The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nicholas Bambos: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yan Li, Nicholas Bambos
    Power-Controlled Media Streaming in the Interference-Limited Wireless Networks. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2004, pp:560-568 [Conf]
  2. Athina Markopoulou, Yan Li, Nicholas Bambos, Carri Chan
    Energy-efficient communication in battery-constrained portable devices. [Citation Graph (0, 0)][DBLP]
    BROADNETS, 2005, pp:441-450 [Conf]
  3. Kevin Ross, Nicholas Bambos
    Job Scheduling for Maximal Throughput in Autonomic Computing Systems. [Citation Graph (0, 0)][DBLP]
    IWSOS/EuroNGI, 2006, pp:105-119 [Conf]
  4. Savvas Gitzenis, Nicholas Bambos
    Local/Remote Task Execution in Network Computing. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:842-848 [Conf]
  5. Keith Scott, Nicholas Bambos
    Routing in Networks with Random Topologies. [Citation Graph (0, 0)][DBLP]
    ICC (2), 1997, pp:862-866 [Conf]
  6. Kevin Ross, Nicholas Bambos
    Packet Scheduling Across Networks of Switches. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:849-856 [Conf]
  7. Steven M. P. Yip, Nicholas Bambos
    Scalable routing schemes for massively parallel processing using reconfigurable optical interconnect. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1996, pp:500-0 [Conf]
  8. Nicholas Bambos, Shou C. Chen, Gregory J. Pottie
    Radio Link Admission Algorithms for Wireless Networks with Power Control and Active Link Quality Protection. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1995, pp:97-104 [Conf]
  9. Nicholas Bambos, Sunil Kandukuri
    Power Controlled Multiple Access (PCMA) in Wireless Communication Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:386-395 [Conf]
  10. Shou C. Chen, Nicholas Bambos, Gregory J. Pottie
    Admission Control Schemes for Wireless Communication Networks with Adjustable Transmitter Powers. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:21-28 [Conf]
  11. Savvas Gitzenis, Nicholas Bambos
    Power-Controlled Data Prefetching/Caching in Wireless Packet Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2002, pp:- [Conf]
  12. Sunil Kandukuri, Nicholas Bambos
    Multimodal Dynamic Multiple Access (MDMA) in Power Controlled Wireless Packet Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:199-208 [Conf]
  13. Kevin Ross, Nicholas Bambos
    Local Search Scheduling Algorithms for Maximal Throughput in Packet Switches. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  14. John M. Rulnick, Nicholas Bambos
    Mobile Power Management for Maximum Battery Life in Wireless Communication Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1996, pp:443-450 [Conf]
  15. John M. Rulnick, Nicholas Bambos
    Power Control and Time Division: The CDMA versus TDMA Question. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:634-641 [Conf]
  16. Savvas Gitzenis, Nicholas Bambos
    Efficient Data Prefetching for Power-Controlled Wireless Packet Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:64-73 [Conf]
  17. Steven M. P. Yip, Nicholas Bambos
    Algorithmic Speed Up of All Pairs Shortest Paths Computation with Reconfigurable Optical Interconnection. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1996, pp:355-366 [Conf]
  18. Savvas Gitzenis, Nicholas Bambos
    Mobile to Base Task Migration in Wireless Computing. [Citation Graph (0, 0)][DBLP]
    PerCom, 2004, pp:187-196 [Conf]
  19. Jatinder Pal Singh, Nicholas Bambos, Bhaskar Srinivasan, Detlef Clawin
    Cross-layer multi-hop wireless routing for inter-vehicle communication. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2006, pp:- [Conf]
  20. Savvas Gitzenis, Nicholas Bambos
    Power-managed block level file decryption in wireless network computing. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2006, pp:124-132 [Conf]
  21. Nicholas Bambos, Jean C. Walrand
    On Stability and Performance of Parallel Processing Systems. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1991, v:38, n:2, pp:429-452 [Journal]
  22. Nicholas Bambos, Sunil Kandukuri
    Globally Constrained Power Control Across Multiple Channels in Wireless Data Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2001, v:6, n:5, pp:427-434 [Journal]
  23. Kimberly M. Wasserman, George Michailidis, Nicholas Bambos
    Optimal processor allocation to differentiated job flows. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:1, pp:1-14 [Journal]
  24. Cathy H. Xia, George Michailidis, Nicholas Bambos
    Dynamic on-line task scheduling on parallel processors. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2001, v:46, n:2-3, pp:219-233 [Journal]
  25. Mor Armony, Nicholas Bambos
    Queueing Dynamics and Maximal Throughput Scheduling in Switched Processing Systems. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2003, v:44, n:3, pp:209-252 [Journal]
  26. Nicholas Bambos, George Michailidis
    Queueing Networks of Random Link Topology: Stationary Dynamics of Maximal Throughput Schedules. [Citation Graph (0, 0)][DBLP]
    Queueing Syst., 2005, v:50, n:1, pp:5-52 [Journal]
  27. Yan Li, Athina Markopoulou, Nicholas Bambos, John G. Apostolopoulos
    Joint Power-Playout Control for Media Streaming Over Wireless Links. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:4, pp:830-843 [Journal]
  28. Nicholas Bambos, Shou C. Chen, Gregory J. Pottie
    Channel access algorithms with active link protection for wireless communication networks with power control. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:5, pp:583-597 [Journal]
  29. David Vengerov, Nicholas Bambos, Hamid R. Berenji
    A fuzzy reinforcement learning approach to power control in wireless transmitters. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2005, v:35, n:4, pp:768-778 [Journal]
  30. John M. Rulnick, Nicholas Bambos
    Mobile power management for wireless communication networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1997, v:3, n:1, pp:3-14 [Journal]
  31. John M. Rulnick, Nicholas Bambos
    Power-induced time division on asynchronous channels. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1999, v:5, n:2, pp:71-80 [Journal]
  32. François Baccelli, Nicholas Bambos, Carri Chan
    Optimal Power, Throughput and Routing for Wireless Link Arrays. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  33. Aditya Dua, Nicholas Bambos
    Low-Jitter Scheduling Algorithms for Deadline-Aware Packet Switches. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  34. Kevin Ross, Nicholas Bambos
    Capacity Maximizing Packet Scheduling Algorithms for Interconnection Networks with Finite Buffers. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  35. Lykomidis Mastroleon, Reiko Ann Miura-Ko, Nicholas Bambos
    Patching Rate Management For Controlled Service-Disruption In Data Centers. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  36. Aditya Dua, Nicholas Bambos
    Joint Power Allocation and Scheduling for Deadline Constrained Wireless Traffic. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  37. Aditya Dua, Nicholas Bambos
    Downlink Wireless Packet Scheduling with Deadlines. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:12, pp:1410-1425 [Journal]

