Search For:

Displaying 1-50 out of 85 total
Research: Culture and Best Practices
Found in: Electronic System Design, International Symposium on
By Prasant Mohapatra
Issue Date:December 2010
pp. 271
In this informal presentation, we will overview experiences related to research activities in terms of best practices. Fundamental and well-established strategies will be overviewed with an emphasis of motivation and significance of specific problems while...
 
Panel Discussion: Wireless Ad Hoc Networks for Internet Applications: Real or Hype?
Found in: Internet Applications, IEEE Workshop on
By Prasant Mohapatra
Issue Date:June 2003
pp. 72
No summary available.
   
Channel Bonding in Evolving Wireless LANs
Found in: Computer
By Prasant Mohapatra
Issue Date:September 2014
pp. 6
This installment of Computer's series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Mobile Computing.
   
Editorial: A Message from the Incoming Editor-in-Chief
Found in: IEEE Transactions on Mobile Computing
By Prasant Mohapatra
Issue Date:January 2014
pp. 2
No summary available.
 
Securing Multimedia Content Using Joint Compression and Encryption
Found in: IEEE MultiMedia
By Amit Pande,Prasant Mohapatra,Joseph Zambreno
Issue Date:October 2013
pp. 50-61
Algorithmic parameterization and hardware architectures can ensure secure transmission of multimedia data in resource-constrained environments such as wireless video surveillance networks, telemedicine frameworks for distant health care support in rural ar...
 
Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller
Found in: IEEE Transactions on Mobile Computing
By Yunchuan Wei,Kai Zeng,Prasant Mohapatra
Issue Date:September 2013
pp. 1842-1852
Generating a shared key between two parties from the wireless channel is an increasingly interesting topic. The process of obtaining information from the wireless channel is called channel probing. Previous key generation schemes probe the channel at a pre...
 
Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Wenjie Hu, Guohong Cao,Srikanth V. Krishanamurthy,Prasant Mohapatra
Issue Date:July 2013
pp. 155-164
Many practical problems in mobile social networks such as routing, community detection, and social behavior analysis, rely on accurate user contact detection. The frequently used method for detecting user contact is through Bluetooth on smartphones. Howeve...
 
Keynote Abstracts
Found in: 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2011)
By Ness B. Shroff,Dharma P. Agrawal,Prasant Mohapatra
Issue Date:December 2011
pp. xix-xxi
These keynote abstracts discuss the following: beyond stability: open problems in multi-hop wireless networks; and why are femtocells invading wireless technologies?.
   
Using Chaotic Maps for Encrypting Image and Video Content
Found in: Multimedia, International Symposium on
By Amit Pande,Prasant Mohapatra,Joseph Zambreno
Issue Date:December 2011
pp. 171-178
Arithmetic Coding (AC) is widely used for the entropy coding of text and multimedia data. It involves recursive partitioning of the range [0,1) in accordance with the relative probabilities of occurrence of the input symbols. In this paper, we present a da...
 
Architectures for Simultaneous Coding and Encryption Using Chaotic Maps
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Amit Pande, Joseph Zambreno, Prasant Mohapatra
Issue Date:July 2011
pp. 351-352
In this work, we discuss an interpretation of arithmetic coding using chaotic maps. We present a hardware implementation using 64 bit fixed point arithmetic on Virtex-6 FPGA (with and without using DSP slices). The encoder resources are slightly higher tha...
 
Trustworthy Wireless Networks: Issues and Applications (Invited Paper)
Found in: Electronic System Design, International Symposium on
By Kannan Govindan, Prasant Mohapatra, Tarek F. Abdelzaher
Issue Date:December 2010
pp. 253-258
Wireless networks are susceptible to various attacks due to their open nature of operations. Existing security mechanisms and systems are rarely robust under attacks, misoperation and internal faults. Most of the solutions are targeted to specific attacks ...
 
