Prasant Mohapatra
#55,590
Most Influential Person Now
Researcher
Prasant Mohapatra's AcademicInfluence.com Rankings
Prasant Mohapatracomputer-science Degrees
Computer Science
#3610
World Rank
#3792
Historical Rank
Database
#2004
World Rank
#2103
Historical Rank

Download Badge
Computer Science
Prasant Mohapatra's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Prasant Mohapatra Influential?
(Suggest an Edit or Addition)According to Wikipedia, Prasant Mohapatra is an Indian-American computer scientist. Mohapatra is currently the Provost of the University of South Florida. Previously, he was Vice Chancellor for Research at University of California Davis .
Prasant Mohapatra's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges (2015) (1030)
- Medium access control in wireless sensor networks (2007) (608)
- Power conservation and quality of surveillance in target tracking sensor networks (2004) (557)
- FIREMAN: a toolkit for firewall modeling and analysis (2006) (471)
- Analytical modeling and mitigation techniques for the energy hole problem in sensor networks (2007) (434)
- Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey (2012) (390)
- QRON: QoS-aware routing in overlay networks (2004) (341)
- WiWho: WiFi-Based Person Identification in Smart Spaces (2016) (297)
- An analytical model for the energy hole problem in many-to-one sensor networks (2005) (256)
- Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] (2010) (241)
- Qos in mobile a hoc networks (2003) (231)
- Finger-writing with Smartwatch: A Case for Finger and Hand Gesture Recognition using Smartwatch (2015) (227)
- Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks (2010) (214)
- Efficient overlay multicast for mobile ad hoc networks (2003) (208)
- Using humans as sensors: An estimation-theoretic perspective (2014) (187)
- ARTSense: Anonymous reputation and trust in participatory sensing (2013) (173)
- STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol (2009) (167)
- ProgME: Towards Programmable Network MEasurement (2007) (162)
- Identifying rumors and their sources in social networks (2012) (147)
- Predicting user traits from a snapshot of apps installed on a smartphone (2014) (142)
- Group communications in mobile ad hoc networks (2004) (128)
- Monitoring vital signs using millimeter wave (2016) (124)
- The impact of topology on overlay routing service (2004) (124)
- Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers (2016) (122)
- Dynamic defense strategy against advanced persistent threat with insiders (2015) (121)
- An Admission Control Scheme for Predictable Server Response Time for Web Accesses (2001) (120)
- Session-based overload control in QoS-aware Web servers (2002) (118)
- Wormhole routing techniques for directly connected multicomputer systems (1998) (116)
- Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing (2014) (102)
- Analyzing Shopper's Behavior through WiFi Signals (2015) (102)
- AccelWord: Energy Efficient Hotword Detection through Accelerometer (2015) (100)
- Ad Hoc Networks: Technologies And Protocols (2009) (98)
- SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks (2003) (97)
- Scalable multicasting in mobile ad hoc networks (2004) (94)
- Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware (2009) (94)
- Improving energy efficiency of Wi-Fi sensing on smartphones (2011) (93)
- Received signal strength indicator and its analysis in a typical WLAN system (short paper) (2013) (92)
- Your Installed Apps Reveal Your Gender and More! (2015) (87)
- A hybrid medium access control protocol for underwater wireless networks (2007) (87)
- Energy Consumption and Conservation in WiFi Based Phones: A Measurement-Based Study (2007) (84)
- Virtual patrol: a new power conservation design for surveillance using sensor networks (2005) (81)
- ColorBars: increasing data rate of LED-to-camera communication using color shift keying (2015) (79)
- HostCast: a new overlay multicasting protocol (2003) (79)
- Trusted collaborative spectrum sensing for mobile cognitive radio networks (2012) (78)
- Probability Density of the Received Power in Mobile Networks (2011) (77)
- Simultaneously Reducing Latency and Power Consumption in OpenFlow Switches (2014) (77)
- Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones (2014) (75)
- A first look at 802.11ac in action: Energy efficiency and interference characterization (2014) (69)
- Characterizing privacy leakage of public WiFi networks for users on travel (2013) (69)
- Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives (2018) (68)
- Vital Sign and Sleep Monitoring Using Millimeter Wave (2017) (67)
- Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks (2010) (67)
- Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller (2013) (65)
- Characterization of E-Commerce Traffic (2002) (65)
- PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications (2016) (64)
- Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas (2011) (64)
- Comparing simulation tools and experimental testbeds for wireless mesh networks (2010) (63)
- Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh Networks (2009) (63)
- MARIA: Interference-Aware Admission Control and QoS Routing in Wireless Mesh Networks (2008) (63)
