Thomas F. La Porta

According to our database1, Thomas F. La Porta authored at least 239 papers between 1992 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2002, "For contributions to systems for advanced broadband, mobile data and mobile telecommunication networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

On Progressive Network Recovery From Massive Failures Under Uncertainty.
IEEE Trans. Network and Service Management, 2019

CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning.
IEEE Trans. Mob. Comput., 2019

Mitigation and Recovery From Cascading Failures in Interdependent Networks Under Uncertainty.
IEEE Trans. Control of Network Systems, 2019

A Truthful Online Mechanism for Resource Allocation in Fog Computing.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Optimizing 5G Performance by Reallocating Unused Resources.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Admission Control for Consistent Users in Next Generation Cellular Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Truthful Online Mechanism for Allocating Fog Computing Resources.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Scalability and Satisfiability of Quality-of-Information in Wireless Networks.
IEEE/ACM Trans. Netw., 2018

Fast Network Configuration in Software Defined Networking.
IEEE Trans. Network and Service Management, 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research Directions.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Computing Platform for Video Crowdprocessing Using Deep Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Framework for MIMO-based Packet Header Obfuscation.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

It's Hard to Share: Joint Service Placement and Request Scheduling in Edge Clouds with Sharable and Non-Sharable Resources.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

On the Detection of Adaptive Side-Channel Attackers in Cloud Environments.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Symptotics: a framework for estimating the scalability of real-world wireless networks.
Wireless Networks, 2017

Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure.
IEEE/ACM Trans. Netw., 2017

Managing Redundant Content in Bandwidth Constrained Wireless Networks.
IEEE/ACM Trans. Netw., 2017

On Critical Service Recovery After Massive Network Failures.
IEEE/ACM Trans. Netw., 2017

Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Network and Service Management, 2017

TeamPhone: Networking SmartPhones for Disaster Recovery.
IEEE Trans. Mob. Comput., 2017

Autonomous Mobile Sensor Placement in Complex Environments.
TAAS, 2017

Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring.
SIGMETRICS Performance Evaluation Review, 2017

Stalling Live Migrations on the Cloud.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Physics-inspired models for agile code and data in federated edges.
Proceedings of the 2017 IEEE SmartWorld, 2017

Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017

Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017

Network recovery from massive failures under uncertain knowledge of damages.
Proceedings of the 2017 IFIP Networking Conference, 2017

Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Progressive damage assessment and network recovery after massive failures.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Resource Allocation for Pragmatically-Assisted Quality of Information-Aware Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
On Selective Activation in Dense Femtocell Networks.
IEEE Trans. Wireless Communications, 2016

A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding.
IEEE/ACM Trans. Netw., 2016

On Propagation of Phenomena in Interdependent Networks.
IEEE Trans. Network Science and Engineering, 2016

On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment.
IEEE Trans. Mob. Comput., 2016

netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks.
IEEE Trans. Dependable Sec. Comput., 2016

Networking smartphones for disaster recovery.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Integrating quality of information with pragmatic assistance.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Cooperative data offloading in opportunistic mobile networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Power adjustment and scheduling in OFDMA femtocell networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On-demand video processing in wireless networks.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Service Placement for Detecting and Localizing Failures Using End-to-End Observations.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Network coding efficiency in the presence of an intermittent backhaul network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Video processing of complex activity detection in resource-constrained networks.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Network Recovery After Massive Failures.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
You can't get there from here: sensor scheduling with refocusing delays.
Wireless Networks, 2015

Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Algorithms and Applications for Community Detection in Weighted Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks.
IEEE/ACM Trans. Netw., 2015

Network Topology Inference With Partial Information.
IEEE Trans. Network and Service Management, 2015

A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.
TKDD, 2015

Quality of information-aware real-time traffic flow analysis and reporting.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Energy-Efficient Selective Activation in Femtocell Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Spatial and temporal considerations in next place predictions.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Next place predictions based on user mobility traces.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Network topology inference with partial path information.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Inferring Network Topologies in MANETs Applied to Service Redeployment.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
Throughput Maximization in Mobile WSN Scheduling With Power Control and Rate Selection.
IEEE Trans. Wireless Communications, 2014