Comparing simulation tools and experimental testbeds for wireless mesh networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Kefeng Tan, Daniel Wu, An (Jack) Chan, Prasant Mohapatra
Issue Date:June 2010
pp. 1-9
Wireless simulators provide full control to researchers in investigating traffic flow behavior, but do not always reflect real-world scenarios. Although previous work pointed out such shortages are due to the limitation of radio propagation models in the s...
 
A Scalable Hybrid Approach to Switching in Metro Ethernet Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Minh Huynh, Prasant Mohapatra
Issue Date:October 2007
pp. 436-443
The most common technology in Local Area Networks is the Ethernet protocol. The continuing evolution of Ethernet has propelled it into the scope of Metropolitan Area Networks. Even though Ethernet is fast and simple, the Spanning Tree in Ethernet is ineffi...
 
A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Jaya Shankar Pathmasuntharam, Amitabha Das, Prasant Mohapatra
Issue Date:June 2006
pp. 143-149
In a CSMA/CA based multihop wireless network, excessive interference at a receiver or a potential forwarding node causes severe blocking and reduction in throughput. The unbalanced interference forces the node to consume more time receiving packets rather ...
 
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Found in: Security and Privacy, IEEE Symposium on
By Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
Issue Date:May 2006
pp. 199-213
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are very common and significantly weaken the desired security. This paper introduce...
 
Guest Editors' Introduction: Internet Data Centers
Found in: Computer
By Krishna Kant, Prasant Mohapatra
Issue Date:November 2004
pp. 35-37
Several ongoing developments necessitate a study of architectural and operational concerns in modern data centers, including data center fabric research, scale-up versus scale-out, resource consolidation, infrastructure management, and operational cost red...
 
Group Communications in Mobile Ad Hoc Networks
Found in: Computer
By Prasant Mohapatra, Chao Gui, Jian Li
Issue Date:February 2004
pp. 52-59
<p>Efficient support of group communications is critical for most ad hoc network applications. However, manet group communications issues differ from those in wired environments because the wireless communications medium has variable and unpredictabl...
 
Using Service Brokers for Accessing Backend Servers for Web Applications
Found in: Distributed Computing Systems Workshops, International Conference on
By Huamin Chen, Prasant Mohapatra
Issue Date:May 2003
pp. 928
Web service infrastrutures usually are comprised of front-end Web servers that accept requests and process them, and backend servers that manage data and services. Current Web servers use various API sets to access backend services. This model does not sup...
 
CATP: A Context-Aware Transportation Protocol for HTTP
Found in: Distributed Computing Systems Workshops, International Conference on
By Huamin Chen, Prasant Mohapatra
Issue Date:May 2003
pp. 922
The rendering mechanism used in Web browsers have a significant impact on the user behavior and delay tolerance of retrieval. The head-of-line blocking phenomena prevents the browser to render partial results within the HTTP document. This phenomena stems ...
 
Characterization of E-Commerce Traffic
Found in: Advanced Issues of E-Commerce and Web-Based Information Systems, International Workshop on
By Udaykiran Vallamsetty, Krishna Kant, Prasant Mohapatra
Issue Date:June 2002
pp. 137
The world wide web has acheived immense popularity in the business world. It is thus essential to characterize the traffic behavior at these sites, a study that will facilitate the design and development of high-performance, reliable e-commerce servers. Th...
 
An Application Based Differentiated Service Model
Found in: Networks, IEEE International Conference on
By Fugui Wang, Prasant Mohapatra, Sarit Mukherjee
Issue Date:September 2000
pp. 424
In this paper, we propose a flexible differentiated service model, which is based on the application layer so that applications could indicate their network service requirements directly. We classify Internet applications into four categories and provide d...
 
Dynamic Branch Decoupled Architecture
Found in: Computer Design, International Conference on
By Akhilesh Tyagi, Hon-Chi Ng, Prasant Mohapatra
Issue Date:October 1999
pp. 442
We propose an alternative approach to branch resolution based on the earlier work on decoupled memory architectures. Branch decoupling is a technique to decouple a single instruction stream program into two streams. One stream is solely dedicated to resolv...
 
