Stephen W. Neville

According to our database1, Stephen W. Neville authored at least 44 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Leveraging Public Information to Fit a Compact Hot Carrier Injection Model to a Target Technology.
IEEE Access, 2023

2018
An analog of the prime number theorem for finite fields via truncated polylogarithm expansions.
Math. Comput., 2018

IMPROMPTU: A Reactive and Distributed Resource Consolidation Manager for Clouds.
Int. J. Inf. Technol. Decis. Mak., 2018

Novel MOSFET Operation for Detection of Recycled Integrated Circuits.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

2017
Assessing QoS consistency in cloud-based software-as-a-service deployments.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2017

DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2017

2015
Big File Protocol for OTN and Ethernet Transport Systems.
JOCN, 2015

Robust adversarial learning and invariant measures.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

Consumers' Sentiment Analysis of Popular Phone Brands and Operating System Preference Using Twitter Data: A Feasibility Study.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
FLOTT - A Fast, Low Memory T-TransformAlgorithm for Measuring String Complexity.
IEEE Trans. Computers, 2014

Big file protocol (BFP): A traffic shaping approach for efficient transport of large files.
Proceedings of the IEEE 15th International Conference on High Performance Switching and Routing, 2014

Statistical Assessment of Sybil-Placement Strategies within DHT-Structured Peer-to-Peer Botnets.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Determining Per-Mode Battery Usage within Non-trivial Mobile Device Apps.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Enabling richer statistical MANET simulations through cluster computing.
Clust. Comput., 2013

Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Measurement of packet train arrival conditions in high latency networks.
Proceedings of the 9th International Conference on Information, 2013

Mining WiFi Data for Business Intelligence.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation.
IEEE Trans. Inf. Forensics Secur., 2012

Jamming Strategies in DYMO MANETs: Assessing Detectability and Operational Impacts.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Autonomous Resource Consolidation Management in Clouds Using IMPROMPTU Extensions.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Maitland: Lighter-Weight VM Introspection to Support Cyber-security in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Secret Key Generation within Peer-to-Peer Network Overlays.
Proceedings of the 2012 Seventh International Conference on P2P, 2012

Assessing Trade-Offs between Stealthiness and Node Recruitment Rates in Peer-to-Peer Botnets.
Proceedings of the 2012 Seventh International Conference on P2P, 2012

2011
Efficiently Achieving Full Three-Way Non-repudiation in Consumer-Level eCommerce and M-Commerce Transactions.
Proceedings of the IEEE 10th International Conference on Trust, 2011

On the statistical behaviors of network-level features within MANETs.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Controlling spam and spear phishing via peered network overlays and non-repudiable traceback.
Proceedings of the 2011 eCrime Researchers Summit, 2011

On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs.
Proceedings of the 2011 International Conference on Broadband, 2011

STARS: A Framework for Statistically Rigorous Simulation-Based Network Research.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Time Correlation Analysis of Secret Key Generation via UWB Channels.
Proceedings of the Global Communications Conference, 2010

A Framework for Performing Statistical Testing of Distributed Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Dynamic Resource Allocation in Computing Clouds Using Distributed Multiple Criteria Decision Analysis.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
On the Empirical Evaluation of Spatial and Temporal Characteristics of Ultra-Wideband Channel.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Verification of Secret Key Generation from UWB Channel Observations.
Proceedings of IEEE International Conference on Communications, 2009

The Rational for Developing Larger-scale 1000+ Machine Emulation-Based Research Test Beds.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

A Distributed Application-Level IT System Workload Generator.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Secret Key Generation and Agreement in UWB Communication Channels.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2006
Wavelet denoising of coarsely quantized signals.
IEEE Trans. Instrum. Meas., 2006

2005
Optimal fault detection for coarsely quantized systems.
Proceedings of the IEEE International Conference on Systems, 2005

Necessary conditions for determining a robust time threshold in standard INFOSEC alert clustering algorithms.
Proceedings of the IEEE International Conference on Systems, 2005

1998
A model based approach to fault detection for the reverse path of cable television networks.
IEEE Trans. Broadcast., 1998

1996
Training Asymptotically Stable Recurrent Neural Networks.
Intell. Autom. Soft Comput., 1996


  Loading...