- Performance Improvement of Allocation Schemes for Mesh-Connected Computers (1998) (62)
- Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection (2019) (59)
- Your AP knows how you move: fine-grained device motion recognition through WiFi (2014) (59)
- LAKER: location aided knowledge extraction routing for mobile ad hoc networks (2003) (59)
- STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users (2016) (59)
- A Scalable Hybrid Approach to Switching in Metro Ethernet Networks (2007) (57)
- DopEnc: acoustic-based encounter profiling using smartphones (2016) (57)
- Improving crowd-sourced Wi-Fi localization systems using Bluetooth beacons (2012) (55)
- On investigating overlay service topologies (2007) (54)
- MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers (2016) (52)
- Received Signal Strength Indicator and its Analysis in a Typical WLAN System (2013) (52)
- QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations (2010) (51)
- Edge Cloud Offloading Algorithms (2018) (51)
- Experimental characterization of an 802.11b wireless mesh network (2006) (51)
- Real-time scheduling method for networked discrete control systems (2009) (50)
- ACES: An efficient admission control scheme for QoS-aware web servers (2003) (50)
- A Traffic-Balanced Adaptive Wormhole-Routing Scheme for Two-Dimensional Meshes (1997) (50)
- Integration Gain of Heterogeneous WiFi/WiMAX Networks (2011) (49)
- Quality-of-information aware networking for tactical military networks (2011) (48)
- Performance Evaluation of Service Differentiating Internet Servers (2002) (47)
- DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks (2006) (47)
- RACE: time series compression with rate adaptivity and error bound for sensor networks (2004) (47)
- Vulnerabilities in Federated Learning (2021) (46)
- Securing Multimedia Content Using Joint Compression and Encryption (2013) (45)
- Scheduling Multiple Partially Overlapped Channels in Wireless Mesh Networks (2007) (45)
- On the deployment of wireless data back-haul networks (2007) (44)
- Identity-based attack detection in mobile wireless networks (2011) (44)
- RSS-Ratio for enhancing performance of RSS-based applications (2013) (44)
- Admission Control and Interference-Aware Scheduling in Multi-hop WiMAX Networks (2007) (44)
- Metropolitan Ethernet Network: A move from LAN to MAN (2007) (44)
- Experimental characterization of multi-hop communications in vehicular ad hoc network (2005) (43)
- Adaptive wireless channel probing for shared key generation (2011) (43)
- Soft-TDMAC: A Software-Based 802.11 Overlay TDMA MAC with Microsecond Synchronization (2012) (42)
- Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks (2008) (41)
- Using Deep Learning for Energy Expenditure Estimation with wearable sensors (2015) (41)
- Overload control in QoS-aware web servers (2003) (39)
- Energy Expenditure Estimation using Smartphone Body Sensors (2013) (39)
- Hearing is believing: Detecting mobile primary user emulation attack in white space (2011) (39)
- Contextual localization through network traffic analysis (2014) (38)
- Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks (2010) (38)
- Inferring user relationship from hidden information in WLANs (2012) (38)
- Processor-Network Speed Scaling for Energy–Delay Tradeoff in Smartphone Applications (2016) (37)
- A survey on ultra wide band medium access control schemes (2007) (37)
- Multicasting in Ad Hoc Networks (2005) (37)
- Stealthy attacks meets insider threats: A three-player game model (2015) (36)
- Monitoring building door events using barometer sensor in smartphones (2015) (36)
- Security and Science of Agility (2014) (36)
- Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space (2013) (35)
- Performance evaluation of video streaming in multihop wireless mesh networks (2008) (35)
- Chaining for securing data provenance in distributed information networks (2012) (35)
- STAMP: Ad hoc spatial-temporal provenance assurance for mobile users (2013) (35)
- Scheduling in multihop WiMAX networks (2008) (35)
- Edge router multicasting with MPLS traffic engineering (2002) (34)
- Design and deployment considerations for high performance MIMO testbeds (2008) (34)
- Efficient and balanced adaptive routing in two-dimensional meshes (1995) (34)
- Mobile video chat: issues and challenges (2013) (34)
- BF-IoT: Securing the IoT Networks via Fingerprinting-Based Device Authentication (2018) (34)
- Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications (2014) (34)
- Early Detection of Spam Mobile Apps (2015) (33)
- Temporal quality assessment for mobile videos (2012) (33)
- Multicasting in differentiated service domains (2002) (33)
- A signaling game model for moving target defense (2017) (33)
- QoS-aware multicasting in DiffServ domains (2002) (33)
- Overlay multicast for MANETs using dynamic virtual mesh (2007) (33)
- QRPp1-4: Characterizing Quality of Time and Topology in a Time Synchronization Network (2006) (33)
- From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network (2010) (32)
- Adaptive per hop differentiation for end-to-end delay assurance in multihop wireless networks (2009) (32)
