Search the dblp DataBase
Ahmed Helmy :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jabed Faruque , Konstantinos Psounis , Ahmed Helmy Analysis of Gradient-Based Routing Protocols in Sensor Networks. [Citation Graph (0, 0)][DBLP ] DCOSS, 2005, pp:258-275 [Conf ] Ahmed Helmy , Deborah Estrin , Sandeep K. S. Gupta Fault-oriented Test Generation for Multicast Routing Protocol Design. [Citation Graph (0, 0)][DBLP ] FORTE, 1998, pp:93-109 [Conf ] Ahmed Helmy , Sandeep K. S. Gupta , Deborah Estrin , Alberto Cerpa , Yan Yu Systematic Performance Evaluation of Multipoint Protocols. [Citation Graph (0, 0)][DBLP ] FORTE, 2000, pp:189-204 [Conf ] Rohan Chitradurga , Ahmed Helmy Analysis of Wired Short Cuts in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICPS, 2004, pp:167-176 [Conf ] Jabed Faruque , Ahmed Helmy RUGGED: RoUting on finGerprint Gradients in sEnsor Networks. [Citation Graph (0, 0)][DBLP ] ICPS, 2004, pp:179-188 [Conf ] Fan Bai , Narayanan Sadagopan , Ahmed Helmy IMPORTANT: A framework to systematically analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] S. Ebrahimi-Taghizadeh , Ahmed Helmy , S. Gupta TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:926-937 [Conf ] Abhimanyu Das , Debojyoti Dutta , Ahmed Helmy , Ashish Goel , John S. Heidemann Low-state fairness: lower bounds and practical enforcement. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:2436-2446 [Conf ] Deborah Estrin , Mark Handley , Ahmed Helmy , Polly Huang , David Thaler A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:1090-1098 [Conf ] Ahmed Helmy , Saurabh Garg , Priyatham Pamu , Nitin Nahata Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets. [Citation Graph (0, 0)][DBLP ] IPDPS, 2003, pp:219- [Conf ] Karim Seada , Ahmed Helmy Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Karim Seada , Ahmed Helmy , Ramesh Govindan On the effect of localization errors on geographic face routing in sensor networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2004, pp:71-80 [Conf ] Amr Hafez , Waleed F. Aboueldahab , Ahmed Helmy On the design of an offset-PLL modulation loop for the EGSM band. [Citation Graph (0, 0)][DBLP ] ISCAS (4), 2004, pp:153-156 [Conf ] Shamim Begum , Meeta Sharma , Ahmed Helmy , Sandeep K. S. Gupta Systematic Testing of Protocol Robustness: Case Studies on Mobile IP and MARS. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:369-380 [Conf ] Ahmed Helmy , Deborah Estrin Simulation-based 'STRESS' Testing Case Study: A Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1998, pp:36-43 [Conf ] Abhimanyu Das , Debojyoti Dutta , Ahmed Helmy Fair Stateless Aggregate Traffic Marking Using Active Queue Management Techniques. [Citation Graph (0, 0)][DBLP ] MMNS, 2002, pp:211-223 [Conf ] Kitae Nahm , Ahmed Helmy , C. C. Jay Kuo TCP over multihop 802.11 networks: issues and performance enhancement. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2005, pp:277-287 [Conf ] Narayanan Sadagopan , Fan Bai , Bhaskar Krishnamachari , Ahmed Helmy PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2003, pp:245-256 [Conf ] Sapon Tanachaiwiwat , Ahmed Helmy Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:97-108 [Conf ] Yongjin Kim , Ahmed Helmy SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:85-96 [Conf ] Yongjin Kim , Jae-Joon Lee , Ahmed Helmy Impact of location inconsistencies on geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP ] MSWiM, 2003, pp:124-127 [Conf ] Ahmed Helmy A multicast-based protocol for IP mobility support. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2000, pp:49-58 [Conf ] Yongjin Kim , Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:123-134 [Conf ] Karim Seada , Marco Zuniga , Ahmed Helmy , Bhaskar Krishnamachari Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2004, pp:108-121 [Conf ] Karim Seada , Ahmed Helmy , Ramesh Govindan On the effect of localization errors on geographic face routing in sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:312-313 [Conf ] Sapon Tanachaiwiwat , Pinalkumar Dave , Rohan Bhindwale , Ahmed Helmy Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:324-325 [Conf ] Fan Bai , Narayanan Sadagopan , Ahmed Helmy The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:4, pp:383-403 [Journal ] Narayanan Sadagopan , Bhaskar Krishnamachari , Ahmed Helmy Active query forwarding in sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2005, v:3, n:1, pp:91-113 [Journal ] Fan Bai , Ganesha Bhaskara , Ahmed Helmy Building the blocks of protocol design and analysis: challenges and lessons learned from case studies on mobile ad hoc routing and micro-mobility protocols. