Context-Aware and Energy-Aware Video Streaming on Smartphones | 1 | 0.35 | 2022 |
Packet Header Obfuscation Using MIMO | 0 | 0.34 | 2020 |
Co-residency Attacks on Containers are Real | 0 | 0.34 | 2020 |
Solving the Divergence Problem in AC-QSS Cascading Failure Model by Introducing the Effect of a Realistic UVLS Scheme. | 0 | 0.34 | 2020 |
NetVision: On-Demand Video Processing in Wireless Networks | 1 | 0.35 | 2020 |
Optimizing 5G Performance by Reallocating Unused Resources | 0 | 0.34 | 2019 |
Mitigation and Recovery from Cascading Failures in Interdependent Networks under Uncertainty | 3 | 0.40 | 2019 |
Admission Control for Consistent Users in Next Generation Cellular Networks | 0 | 0.34 | 2019 |
CrowdVision: A Computing Platform for Video Crowdprocessing Using Deep Learning | 0 | 0.34 | 2019 |
Scalability and satisfiability of quality-of-information in wireless networks. | 1 | 0.35 | 2018 |
Stalling Live Migrations on the Cloud. | 0 | 0.34 | 2017 |
TeamPhone: Networking Smartphones for Disaster Recovery. | 9 | 0.82 | 2017 |
On-demand Information Retrieval from Videos Using Deep Learning in Wireless Networks: Demo Abstract. | 0 | 0.34 | 2017 |
Adversarial Network Forensics in Software Defined Networking. | 3 | 0.39 | 2017 |
Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure. | 5 | 0.48 | 2017 |
Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring. | 2 | 0.37 | 2017 |
Adversarial Network Forensics in Software Defined Networking: Demo. | 1 | 0.35 | 2017 |
Cooperative Data Offloading In Opportunistic Mobile Networks | 7 | 0.44 | 2016 |
On Propagation of Phenomena in Interdependent Networks. | 2 | 0.40 | 2016 |
Video Processing Of Complex Activity Detection In Resource-Constrained Networks | 0 | 0.34 | 2016 |
Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network | 1 | 0.38 | 2016 |
On-demand video processing in wireless networks | 1 | 0.36 | 2016 |
Mapping sample scenarios to operational models. | 0 | 0.34 | 2016 |
Network topology inference with partial path information | 1 | 0.35 | 2015 |
A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System. | 1 | 0.37 | 2015 |
Quality of information-aware real-time traffic flow analysis and reporting | 0 | 0.34 | 2015 |
Adaptive algorithms for diagnosing large-scale failures in computer networks | 2 | 0.37 | 2015 |
Spatial and temporal considerations in next place predictions | 2 | 0.41 | 2015 |
Next place predictions based on user mobility traces | 0 | 0.34 | 2015 |
Algorithms and Applications for Community Detection in Weighted Networks | 24 | 0.81 | 2015 |
Operational information content sum capacity: From theory to practice. | 0 | 0.34 | 2014 |
Splitter: mining fine-grained sequential patterns in semantic trajectories | 56 | 1.60 | 2014 |
Sensor Mission Assignment in Rechargeable Wireless Sensor Networks. | 5 | 0.44 | 2014 |
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing | 35 | 1.13 | 2014 |
Performance analysis of practical distributed backpressure protocols. | 0 | 0.34 | 2014 |
Security and Science of Agility. | 2 | 0.40 | 2014 |
Leveraging Periodicity In Human Mobility For Next Place Prediction | 2 | 0.42 | 2014 |
Quality of information-aware mobile applications. | 4 | 0.43 | 2014 |
Realizing the benefits of wireless network coding in multirate settings | 2 | 0.36 | 2013 |
Control-theoretic utility maximization in multihop wireless networks under mission dynamics | 1 | 0.35 | 2012 |
Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multihop Wireless Networks | 7 | 0.48 | 2012 |
Proactive data dissemination to mission sites | 0 | 0.34 | 2012 |
Max Weight Learning Algorithms for Scheduling in Unknown Environments. | 9 | 0.86 | 2012 |
Convergecast with aggregatable data classes. | 2 | 0.39 | 2012 |
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems. | 0 | 0.34 | 2012 |
Multidimensional Sensor Data Analysis In Cyber-Physical System: An Atypical Cube Approach | 5 | 0.51 | 2012 |
Who, When, Where: Timeslot Assignment to Mobile Clients | 4 | 0.42 | 2012 |
A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. | 4 | 0.44 | 2012 |
Broadcasting in multi channel wireless networks in the presence of adversaries | 2 | 0.46 | 2011 |
Interference cancellation-based RFID tags identification | 6 | 0.55 | 2011 |