Thomas La Porta

Orcid: 0000-0003-1295-4461

Affiliations:
  • Pennsylvania State University, University Park, PA, USA


According to our database1, Thomas La Porta authored at least 302 papers between 1991 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2002, "For contributions to systems for advanced broadband, mobile data and mobile telecommunication networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EDIR: Efficient Distributed Image Retrieval of Novel Objects in Mobile Networks.
IEEE Trans. Mob. Comput., March, 2024

2023
Optimal Resource Allocation for Crowdsourced Image Processing.
IEEE Trans. Mob. Comput., October, 2023

VidQ: Video Query Using Optimized Audio-Visual Processing.
IEEE/ACM Trans. Netw., June, 2023

EQMS: An improved energy-aware and QoE-aware video streaming policy across multiple competitive mobile devices.
Wirel. Networks, April, 2023

Securing Cloud File Systems using Shielded Execution.
CoRR, 2023

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

QoE-Analysis of 5G Network Resource Allocation Schemes for Competitive Multi-User Video Streaming Applications.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

mMLSnet: Multilevel Security Network with Mobility.
Proceedings of the IEEE Military Communications Conference, 2023

2022
Link State Estimation Under Cyber-Physical Attacks: Theory and Algorithms.
IEEE Trans. Smart Grid, 2022

Preventing Outages Under Coordinated Cyber-Physical Attack With Secured PMUs.
IEEE Trans. Smart Grid, 2022

Enforcing Multilevel Security Policies in Unstable Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Improvement of SCADA-Based Preventive Control Under Budget Constraints.
IEEE Trans. Netw. Sci. Eng., 2022

Reducing the Cost of Consistency: Performance Improvements in Next Generation Cellular Networks With Optimal Resource Reallocation.
IEEE Trans. Mob. Comput., 2022

Context-Aware and Energy-Aware Video Streaming on Smartphones.
IEEE Trans. Mob. Comput., 2022

Trustable service discovery for highly dynamic decentralized workflows.
Future Gener. Comput. Syst., 2022

An Approach for Fast Cascading Failure Simulation in Dynamic Models of Power Systems.
CoRR, 2022

Scalable Resource Allocation Techniques for Edge Computing Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

HoneyCam: Scalable High-Interaction Honeypot for IoT Cameras Based on 360-Degree Video.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Modeling and Analysis of mMTC Traffic in 5G Base Stations.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds.
IEEE/ACM Trans. Netw., 2021

MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021

Augur: Modeling the Resource Requirements of ConvNets on Mobile Devices.
IEEE Trans. Mob. Comput., 2021

PicSys: Energy-Efficient Fast Image Search on Distributed Mobile Networks.
IEEE Trans. Mob. Comput., 2021

Topology Estimation Following Islanding and its Impact on Preventive Control of Cascading Failure.
CoRR, 2021

Verifiable Failure Localization in Smart Grid under Cyber-Physical Attacks.
CoRR, 2021

Quality of Information in Gathering Information via Video Analytics for Military Networks.
IEEE Commun. Mag., 2021

Admission Control for mMTC Traffic in 5G Networks.
Proceedings of the Q2SWinet 2021: Proceedings of the 17th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2021

Resource Allocation for Improved User Experience with Live Video Streaming in 5G.
Proceedings of the Q2SWinet 2021: Proceedings of the 17th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2021

Efficient Resource Allocation with Constrained Rate Variability in Cellular Networks.
Proceedings of the Q2SWinet 2021: Proceedings of the 17th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2021

Admission Control for URLLC Users in 5G Networks.
Proceedings of the MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 22, 2021

Analyzing a 5G Dataset and Modeling Metrics of Interest.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Minimizing Rate Variability with Effective Resource Utilization in 5G Networks.
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021

Online Resource Allocation in Edge Computing Using Distributed Bidding Approaches.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Budget-Constrained Reinforcement of SCADA for Cascade Mitigation.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