  38. Security Decision-Making among Interdependent Organizations. [Citation Graph (, )][DBLP]


  39. Backlog Aware Scheduling for Large Buffered Crossbar Switches. [Citation Graph (, )][DBLP]


  40. Power Management of Packet Switches via Differentiated Delay Targets. [Citation Graph (, )][DBLP]


  41. Wireless Video Broadcasting to Diverse Users. [Citation Graph (, )][DBLP]


  42. Power Managed Packet Switching. [Citation Graph (, )][DBLP]


  43. SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures. [Citation Graph (, )][DBLP]


  44. Wireless Packet Scheduling With Soft Deadlines. [Citation Graph (, )][DBLP]


  45. Dynamic Resource Modeling for Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]


  46. Cost and Target-Based Scheduling for Switch Power Control. [Citation Graph (, )][DBLP]


  47. Receiver-Based Optimization for Video Delivery Over Wireless Links. [Citation Graph (, )][DBLP]


  48. Optimal Scheduling of Media Packets with Multiple Distortion Measures. [Citation Graph (, )][DBLP]


  49. Media and data traffic coexistence in power-controlled wireless networks. [Citation Graph (, )][DBLP]


  50. Buffer Management for Wireless Media Streaming. [Citation Graph (, )][DBLP]


  51. Target-Driven and Incentive-Aligned Power Control for Wireless Networks. [Citation Graph (, )][DBLP]


  52. Target-Based Power Control for Queueing Systems with Applications to Packet Switches. [Citation Graph (, )][DBLP]


  53. Backlog Aware Scheduling for Ingress Memories in High-Radix, Single-Stage Switches. [Citation Graph (, )][DBLP]


  54. Performance tradeoffs in mobile computing: to fetch or not to fetch? [Citation Graph (, )][DBLP]


  55. Dynamic Risk Mitigation in Computing Infrastructures. [Citation Graph (, )][DBLP]


  56. Network-Assisted Wireless Computing. [Citation Graph (, )][DBLP]


  57. Game-based admission control for wireless systems. [Citation Graph (, )][DBLP]


  58. Modeling dependencies in security risk management. [Citation Graph (, )][DBLP]


  59. A Characterization of Max-Min SIR-Balanced Power Allocation with Applications [Citation Graph (, )][DBLP]


  60. Decentralized Admission Control for Power-Controlled Wireless Links [Citation Graph (, )][DBLP]


  61. Dynamic Task Fetching Over Time Varying Wireless Channels for Mobile Computing Applications [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002