Cross-Layer Approach for Minimizing Routing Disruption in IP Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Sensor Mission Assignment in Rechargeable Wireless Sensor Networks.
TOSN, 2014

On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment.
IEEE Trans. Mob. Comput., 2014

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing.
IEEE Trans. Dependable Sec. Comput., 2014

Splitter: Mining Fine-Grained Sequential Patterns in Semantic Trajectories.
PVLDB, 2014

Quality of information-aware mobile applications.
Pervasive and Mobile Computing, 2014

Operational information content sum capacity: From theory to practice.
Computer Networks, 2014

Leveraging periodicity in human mobility for next place prediction.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Energy-aware enterprise femtocell deployment.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Power minimization with quality-of-information outages.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Robust Network Tomography in the Presence of Failures.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Performance analysis of practical distributed backpressure protocols.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Voronoi-based deployment of mobile sensors in the face of adversaries.
Proceedings of the IEEE International Conference on Communications, 2014

Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Security and Science of Agility.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Realizing the Benefits of Wireless Network Coding in Multirate Settings.
IEEE/ACM Trans. Netw., 2013

On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

A framework of traveling companion discovery on trajectory data streams.
ACM TIST, 2013

Guest Editorial: Network science.
IEEE Journal on Selected Areas in Communications, 2013

Trustworthiness analysis of sensor data in cyber-physical systems.
J. Comput. Syst. Sci., 2013

Utility-based femtocell pilot management.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Effects of Partial Topology on Fault Diagnosis.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Scalability Analysis of Tactical Mobility Patterns.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Trading off distortion for delay for video transmissions in wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the security vulnerabilities of the virtual force approach to mobile sensor deployment.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Wireless network coding: Deciding when to flip the switch.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Resource thrifty secure mobile video transfers on open WiFi networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Link prediction in human mobility networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Proactive data dissemination to mission sites.
Wireless Networks, 2012

Utility-based bandwidth adaptation in mission-oriented wireless sensor networks.
TOSN, 2012

Sensor activation and radius adaptation (SARA) in heterogeneous sensor networks.
TOSN, 2012

Control-Theoretic Utility Maximization in Multihop Wireless Networks Under Mission Dynamics.
IEEE/ACM Trans. Netw., 2012

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2012

Who, When, Where: Timeslot Assignment to Mobile Clients.
IEEE Trans. Mob. Comput., 2012

Max Weight Learning Algorithms for Scheduling in Unknown Environments.
IEEE Trans. Automat. Contr., 2012

Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.
IJDSN, 2012

A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012

Convergecast with aggregatable data classes.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Quality of information functions for networked applications.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Symptotics: a framework for analyzing the scalability of real-world wireless networks.
Proceedings of the 9th ACM Symposium on Performance evaluation of wireless ad hoc, 2012

Demo: Medusa: a programming framework for crowd-sensing applications.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Medusa: a programming framework for crowd-sensing applications.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Intra-cloud lightning: Building CDNs in the cloud.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Optimal Recovery from Large-Scale Failures in IP Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Dynamic Interference Management in Femtocells.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Network Coding Aware Queue Management in Multi-Rate Wireless Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Resource Allocation with Stochastic Demands.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Broadcasting info-pages to sensors: efficiency versus energy conservation.
Wireless Networks, 2011

Cooperative Channelization in Wireless Networks with Network Coding.
IEEE Trans. Parallel Distrib. Syst., 2011

Optimizing sensor movement planning for energy efficiency.
TOSN, 2011

Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization.
IEEE Trans. Mob. Comput., 2011

Autonomous Deployment of Heterogeneous Mobile Sensors.
IEEE Trans. Mob. Comput., 2011

From mobile phones to responsible devices.
Security and Communication Networks, 2011

Sensor-mission assignment in wireless sensor networks with energy harvesting.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

End-to-end rate selection for opportunistic reception in multi-rate wireless networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Broadcasting in multi channel wireless networks in the presence of adversaries.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Interference cancellation-based RFID tags identification.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

