Select Publications
Journal articles
, 2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
, 2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
, 2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', Sensys 2013 Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
, 2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290
, 2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103
, 2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
, 2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171
, 2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140
, 2010, 'Cane toad monitoring: Data reduction in a high rate application', , pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7
, 2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913
, 2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83
, 2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900
, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security Wisec 09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308
, 2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, 5
, 2008, 'EIC Editorial', IEEE Transactions on Mobile Computing, 7, pp. 529 - 532, http://dx.doi.org/10.1109/TMC.2008.45
, 2008, 'ADAPTIVE BANDWIDTH MANAGEMENT AND QoS PROVISIONING IN IPVPNs', International Journal of Computers and Applications, 30, http://dx.doi.org/10.2316/journal.202.2008.2.202-2223
, 2007, 'Wireless mesh networks', IEEE Communications Magazine, 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322
, 2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, 4, pp. 749 - 767
, 2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144
, 2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, 12, pp. 47 - 59
, 2005, 'Advances and directions in quality of service management.', Journal of Computer Communications, 28, pp. 1701 - 1702
, 2005, 'Node localization using mobile robots in delay-tolerant sensor networks', IEEE Transactions on Mobile Computing, 4, pp. 285 - 296
, 2005, 'Processing resource scheduling in programmable networks', Computer Communications, 28, pp. 676 - 687
, 2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992
, 2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, 25, pp. 305 - 321
, 2004, 'Failure-Oriented Path Restoration Algorithm for Survivable Networks', IEEE Transactions on Network and Service Management, 1, pp. 11 - 20, http://dx.doi.org/10.1109/TNSM.2004.4623690
, 2004, 'Network QoS provision for distributed grid applications', International Journal of Simulation Systems Science and Technology, 5, pp. 13 - 28
, 2004, 'Advances in future mobile/wireless networks and services', Computer Communications, 27, pp. 695 - 696
, 2004, 'Design and Analysis of Location Management Schemes for a New light-weight Wireless Network', Computer Communications, 27(8), pp. 743 - 750
, 2004, 'Failure Oriented Path Restoration Algorithm for Survivable Networks', Etransactions on Network Service and Management, 1, pp. 2 - 10
, 2004, 'Location Estimation and Trajectory Prediction for Cellular Networks with Mobile Base Stations', IEEE Transactions on Vehicular Technology, 53, pp. 1903 - 1913
, 2004, 'Robust Extended Kalman Filter Based Technique for Location Management in PCS Networks', Computer Communications, 27(5), pp. 502 - 512
, 2003, 'An Adaptive Resource Management Architecture for Active Networks', Telecommunication Systems, 24:, pp. 139 - 166
, 2003, 'Bandwidth broker extension optimal resource management', Journal of Telecommunications and Information Technology, 3, pp. 77 - 82
, 2003, 'Cell Hoping: A Lightweight Architecture for Wireless Communications', IEEE Wireless Communications, 10, pp. 16 - 21
, 2003, 'Empirical Study of Traffic Trunking in Linux-Based MPLS Test-Bed', International Journal of Network Management, 13, pp. 277 - 288
, 2003, 'Java Implementation of Policy-Based Bandwidth Management', International Journal of Network Management, 13, pp. 249 - 258
, 2002, 'Building Agent for Rule Based Intrusion Detection System', Computer Communications, pp. 1366 - 1373
, 2002, 'G-QoSM: Grid Service Discovery Using QoS Properties', Computing and Informatics, pp. 363 - 382