- Investigation of scalable video delivery using H.264 SVC on an LTE network (2011) (32)
- Characterization of BGP Recovery Time under Large-Scale Failures (2006) (32)
- Sensor-Assisted Codebook-Based Beamforming for Mobility Management in 60 GHz WLANs (2015) (32)
- Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems (2012) (31)
- Exploiting Multi-Channel Clustering for Power Efficiency in Sensor Networks (2006) (31)
- Opportunistic spectrum scheduling for mobile cognitive radio networks in white space (2011) (31)
- Joint carrier aggregation and packet scheduling in LTE-advanced networks (2013) (31)
- Scalable internet servers: issues and challenges (2000) (31)
- Collusion-resilient quality of information evaluation based on information provenance (2011) (31)
- Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks (2009) (30)
- Virtual Multi-Homing: On the Feasibility of Combining Overlay Routing with BGP Routing (2005) (30)
- A novel cooperative localization algorithm using enhanced particle filter technique in maritime search and rescue wireless sensor network. (2017) (29)
- A hardware multicast routing algorithm for two-dimensional meshes (1996) (29)
- A Lazy Scheduling Scheme for Improving Hypercube Performance (1993) (29)
- Improving BGP Convergence Delay for Large-Scale Failures (2006) (28)
- Architectural impact of secure socket layer on Internet servers (2012) (28)
- Resilience technologies in Ethernet (2010) (28)
- iType: Using eye gaze to enhance typing privacy (2017) (28)
- An adaptive privacy-preserving scheme for location tracking of a mobile user (2013) (28)
- Efficient data capturing for network forensics in cognitive radio networks (2011) (27)
- Spatio-temporal provenance: Identifying location information from unstructured text (2013) (27)
- Architectural impact of secure socket layer on Internet servers (2000) (27)
- Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS (2009) (27)
- Video Delivery Challenges and Opportunities in 4G Networks (2013) (26)
- Distributed Scheduling and Routing in Underwater Wireless Networks (2010) (26)
- Live Video Forensics: Source Identification in Lossy Wireless Networks (2015) (26)
- On the Deployment of Wireless Sensor Nodes (2005) (26)
- PANDA: A novel mechanism for flooding based route discovery in ad hoc networks (2003) (25)
- Scalable testbed for next-generation wireless networking technologies (2005) (25)
- Providing differentiated service from an Internet server (1999) (25)
- How expensive are free smartphone apps? (2012) (25)
- Contactless Breathing Rate Monitoring in Vehicle Using UWB Radar (2018) (25)
- Using Smartphone Sensors for Improving Energy Expenditure Estimation (2015) (25)
- Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center (2011) (24)
- Rendezvous based trust propagation to enhance distributed network security (2011) (24)
- Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks (2013) (24)
- A framework for self-healing and optimizing routing techniques for mobile ad hoc networks (2008) (24)
- A novel mechanism for flooding based route discovery in ad hoc networks (2003) (24)
- Quail Ridge Wireless Mesh Network: Experiences, Challenges and Findings (2007) (24)
- WearIA: Wearable device implicit authentication based on activity information (2017) (23)
- IoTGaze: IoT Security Enforcement via Wireless Context Analysis (2020) (23)
- Non-Intrusive Multi-Modal Estimation of Building Occupancy (2017) (23)
- Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System (2020) (23)
- Secret message sharing using online social media (2014) (23)
- Quality-optimized downlink scheduling for video streaming applications in LTE networks (2012) (23)
- Architectural impact of secure socket layer on Internet servers: A retrospect (2000) (22)
- LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications (2017) (22)
- Dynamic Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks (2007) (21)
- On the analysis of overlay failure detection and recovery (2007) (21)
- Determining 802.11 link quality with passive measurements (2008) (21)
- A Stackelberg Game and Markov Modeling of Moving Target Defense (2017) (21)
- PLiFi: hybrid wifi-VLC networking using power lines (2016) (21)
- A random early demotion and promotion marker for assured services (2000) (21)
- BGP convergence delay after multiple simultaneous router failures: Characterization and solutions (2009) (20)
- Characterizing WiFi connection and its impact on mobile users: practical insights (2013) (20)
- Cross-over spanning trees Enhancing metro ethernet resilience and load balancing (2007) (20)
- Quantifying and Improving DNSSEC Availability (2011) (20)
- WebGraph: a framework for managing and improving performance of dynamic Web content (2002) (20)
- On insider misbehavior detection in cognitive radio networks (2013) (19)
- Stealthy attacks with insider information: A game theoretic model with asymmetric feedback (2016) (19)
- Joint Video Compression and Encryption using Arithmetic Coding and chaos (2010) (19)
- Using Chaotic Maps for Encrypting Image and Video Content (2011) (19)
- TIDE: A User-centric Tool for Identifying Energy Hungry Applications on Smartphones (2015) (19)