Detecting and localizing large-scale router failures using active probes.
Proceedings of the MILCOM 2011, 2011

Data replication in mobile tactical networks.
Proceedings of the MILCOM 2011, 2011

Distributed backpressure protocols with limited state feedback.
Proceedings of the MILCOM 2011, 2011

Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Demo: A distributed architecture for heterogeneous multi sensor-task allocation.
Proceedings of the Distributed Computing in Sensor Systems, 2011

A distributed architecture for heterogeneous multi sensor-task allocation.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Sensor-Mission Assignment in Constrained Environments.
IEEE Trans. Parallel Distrib. Syst., 2010

Sensor-mission assignment in wireless sensor networks.
TOSN, 2010

A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Mobile Sensor Deployment in Unknown Fields.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Network Coding aware Rate Selection in multi-rate IEEE 802.11.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Network Integration in 3G and 4G Wireless Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

2009
Evaluating MAPSec by marking attack graphs.
Wireless Networks, 2009

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wireless Networks, 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

A Mobility-Prediction-Based Relay Deployment Framework for Conserving Power in MANETs.
IEEE Trans. Mob. Comput., 2009

A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice.
IEEE Trans. Mob. Comput., 2009

Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows.
Mobile Computing and Communications Review, 2009

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009

Cross-layer Enhanced Source Location Privacy in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Control-theoretic Optimization of Utility over Mission Lifetimes in Multi-hop Wireless Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Proactive Data Dissemination to Mission Sites.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Autonomous deployment of heterogeneous mobile sensors.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Multiple Backhaul Mobile Access Router Striping.
Proceedings of IEEE International Conference on Communications, 2009

Detection and Localization Sensor Assignment with Exact and Fuzzy Locations.
Proceedings of the Distributed Computing in Sensor Systems, 2009

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Mobile multi-layered IPsec.
Wireless Networks, 2008

Evaluation of signaling loads in 3GPP networks.
IEEE Wireless Commun., 2008

Mitigating Performance Degradation in Congested Sensor Networks.
IEEE Trans. Mob. Comput., 2008

Exploiting open functionality in SMS-capable cellular networks.
Journal of Computer Security, 2008

EndSec: An end-to-end message security protocol for mobile telecommunication networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Multi-Hop Wireless Relay Networks of Mesh Clients.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A cross-layer dropping attack in video streaming over ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Utility-Based Adaptation in Mission-Oriented Wireless Sensor Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Distributed network utility optimization in wireless sensor networks using power control.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Channelization for Network Coding in Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Multiple Backhaul Mobile Access Router: Design and Experimentation.
Proceedings of IEEE International Conference on Communications, 2008

Assigning Sensors to Competing Missions.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Data Collection Using RFID and a Mobile Reader.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Ontology-Centric Approach to Sensor-Mission Assignment.
Proceedings of the Knowledge Engineering: Practice and Patterns, 2008

Frugal Sensor Assignment.
Proceedings of the Distributed Computing in Sensor Systems, 2008

Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008

2007
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks.
Wireless Networks, 2007

Data Dissemination with Ring-Based Index for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Bidding Protocols for Deploying Mobile Sensors.
IEEE Trans. Mob. Comput., 2007

Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Telecommunication Systems, 2007

Editorial PerCom 2007 special issue.
Pervasive and Mobile Computing, 2007

Channelization for dynamic multi-frequency, multi-hop wireless cellular networks.
Ad Hoc Networks, 2007

SET: Detecting node clones in sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Privacy Preserving Communication in MANETs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Demo: Sensor Relocation with Mobile Sensors.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Sensor Relocation with Mobile Sensors: Design, Implementation, and Evaluation.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Relay-based Multi-hop Access to Wireless Mesh Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Assigning Sensors to Missions with Demands.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
Movement-Assisted Sensor Deployment.
IEEE Trans. Mob. Comput., 2006

On-demand diversity wireless relay networks.
MONET, 2006

The effects of probabilistic key management on secure routing in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Efficient Group Mobility for Heterogeneous Sensor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks.
Proceedings of the 4th International Conference on Mobile Systems, 2006

