Name
Affiliation
Papers
TOM LA PORTA
Penn State Univ, Dept Comp Sci & Engn, State Coll, PA USA
41
Collaborators
Citations 
PageRank 
112
581
36.19
Referers 
Referees 
References 
1349
1062
462
Search Limit
1001000
Title
Citations
PageRank
Year
Trustable service discovery for highly dynamic decentralized workflows00.342022
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison00.342021
PicSys: Energy-Efficient Fast Image Search on Distributed Mobile Networks10.382021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison00.342021
Decentralized Placement Of Data And Analytics In Wireless Networks For Energy-Efficient Execution00.342020
Strategyproof Reinforcement Learning for Online Resource Allocation00.342020
Enabling Discoverable Trusted Services for Highly Dynamic Decentralized Workflows00.342020
A Truthful Online Mechanism for Allocating Fog Computing Resources.00.342019
Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds150.572019
Learning Service Semantics For Self-Organization In Distributed Environments: Concepts And Research Directions00.342018
It's Hard to Share: Joint Service Placement and Request Scheduling in Edge Clouds with Sharable and Non-Sharable Resources140.772018
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.00.342018
Symptotics: a framework for estimating the scalability of real-world wireless networks.10.352017
Service Placement for Detecting and Localizing Failures Using End-to-End Observations40.412016
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks10.352015
Inferring Network Topologies in MANETs Applied to Service Redeployment00.342015
Managing Redundant Content in Bandwidth Constrained Wireless Networks.40.402014
Utility-based femtocell pilot management.00.342013
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks521.362013
Resource thrifty secure mobile video transfers on open WiFi networks10.382013
Trading off distortion for delay for video transmissions in wireless networks60.432013
Symptotics: a framework for analyzing the scalability of real-world wireless networks50.582012
Distortion-Resilient Routing for Video Flows in Wireless Multi-hop Networks30.392012
Quality of information functions for networked applications.20.372012
Optimal Recovery from Large-Scale Failures in IP Networks80.552012
Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach291.522011
Demo: A distributed architecture for heterogeneous multi sensor-task allocation10.352011
End-to-end rate selection for opportunistic reception in multi-rate wireless networks00.342011
A distributed architecture for heterogeneous multi sensor-task allocation.20.382011
Cross-layer enhanced source location privacy in sensor networks220.882009
A cross-layer dropping attack in video streaming over ad hoc networks.20.432008
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks302.252007
Data Dissemination with Ring-Based Index for Wireless Sensor Networks622.522007
Demo: Sensor Relocation with Mobile Sensors30.422007
Sensor Relocation with Mobile Sensors: Design, Implementation, and Evaluation100.642007
The Effects Of Probabilistic Key Management On Secure Routing In Sensor Networks30.452006
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks561.892006
Optimizing sensor movement planning for energy efficiency271.462005
Proxy-Based Sensor Deployment for Mobile Sensor Networks523.052004
A Bidding Protocol for Deploying Mobile Sensors1275.692003
IP Paging Service for Mobile Hosts382.932002