default search action
Niki Pissinou
Person information
- affiliation: Florida International University, University Park, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c137]Hussein Zangoti, Alex Pissinou Makki, Wazir Zada Khan, Niki Pissinou:
Enhancing Blockchain Storage Efficiency in Mobile IoT through Multidimensional Structures and Collective Signing. Blockchain 2024: 478-483 - [c136]Mohammed Rajhi, Niki Pissinou:
Adversarial Training on Limited-Resource Devices Through Asymmetric Disturbances. DCOSS-IoT 2024: 27-34 - [c135]Ahmed Hakami, Niki Pissinou, Mohammed Rajhi:
Adaptive Dynamic Adversarial Training with Real-Time Feedback in 6G. DCOSS-IoT 2024: 44-49 - [c134]Hussein Zangoti, Niki Pissinou:
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT. DCOSS-IoT 2024: 269-276 - 2023
- [c133]Mohammed Rajhi, Niki Pissinou:
Resource-Limited Localized Adaptive Adversarial Training for Machine Learning Model. ISPA/BDCloud/SocialCom/SustainCom 2023: 1113-1120 - [c132]Hussein Zangoti, Niki Pissinou, Charles A. Kamhoua:
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT. DCOSS-IoT 2023: 142-149 - [c131]Sheila Alemany, Alberto Luis Dominguez, Ilan Grapel, Niki Pissinou:
Towards Parametric Robust Activation Functions in Adversarial Machine Learning. Tiny Papers @ ICLR 2023 - [c130]Mohammed Rajhi, Niki Pissinou:
Adversarial Training Method for Machine Learning Model in a Resource-Constrained Environment. Q2SWinet 2023: 87-95 - 2022
- [c129]Sheila Alemany, Niki Pissinou:
The Dilemma Between Data Transformations and Adversarial Robustness for Time Series Application Systems. SafeAI@AAAI 2022 - [c128]Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez:
A Multidimensional Blockchain Framework For Mobile Internet of Things. TrustCom 2022: 935-944 - 2021
- [j56]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki:
Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int. J. Commun. Syst. 34(1) (2021) - [c127]Sheila Alemany, Jason Nucciarone, Niki Pissinou:
Jespipe: A Plugin-Based, Open MPI Framework for Adversarial Machine Learning Analysis. IEEE BigData 2021: 3663-3670 - 2020
- [i2]Sheila Alemany, Niki Pissinou:
The Dilemma Between Dimensionality Reduction and Adversarial Robustness. CoRR abs/2006.10885 (2020)
2010 – 2019
- 2019
- [j55]Wenrui Ma, Jonathan Beltran, Deng Pan, Niki Pissinou:
Placing Traffic-Changing and Partially-Ordered NFV Middleboxes via SDN. IEEE Trans. Netw. Serv. Manag. 16(4): 1303-1317 (2019) - [c126]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Privacy-Preserving Deep Learning for Enabling Big Edge Data Analytics in Internet of Things. IGSC 2019: 1-6 - [c125]Abdur R. Shahid, Niki Pissinou, Corey Staier, Rain Kwan:
Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things. iThings/GreenCom/CPSCom/SmartData 2019: 1154-1161 - [c124]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez:
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT. MASS Workshops 2019: 172-173 - [c123]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). MobiQuitous 2019: 116-125 - [i1]Wei Zeng, Abdur Bin Shahid, Keyan Zolfaghari, Aditya Shetty, Niki Pissinou, S. Sitharama Iyengar:
n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality. CoRR abs/1906.09158 (2019) - 2018
- [c122]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
Using Candlestick Charting and Dynamic Time Warping for Data Behavior Modeling and Trend Prediction for MWSN in IoT. IEEE BigData 2018: 2884-2889 - [c121]Yujian Charles Tang, Samia Tasnim, Niki Pissinou, S. S. Iyengar, Abdur R. Shahid:
Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing. IEEE BigData 2018: 4820-4828 - [c120]Samia Tasnim, Juan Caldas, Niki Pissinou, S. S. Iyengar, Ziqian Ding:
Semantic-Aware Clustering-based Approach of Trajectory Data Stream Mining. ICNC 2018: 88-92 - [c119]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Kianoosh G. Boroojeni, Jerry Miller, Ziqian Ding:
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach. ICNC 2018: 226-230 - [c118]Mingming Guo, Kianoosh G. Boroojeni, Niki Pissinou, Kia Makki, Jerry Miller, S. Sitharama Iyengar:
Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks. ISCC 2018: 1-7 - [c117]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, Teresita Lemus:
KLAP for Real-World Protection of Location Privacy. SERVICES 2018: 17-18 - [c116]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. TrustCom/BigDataSE 2018: 61-67 - [c115]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. TrustCom/BigDataSE 2018: 1852-1857 - 2017
- [j54]Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50(2): 30:1-30:37 (2017) - [j53]Wenrui Ma, Jonathan Beltran, Zhenglin Pan, Deng Pan, Niki Pissinou:
SDN-Based Traffic Aware Placement of NFV Middleboxes. IEEE Trans. Netw. Serv. Manag. 14(3): 528-542 (2017) - [c114]Samia Tasnim, Niki Pissinou, S. S. Iyengar:
A novel cleaning approach of environmental sensing data streams. CCNC 2017: 632-633 - [c113]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c112]Abdur R. Shahid, Liz Jeukeng, Wei Zeng, Niki Pissinou, S. S. Iyengar, Sartaj Sahni, Maite Varela-Conover:
PPVC: Privacy Preserving Voronoi Cell for location-based services. ICNC 2017: 351-355 - [c111]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Charles A. Kamhoua, Brandon L. Hernandez, Laurent Njilla, Alex Pissinou Makki:
Preventing Colluding Identity Clone Attacks in Online Social Networks. ICDCS Workshops 2017: 187-192 - [c110]Wenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. INFOCOM 2017: 1-9 - [c109]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. IPCCC 2017: 1-8 - [c108]Laurent Njilla, Harold N. Ouete, Niki Pissinou, Kia Makki:
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration. SysCon 2017: 1-8 - 2016
- [j52]Laurent Yamen Njilla, Niki Pissinou, Kia Makki:
Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9): 1500-1512 (2016) - [c107]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Privacy-aware mobile sensing in vehicular networks. ICNC 2016: 1-5 - [c106]Laurent Yamen Njilla, Patricia Echual, Niki Pissinou, Kia Makki:
A game-theoretic approach on resource allocation with colluding nodes in MANETs. SysCon 2016: 1-8 - 2015
- [j51]Vasanth Iyer, S. S. Iyengar, Niki Pissinou:
Ensemble stream model for data-cleaning in sensor networks. AI Matters 1(4): 29-32 (2015) - [j50]Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastián A. Zanlongo, Bogdan Carbunar, S. Sitharama Iyengar:
In-Network Trajectory Privacy Preservation. ACM Comput. Surv. 48(2): 23:1-23:29 (2015) - [j49]Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar, Kia Makki:
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks. Int. J. Commun. Syst. 28(17): 2180-2196 (2015) - [j48]Mohammad A. Islam, Shaolei Ren, Niki Pissinou, A. Hasan Mahmud, Athanasios V. Vasilakos:
Distributed temperature-aware resource management in virtualized data center. Sustain. Comput. Informatics Syst. 6: 3-16 (2015) - [c105]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Pseudonym-based anonymity zone generation for mobile service with strong adversary model. CCNC 2015: 335-340 - [c104]Laurent Yamen Njilla, Niki Pissinou:
Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. CISDA 2015: 1-6 - 2014
- [c103]Samia Tasnim, Mohammad Ataur Rahman Chowdhury, Kishwar Ahmed, Niki Pissinou, S. Sitharama Iyengar:
Location aware code offloading on mobile cloud with QoS constraint. CCNC 2014: 74-79 - [c102]Ian Michael Terry, Anita Wu, Sebastian Ramirez, Alex Pissinou Makki, Leonardo Bobadilla, Niki Pissinou, S. Sitharama Iyengar, Bogdan Carbunar:
Geofit: Verifiable Fitness Challenges. MASS 2014: 720-724 - 2013
- [j47]Bogdan Carbunar, Mahmudur Rahman, Niki Pissinou:
A survey of privacy vulnerabilities and defenses in geosocial networks. IEEE Commun. Mag. 51(11): 114-119 (2013) - [j46]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches. IEEE Trans. Computers 62(9): 1799-1812 (2013) - [c101]Mohammad A. Islam, Shaolei Ren, Niki Pissinou, A. Hasan Mahmud, Athanasios V. Vasilakos:
Distributed resource management in data center with temperature constraint. IGCC 2013: 1-10 - [c100]Sitthapon Pumpichet, Xinyu Jin, Niki Pissinou:
Sketch-based data recovery in sensor data streams. ICON 2013: 1-6 - [c99]Hao Jin, Tosmate Cheocherngngarn, Dmita Levy, Alex Smith, Deng Pan, Jason Liu, Niki Pissinou:
Joint Host-Network Optimization for Energy-Efficient Data Center Networking. IPDPS 2013: 623-634 - [c98]Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. LCN 2013: 835-842 - [c97]Vasanth Iyer, S. Sitharama Iyengar, Niki Pissinou, Shaolei Ren:
SPOTLESS: Similarity patterns of trajectories in label-less sensor streams. PerCom Workshops 2013: 487-492 - 2012
- [j45]Vinayak Ganapathy, Niki Pissinou, S. Kami Makki, Qutub Bakhtiar Ali:
An epistemic event-based correlation approach for managing pervasive networks. Int. J. Netw. Manag. 22(1): 81-94 (2012) - [j44]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Belief based data cleaning for wireless sensor networks. Wirel. Commun. Mob. Comput. 12(5): 406-419 (2012) - [c96]Hao Jin, Deng Pan, Jing Xu, Niki Pissinou:
Efficient VM placement with multiple deterministic and stochastic resources in data centers. GLOBECOM 2012: 2505-2510 - [c95]Sitthapon Pumpichet, Niki Pissinou, Xinyu Jin, Deng Pan:
Belief-based cleaning in trajectory sensor streams. ICC 2012: 208-212 - [c94]Xinyu Jin, Niki Pissinou, Cody Chesneau, Sitthapon Pumpichet, Deng Pan:
Hiding trajectory on the fly. ICC 2012: 403-407 - [c93]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - [e12]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 262, Springer 2012, ISBN 978-3-642-27203-5 [contents] - [e11]Tai-Hoon Kim, Jeong-Jin Kang, William I. Grosky, Tughrul Arslan, Niki Pissinou:
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City - International Conferences MulGraB, BSBT and IUrC 2012 Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 353, Springer 2012, ISBN 978-3-642-35520-2 [contents] - 2011
- [j43]Kai Chen, Kia Makki, Niki Pissinou:
Machine Learning on Congestion Analysis Based Real-Time Navigation System. Int. J. Artif. Intell. Tools 20(4): 753-781 (2011) - [j42]Garth V. Crosby, Lance Hester, Niki Pissinou:
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. Int. J. Netw. Secur. 12(2): 107-117 (2011) - [c92]Hao Jin, Deng Pan, Niki Pissinou:
Parallel Packet Switch without Segmentation-and-Reassembly. GLOBECOM 2011: 1-5 - [c91]Charles A. Kamhoua, Niki Pissinou, Kia Makki:
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy. ICC 2011: 1-6 - [c90]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow based flow level bandwidth provisioning for CICQ switches. INFOCOM 2011: 476-480 - [c89]Kai Chen, Niki Pissinou, Kia Makki:
Cellular network location estimation via RSS-based data clean enhanced scheme. ISCC 2011: 924-930 - [c88]Kai Chen, Niki Pissinou, Kia Makki:
Fast Normalized Cross-Correlation enhanced floating car data estimation. WOCC 2011: 1-6 - [e10]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 263, Springer 2011, ISBN 978-3-642-27185-4 [contents] - 2010
- [c87]Hao Jin, Deng Pan, Niki Pissinou, Kia Makki:
Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup. GLOBECOM 2010: 1-5 - [c86]Sitthapon Pumpichet, Niki Pissinou:
Virtual Sensor for Mobile Sensor Data Cleaning. GLOBECOM 2010: 1-5 - [c85]Zhuo Sun, Masoumeh Karimi, Deng Pan, Zhenyu Yang, Niki Pissinou:
Buffered Crossbar Based Parallel Packet Switch. GLOBECOM 2010: 1-5 - [c84]Qian Wang, Zesheng Chen, Chao Chen, Niki Pissinou:
On the Robustness of the Botnet Topology Formed by Worm Infection. GLOBECOM 2010: 1-6 - [c83]Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. IPCCC 2010: 315-324 - [c82]Deng Pan, Kia Makki, Niki Pissinou:
Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup. IPDPS 2010: 1-12 - [c81]Charles A. Kamhoua, Niki Pissinou:
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory. LCN 2010: 232-235 - [e9]Tai-Hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Slezak:
Signal Processing and Multimedia - International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 123, Springer 2010, ISBN 978-3-642-17640-1 [contents]
2000 – 2009
- 2009
- [j41]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2): 52-73 (2009) - [j40]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou, Masoumeh Karimi:
On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 1(2): 28-45 (2009) - [j39]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-aware replacement policy for the cache management at the mobile terminal. Wirel. Commun. Mob. Comput. 9(5): 607-629 (2009) - [c80]Deng Pan, Kia Makki, Niki Pissinou:
Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. GLOBECOM 2009: 1-6 - [c79]Deng Pan, Zhenyu Yang, Kia Makki, Niki Pissinou:
Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. QSHINE 2009: 297-314 - [c78]Kai Chen, Kia Makki, Niki Pissinou:
A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. VTC Fall 2009 - 2008
- [j38]Xiangqian Chen, Kia Makki, Kang K. Yen, Niki Pissinou:
Attack Distribution Modeling and Its Applications in Sensor Network Security. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c77]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Estimated replication of data in wireless sensor networks. COMSWARE 2008: 107-110 - [c76]Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou:
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. EUC (2) 2008: 549-552 - [c75]Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, Chao Chen:
Inferring Internet Worm Temporal Characteristics. GLOBECOM 2008: 2007-2012 - [c74]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Self-organized forensic support in MANETs. IPDPS 2008: 1-8 - [c73]Bakhtiar Qutub Ali, Niki Pissinou, Kia Makki:
Approximate replication of data using adaptive filters in Wireless Sensor Networks. ISWPC 2008: 365-369 - [c72]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu:
A proactive secure routing algorithm defense against node compromise in sensor networks. LCN 2008: 557-559 - [c71]Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Niki Pissinou:
On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. WCNC 2008: 1905-1910 - [c70]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. WCNC 2008: 2224-2228 - 2007
- [j37]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware cache structure for mobile computing environments. J. Syst. Softw. 80(7): 1102-1119 (2007) - [j36]Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, S. Kami Makki, Niki Pissinou:
Maximizing lifetime of sensor surveillance systems. IEEE/ACM Trans. Netw. 15(2): 334-345 (2007) - [c69]Xiwei Zhao, Niki Pissinou, S. Kami Makki:
The Optimization of Location Management. CCNC 2007: 380-384 - [c68]Niki Pissinou, Garth V. Crosby:
Cluster-Based Reputation and Trust for Wireless Sensor Networks. CCNC 2007: 604-608 - [c67]Yu Dong, Niki Pissinou, Jian Wang:
