The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sirisha Medidi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sirisha Medidi, Muralidhar Medidi, Sireesh Gavini, Richard L. Griswold
    Detecting Packet Mishandling in MANETs. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:159-162 [Conf]
  2. Muralidhar Medidi, Roger A. Slaaen, Yuanyuan Zhou, Christopher J. Mallery, Sirisha Medidi
    Scalable Localization in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HiPC, 2006, pp:522-533 [Conf]
  3. Sirisha Medidi, Forouzan Golshani
    Handoff In Mobile ATM Networks: A Framework for Performance Optimization. [Citation Graph (0, 0)][DBLP]
    HPCS, 2002, pp:53-60 [Conf]
  4. Muralidhar Medidi, Jin Ding, Sirisha Medidi
    Data Dissemination using Limited Flooding in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:434-440 [Conf]
  5. Arunabha Sen, Tom Roxborough, Sirisha Medidi
    Upper and Lower Bounds of a Class of Channel Assignment Problems in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1284-1291 [Conf]
  6. Sirisha Medidi, Edward A. Ashcroft
    Performance Analysis of Mobile Wireless ATM Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  7. Sirisha Medidi, Muralidhar Medidi
    An Efficient Mobile IP-Wireless ATM Interworking for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:1817-1823 [Conf]
  8. H. Lui, José G. Delgado-Frias, Sirisha Medidi
    Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2007, pp:181-186 [Conf]
  9. H. Lin, José G. Delgado-Frias, Sirisha Medidi
    Using a cache scheme to detect selfish nodes in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2007, pp:61-66 [Conf]

  10. An Analytical Model and Performance Evaluation of Transport Protocols for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  11. Density-first Ad-hoc routing protocol for MANET. [Citation Graph (, )][DBLP]


  12. FPGA Schemes with Optimized Routing for the Advanced Encryption Standard. [Citation Graph (, )][DBLP]


  13. Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks. [Citation Graph (, )][DBLP]


  14. Relative localization with 2-hop neighborhood. [Citation Graph (, )][DBLP]


  15. Mesh-Based Coverage for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. Energy-Efficient k-Coverage for Wireless Sensor Networks with Variable Sensing Radii. [Citation Graph (, )][DBLP]


  17. Energy Efficient Coverage with Variable Sensing Radii in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  18. A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  19. Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  20. History-based route selection for reactive ad hoc routing protocols. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002