Stream Scheduling Algorithms for Multimedia Storage Servers
Found in: Parallel Processing, International Conference on
By Xiaoye Jiang, Prasant Mohapatra
Issue Date:August 1998
pp. 321
In this paper, we have proposed efficient stream scheduling algorithms for multimedia storage servers that are providers of variable bit rate media streams. We have developed three types of stream scheduling algorithms: In-Order Scheduling Algorithm (IOSA)...
 
A Traffic-Balanced Adaptive Wormhole Routing Scheme for Two-Dimensional Meshes
Found in: IEEE Transactions on Computers
By Jatin Upadhyay, Vara Varavithya, Prasant Mohapatra
Issue Date:February 1997
pp. 190-197
<p><b>Abstract</b>—In this paper, we analyze several issues involved in developing low latency adaptive wormhole routing schemes for two-dimensional meshes. It is observed that along with adaptivity, balanced distribution of traffic has a...
 
On-Line Real-Time Task Scheduling on Partitionable Multiprocessors
Found in: Parallel and Distributed Processing, IEEE Symposium on
By Prasant Mohapatra, ByungJun Ahn, Jian-Feng Shi
Issue Date:October 1996
pp. 350
Multiprocesssor systems have emerged as an important computing means for real-time applications and have received increasing attention than before. However, until now, little research has been done on the problem of on-line scheduling of parallel tasks wit...
 
Allocation and Mapping Based Reliability Analysis of Multistage Interconnection Networks
Found in: IEEE Transactions on Computers
By Prasant Mohapatra, Chansu Yu, Chita R. Das
Issue Date:May 1996
pp. 600-606
<p><b>Abstract</b>—Task allocation using cubic partitioning of multistage interconnection networks (MINs) offers several advantages over random allocation of resources. The objective of this paper is to analyze MIN reliability considering...
 
On Dependability Evaluation of Mesh-Connected Processors
Found in: IEEE Transactions on Computers
By Chita R. Das, Prasant Mohapatra
Issue Date:September 1995
pp. 1073-1084
<p><it>Abstract</it>—Analytical techniques for reliability and availability prediction of mesh-connected systems are proposed in this paper. The models are based on the submesh requirements. First, a reliability model is proposed assuming...
 
Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing
Found in: IEEE Transactions on Mobile Computing
By Xinlei Oscar Wang,Wei Cheng,Prasant Mohapatra,Tarek Abdelzaher
Issue Date:December 2014
pp. 1-1
Mobile sensing is becoming a popular paradigm to collect information from and outsource tasks to mobile users. These applications deal with lot of personal information, e.g., identity and location. Therefore, we need to pay a deeper attention to privacy an...
 
Architecture for Blocking Detection in Wireless Video Source Authentication
Found in: 2014 27th International Conference on VLSI Design
By Amit Pande,Shaxun Chen,Prasant Mohapatra,Gaurav Pande
Issue Date:January 2014
pp. 294-299
Blocking is a common artifact in wireless video streaming services, mainly attributed to packet loss degradation in real-time transmission scenarios. In this paper, we present a simple algorithm and architecture for robust detection of blocking artifact. W...
 
Video Delivery Challenges and Opportunities in 4G Networks
Found in: IEEE MultiMedia
By Amit Pande,Vishal Ahuja,Rajarajan Sivaraj,Eilwoo Baik,Prasant Mohapatra
Issue Date:July 2013
pp. 88-94
Wireless network traffic is dominated by video and requires new ways to maximize the user experience and optimize networks to prevent saturation. The exploding number of subscribers in cellular networks has exponentially increased the volume and variety of...
 
Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space
Found in: IEEE Transactions on Mobile Computing
By Shaxun Chen, Kai Zeng,Prasant Mohapatra
Issue Date:March 2013
pp. 401-411
In cognitive radio networks, an attacker transmits signals mimicking the characteristics of primary signals, in order to prevent secondary users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and wireless microph...
 