- Measuring Availability in the Domain Name System (2010) (19)
- Towards Learning-automation IoT Attack Detection through Reinforcement Learning (2020) (19)
- mmSense: Multi-Person Detection and Identification via mmWave Sensing (2019) (19)
- QuRiNet: quail ridge natural reserve wireless mesh network (2006) (19)
- Seeker: A bandwidth-based association control framework for wireless mesh networks (2011) (18)
- Scheduling of wireless control networks based on IEEE 802.15.4 networks: Mixed traffic environment (2011) (18)
- Lifetime behavior and its impact on Web caching (1999) (18)
- APHD: End-to-End Delay Assurance in 802.11e Based MANETs (2006) (18)
- An Overview of Fairness in Clustering (2021) (18)
- Prediction based opportunistic routing for maritime search and rescue wireless sensor network (2018) (18)
- Missing data recovery using reconstruction in ocean wireless sensor networks (2018) (18)
- Efficient monitoring in wireless mesh networks: Overheads and accuracy trade-offs (2008) (17)
- Efficient admission control algorithms for multimedia servers (1999) (17)
- RECOG: A Sensing-Based Cognitive Radio System with Real-Time Application Support (2013) (17)
- A Proxy View of Quality of Domain Name Service (2007) (17)
- The impact of link-layer retransmissions on video streaming in wireless mesh networks (2008) (16)
- MU-MIMO-Aware AP Selection for 802.11ac Networks (2017) (16)
- Performance study of RAID-5 disk arrays with data and parity cache (1996) (16)
- Quality of name resolution in the Domain Name System (2009) (16)
- Efficient target detection in maritime search and rescue wireless sensor network using data fusion (2019) (16)
- Video source identification in lossy wireless networks (2013) (15)
- High Speed LED-to-Camera Communication using Color Shift Keying with Flicker Mitigation (2020) (15)
- Hierarchical multicast techniques and scalability in mobile Ad Hoc networks (2006) (15)
- Online and Bandit Algorithms for Nonstationary Stochastic Saddle-Point Optimization (2019) (15)
- An integrated processor management scheme for the mesh-connected multicomputer systems (1997) (14)
- Suspicion-Free Adversarial Attacks on Clustering Algorithms (2019) (14)
- A framework for managing QoS and improving performance of dynamic Web content (2001) (14)
- CAM: a context-aware transportation protocol for HTTP (2003) (14)
- Hardware Architecture for Video Authentication Using Sensor Pattern Noise (2014) (14)
- Evaluation of network trust using provenance based on distributed local intelligence (2011) (14)
- Performance Analysis of Cluster-Based Multiprocessors (1994) (14)
- Fair Algorithms for Hierarchical Agglomerative Clustering (2020) (13)
- Performance Analysis of Finite-Buffered Asynchronous Multistage Interconnection Networks (1996) (13)
- Demo: Finger and Hand Gesture Recognition using Smartwatch (2015) (13)
- CLIP: Continuous Location Integrity and Provenance for Mobile Phones (2015) (13)
- Using differentiated services to support Internet telephony (2001) (13)
- Multicasting: an enabling technology (2003) (13)
- Spam Mobile Apps (2017) (13)
- A Self-Healing and Optimizing Routing Technique for Ad Hoc Networks (2003) (13)
- Video acuity assessment in mobile devices (2015) (13)
- Quality-Oriented Video Delivery over LTE Using Adaptive Modulation and Coding (2011) (13)
- On Dependability Evaluation of Mesh-Connected Processors (1995) (13)
- Applications and Design of Heterogeneous and / or Broadband Sensor Networks (2004) (12)
- Processor Allocation Using Partitioning in Mesh Connected Parallel Computers (1996) (12)
- Experimental Study of Measurement-based Admission Control for Wireless Mesh Networks (2007) (12)
- A Lazy Scheduling Scheme for Hypercube Computers (1995) (12)
- A Holistic Approach to Reconstruct Data in Ocean Sensor Network Using Compression Sensing (2018) (12)
- Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection (2017) (12)
- Retransmission-aware queuing and routing for video streaming in wireless mesh networks (2011) (12)
- Dynamic branch decoupled architecture (1999) (12)
- WDS-based layer 2 routing for wireless mesh networks (2006) (12)
- An efficient bandwidth management scheme for real-time Internet applications (2001) (12)
- Sense and Deploy: Blockage-Aware Deployment of Reliable 60 GHz mmWave WLANs (2018) (12)
- An Availability Model for MIN-Based Multiprocessors (1993) (12)
- A moving target defense against adversarial machine learning (2019) (12)
- PRONET: Network trust assessment based on incomplete provenance (2011) (11)
- Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails (2018) (11)
- Heterogeneous wireless access in large mesh networks (2008) (11)
- Quality of service (qos) provisioning in multihop ad hoc networks (2006) (11)
- BGP Convergence Delay under Large-Scale Failures: Characterization and Solutions (2007) (11)
- Scheduling Prioritized Services in Multihop OFDMA Networks (2010) (11)
- VSync: Cloud based video streaming service for mobile devices (2016) (11)
- Cross-layer coordination for efficient contents delivery in LTE eMBMS traffic (2012) (11)
- Detecting spectrum misuse in wireless networks (2012) (11)
- Spectrum-aware radio resource management for scalable video multicast in LTE-advanced systems (2013) (11)