2020
NetVision: On-Demand Video Processing in Wireless Networks.
IEEE/ACM Trans. Netw., 2020

On Interference Aware Power Adjustment and Scheduling in Femtocell Networks.
IEEE/ACM Trans. Netw., 2020

Packet Header Obfuscation Using MIMO.
IEEE/ACM Trans. Netw., 2020

Enabling Discoverable Trusted Services for Highly Dynamic Decentralized Workflows.
Proceedings of the IEEE/ACM Workflows in Support of Large-Scale Science, 2020

Power Grid State Estimation under General Cyber-Physical Attacks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Improving Robustness of a Popular Probabilistic Clustering Algorithm Against Insider Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2020

Misreporting Attacks in Software-Defined Networking.
Proceedings of the Security and Privacy in Communication Networks, 2020

Multi-User Competitive Energy-Aware and QoE-Aware Video Streaming on Mobile Devices.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Solving the Divergence Problem in AC-QSS Cascading Failure Model by Introducing the Effect of a Realistic UVLS Scheme.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2020

Decentralized placement of data and analytics in wireless networks for energy-efficient execution.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Co-residency Attacks on Containers are Real.
Proceedings of the CCSW'20, 2020

Strategyproof Reinforcement Learning for Online Resource Allocation.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

On Progressive Network Recovery From Massive Failures Under Uncertainty.
IEEE Trans. Netw. Serv. Manag., 2019

CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning.
IEEE Trans. Mob. Comput., 2019

Mitigation and Recovery From Cascading Failures in Interdependent Networks Under Uncertainty.
IEEE Trans. Control. Netw. Syst., 2019

Large-Scale Hybrid ad hoc Network for Mobile Platforms: Challenges and Experiences.
Proceedings of the IEEE International Conference on Smart Computing, 2019

A Truthful Online Mechanism for Resource Allocation in Fog Computing.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

Poster: a minimally disruptive network reconfiguration approach in SDN.
Proceedings of the 2019 IFIP Networking Conference, 2019

Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Optimizing 5G Performance by Reallocating Unused Resources.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Admission Control for Consistent Users in Next Generation Cellular Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Truthful Online Mechanism for Allocating Fog Computing Resources.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Scalability and Satisfiability of Quality-of-Information in Wireless Networks.
IEEE/ACM Trans. Netw., 2018

Fast Network Configuration in Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

On the Design of Resource Allocation Algorithms for Low-Latency Video Analytics.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research Directions.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Computing Platform for Video Crowdprocessing Using Deep Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Framework for MIMO-based Packet Header Obfuscation.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

It's Hard to Share: Joint Service Placement and Request Scheduling in Edge Clouds with Sharable and Non-Sharable Resources.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

On the Detection of Adaptive Side-Channel Attackers in Cloud Environments.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Symptotics: a framework for estimating the scalability of real-world wireless networks.
Wirel. Networks, 2017

Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure.
IEEE/ACM Trans. Netw., 2017

Managing Redundant Content in Bandwidth Constrained Wireless Networks.
IEEE/ACM Trans. Netw., 2017

On Critical Service Recovery After Massive Network Failures.
IEEE/ACM Trans. Netw., 2017

Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Netw. Serv. Manag., 2017

TeamPhone: Networking SmartPhones for Disaster Recovery.
IEEE Trans. Mob. Comput., 2017

Autonomous Mobile Sensor Placement in Complex Environments.
ACM Trans. Auton. Adapt. Syst., 2017

Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring.
SIGMETRICS Perform. Evaluation Rev., 2017

Stalling Live Migrations on the Cloud.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Physics-inspired models for agile code and data in federated edges.
Proceedings of the 2017 IEEE SmartWorld, 2017

Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017

Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017

Network recovery from massive failures under uncertain knowledge of damages.
Proceedings of the 2017 IFIP Networking Conference, 2017

Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Progressive damage assessment and network recovery after massive failures.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Stealth migration: Hiding virtual machines on the network.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Resource Allocation for Pragmatically-Assisted Quality of Information-Aware Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
On Selective Activation in Dense Femtocell Networks.
IEEE Trans. Wirel. Commun., 2016

A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding.
IEEE/ACM Trans. Netw., 2016

On Propagation of Phenomena in Interdependent Networks.
IEEE Trans. Netw. Sci. Eng., 2016

On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment.
IEEE Trans. Mob. Comput., 2016

netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks.
IEEE Trans. Dependable Secur. Comput., 2016

Networking smartphones for disaster recovery.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Integrating quality of information with pragmatic assistance.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Cooperative data offloading in opportunistic mobile networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Power adjustment and scheduling in OFDMA femtocell networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On-demand video processing in wireless networks.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Service Placement for Detecting and Localizing Failures Using End-to-End Observations.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Network coding efficiency in the presence of an intermittent backhaul network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Video processing of complex activity detection in resource-constrained networks.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Network Recovery After Massive Failures.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
You can't get there from here: sensor scheduling with refocusing delays.
Wirel. Networks, 2015

Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Algorithms and Applications for Community Detection in Weighted Networks.
IEEE Trans. Parallel Distributed Syst., 2015

A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks.
IEEE/ACM Trans. Netw., 2015

Network Topology Inference With Partial Information.
IEEE Trans. Netw. Serv. Manag., 2015

A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.
ACM Trans. Knowl. Discov. Data, 2015

Quality of information-aware real-time traffic flow analysis and reporting.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Energy-Efficient Selective Activation in Femtocell Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Spatial and temporal considerations in next place predictions.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Next place predictions based on user mobility traces.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Network topology inference with partial path information.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Inferring Network Topologies in MANETs Applied to Service Redeployment.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
Throughput Maximization in Mobile WSN Scheduling With Power Control and Rate Selection.
IEEE Trans. Wirel. Commun., 2014

Cross-Layer Approach for Minimizing Routing Disruption in IP Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Sensor Mission Assignment in Rechargeable Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment.
IEEE Trans. Mob. Comput., 2014

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2014

Splitter: Mining Fine-Grained Sequential Patterns in Semantic Trajectories.
Proc. VLDB Endow., 2014

Quality of information-aware mobile applications.
Pervasive Mob. Comput., 2014

Operational information content sum capacity: From theory to practice.
Comput. Networks, 2014

Leveraging periodicity in human mobility for next place prediction.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Energy-aware enterprise femtocell deployment.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Power minimization with quality-of-information outages.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Robust Network Tomography in the Presence of Failures.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Performance analysis of practical distributed backpressure protocols.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Voronoi-based deployment of mobile sensors in the face of adversaries.
Proceedings of the IEEE International Conference on Communications, 2014

Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014


2013
Realizing the Benefits of Wireless Network Coding in Multirate Settings.
IEEE/ACM Trans. Netw., 2013

On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

A framework of traveling companion discovery on trajectory data streams.
ACM Trans. Intell. Syst. Technol., 2013

Guest Editorial: Network science.
IEEE J. Sel. Areas Commun., 2013

Trustworthiness analysis of sensor data in cyber-physical systems.
J. Comput. Syst. Sci., 2013

Utility-based femtocell pilot management.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Effects of Partial Topology on Fault Diagnosis.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Scalability Analysis of Tactical Mobility Patterns.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Resource Allocation with Non-deterministic Demands and Profits.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Trading off distortion for delay for video transmissions in wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the security vulnerabilities of the virtual force approach to mobile sensor deployment.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Wireless network coding: Deciding when to flip the switch.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Resource thrifty secure mobile video transfers on open WiFi networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Link prediction in human mobility networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Proactive data dissemination to mission sites.
Wirel. Networks, 2012