Detecting spectrum misuse in wireless networks
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Kefeng Tan,Kai Zeng,Daniel Wu,Prasant Mohapatra
Issue Date:October 2012
pp. 245-253
In contrast to conventional static fixed-width channel allocation, on-demand dynamic variable-width channel allocation has shown that it can effectively improve the fairness, throughput, and spectrum efficiency of wireless networks. Air-time utilization (t...
 
Cross-layer coordination for efficient contents delivery in LTE eMBMS traffic
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Eilwoo Baik,Amit Pande,Prasant Mohapatra
Issue Date:October 2012
pp. 398-406
Evolved Multimedia Broadcast Multicast Services (eMBMS) in LTE standards provides Raptor code as Forward Error Correction (FEC) scheme in application layer. Hybrid automatic repeat request (HARQ) is also used to increase reliability at MAC layer for packet...
 
Architectural impact of secure socket layer on Internet servers
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Krishna Kant,Ravishankar Iyer,Prasant Mohapatra
Issue Date:September 2012
pp. 27-34
Secure socket layer (SSL) is the most popular protocol used in the Internet for facilitating secure communications. In this paper, we analyze the performance and architectural impact of SSL on the servers in terms of various parameters such as throughput, ...
 
Architectural impact of secure socket layer on Internet servers: A retrospect
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Krishna Kant,Ravishankar Iyer,Prasant Mohapatra
Issue Date:September 2012
pp. 25-26
Secure socket layer (SSL) is the most popular protocol used in the Internet for facilitating secure communications. In this retrospective, we summarize our original paper which analyzed the performance and architectural impact of SSL on the servers and pro...
 
Message from the general chair
Found in: 2012 IEEE Thirteenth International Symposium on
By Prasant Mohapatra
Issue Date:June 2012
pp. 1-1
It is my pleasure to welcome you to the Thirteenth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). It is indeed my honor to serve as the General chair of this symposium, which is being organized at San Francisc...
   
Detecting Route Attraction Attacks in Wireless Networks
Found in: Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on
By Mustafa Y. Arslan,Konstantinos Pelechrinis,Ioannis Broustis,Srikanth V. Krishnamurthy,Prashant Krishnamurthy,Prasant Mohapatra
Issue Date:October 2011
pp. 371-380
Selecting high performance routes in wireless networks requires the exchange of link quality information among nodes. Adversaries can manipulate this functionality by advertising fake qualities for links; by doing so, they can attract routes and subsequent...
 
Efficient data capturing for network forensics in cognitive radio networks
Found in: Network Protocols, IEEE International Conference on
By Shaxun Chen,Kai Zeng,Prasant Mohapatra
Issue Date:October 2011
pp. 176-185
Network forensics is widely used in tracking down criminals and detecting network anomalies, and data capture is the basis of network forensics. Compared to traditional networks, data capture faces significant challenges in cognitive radio networks. In tra...
 
Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining
Found in: Parallel Processing, International Conference on
By Eunsoo Seo,Mohammad Maifi Hasan Khan,Prasant Mohapatra,Jiawei Han,Tarek Abdelzaher
Issue Date:September 2011
pp. 186-195
Software bugs in distributed systems are notoriously hard to find due to the large number of components involved and the non-determinism introduced by race conditions between messages. This paper introduces Pop Mine, a tool for diagnosing corner-case bugs ...
 
Integration Gain of Heterogeneous WiFi/WiMAX Networks
Found in: IEEE Transactions on Mobile Computing
By Wei Wang, Xin Liu, John Vicente, Prasant Mohapatra
Issue Date:August 2011
pp. 1131-1143
We study the integrated WiFi/WiMAX networks, where users are equipped with dual-radio interfaces that can connect to either a WiFi or a WiMAX network. Previous research on integrated heterogeneous networks (e.g., WiFi/cellular) usually considers one networ...
 
RRR: Rapid Ring Recovery Submillisecond Decentralized Recovery for Ethernet Ring
Found in: IEEE Transactions on Computers
By Minh Huynh,Stuart Goose,Prasant Mohapatra,Raymond Liao
Issue Date:November 2011
pp. 1561-1570
Ethernet is the indisputable de facto technology for local area networks due to its simplicity, low cost, and wide-scale adoption. In recent times, Ethernet has entered new networking areas, such as Metro Area Network (MAN) and Industrial Area Network (IAN...
 