- Multicasting in MPLS domains (2004) (11)
- On the feasibility of estimating soluble sugar content using millimeter-wave (2019) (10)
- Characterizing Instant Messaging Apps on Smartphones (2015) (10)
- Tree-based multicasting on wormhole routed multistage interconnection networks (1997) (10)
- Machine Learning to Improve Energy Expenditure Estimation in Children With Disabilities: A Pilot Study in Duchenne Muscular Dystrophy (2016) (10)
- Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks (2020) (10)
- Poster Abstract: Human Tracking and Activity Monitoring Using 60 GHz mmWave (2016) (10)
- Improving Performance of Mesh-connected Multicomputers by Reducing Fragmentation (1998) (10)
- Multi-Point Bandit Algorithms for Nonstationary Online Nonconvex Optimization (2019) (10)
- FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping (2016) (10)
- An Efficient Method for Approximating Submesh Reliability of Two-Dimensional Meshes (1998) (10)
- Asynchronous Tree-Based Multicasting in Wormhole-Switched MINs (1999) (10)
- Human tracking and activity monitoring using 60 GHz mmWave: poster abstract (2016) (10)
- A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks (2016) (9)
- A cross-layer dropping attack in video streaming over ad hoc networks (2008) (9)
- QoE prediction model for mobile video telephony (2016) (9)
- QMBF: a QoS-aware multicast routing protocol (2003) (9)
- Characterization of Wireless Multidevice Users (2016) (9)
- Efficient health data compression on mobile devices (2013) (9)
- QoS-aware multicast protocol using bounded flooding (QMBF) technique (2002) (9)
- Dual-Crosshatch Disk Array: A Highly Reliable Hybrid-RAID Architecture (1995) (8)
- Speculative Route Invalidation to Improve BGP Convergence Delay under Large-Scale Failures (2006) (8)
- Scheduling granularity in underwater acoustic networks (2011) (8)
- Quality-Oriented Video Delivery over LTE (2013) (8)
- Trust and independence aware decision fusion in distributed networks (2013) (8)
- Throughput, energy efficiency and interference characterisation of 802.11ac (2017) (8)
- Improving cache performance of network intensive workloads (2001) (8)
- WiFi and Multiple Interfaces: Adequate for Virtual Reality? (2018) (8)
- Good Neighbor : Secure Pairing of Nearby Wireless Devices by Multiple Antennas ∗ (2011) (8)
- RRR: Rapid Ring Recovery Submillisecond Decentralized Recovery for Ethernet Ring (2011) (8)
- Enabling privacy-preserving first-person cameras using low-power sensors (2015) (8)
- Quantifying DNS namespace influence (2012) (8)
- DiffServ-Aware Multicasting (2004) (7)
- Heterogeneous QoS multicast in Diffserv-like networks (2005) (7)
- Workshop on performance and architecture of web servers (2000) (7)
- Recommendation Systems for Markets with Two Sided Preferences (2014) (7)
- Dynamic Real-Time Task Scheduling on Hypercubes (1997) (7)
- A Novel Navigation and Transmission Technique for Mobile Handheld Devices (2002) (7)
- MotionSync: Personal Energy Analytics through Motion Tags and Wearable Sensing (2016) (7)
- Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining (2011) (7)
- Jamming-Resistant Communication: Channel Surfing without Negotiation (2010) (7)
- A study of overheads and accuracy for efficient monitoring of wireless mesh networks (2010) (7)
- A flow control framework for improving throughput and energy efficiency in CSMA/CA based wireless multihop networks (2006) (7)
- MagPairing: Exploiting magnetometers for pairing smartphones in close proximity (2014) (7)
- Impact of security properties on the quality of information in tactical military networks (2010) (7)
- ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things (2019) (7)
- DATALET: An approach to manage big volume of data in cyber foraged environment (2019) (7)
- Characterizing Mobile Open APIs in smartphone apps (2014) (7)
- PANDA : An Approach to Improve Flooding Based Route Discovery in Mobile Ad Hoc Networks (2002) (6)
- Improving mobile video telephony (2014) (6)
- A Queuing Model for Finite-Buffered Multistage Interconnection Networks (1993) (6)
- Wireless Access to Ultimate Virtual Reality 360-Degree Video At Home (2018) (6)
- Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation (2019) (6)
- Diagnosing Failures in Wireless Networks Using Fault Signatures (2010) (6)
- Trustworthy Wireless Networks: Issues and Applications (Invited Paper) (2010) (6)
- A Context-Aware HTML/XML Document Transmission Process for Mobile Wireless Clients (2005) (6)
- Slimmer: Accelerating 3D Semantic Segmentation for Mobile Augmented Reality (2020) (6)
- Resource allocation using Link State Propagation in OFDMA femto networks (2014) (6)
- Accurate and Timely Situation Awareness Retrieval from a Bandwidth Constrained Camera Network (2017) (6)
- IoTSpy: Uncovering Human Privacy Leakage in IoT Networks via Mining Wireless Context (2020) (6)
- Characterization of wireless multi-device users (2015) (6)
- Hardware Architecture for Simultaneous Arithmetic Coding and Encryption (2011) (6)
- Smart Contract-based Computing Resources Trading in Edge Computing (2020) (6)
- Toward Deployable Methods for Assessment of Quality for Scalable IPTV Services (2013) (6)
