1998
UniNet: a hybrid approach for universal broadband access using small radio cells interconnected by free-space optical links.
IEEE J. Sel. Areas Commun., 1998

On the capacity of TDMA and CDMA for broadband wireless packet access.
Proceedings of the 9th IEEE International Symposium on Personal, 1998


  Loading...