Adaptive Scheduling of Prioritized Traffic in IEEE 802.16j Wireless Networks
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Debalina Ghosh, Ashima Gupta, Prasant Mohapatra
Issue Date:October 2009
pp. 307-313
In this paper we propose an adaptive scheduling algorithm for IEEE 802.16j based wireless broadband networks. Computation of an optimal schedule for prioritized traffic in OFDMA based IEEE 802.16 wireless network is an NP-Hard problem. Hence, we propose a ...
 
Experimental Study of Measurement-based Admission Control for Wireless Mesh Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Dhruv Gupta, Daniel Wu, Chao C. Chen, Chen-Nee Chuah, Prasant Mohapatra, Sanjay Rungta
Issue Date:October 2007
pp. 1-9
The increased deployment of wireless mesh networks (WMNs) should be complemented by a robust resource management scheme that can provide performance guarantees to mission-critical applications. Several admission control schemes have been presented for wire...
 
Admission Control and Interference-Aware Scheduling in Multi-hop WiMAX Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Debalina Ghosh, Ashima Gupta, Prasant Mohapatra
Issue Date:October 2007
pp. 1-9
Multi-hop WiMAX networks based on IEEE 802.16 has the potential of easily providing high-speed wireless broadband access to areas with little or no existing wired infrastructure. WiMAX technology can be used as ¿last mile¿ broadband connections to deliver ...
 
Dynamic Channel Assignment and Link Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Hua Yu, Prasant Mohapatra, Xin Liu
Issue Date:August 2007
pp. 1-8
Capacity limitation is one of the fundamental issues in wireless mesh networks. This paper addresses capacity improvement issues in multi-radio multi-channel wireless mesh networks. Our objective is to find a dynamic channel assignment and link schedule th...
 
Improving BGP Convergence Delay for Large-Scale Failures
Found in: Dependable Systems and Networks, International Conference on
By Amit Sahoo, Krishna Kant, Prasant Mohapatra
Issue Date:June 2006
pp. 323-332
Border Gateway Protocol (BGP) is the standard routing protocol used in the Internet for routing packets between the Autonomous Systems (ASes). It is known that BGP can take hundreds of seconds to converge after isolated failures. We have also observed that...
 
Performance Evaluation of Service Differentiating Internet Servers
Found in: IEEE Transactions on Computers
By Xiangping Chen, Prasant Mohapatra
Issue Date:November 2002
pp. 1368-1375
<p><b>Abstract</b>—Differentiated service approach has been proposed as a potential solution to provide Quality of Services (QoS) in the next generation Internet. The ultimate goal of end-to-end service differentiation can be achieved by ...
 
Asynchronous Tree-Based Multicasting in Wormhole-Switched MINs
Found in: IEEE Transactions on Parallel and Distributed Systems
By Vara Varavithya, Prasant Mohapatra
Issue Date:November 1999
pp. 1159-1178
<p><b>Abstract</b>—Multicast operation is an important operation in multicomputer communication systems and can be used to support several collective communication operations. A significant performance improvement can be achieved by suppo...
 
Lifetime Behavior and its Impact on Web Caching
Found in: Internet Applications, IEEE Workshop on
By Xiangping Chen, Prasant Mohapatra
Issue Date:July 1999
pp. 54
The exponential growth of the World Wide Web has made it the most popular information dissemination tool in the world. The growth necessitates caching, prefetching, and replication schemes on the web to alleviate the web server load, conserve the network b...
 
An Efficient Method for Approximating Submesh Reliability of Two-Dimensional Meshes
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chung-yen Chang, Prasant Mohapatra
Issue Date:November 1998
pp. 1115-1124
<p><b>Abstract</b>—An analytical model for submesh reliability of mesh-connected systems is proposed in this paper. A mesh is considered operational as long as a functional submesh of the required size is available. We use the principle o...
 
 1  2 Next >>