- FedTune: Automatic Tuning of Federated Learning Hyper-Parameters from System Perspective (2021) (6)
- Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks (2013) (6)
- When to Reset Your Keys: Optimal Timing of Security Updates via Learning (2016) (6)
- Using service brokers for accessing backend servers for web applications (2003) (6)
- Wireless access to ultimate virtual reality 360-degree video: poster abstract (2019) (6)
- Experimental Anatomy of Packet Losses in Wireless Mesh Networks (2009) (6)
- Lifetime Behavior and its Impact on Web (1999) (5)
- Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications (2020) (5)
- Quantifying and Visualizing the Demand and Supply Gap from E-commerce Search Data using Topic Models (2019) (5)
- When to type, talk, or Swype: Characterizing energy consumption of mobile input modalities (2015) (5)
- An Adaptive Job Allocation Method for Directly-Connected Multicomputer Systems. (1996) (5)
- Provenance logic: Enabling multi-event based trust in mobile sensing (2014) (5)
- An application based differentiated service model (2000) (5)
- A model checking-based security analysis framework for IoT systems (2021) (5)
- An Acoustic-Based Encounter Profiling System (2018) (5)
- Trustworthy Wireless Networks : Issues and Applications (2010) (5)
- Learning to Diversify for E-commerce Search with Multi-Armed Bandit (2019) (5)
- Characterization of Bus Transactions for SPECweb96 Benchmark (2000) (5)
- Processor Allocation Using a Reservation Technique in Hypercube Computers (1993) (5)
- Fair Clustering Using Antidote Data (2021) (5)
- BoLTE: Efficient network-wide LTE broadcasting (2017) (5)
- Optimal System Maneuver for Trust Management in Social Networks (2016) (5)
- Accurate energy expenditure estimation using smartphone sensors (2013) (5)
- Type, Talk, or Swype: Characterizing and comparing energy consumption of mobile input modalities (2016) (5)
- An efficient processor allocation scheme for mesh connected parallel computers (1995) (5)
- LAKER: learning from past actions to guide future behaviors in ad hoc routing (2007) (5)
- On the Limits of Subsampling of Location Traces (2017) (5)
- On Availability-Performability Tradeoff in Wireless Mesh Networks (2015) (5)
- DustDoctor: A self-healing sensor data collection system (2011) (5)
- Efficient MAC for Real-Time Video Streaming over Wireless LAN (2015) (5)
- A Tree Building Technique for Overlay Multicasting in DiffServ Domains (2003) (5)
- Toward Mobile 3D Vision (2020) (4)
- Mobile Cloud Computing and Wireless Sensor Networks: A review, integration architecture, and future directions (2021) (4)
- Etherlay: An Overlay Enhancement for Metro Ethernet Networks (2006) (4)
- RangingNet: A convolutional deep neural network based ranging model for wireless sensor networks (WSN) (2019) (4)
- Experimental Work Versus Simulation in the Study of Mobile Ad Hoc Networks (2013) (4)
- Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief (2011) (4)
- Placement of Sensor Nodes in Wireless Sensor Networks (4)
- Blockchain based secure smart city architecture using low resource IoTs (2021) (4)
- BeamSniff: Enabling Seamless Communication under Mobility and Blockage in 60 GHz Networks (2019) (4)
- Energy Expenditure Estimation in boys with Duchene muscular dystrophy using accelerometer and heart rate sensors (2014) (4)
- Detecting Route Attraction Attacks in Wireless Networks (2011) (4)
- Current research trends in internet servers (2001) (4)
- Towards Optimization of e-Commerce Search and Discovery (2018) (4)
- Game Theoretic Characterization of Collusive Behavior Among Attackers (2018) (4)
- SWIM: A Switch Manager for Datacenter Networks (2014) (4)
- An adaptive job allocation method for multicomputer systems (1996) (4)
- Guest Editors' Introduction: Internet Data Centers (2004) (4)
- Architectures for Simultaneous Coding and Encryption Using Chaotic Maps (2011) (4)
- Recent advances and evolution of WLAN and WMAN standards [Guest Editorial] (2008) (4)
- Demo: Crowd-cache -- popular content for free (2014) (4)
- Network Characterization and Perceptual Evaluation of Skype Mobile Videos (2013) (4)
- Privacy-aware contextual localization using network traffic analysis (2017) (4)
- An Efficient Overlay Link Performance Monitoring Technique (2006) (3)
- Fairness Degrading Adversarial Attacks Against Clustering Algorithms (2021) (3)
- Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks (2011) (3)
- Mitigating macro-cell outage in LTE-Advanced deployments (2015) (3)
- Allocation and Mapping Based Reliability Analysis of Multistage Interconnection Networks (1996) (3)
- Evaluating perceptual video quality for mobile clients in 802.11n WLAN (2013) (3)
- Packet prediction for speculative cut-through switching (2008) (3)
- Stream scheduling algorithms for multimedia storage servers (1998) (3)
- Strong Black-box Adversarial Attacks on Unsupervised Machine Learning Models (2019) (3)
- Your installed apps reveal your gender and more! (2014) (3)
- An Aggressive Admission Control Algorithms for Multimedia Servers. (1997) (3)
- An aggressive admission control scheme for multimedia servers (1997) (3)