Utility-based bandwidth adaptation in mission-oriented wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Sensor activation and radius adaptation (SARA) in heterogeneous sensor networks.
ACM Trans. Sens. Networks, 2012

Control-Theoretic Utility Maximization in Multihop Wireless Networks Under Mission Dynamics.
IEEE/ACM Trans. Netw., 2012

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2012

Who, When, Where: Timeslot Assignment to Mobile Clients.
IEEE Trans. Mob. Comput., 2012

Max Weight Learning Algorithms for Scheduling in Unknown Environments.
IEEE Trans. Autom. Control., 2012

Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.
Int. J. Distributed Sens. Networks, 2012

A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.
Proceedings of the Security and Privacy in Communication Networks, 2012

Convergecast with aggregatable data classes.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Quality of information functions for networked applications.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Symptotics: a framework for analyzing the scalability of real-world wireless networks.
Proceedings of the 9th ACM Symposium on Performance evaluation of wireless ad hoc, 2012

Demo: Medusa: a programming framework for crowd-sensing applications.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Medusa: a programming framework for crowd-sensing applications.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Intra-cloud lightning: Building CDNs in the cloud.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Optimal Recovery from Large-Scale Failures in IP Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Dynamic Interference Management in Femtocells.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Network Coding Aware Queue Management in Multi-Rate Wireless Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Resource Allocation with Stochastic Demands.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Broadcasting info-pages to sensors: efficiency versus energy conservation.
Wirel. Networks, 2011

Cooperative Channelization in Wireless Networks with Network Coding.
IEEE Trans. Parallel Distributed Syst., 2011

Optimizing sensor movement planning for energy efficiency.
ACM Trans. Sens. Networks, 2011

Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization.
IEEE Trans. Mob. Comput., 2011

Autonomous Deployment of Heterogeneous Mobile Sensors.
IEEE Trans. Mob. Comput., 2011

From mobile phones to responsible devices.
Secur. Commun. Networks, 2011

Sensor-mission assignment in wireless sensor networks with energy harvesting.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

End-to-end rate selection for opportunistic reception in multi-rate wireless networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Broadcasting in multi channel wireless networks in the presence of adversaries.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Interference cancellation-based RFID tags identification.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

Detecting and localizing large-scale router failures using active probes.
Proceedings of the MILCOM 2011, 2011

Data replication in mobile tactical networks.
Proceedings of the MILCOM 2011, 2011

Distributed backpressure protocols with limited state feedback.
Proceedings of the MILCOM 2011, 2011

Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Demo: A distributed architecture for heterogeneous multi sensor-task allocation.
Proceedings of the Distributed Computing in Sensor Systems, 2011

A distributed architecture for heterogeneous multi sensor-task allocation.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Sensor-Mission Assignment in Constrained Environments.
IEEE Trans. Parallel Distributed Syst., 2010

Sensor-mission assignment in wireless sensor networks.
ACM Trans. Sens. Networks, 2010

A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Mobile Sensor Deployment in Unknown Fields.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Network Coding aware Rate Selection in multi-rate IEEE 802.11.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Network Integration in 3G and 4G Wireless Networks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

2009
Evaluating MAPSec by marking attack graphs.
Wirel. Networks, 2009

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

A Mobility-Prediction-Based Relay Deployment Framework for Conserving Power in MANETs.
IEEE Trans. Mob. Comput., 2009

A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice.
IEEE Trans. Mob. Comput., 2009

Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009

Cross-layer Enhanced Source Location Privacy in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Control-theoretic Optimization of Utility over Mission Lifetimes in Multi-hop Wireless Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Proactive Data Dissemination to Mission Sites.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Autonomous deployment of heterogeneous mobile sensors.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Multiple Backhaul Mobile Access Router Striping.
Proceedings of IEEE International Conference on Communications, 2009

Detection and Localization Sensor Assignment with Exact and Fuzzy Locations.
Proceedings of the Distributed Computing in Sensor Systems, 2009

Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Mobile multi-layered IPsec.
Wirel. Networks, 2008

Evaluation of signaling loads in 3GPP networks.
IEEE Wirel. Commun., 2008

Mitigating Performance Degradation in Congested Sensor Networks.
IEEE Trans. Mob. Comput., 2008

Exploiting open functionality in SMS-capable cellular networks.
J. Comput. Secur., 2008

EndSec: An end-to-end message security protocol for mobile telecommunication networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Multi-Hop Wireless Relay Networks of Mesh Clients.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A cross-layer dropping attack in video streaming over ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Utility-Based Adaptation in Mission-Oriented Wireless Sensor Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Distributed network utility optimization in wireless sensor networks using power control.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Channelization for Network Coding in Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Multiple Backhaul Mobile Access Router: Design and Experimentation.
Proceedings of IEEE International Conference on Communications, 2008

Assigning Sensors to Competing Missions.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Data Collection Using RFID and a Mobile Reader.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Ontology-Centric Approach to Sensor-Mission Assignment.
Proceedings of the Knowledge Engineering: Practice and Patterns, 2008

Frugal Sensor Assignment.
Proceedings of the Distributed Computing in Sensor Systems, 2008

Utility-based joint sensor selection and congestion control for task-oriented WSNs.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

Security for Telecommunications Networks
Advances in Information Security 40, Springer, ISBN: 978-0-387-72441-6, 2008

2007
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks.
Wirel. Networks, 2007

Data Dissemination with Ring-Based Index for Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Bidding Protocols for Deploying Mobile Sensors.
IEEE Trans. Mob. Comput., 2007

Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Telecommun. Syst., 2007

Editorial PerCom 2007 special issue.
Pervasive Mob. Comput., 2007

Channelization for dynamic multi-frequency, multi-hop wireless cellular networks.
Ad Hoc Networks, 2007

SET: Detecting node clones in sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Privacy Preserving Communication in MANETs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Demo: Sensor Relocation with Mobile Sensors.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Sensor Relocation with Mobile Sensors: Design, Implementation, and Evaluation.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Relay-based Multi-hop Access to Wireless Mesh Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Assigning Sensors to Missions with Demands.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
Movement-Assisted Sensor Deployment.
IEEE Trans. Mob. Comput., 2006

On-demand diversity wireless relay networks.
Mob. Networks Appl., 2006

Of interest to our engineering practitioners ...
IEEE Commun. Mag., 2006

The effects of probabilistic key management on secure routing in sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Efficient Group Mobility for Heterogeneous Sensor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

CAT - A Practical Graph & SDL Based Toolkit for Vulnerability Assessment of 3G Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks.
Proceedings of the 4th International Conference on Mobile Systems, 2006

Establishing Pair-Wise Keys in Heterogeneous Sensor Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Optimizing sensor movement planning for energy efficiency.
Proceedings of the 2005 International Symposium on Low Power Electronics and Design, 2005

A Taxonomy of Cyber Attacks on 3G Networks.
Proceedings of the Intelligence and Security Informatics, 2005

Sensor relocation in mobile sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Robust Multiclass Signaling Overload Control.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Security and IP-based 3G wireless networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

An architecture and key management approach for maintaining privacy in location based group services.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Distributed Algorithms for Deploying Mobile Sensors.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Editorial: State of the Transactions.
IEEE Trans. Mob. Comput., 2004

Mobility management alternatives for migration to mobile Internet session-based services.
IEEE J. Sel. Areas Commun., 2004

Proxy-based sensor deployment for mobile sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

2003
Unified Mobility Manager: enabling efficient SIP/UMTS mobile network control.
IEEE Wirel. Commun., 2003

Editor's Note.
IEEE Trans. Mob. Comput., 2003

Editorial: New AE Introduction.
IEEE Trans. Mob. Comput., 2003

A Bidding Protocol for Deploying Mobile Sensors.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

