The SCEAS System
Navigation Menu

Search the dblp DataBase


Kyle Jamieson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kyle Jamieson, Hari Balakrishnan, Y. C. Tay
    Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EWSN, 2006, pp:260-275 [Conf]
  2. Benjie Chen, Kyle Jamieson, Hari Balakrishnan, Robert Morris
    Span: An energy-efficient coordination algorithm for topology maintenance in Ad Hoc wireless networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2001, pp:85-96 [Conf]
  3. Bret Hull, Kyle Jamieson, Hari Balakrishnan
    Bandwidth management in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:306-307 [Conf]
  4. Bret Hull, Kyle Jamieson, Hari Balakrishnan
    Mitigating congestion in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2004, pp:134-147 [Conf]
  5. Lewis Girod, Kyle Jamieson, Yuan Mei, Ryan Newton, Stanislav Rost, Arvind Thiagarajan, Hari Balakrishnan, Samuel Madden
    WaveScope: a signal-oriented data stream management system. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:421-422 [Conf]
  6. Can Emre Koksal, Kyle Jamieson, Emre Telatar, Patrick Thiran
    Impacts of channel variability on link-level throughput in wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:51-62 [Conf]
  7. Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto
    Signature metrics for accurate and automated worm detection. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:65-72 [Conf]
  8. Benjie Chen, Kyle Jamieson, Hari Balakrishnan, Robert Morris
    Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:5, pp:481-494 [Journal]
  9. Kyle Jamieson, Hari Balakrishnan
    PPR: partial packet recovery for wireless networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2007, pp:409-420 [Conf]

  10. Harnessing Exposed Terminals in Wireless Networks. [Citation Graph (, )][DBLP]

  11. Collection tree protocol. [Citation Graph (, )][DBLP]

  12. Cross-layer wireless bit rate adaptation. [Citation Graph (, )][DBLP]

  13. SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). [Citation Graph (, )][DBLP]

  14. Cone of silence: adaptively nulling interferers in wireless networks. [Citation Graph (, )][DBLP]

Search in 0.022secs, Finished in 0.023secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002