The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

P. R. Kumar: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kevin Buescher, P. R. Kumar
    Simultaneous Learning of Concepts and Simultaneous Estimation of Probabilities. [Citation Graph (0, 0)][DBLP]
    COLT, 1991, pp:33-42 [Conf]
  2. Kevin Buescher, P. R. Kumar
    Learning Stochastic Functions by Smooth Simultaneous Estimation. [Citation Graph (0, 0)][DBLP]
    COLT, 1992, pp:272-279 [Conf]
  3. P. R. Kumar
    Towards a Third Generation of Control Systems. [Citation Graph (0, 0)][DBLP]
    HSCC, 2006, pp:2- [Conf]
  4. Scott Graham, P. R. Kumar
    The Convergence of Control, Communication, and Computation. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:458-475 [Conf]
  5. Arvind Giridhar, P. R. Kumar
    Maximizing the functional lifetime of sensor networks. [Citation Graph (0, 0)][DBLP]
    IPSN, 2005, pp:5-12 [Conf]
  6. Girish Baliga, Scott Graham, Lui Sha, P. R. Kumar
    Etherware: Domainware for Wireless Control Networks. [Citation Graph (0, 0)][DBLP]
    ISORC, 2004, pp:155-162 [Conf]
  7. R. Rozovsky, P. R. Kumar
    SEEDEX: a MAC protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:67-75 [Conf]
  8. Vivek Raghunathan, P. R. Kumar
    A counterexample in congestion control of wireless networks. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2005, pp:290-297 [Conf]
  9. P. R. Kumar
    Ad Hoc Wireless Networks: Analysis, Protocols, Architecture, and Convergence. [Citation Graph (0, 0)][DBLP]
    Infrastructure for Mobile and Wireless Systems, 2001, pp:39- [Conf]
  10. Tanya L. Crenshaw, C. L. Robinson, Hui Ding, P. R. Kumar, Lui Sha
    A Pattern for Adaptive Behavior in Safety-Critical, Real-Time Middleware. [Citation Graph (0, 0)][DBLP]
    RTSS, 2006, pp:127-136 [Conf]
  11. K. H. Plarre, P. R. Kumar
    Extended message passing algorithm for inference in loopy Gaussian graphical models. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2004, v:2, n:2, pp:153-169 [Journal]
  12. Ashish Agarwal, P. R. Kumar
    Capacity bounds for ad hoc and hybrid wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communication Review, 2004, v:34, n:3, pp:71-81 [Journal]
  13. Jennifer C. Hou, P. R. Kumar
    Network modelling and simulation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:12, pp:1885-1886 [Journal]
  14. Girish Baliga, Scott Graham, Lui Sha, P. R. Kumar
    Service Continuity in Networked Control Using Etherware. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:9, pp:- [Journal]
  15. P. R. Kumar
    A Tutorial on Some New Methods for Performance Evaluation of Queueing Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:6, pp:970-980 [Journal]
  16. Vivek Raghunathan, P. R. Kumar
    A counterexample in congestion control of wireless networks. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2007, v:64, n:5, pp:399-418 [Journal]
  17. Sunil Kumar, R. Srikant, P. R. Kumar
    Bounding blocking probabilities and throughput in queueing networks with buffer capacity constraints. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1998, v:28, n:1-3, pp:55-77 [Journal]
  18. James R. Morrison, P. R. Kumar
    On the guaranteed throughput and efficiency of closed re-entrant lines. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 1998, v:28, n:1-3, pp:33-54 [Journal]
  19. Piyush Gupta, P. R. Kumar
    The capacity of wireless networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:388-404 [Journal]
  20. Piyush Gupta, P. R. Kumar
    Towards an information theory of large networks: an achievable rate region. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:8, pp:1877-1894 [Journal]
  21. P. R. Kumar
    A correction to the proof of a lemma in "The capacity of wireless networks". [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:11, pp:3117- [Journal]
  22. Feng Xue, P. R. Kumar
    On the theta-coverage and connectivity of large random networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:6, pp:2289-2299 [Journal]
  23. Ashish Agarwal, P. R. Kumar
    Improved capacity bounds for wireless networks. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2004, v:4, n:3, pp:251-261 [Journal]

  24. Safety and Liveness in Intelligent Intersections. [Citation Graph (, )][DBLP]


  25. Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach. [Citation Graph (, )][DBLP]


  26. Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems. [Citation Graph (, )][DBLP]


  27. A Theory of QoS for Wireless. [Citation Graph (, )][DBLP]


  28. Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. [Citation Graph (, )][DBLP]


  29. Utility Maximization for Delay Constrained QoS in Wireless. [Citation Graph (, )][DBLP]


  30. Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels. [Citation Graph (, )][DBLP]


  31. Joint Random Access and Power Selection for Maximal Throughput in Wireless Networks. [Citation Graph (, )][DBLP]


  32. Admission control and scheduling for QoS guarantees for variable-bit-rate applications on wireless channels. [Citation Graph (, )][DBLP]


  33. The Simplex Reference Model: Limiting Fault-Propagation Due to Unreliable Components in Cyber-Physical System Architectures. [Citation Graph (, )][DBLP]


  34. Dynamic Channel Reservation to Enhance Channel Access by Exploiting Structure of Vehicular Networks. [Citation Graph (, )][DBLP]


  35. Temporal Considerations in Wireless Networks and Cyberphysical Systems. [Citation Graph (, )][DBLP]


  36. Towards optimally exploiting physical layer information in OFDM wireless networks. [Citation Graph (, )][DBLP]


  37. Controlled random access MAC for network utility maximization in wireless networks. [Citation Graph (, )][DBLP]


  38. Networked control systems with packet delays and losses. [Citation Graph (, )][DBLP]


  39. Zero-error function computation in sensor networks. [Citation Graph (, )][DBLP]


  40. Joint congestion control and random access MAC in multi-hop wireless networks via a simplified model. [Citation Graph (, )][DBLP]


  41. A model-based approach to clock synchronization. [Citation Graph (, )][DBLP]


  42. On approximating Gaussian relay networks by deterministic networks [Citation Graph (, )][DBLP]


  43. Utility Maximization for Delay Constrained QoS in Wireless [Citation Graph (, )][DBLP]


  44. Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels [Citation Graph (, )][DBLP]


  45. Optimal strategies for computing symmetric Boolean functions in collocated networks [Citation Graph (, )][DBLP]


  46. Fundamentals of Large Sensor Networks: Connectivity, Capacity, Clocks and Computation [Citation Graph (, )][DBLP]


  47. The Importance, Design and Implementation of a Middleware for Networked Control Systems [Citation Graph (, )][DBLP]


  48. A digital interface for Gaussian relay networks: lifting codes from the discrete superposition model to Gaussian relay networks [Citation Graph (, )][DBLP]


  49. A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model [Citation Graph (, )][DBLP]


  50. Scheduling Periodic Real-Time Tasks with Heterogeneous Reward Requirements [Citation Graph (, )][DBLP]


Search in 17.470secs, Finished in 17.473secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002