Name
Affiliation
Papers
THOMAS F. LA PORTA
Pennsylvania State University Dept. of Computer Science and Engineering USA
93
Collaborators
Citations 
PageRank 
162
1025
91.82
Referers 
Referees 
References 
2369
1868
945
Search Limit
1001000
Title
Citations
PageRank
Year
Context-Aware and Energy-Aware Video Streaming on Smartphones10.352022
Packet Header Obfuscation Using MIMO00.342020
Co-residency Attacks on Containers are Real00.342020
Solving the Divergence Problem in AC-QSS Cascading Failure Model by Introducing the Effect of a Realistic UVLS Scheme.00.342020
NetVision: On-Demand Video Processing in Wireless Networks10.352020
Optimizing 5G Performance by Reallocating Unused Resources00.342019
Mitigation and Recovery from Cascading Failures in Interdependent Networks under Uncertainty30.402019
Admission Control for Consistent Users in Next Generation Cellular Networks00.342019
CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning00.342019
Scalability and satisfiability of quality-of-information in wireless networks.10.352018
Stalling Live Migrations on the Cloud.00.342017
TeamPhone: Networking Smartphones for Disaster Recovery.90.822017
On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract.00.342017
Adversarial Network Forensics in Software Defined Networking.30.392017
Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure.50.482017
Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring.20.372017
Adversarial Network Forensics in Software Defined Networking: Demo.10.352017
Cooperative Data Offloading In Opportunistic Mobile Networks70.442016
On Propagation of Phenomena in Interdependent Networks.20.402016
Video Processing Of Complex Activity Detection In Resource-Constrained Networks00.342016
Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network10.382016
On-demand video processing in wireless networks10.362016
Mapping sample scenarios to operational models.00.342016
Network topology inference with partial path information10.352015
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System.10.372015
Quality of information-aware real-time traffic flow analysis and reporting00.342015
Adaptive algorithms for diagnosing large-scale failures in computer networks20.372015
Spatial and temporal considerations in next place predictions20.412015
Next place predictions based on user mobility traces00.342015
Algorithms and Applications for Community Detection in Weighted Networks240.812015
Operational information content sum capacity: From theory to practice.00.342014
Splitter: mining fine-grained sequential patterns in semantic trajectories561.602014
Sensor Mission Assignment in Rechargeable Wireless Sensor Networks.50.442014
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing351.132014
Performance analysis of practical distributed backpressure protocols.00.342014
Security and Science of Agility.20.402014
Leveraging Periodicity In Human Mobility For Next Place Prediction20.422014
Quality of information-aware mobile applications.40.432014
Realizing the benefits of wireless network coding in multirate settings20.362013
Control-theoretic utility maximization in multihop wireless networks under mission dynamics10.352012
Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multihop Wireless Networks70.482012
Proactive data dissemination to mission sites00.342012
Max Weight Learning Algorithms for Scheduling in Unknown Environments.90.862012
Convergecast with aggregatable data classes.20.392012
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems.00.342012
Multidimensional Sensor Data Analysis In Cyber-Physical System: An Atypical Cube Approach50.512012
Who, When, Where: Timeslot Assignment to Mobile Clients40.422012
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks.40.442012
Broadcasting in multi channel wireless networks in the presence of adversaries20.462011
Interference cancellation-based RFID tags identification60.552011
  • 1
  • 2