Publications

Export 197 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing wireless-specific services for a wireless access network, 2009.
R. Dantu, Chiang, S., Yin, H., and Kachhla, R., Method and system for providing supplementary services for a wireless access network, 2008.
R. Dantu, Patel, P., Patel, P., Garbuz, A., Miernik, J., Patel, A., and Holur, B., Method and system for providing services for wireless data calls, 2007.
B. Holur, Dantu, R., and Derrick, C., Method and system for managing wireless bandwidth resources, 2009.
P. Patel, Choksi, O., Davidson, K., and Dantu, R., Method and system for configuring wireless routers and networks, 2006.
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
A. Salau, Dantu, R., Morozov, K., Badruddoja, S., and Upadhyay, K., Making Blockchain Validators Honest, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Blockchain_Validators_Honest.pdf (1.13 MB)
K. Upadhyay, Dantu, R., He, Y., Salau, A., and Badruddoja, S., Make Consumers Happy by Defuzzifying the Service Level Agreements, in 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021.PDF icon Make_Consumers_Happy_by_Defuzzifying_the_Service_Level_Agreements.pdf (722.47 KB)
B. Gozick, Subbu, K., Dantu, R., and Maeshiro, T., Magnetic Maps for Indoor Navigation, IEEE Transactions on Instrumentation and Measurement, vol. 60, pp. 3883 - 3891, 2011.
I
R. Dantu, Fahmy, S., Schulzrinne, H., and Cangussu, J., Issues and challenges in securing VoIP, Computers & Security, vol. 28, pp. 743-753, 2009.PDF icon Issues_and_challenges_in_securing_VoIP.pdf (527.79 KB)
S. Badruddoja, Dantu, R., Widick, L., Zaccagni, Z., and Upadhyay, K., Integrating DOTS With Blockchain Can Secure Massive IoT Sensors, in 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 2020.PDF icon Integrating_DOTS_With_Blockchain_Can_Secure_Massive_IoT_Sensors.pdf (1.07 MB)
Y. Hashem, Takabi, H., and Dantu, R., Insider Threat Detection Based on Users’ Mouse Movements and Keystrokes Behavior, in Secure Knowledge Management Workshop, 2017.PDF icon Insider_Threat_.Detection_User_Mouse_Movement_Keystroke_Behavior.pdf (112.09 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals, Journal of Internet Services and Information Security, vol. 6, pp. 20-36, 2016.PDF icon Inside_Mind_Of_Insider.pdf (1023.25 KB)
S. Phithakkitnukoon and Dantu, R., Inferring Social Groups Using Call Logs, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, 2008, pp. 200–210.PDF icon inferring_social_groups_using_call_logs.pdf (235.6 KB)
K. Subbu, Gozick, B., and Dantu, R., Indoor localization through dynamic time warping, in 2011 IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, 2011.
P. Guturu and Dantu, R., An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 38, pp. 645 - 666, 2008.
K. Subbu, Xu, N., and Dantu, R., iKnow Where You Are, in Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04, Washington, DC, USA, 2009.PDF icon iknow_where_you_are.pdf (224.2 KB)
M. Fazeen, Dantu, R., and Guturu, P., Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches, Social Network Analysis and Mining, vol. 1, pp. 241–254, 2011.PDF icon leaders_lurkers_associates_spammers.pdf (891.55 KB)
G
E. - A. Baatarjav, Phithakkitnukoon, S., and Dantu, R., Group Recommendation System for Facebook, in On the Move to Meaningful Internet Systems: OTM 2008 Workshops, Monterrey, Mexico, November 9-14, 2008. Proceedings, R. Meersman, Tari, Z., and Herrero, P., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 211–219.PDF icon group_recommendation_system_for_facebook.pdf (353.63 KB)
W. Fagen, Cangussu, J., and Dantu, R., Goliath: A Configurable Approach for Network Testing, in Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, 2007.PDF icon goliath_configurable_approach_network_testing.pdf (127.03 KB)
F
R. Dantu, Future Threats. NSF Workshop on Future Topics for Cyber Trust, 2006.

Pages