- Performance Analysis of Combining Multistage Interconnection Networks (1994) (3)
- Distributed Video Surveillance Using Mobile Agents (2011) (3)
- Personal cloudlets for privacy and resource efficiency in mobile in-app advertising (2013) (3)
- Jamming-Resilient Message Dissemination in Wireless Networks (2023) (3)
- Using Social Information for Flow Allocation in MANETs (2013) (3)
- Long-Term Privacy Profiling through Smartphone Sensors (2015) (3)
- On-line real-time task scheduling on partitionable multiprocessors (1996) (3)
- Visual DNSSEC troubleshooting with DNSViz. (2010) (2)
- Future Radio Access, Wi-Fi-LTE, LTE-Advanced: The Path to 5G (2017) (2)
- Quantifying and improving dns availability (2010) (2)
- Fast rendezvous for cognitive radios by exploiting power leakage at adjacent channels (2012) (2)
- Special section on wireless mobile and multimedia networks (2011) (2)
- Processor allocation using user directives in mesh-connected multicomputer systems (1998) (2)
- Analysis of Windowing and Peering Schemes for Cache Coherency in Mobile Devices (2005) (2)
- Navigating in Signal Space: A Crowd-Sourced Sensing Map Construction for Navigation (2014) (2)
- Throughput-constrained scheduling in OFDMA wireless networks (2012) (2)
- Why My App Got Deleted: Detection of Spam Mobile Apps (2014) (2)
- Design and implementation of a frequency-aware wireless video communication system (2013) (2)
- Poster Abstract: Passive Activity Classification of Smart Homes through Wireless Packet Sniffing (2020) (2)
- StrLight: An Imperceptible Visible Light Communication System with String Lights (2019) (2)
- Comments on ''arithmetic coding as a non-linear dynamical system'' (2012) (2)
- Capacity enhancement and reliability of wireless mesh networks (2010) (2)
- Escaping Saddle-Points Faster under Interpolation-like Conditions (2020) (2)
- Wireless Mesh Networks [Guest Editorial] (2007) (2)
- Resource Allocation in OFDMA Femto Networks (2013) (2)
- PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices (2017) (2)
- Practical Rate and Route Adaptation with Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks (2009) (1)
- SmartAIR: Smart energy efficient framework for large network of air quality monitoring systems (2019) (1)
- Demonstration Paper: Accurate Energy Expenditure Estimation using Smartphone Sensors (2013) (1)
- Networking support for underwater wireless networks (2010) (1)
- Efficient processor management strategies for multicomputer systems (1997) (1)
- Editorial: A Message from the Incoming Editor-in-Chief (2014) (1)
- Routing performance and power conservation in ad hoc and sensor networks (2006) (1)
- MAIDE: Augmented Reality (AR)-facilitated Mobile System for Onboarding of Internet of Things (IoT) Devices at Ease (2022) (1)
- Improving Packet Delivery Performance of BGP During Large-Scale Failures (2007) (1)
- Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks (2011) (1)
- Moving Target Defense against Adversarial Machine Learning (2021) (1)
- On Dependability Evaluation of Mesh Connected Multiprocessors* (1995) (1)
- QuRiNet: a wireless testbed for network and ecological research (2010) (1)
- Crowd-Cache: Popular Content for Free (2014) (1)
- Security and quality provisioning in wireless networks (2011) (1)
- Your Apps Are What You Are: Personification Through Installed Smartphone Apps (2013) (1)
- Dependability and performance modelling of parallel computers (1993) (1)
- IOTA: A Framework for Analyzing System-Level Security of IoTs (2022) (1)
- Soft-TDMAC : A Software-based 802 . 11 Overlay TDMA MAC Protocol with Microsecond Synchronization (2008) (1)
- IEEE INFOCOM 2004 Conference (2004) (1)
- LAKER: learning from past actions to guide future behaviors in ad hoc routing: Research Articles (2007) (1)
- Securing Sensor Networks Using A Novel Multi-Channel Architecture (2006) (1)
- Wireless ad hoc networks for internet applications: real or hype? (2003) (1)
- AIDE: Augmented Onboarding of IoT Devices at Ease (2019) (1)
- Editorial: Wireless Technologies for Humanitarian Relief (2014) (1)
- On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses (2022) (1)
- Learning to Rank and Discover for E-Commerce Search (2018) (1)
- Transmit power estimation with a single monitor in multi-band networks (2012) (1)
- FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways (2018) (1)
- Supporting multicast in scalable qos frameworks (2002) (1)
- Asymptotic Analysis of a Peer Enhanced Cache Invalidation Scheme (2004) (1)
- Architecture for Blocking Detection in Wireless Video Source Authentication (2014) (1)
- How BlockChain Can Help Enhance The Security And Privacy in Edge Computing? (2021) (1)
- AIDE (2019) (1)
- Performance Anaiysis of Finite-Buffered Asynchronous (1996) (0)
- AnonAD: Privacy-Aware Micro-Targeted Mobile Advertisements without Proxies (2015) (0)
- Recent advances on practical aspects of Wireless Mesh Networks (2011) (0)
- Poster : Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks (2009) (0)
- Exploiting characteristics of data centers to enhance ethernet switching (2012) (0)
- Scheduling and resource allocation in ofdma wireless networks (2012) (0)
- Interprocessor communication in wormhole-switched multicomputers (1998) (0)