Establishing Pair-Wise Keys in Heterogeneous Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Optimizing sensor movement planning for energy efficiency.
Proceedings of the 2005 International Symposium on Low Power Electronics and Design, 2005

A Taxonomy of Cyber Attacks on 3G Networks.
Proceedings of the Intelligence and Security Informatics, 2005

Sensor relocation in mobile sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Security and IP-based 3G wireless networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

An architecture and key management approach for maintaining privacy in location based group services.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Distributed Algorithms for Deploying Mobile Sensors.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Editorial: State of the Transactions.
IEEE Trans. Mob. Comput., 2004

Mobility management alternatives for migration to mobile Internet session-based services.
IEEE Journal on Selected Areas in Communications, 2004

Proxy-based sensor deployment for mobile sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

2003
Editor's Note.
IEEE Trans. Mob. Comput., 2003

Editorial: New AE Introduction.
IEEE Trans. Mob. Comput., 2003

A Bidding Protocol for Deploying Mobile Sensors.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
IP Paging Service for Mobile Hosts.
Wireless Networks, 2002

HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks.
IEEE/ACM Trans. Netw., 2002

Editorial.
IEEE Trans. Mob. Comput., 2002

Editorial: Introducing the New AEs.
IEEE Trans. Mob. Comput., 2002

Introduction to the IEEE Transactions on Mobile Computing.
IEEE Trans. Mob. Comput., 2002

2001
Interworking internet telephony and wireless telecommunications networks.
Computer Communication Review, 2001

2000
IP-based access network infrastructure for next-generation wireless data networks.
IEEE Personal Commun., 2000

User agent migration policies in wireless networks.
IEEE Journal on Selected Areas in Communications, 2000

Wireless data networking, standards, and applications.
Bell Labs Technical Journal, 2000

RIMA: Router for Integrated Mobile Access.
Proceedings of the 11th IEEE International Symposium on Personal, 2000

1999
Mobile IP and wide area wireless data.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

HAWAII: A Domain-based Approach for Supporting Mobility in Wide-Area Wireless Networks.
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999

1998
Performance evaluation of connection rerouting schemes for ATM-based wireless networks.
IEEE/ACM Trans. Netw., 1998

Experiences with Network-Based User Agents for Mobile Applications.
MONET, 1998

Update and Search Algorithms for Wireless Two-Way Messaging: Design and Performance.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

User Agent Migration Policies in Multimedia Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

Design, Implementation, and Evaluation of Highly Available Distributed Call Processing Systems.
Proceedings of the Digest of Papers: FTCS-28, 1998

Protocol Feature Interactions.
Proceedings of the Formal Description Techniques and Protocol Specification, 1998

1997
A direct signaling system for flexible access and deployment of telecommunication services.
IEEE/ACM Trans. Netw., 1997

Pigeon: A Wireless Two-Way Messaging System.
IEEE Journal on Selected Areas in Communications, 1997

User Agents and Flexible Messages: A New Approach to Wireless Two-Way Messaging.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
Comparison of signaling loads for PCS systems.
IEEE/ACM Trans. Netw., 1996

Challenges for Nomadic Computing: Mobility Management and Wireless Communications.
MONET, 1996

1995
A distributed control strategy for wireless ATM networks.
Wireless Networks, 1995

AIRMAIL: a link-layer protocol for wireless networks.
Wireless Networks, 1995

The use of network-based migrating user agents for personal communication services.
IEEE Personal Commun., 1995

An Asymmetric Protocol for Digital Cellular Communications.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
Verification of the MultiStream Potocol (MSP) Using COSPAN.
Formal Methods in System Design, 1994

1993
Performance analysis of MSP feature-rich high-speed transport protocol.
IEEE/ACM Trans. Netw., 1993

The MultiStream Protocol: A Highly Flexible High-Speed Transport Protocol.
IEEE Journal on Selected Areas in Communications, 1993

Evaluation of Broadband UNI Signaling Protocol Techniques.
J. High Speed Networks, 1993

1992
A High-Speed Protocol Parallel Implementation: Design and Analysis.
Proceedings of the High Performance Networking IV, 1992


  Loading...