Achievable throughput and queueing delay for imperfect cooperative retransmission MAC protocols

Steven Weber , Athina Petropulu
asilomar conference on signals, systems and computers 1421 -1425

1
2008
Secrecy rate optimization under cooperation with perfect channel state information

Jiangyuan Li , Athina P. Petropulu , Steven Weber
asilomar conference on signals, systems and computers 824 -828

18
2009
Efficiency and Detectability of Random Reactive Jamming in Carrier Sense Wireless Networks

Ni An , Steven Weber
IEEE Transactions on Communications 67 ( 10) 6925 -6938

2019
The self-avoiding walk-jump (SAWJ) algorithm for finding maximum degree nodes in large graphs

Jonathan Stokes , Steven Weber
2016 IEEE International Conference on Big Data (Big Data) 142 -149

4
2016
Bandwidth-SINR Tradeoffs in Spatial Networks

Nihar Jindal , Jeffrey G. Andrews , Steven Weber
international symposium on information theory 836 -840

13
2007
Geometric Approximations of Some Aloha-like Stability Regions

Nan Xie , Steven Weber
arXiv: Information Theory

2010
Optimal rate delay tradeoffs for multipath routed and network coded networks

John MacLaren Walsh , Steven Weber , Ciira wa Maina
international symposium on information theory 682 -686

7
2008
OMAN: A Mobile Ad Hoc Network Design System

Alex Fridman , Steven Weber , Charles Graff , David E. Breen
IEEE Transactions on Mobile Computing 11 ( 7) 1179 -1191

10
2012
Optimal Rate–Delay Tradeoffs and Delay Mitigating Codes for Multipath Routed and Network Coded Networks

John MacLaren Walsh , Steven Weber , Ciira wa Maina
IEEE Transactions on Information Theory 55 ( 12) 5491 -5510

25
2009
A Recursive Construction of the Set of Binary Entropy Vectors and Related Algorithmic Inner Bounds for the Entropy Region

John MacLaren Walsh , Steven Weber
IEEE Transactions on Information Theory 57 ( 10) 6356 -6363

8
2011
Combined Preemption and Adaptation in Next Generation Multiservice Networks

Steven Weber , Jaudelice De Oliveira , Sukrit Dasgupta , Bryan Willman
international conference on communications 2 670 -675

2
2006
A modular multi-location anonymized traffic monitoring tool for a WiFi network

Justin Hummel , Andrew McDonald , Vatsal Shah , Riju Singh
conference on data and application security and privacy 135 -138

2014
Distributed path planning for connectivity under uncertainty by ant colony optimization

Alex Fridman , Steven Weber , Vijay Kumary , Moshe Kam
american control conference 1952 -1958

12
2008
Distributed Algorithms for Rate-Adaptive Media Streams

Steven Weber , Vilas Veeraraghavan
Networks and Spatial Economics 8 ( 1) 61 -94

8
2008
Channel dependent adaptive modulation and coding without channel state information at the transmitter

Bradford D. Boyle , John MacLaren Walsh , Steven Weber
international conference on acoustics, speech, and signal processing 5090 -5093

1
2013
Behavioral anomaly detection of malware on home routers

Ni An , Alexander Duff , Gaurav Naik , Michalis Faloutsos
international conference on malicious and unwanted software 47 -54

14
2017
Malware Anomaly Detection on Virtual Assistants

Ni An , Alexander Duff , Mahshid Noorani , Steven Weber
international conference on malicious and unwanted software 124 -131

4
2018
Preemption rates for a parallel link loss network

Zhen Zhao , Steven Weber , Jaudelice C. de Oliveira
Performance Evaluation 66 ( 1) 21 -46

13
2009
On Cooperative Relaying Schemes for Wireless Physical Layer Security

Jiangyuan Li , Athina P. Petropulu , Steven Weber
IEEE Transactions on Signal Processing 59 ( 10) 4985 -4997

358
2011
Capacity region of the permutation channel

John MacLaren Walsh , Steven Weber
allerton conference on communication, control, and computing 646 -652

13
2008