Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Kyriakos Manousakis"'
A communication network can be modeled as a directed connected graph with edge weights that characterize performance metrics such as loss and delay. Network tomography aims to infer these edge weights from their pathwise versions measured on a set of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0e788bc7df3f0916fc8de6bf8a88dcbe
Autor:
Sharanya Eswaran, Gaurav Naik, David Hilton Shur, William C. Regli, Brian Adamson, Pavan Kantharaju, Kyriakos Manousakis
Publikováno v:
Journal of Cyber Security and Mobility. 4:1-22
Content dissemination in peer-to-peer mobile ad-hoc networks is subject to disruptions due to erratic link performance and intermittent connectivity. Distributed protocols such as BitTorrent are now ubiquitously used for content dissemination in wire
Autor:
David F. Shallcross, O. Younis, Sunil Samtani, Kenneth C. Young, Latha Kant, Mitesh Patel, C. Graff, Kyriakos Manousakis, Miriam Tauil, Kaustubh Sinkar
Publikováno v:
Ad Hoc Networks. 11:2461-2469
To guide users who attempt to deploy wireless networks in military applications, there is an evolving need for developing systematic methodologies to analyze/predict the performance of mobile ad hoc networks (MANETs). In addition, the advance in cogn
Increasing network lifetime by reducing energy consumption across the network is one of the major concerns while designing routing protocols for Mobile Ad-Hoc Networks. In this paper, we investigate the main reasons that lead to energy depletion and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d97cf89f831420a21b0f5e74668b161c
http://arxiv.org/abs/1603.09386
http://arxiv.org/abs/1603.09386
Autor:
Trisha Datta, Kyriakos Manousakis
Publikováno v:
2015 IEEE MIT Undergraduate Research Technology Conference (URTC).
While we have all been warned about viruses attacking our computers and hackers stealing our private information, very few of us realize the similar threat to our phones. With the number of smartphones in use growing each day, we now find ourselves t
Autor:
K. Young, C. Graff, Kirk Chang, Kyriakos Manousakis, Latha Kant, Anthony McAuley, Mitesh Patel, David F. Shallcross, O. Younis, Kaustubh Sinkar
Publikováno v:
IEEE Communications Magazine. 48:70-77
Unlike commercial MANET applications, tactical networks are typically hierarchical and involve heterogeneous types of radio communications. Future tactical networks also require cognitive functions across the protocol stack to exploit scarce spectrum
Autor:
Latha Kant, Kaustubh Sinkar, Anthony McAuley, K. Young, David F. Shallcross, O. Younis, Kyriakos Manousakis, Kirk Chang, C. Graff
Publikováno v:
IEEE Communications Magazine. 46:55-61
Mobile ad hoc networks have become the basis of the military's network-centric warfare (NCW) approach. However, for NCW to be successful, it is imperative that the networks be designed in a robust manner with the capability to produce consistent pred
Autor:
Ashutosh Dutta, Kyriakos Manousakis, Subir Das, Fuchun Lin, Tsunehiko Chiba, Hidetoshi Yokota, Akira Idoue, Henning Schulzrinne
Publikováno v:
IEEE Communications Magazine. 45:118-126
Wireless service providers strive to preserve the quality of service and user experience for mobile users. Several standards bodies are defining architectures that can be used as a platform to provide secure and seamless services to these mobile user
Autor:
Jaewon Kang, Mariusz Fecko, Wayne Phoel, Kyriakos Manousakis, Andrew Pachulski, Kenneth Young
Publikováno v:
MILCOM
We describe the design, implementation and testing of the Component-Based Reusable Adaptive Mitigation (COBRAM) system, which is designed to mitigate attacks against control plane protocols at the MAC and routing layers of mobile wireless networks. T
Autor:
Rodolfo A. Santiago, Thomas Goff, Spiker Carrie, David Hilton Shur, Kyriakos Manousakis, Claudiu Danilov, Jae H. Kim, Brian Adamson
Publikováno v:
MILCOM
This paper presents a field experimentation and demonstration addressing serverless information services that provide both group messaging with ordering guarantees and robust file/media object sharing in a tactical edge communication environment. The