2002
IP Paging Service for Mobile Hosts.
Wirel. Networks, 2002

HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks.
IEEE/ACM Trans. Netw., 2002

Editorial.
IEEE Trans. Mob. Comput., 2002

Editorial: Introducing the New AEs.
IEEE Trans. Mob. Comput., 2002

Introduction to the IEEE Transactions on Mobile Computing.
IEEE Trans. Mob. Comput., 2002

2001
Interworking internet telephony and wireless telecommunications networks.
Comput. Commun. Rev., 2001

Fast and Robust Signaling Overload Control.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001

2000
IP-based access network infrastructure for next-generation wireless data networks.
IEEE Wirel. Commun., 2000

User agent migration policies in wireless networks.
IEEE J. Sel. Areas Commun., 2000

Wireless data networking, standards, and applications.
Bell Labs Tech. J., 2000

RIMA: Router for Integrated Mobile Access.
Proceedings of the 11th IEEE International Symposium on Personal, 2000

1999
Mobile IP and wide area wireless data.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

HAWAII: A Domain-based Approach for Supporting Mobility in Wide-Area Wireless Networks.
Proceedings of the Seventh Annual International Conference on Network Protocols, 1999

1998
Performance evaluation of connection rerouting schemes for ATM-based wireless networks.
IEEE/ACM Trans. Netw., 1998

Experiences with Network-Based User Agents for Mobile Applications.
Mob. Networks Appl., 1998

Cluster mobile switching center for third generation wireless systems.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

Update and Search Algorithms for Wireless Two-Way Messaging: Design and Performance.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

User Agent Migration Policies in Multimedia Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

Design, Implementation, and Evaluation of Highly Available Distributed Call Processing Systems.
Proceedings of the Digest of Papers: FTCS-28, 1998

Protocol Feature Interactions.
Proceedings of the Formal Description Techniques and Protocol Specification, 1998

1997
A direct signaling system for flexible access and deployment of telecommunication services.
IEEE/ACM Trans. Netw., 1997

Pigeon: A Wireless Two-Way Messaging System.
IEEE J. Sel. Areas Commun., 1997

User Agents and Flexible Messages: A New Approach to Wireless Two-Way Messaging.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
Comparison of signaling loads for PCS systems.
IEEE/ACM Trans. Netw., 1996

Challenges for Nomadic Computing: Mobility Management and Wireless Communications.
Mob. Networks Appl., 1996

Distributed call processing for wireless mobile networks.
Bell Labs Tech. J., 1996

1995
A distributed control strategy for wireless ATM networks.
Wirel. Networks, 1995

AIRMAIL: a link-layer protocol for wireless networks.
Wirel. Networks, 1995

The use of network-based migrating user agents for personal communication services.
IEEE Wirel. Commun., 1995

An alternative approach to call/connection control in broadband switching systems.
IEEE Commun. Mag., 1995

Distributed call processing for personal communications services.
IEEE Commun. Mag., 1995

An Asymmetric Protocol for Digital Cellular Communications.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

1994
Verification of the MultiStream Potocol (MSP) Using COSPAN.
Formal Methods Syst. Des., 1994

B-ISDN: a technological discontinuity.
IEEE Commun. Mag., 1994

1993
Performance analysis of MSP feature-rich high-speed transport protocol.
IEEE/ACM Trans. Netw., 1993

The MultiStream Protocol: A Highly Flexible High-Speed Transport Protocol.
IEEE J. Sel. Areas Commun., 1993

Evaluation of Broadband UNI Signaling Protocol Techniques.
J. High Speed Networks, 1993

1992
A High-Speed Protocol Parallel Implementation: Design and Analysis.
Proceedings of the High Performance Networking IV, 1992

1991
Architectures, features, and implementation of high-speed transport protocols.
IEEE Netw., 1991


  Loading...