The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Narayan B. Mandayam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lei Song, Narayan B. Mandayam
    Hierarchical SIR and Rate Control for CDMA Data Users on the Forward Link. [Citation Graph (0, 0)][DBLP]
    ICC (3), 2000, pp:1514-1518 [Conf]
  2. Cristina Comaniciu, Narayan B. Mandayam, David Famolari, Prathima Agrawal
    Admission and Flow Control for Multimedia CDMA. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (III), 2000, pp:1265-1268 [Conf]
  3. Jignesh Panchal, Owen Kelly, Jie Lai, Narayan B. Mandayam, Andrew T. Ogielski, Roy D. Yates
    WiPPET, a Virtual Testbed for Parallel Simulations of Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Parallel and Distributed Simulation, 1998, pp:162-169 [Conf]
  4. Narayan B. Mandayam, Behnaam Aazhang
    Gradient Estimation for Stochastic Optimization of Optical Code-Division Multiple-Access Systems: Part I - Generalized Sensitivity Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:4, pp:731-741 [Journal]
  5. Narayan B. Mandayam, Behnaam Aazhang
    Gradient Estimation for Stochastic Optimization of Optical Code-Division Multiple-Access Systems: Part II - Adaptive Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:4, pp:742-750 [Journal]
  6. Cem U. Saraydar, Narayan B. Mandayam, David J. Goodman
    Pricing and power control in a multicell wireless data network. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 2001, v:19, n:10, pp:1883-1892 [Journal]
  7. Lei Song, Narayan B. Mandayam
    Hierarchical SIR and rate control on the forward link for CDMA data users under delay and error constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 2001, v:19, n:10, pp:1871-1882 [Journal]
  8. Lei Song, Narayan B. Mandayam, Zoran Gajic
    Analysis of an up/down power control algorithm for the CDMA reverse link under fading. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 2001, v:19, n:2, pp:277-286 [Journal]
  9. David Goodman, Narayan B. Mandayam
    Network Assisted Power Control for Wireless Data. [Citation Graph (0, 0)][DBLP]
    MONET, 2001, v:6, n:5, pp:409-415 [Journal]
  10. Owen Kelly, Jie Lai, Narayan B. Mandayam, Andrew T. Ogielski, Jignesh Panchal, Roy D. Yates
    Scalable parallel simulations of wireless networks with WiPPET: Modeling of radio propagation, mobility and protocols. [Citation Graph (0, 0)][DBLP]
    MONET, 2000, v:5, n:3, pp:199-208 [Journal]
  11. Zhuyu Lei, Cem U. Saraydar, Narayan B. Mandayam
    Paging area optimization based on interval estimation in wireless personal communication networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2000, v:5, n:1, pp:85-99 [Journal]
  12. Jignesh Panchal, Owen Kelly, Jie Lai, Narayan B. Mandayam, Andrew T. Ogielski, Roy D. Yates
    Parallel Simulation of Wireless Networks with TED: Radio Propagation, Mobility and Protocols. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 1998, v:25, n:4, pp:30-39 [Journal]
  13. Andrej Domazetovic, Larry J. Greenstein, Narayan B. Mandayam, Ivan Seskar
    Propagation models for short-range wireless channels with predictable path geometries. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:7, pp:1123-1126 [Journal]
  14. Nan Feng, Siun-Chuon Mau, Narayan B. Mandayam
    Pricing and power control for joint network-centric and user-centric radio resource management. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:9, pp:1547-1557 [Journal]
  15. Nan Feng, Siun-Chuon Mau, Narayan B. Mandayam
    Joint network-centric and user-centric radio resource management in a multicell system. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:7, pp:1114-1118 [Journal]
  16. Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz, Narayan B. Mandayam
    An energy-efficient approach to power control and receiver design in wireless data networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:11, pp:1885-1894 [Journal]
  17. Dragan Samardzija, Narayan B. Mandayam
    Unquantized and Uncoded Channel State Information Feedback in Multiple-Antenna Multiuser Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2006, v:54, n:7, pp:1335-1345 [Journal]
  18. Heng Wang, Narayan B. Mandayam
    A simple packet-transmission scheme for wireless data over fading channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:7, pp:1055-1059 [Journal]
  19. Heng Wang, Narayan B. Mandayam
    Opportunistic file transfer over a fading channel under energy and delay constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2005, v:53, n:4, pp:632-644 [Journal]
  20. Michael Andersin, Narayan B. Mandayam, Roy D. Yates
    Subspace based estimation of the signal to interference ratio for TDMA cellular systems. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1998, v:4, n:3, pp:241-247 [Journal]
  21. Mohammad Saquib, Roy D. Yates, Narayan B. Mandayam
    A decision feedback decorrelator for a dual rate synchronous DS/CDMA system. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1998, v:4, n:6, pp:497-506 [Journal]
  22. Lalitha Sankar, Yingbin Liang, H. Vincent Poor, Narayan B. Mandayam
    Opportunistic Communications in an Orthogonal Multiaccess Relay Channel [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  23. Farhad Meshkati, Mung Chiang, Stuart C. Schwartz, H. Vincent Poor, Narayan B. Mandayam
    A Non-Cooperative Power Control Game for Multi-Carrier CDMA Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  24. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. [Citation Graph (, )][DBLP]


  25. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. [Citation Graph (, )][DBLP]


  26. Network Formation Among Selfish Energy-Constrained Wireless Devices. [Citation Graph (, )][DBLP]


  27. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. [Citation Graph (, )][DBLP]


  28. Radio Resource Management for Green Wireless Networks. [Citation Graph (, )][DBLP]


  29. Bandwidth exchange as an incentive for relaying. [Citation Graph (, )][DBLP]


  30. MIMO-assisted channel-based authentication in wireless networks. [Citation Graph (, )][DBLP]


  31. A Utility-Based Approach to Power Control and Receiver Design in Wireless Data Networks [Citation Graph (, )][DBLP]


  32. On the Sum-Capacity of Degraded Gaussian Multiaccess Relay Channels [Citation Graph (, )][DBLP]


  33. Coalitions in Cooperative Wireless Networks [Citation Graph (, )][DBLP]


  34. Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks [Citation Graph (, )][DBLP]


  35. Opportunistic Communications in Fading Multiaccess Relay Channels [Citation Graph (, )][DBLP]


  36. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication [Citation Graph (, )][DBLP]


  37. MIMO-Assisted Channel-Based Authentication in Wireless Networks [Citation Graph (, )][DBLP]


  38. Using the Physical Layer for Wireless Authentication in Time-Variant Channels [Citation Graph (, )][DBLP]


  39. Information-theoretically Secret Key Generation for Fading Wireless Channels [Citation Graph (, )][DBLP]


  40. Analyzing Random Network Coding with Differential Equations and Differential Inclusions [Citation Graph (, )][DBLP]


Search in 0.268secs, Finished in 0.270secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002