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2004, v:34, n:3, pp:57-70 [Journal ] Karthik Dantu , Shyam Kapadia , Rishi Sinha , Ahmed Helmy Modeling of mobility-induced losses in MANETs (MILMAN). [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:30- [Journal ] Ahmed Helmy , Muhammad Jaseemuddin , Ganesha Bhaskara Efficient micro-mobility using intra-domain multicast-based mechanisms (M&M). [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:5, pp:61-72 [Journal ] Nitin Nahata , Priyatham Pamu , Saurabh Garg , Ahmed Helmy Efficient resource discovery for large scale ad hoc networks using contacts. [Citation Graph (0, 0)][DBLP ] Computer Communication Review, 2002, v:32, n:3, pp:32- [Journal ] Ahmed Helmy Mobility-assisted resolution of queries in large-scale mobile sensor networks (MARQ) . [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:43, n:4, pp:437-458 [Journal ] Karim Seada , Ahmed Helmy Efficient and robust geocasting protocols for sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:2, pp:151-161 [Journal ] Lee Breslau , Deborah Estrin , Kevin R. Fall , Sally Floyd , John S. Heidemann , Ahmed Helmy , Polly Huang , Steven McCanne , Kannan Varadhan , Ya Xu , Haobo Yu Advances in Network Simulation. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:5, pp:59-67 [Journal ] Ahmed Helmy Multicast-based Architecture for IP Mobility: Simulation Analysis and Comparison with Basic Mobile IP [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ahmed Helmy , Sandeep K. S. Gupta , Deborah Estrin , Alberto Cerpa , Yan Yu Systematic Performance Evaluation of Multipoint Protocols [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ahmed Helmy , Deborah Estrin , Sandeep K. S. Gupta Systematic Testing of Multicast Routing Protocols: Analysis of Forward and Backward Search Techniques [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Ahmed Helmy State Analysis and Aggregation Study for Multicast-based Micro Mobility [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Ahmed Helmy Architectural Framework for Large-Scale Multicast in Mobile Ad Hoc Networks [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Abhimanyu Das , Debojyoti Dutta , Ahmed Helmy Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Ahmed Helmy Small Large-Scale Wireless Networks: Mobility-Assisted Resource Discovery [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Ahmed Helmy , Sandeep K. S. Gupta , Deborah Estrin The STRESS Method for Boundary-point Performance Analysis of End-to-end Multicast Timer-Suppression Mechanisms [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Saurabh Garg , Priyatham Pamu , Nitin Nahata , Ahmed Helmy Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Ahmed Helmy , Muhammad Jaseemuddin , Ganesha Bhaskara Efficient Micro-Mobility using Intra-domain Multicast-based Mechanisms (M&M) [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Ahmed Helmy , Saurabh Garg , Nitin Nahata , Priyatham Pamu CARD: A Contact-based Architecture for Resource Discovery in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] MONET, 2005, v:10, n:1-2, pp:99-113 [Journal ] Jabed Faruque , Ahmed Helmy Gradient-based routing in sensor networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2003, v:7, n:4, pp:50-52 [Journal ] Ahmed Helmy CAPTURE: location-free contact-assisted power-efficient query resolution for sensor networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2004, v:8, n:1, pp:27-47 [Journal ] Wei-jen Hsu , Kashyap Merchant , Haw-wei Shu , Chih-hsin Hsu , Ahmed Helmy Weighted waypoint mobility model and its impact on ad hoc networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2005, v:9, n:1, pp:59-63 [Journal ] Yongjin Kim , Jae-Joon Lee , Ahmed Helmy Modeling and analyzing the impact of location inconsistencies on geographic routing in wireless networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2004, v:8, n:1, pp:48-60 [Journal ] Karim Seada , Ahmed Helmy , Ramesh Govindan On the effect of location inaccuracy on geographic face routing in wireless networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2003, v:7, n:4, pp:61-63 [Journal ] Dongjin Son , Ahmed Helmy , Bhaskar Krishnamachari The Effect of Mobility-Induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2004, v:3, n:3, pp:233-245 [Journal ] Ahmed Helmy , Sandeep K. S. Gupta , Deborah Estrin The STRESS method for boundary-point performance analysis of end-to-end multicast timer-suppression mechanisms. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:1, pp:44-58 [Journal ] Karim Seada , Ahmed Helmy An overview of geographic protocols in ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP ] AICCSA, 2005, pp:62- [Conf ] Wei-jen Hsu , Thrasyvoulos Spyropoulos , Konstantinos Psounis , Ahmed Helmy Modeling Time-Variant User Mobility in Wireless Mobile Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:758-766 [Conf ] Sapon Tanachaiwiwat , Ahmed Helmy Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks. [Citation Graph (0, 0)][DBLP ] SSS, 2006, pp:582-583 [Conf ] S.-C. Wang , Y.-M. Chen , Tsern-Huei Lee , A. Helmy Performance evaluations for hybrid IEEE 802.11b and 802.11g wireless networks. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:111-118 [Conf ] Karim Seada , Ahmed Helmy , Ramesh Govindan Modeling and analyzing the correctness of geographic face routing under realistic conditions. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:6, pp:855-871 [Journal ] Sapon Tanachaiwiwat , Ahmed Helmy On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Sapon Tanachaiwiwat , Ahmed Helmy Encounter-based worms: Analysis and Defense [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Wei-jen Hsu , Debojyoti Dutta , Ahmed Helmy Mining Behavioral Groups in Large Wireless LANs [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Karim Seada , Ahmed Helmy Rendezvous Regions: A Scalable Architecture for Resource Discovery and Service Location in Large-Scale Mobile Networks [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Karim Seada , Ahmed Helmy Efficient and Robust Geocasting Protocols for Sensor Networks [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Modeling and analysis of worm interactions (war of the worms). [Citation Graph (, )][DBLP ] Computer worm ecology in encounter-based networks. [Citation Graph (, )][DBLP ] Performance Limits and Analysis of Contention-based IEEE 802.11 MAC. [Citation Graph (, )][DBLP ] Performance Analysis of Wireless MAC Protocols Using a Search Based Framework. [Citation Graph (, )][DBLP ] Modeling and test generation for worst-case performance evaluation of MAC protocols for wireless ad hoc networks. [Citation Graph (, )][DBLP ] Mining behavioral groups in large wireless LANs. [Citation Graph (, )][DBLP ] On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. [Citation Graph (, )][DBLP ] TABS: Link Loss Tolerant Data Routing Protocol for Multi-hop Wireless Sensor Networks. [Citation Graph (, )][DBLP ] BEWARE: Background traffic-aware rate adaptation for IEEE 802.11. [Citation Graph (, )][DBLP ] PROTECT: proximity-based trust-advisor using encounters for mobile societies. [Citation Graph (, )][DBLP ] Human Behavior and Challenges of Anonymizing WLAN Traces. [Citation Graph (, )][DBLP ] Visualization and Representation of Mobile Network Users. [Citation Graph (, )][DBLP ] Impact of Mobility on Last Encounter Routing Protocols. [Citation Graph (, )][DBLP ] Profile-Cast: Behavior-Aware Mobile Networking. [Citation Graph (, )][DBLP ] Encounter-based worms: Analysis and defense. [Citation Graph (, )][DBLP ] CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks. [Citation Graph (, )][DBLP ] ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION [Citation Graph (, )][DBLP ] IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis [Citation Graph (, )][DBLP ] CSI: A Paradigm for Behavior-oriented Delivery Services in Mobile Human Networks [Citation Graph (, )][DBLP ] Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks [Citation Graph (, )][DBLP ] PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies [Citation Graph (, )][DBLP ] SHIELD: Social sensing and Help In Emergency using mobiLe Devices [Citation Graph (, )][DBLP ] Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis [Citation Graph (, )][DBLP ] Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies [Citation Graph (, )][DBLP ] Similarity Analysis and Modeling in Mobile Societies: The Missing Link [Citation Graph (, )][DBLP ] Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance [Citation Graph (, )][DBLP ] Spatio-Temporal Modeling of Wireless Users Internet Access Patterns Using Self-Organizing Maps [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.454secs