- Internet Data Centers Scale-up versus Scale-out Several Ongoing Developments Necessitate a Study of Architectural and Operational Concerns in Modern Data Centers, including Data Center Fabric Research, Scale-up versus Scale-out, Resource Consolidation, Infrastructure Management, and Operational Cost (2004) (0)
- Multimedia communication over wireless networks (2012) (0)
- Distributed Optimal Channel Access in Cognitive Radio Networks (2015) (0)
- On Availability-Performability Trade-off in Wireless Mesh Networks (2014) (0)
- Towards network verification and introspection (2008) (0)
- Pseudonym-Varying Scheduling Scheme Protection Interval Setup Prediction Table Construction Entropy-based Commitment Generation STM Broadcast STM Verification Fast Broadcast Authentication Protocol (2018) (0)
- COMSNETS 2015 ORGANIZING COMMITTEE (2015) (0)
- EIC Editorial (2014) (0)
- Next generation of robust carrier ethernet (2010) (0)
- A framework for service differentiating internet servers (2000) (0)
- Trust exploitation and attention competition: A game theoretical model (2016) (0)
- Fairness Uncertainty Quantification: How certain are you that the model is fair? (2023) (0)
- ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks (2016) (0)
- QoE prediction model for mobile video telephony (2015) (0)
- Title SMedia: social media data analysis for emergency detection and its type identification (2023) (0)
- Towards Unconstrained Vocabulary Eavesdropping With Mmwave Radar Using GAN (2022) (0)
- Robust Fair Clustering: A Novel Fairness Attack and Defense Framework (2022) (0)
- Challenges and Solutions in DNSSEC Deployment. (2011) (0)
- Detect DDoS Attack using Border Gateways and Edge Routers (2019) (0)
- Channel Bonding in Evolving Wireless LANs (2014) (0)
- Development and clinical validation of Swaasa AI platform for screening and prioritization of pulmonary TB (2022) (0)
- Guest Editorial: Special Section on IEEE INFOCOM (2004) (0)
- SWIM: SWItch Manager For Data Center Networks (2014) (0)
- Large scale failures in the internet -- characterization, implications and recovery (2009) (0)
- Experimental Evaluation of the Impact of Packet Capturing Tools for Web Services (2011) (0)
- Web server performance improvement and qos provisioning (2003) (0)
- Computing Submesh Reliability in Two-Dimensional Meshes (2007) (0)
- and Derivations for Results in the Main (2022) (0)
- Federated Learning Hyper-Parameter Tuning from a System Perspective (2022) (0)
- MEROCYANINE UND P-DIALKYLAMINOSTYRYLFARBSTOFFE, DIE SICH VON 1,2,6,7-DIBENZOXANTHON ABLEITEN (1971) (0)
- B-PO05-177 USING MACHINE LEARNING TO PREDICT CARDIOMYOPATHY IN PATIENTS WITH CORONARY ARTERY DISEASE (2021) (0)
- Message from the General Co-Chairs (2015) (0)
- Deployment and performance enhancement of wireless mesh networks (2010) (0)
- State of the Journal Editorial (2015) (0)
- Fuzzy Cost based Power Aware QoS Routing Protocol with Mobility Prediction in Mobile Ad Hoc Networks (2016) (0)
- Dynamic Real-time Task Scheduling on Hypercubes 1 (1997) (0)
- Resource-aware fusion in multimodal sensing under network constraints (2016) (0)
- FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications (2022) (0)
- Time and energy efficient localization (2014) (0)
- Mobile Cloud Computing and Wireless Sensor Networks: Areview, integration architecture, and future directions (2021) (0)
- Two-phase Multicast Routing Algorithms for Two-dimensional Meshes 1 (1996) (0)
- A Low Latency Hardware Multicast RoutingAlgorithm for Two-Dimensional Meshes (1996) (0)
- Skalierbares Multimedia-Dateisystem für Netzergänzungsspeichergeräte (2000) (0)
- Exploiting Knowledge Across Distinct Domains: Learning Event Details from Network Logs (2018) (0)
- Managing wireless mesh networks: a measurement-based approach (2010) (0)
- Decentralized Multi-agent Filtering (2023) (0)
- Experimental Evaluation of Packet Capturing For Web Services. (2011) (0)
- A State-of-The-Art of Routing Protocols for Mobile Ad-Hoc Networks (MANET) (2016) (0)
- Farewell Editorial (2017) (0)
- Enhancing quality of video services over wireless networks (2012) (0)
- Research: Culture and Best Practices (2010) (0)
- iOceanSee: A Novel Scheme for Ocean State Estimation Using 3D Mobile Convolutional Neural Network (2020) (0)
- Privacy-aware contextual localization using network traffic analysis (cid:2) (2017) (0)
- Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks (2022) (0)
- IQ2S'15: The seventh international workshop on information quality and quality of service for pervasive computing, 2015 - Welcome and committees (2015) (0)
- DNSSEC misconfigurations and their impact on DNS availability. (2010) (0)
- Keynote 2: Smart-Sensing using Smart-Sensors (2015) (0)
- Message from the general chair (2022) (0)
- Verification of User-Reported Context Claims with Context Correlation Model (2016) (0)
- Towards System-Level Security Analysis of IoT Using Attack Graphs (2022) (0)
- Message from the PMAC-2WN'06 Co-Chairs (2006) (0)
This paper list is powered by the following services:
Other Resources About Prasant Mohapatra
What Schools Are Affiliated With Prasant Mohapatra?
Prasant Mohapatra is affiliated with the following schools: