The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mark D. Corner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
    Ferret: RFID Localization for Pervasive Multimedia. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2006, pp:422-440 [Conf]
  2. Mark D. Corner, Nada Golmie, Jörg Liebeherr, David H. Su
    A Priority Scheme for the IEEE 802.14 MAC Protocol for Hybrid Fiber-Coax Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:1400-1407 [Conf]
  3. Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
    SEVA: sensor-enhanced video annotation. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:618-627 [Conf]
  4. Xiaotao Liu, Prashant J. Shenoy, Mark D. Corner
    Chameleon: application level power management with performance isolation. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:839-848 [Conf]
  5. Mark D. Corner, Brian Noble
    Zero-interaction authentication. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 2002, pp:1-11 [Conf]
  6. Mark D. Corner, Brian Noble
    Protecting Applications with Transient Authentication. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2003, pp:- [Conf]
  7. Jacob Sorber, Nilanjan Banerjee, Mark D. Corner, Sami Rollins
    Turducken: hierarchical power management for mobile devices. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2005, pp:261-274 [Conf]
  8. Brendan Burns, Kevin Grimaldi, Alexander Kostadinov, Emery D. Berger, Mark D. Corner
    Flux: A Language for Programming High-Performance Servers. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:129-142 [Conf]
  9. James Cipar, Mark D. Corner, Emery D. Berger
    Transparent Contribution of Memory. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2006, pp:109-114 [Conf]
  10. Nada Golmie, Mark D. Corner, Jörg Liebeherr, David H. Su
    ATM Traffic Control in Hybrid Fiber-Coax Networks - Problems and Solutions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:1, pp:30-39 [Journal]
  11. Anthony J. Nicholson, Mark D. Corner, Brian D. Noble
    Mobile Device Security Using Transient Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:11, pp:1489-1502 [Journal]
  12. Mark D. Corner, Jörg Liebeherr, Nada Golmie, Chatschik Bisdikian, David H. Su
    A priority scheme for the IEEE 802.14 MAC protocol for hybrid fiber-coax networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:2, pp:200-211 [Journal]
  13. Mark D. Corner, Brian D. Noble
    Protecting File Systems with Transient Authentication. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:1-2, pp:7-19 [Journal]
  14. Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner, Sami Rollins, Lin Zhong
    Users and Batteries: Interactions and Adaptive Energy Management in Mobile Systems. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2007, pp:217-234 [Conf]
  15. Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine
    An Energy-Efficient Architecture for DTN Throwboxes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:776-784 [Conf]
  16. Nilanjan Banerjee, Jacob Sorber, Mark D. Corner, Sami Rollins, Deepak Ganesan
    Triage: balancing energy and quality of service in a microserver. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2007, pp:152-164 [Conf]
  17. James Cipar, Mark D. Corner, Emery D. Berger
    Contributing storage using the transparent file system. [Citation Graph (0, 0)][DBLP]
    TOS, 2007, v:3, n:3, pp:- [Journal]

  18. TFS: A Transparent File System for Contributory Storage. [Citation Graph (, )][DBLP]


  19. An Adaptive Link Layer for Range Diversity in Multi-Radio Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  20. Relays, base stations, and meshes: enhancing mobile networks with infrastructure. [Citation Graph (, )][DBLP]


  21. Surviving attacks on disruption-tolerant networks without authentication. [Citation Graph (, )][DBLP]


  22. Sherlock: automatically locating objects for humans. [Citation Graph (, )][DBLP]


  23. Virtual Compass: Relative Positioning to Sense Mobile Social Interactions. [Citation Graph (, )][DBLP]


  24. Eon: a language and runtime system for perpetual systems. [Citation Graph (, )][DBLP]


  25. mCrowd: a platform for mobile crowdsourcing. [Citation Graph (, )][DBLP]


  26. The case for transient authentication. [Citation Graph (, )][DBLP]


  27. Memory buddies: exploiting page sharing for smart colocation in virtualized data centers. [Citation Graph (, )][DBLP]


  28. Hierarchical power management in disruption tolerant networks using traffic-aware optimization. [Citation Graph (, )][DBLP]


Search in 0.765secs, Finished in 0.766secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002