Concurrency Handling in TCP. CNSR 2007: 255-262 - [c66]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Revisiting Global Time Synchronization. GLOBECOM 2007: 1058-1063 - [c65]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. ICN 2007: 56 - [c64]James D. Gadze, Niki Pissinou, Kia Makki:
Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. ICNSC 2007: 644-649 - [c63]Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:
Fuzzy Belief Reasoning for Intrusion Detection Design. IIH-MSP 2007: 621-624 - [c62]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Node Compromise Modeling and its Applications in Sensor Networks. ISCC 2007: 575-582 - [c61]James D. Gadze, Niki Pissinou, Kia Makki, Garth V. Crosby:
On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment. ISWCS 2007: 809-813 - [c60]Garth V. Crosby, Niki Pissinou:
Evolution of Cooperation in Multi-Class Wireless Sensor Networks. LCN 2007: 489-495 - [c59]Te-Shun Chou, Kang K. Yen, Liwei An, Niki Pissinou, Kia Makki:
Fuzzy belief pattern classification of incomplete data. SMC 2007: 535-540 - [c58]Chunming Liu, Chi Zhou, Niki Pissinou, Kia Makki:
Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks. WCNC 2007: 3341-3346 - 2006
- [j35]Scott C.-H. Huang, Kia Makki, Niki Pissinou:
On Optimizing Compatible Security Policies in Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [c57]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware prefetching strategy for mobile computing environments. IWCMC 2006: 1109-1116 - [c56]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks. MobiQuitous 2006: 1-8 - [c55]Xiwei Zhao, S. Kami Makki, Niki Pissinou:
An Efficient and Robust Routing Protocol for Data Aggregation. WASA 2006: 175-186 - [c54]Scott C.-H. Huang, Shamila Makki, Niki Pissinou:
Accusation Resolution Using Security Metrology. WASA 2006: 435-444 - [c53]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-prediction replacement strategy for mobile computing environments. WCNC 2006: 2252-2260 - 2005
- [j34]Tirthankar Ghosh, Niki Pissinou, S. Kami Makki:
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mob. Networks Appl. 10(6): 985-995 (2005) - [c52]Hai Liu, Peng-Jun Wan, Chih-Wei Yi, Xiaohua Jia, S. A. M. Makki, Niki Pissinou:
Maximal lifetime scheduling in sensor surveillance networks. INFOCOM 2005: 2482-2491 - 2004
- [c51]Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427- - [c50]Shamila Makki, Niki Pissinou, Tirthankar Bhowmick:
LEACH Protocol for Assigning Cluster-Heads Using a Deterministic and Stochastic Approach for Wireless Sensor Networks. International Conference on Wireless Networks 2004: 963-968 - [c49]S. A. M. Makki, Niki Pissinou, Saurabh D. Agrawal:
A Framework For Policy Based Coordinated Adaptation in Mobile Systems. International Conference on Wireless Networks 2004: 969-974 - [c48]Shamila Makki, Niki Pissinou, Sachin Vitthal Khare:
Simulation of Wireless Sensor Networks Based on Energy Aware Routing Approach. International Conference on Wireless Networks 2004: 982- - [c47]Niki Pissinou, Tirthankar Ghosh, Kia Makki:
Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. NETWORKING 2004: 1446-1451 - [c46]Chi Zhou, Dayou Qian, Niki Pissinou, Kia Makki:
Resource allocation based on pricing for wireless multimedia networks. WCNC 2004: 477-482 - 2003
- [j33]Niki Pissinou, Kia Makki, Birgitta König-Ries:
Mobile users in heterogeneous environments with middleware platform. Comput. Commun. 26(7): 700-707 (2003) - [j32]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
Mobile and wireless Internet access. Comput. Commun. 26(7): 734-746 (2003) - [j31]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
LEO satellite communication networks - a routing approach. Wirel. Commun. Mob. Comput. 3(3): 385-395 (2003) - [c45]S. A. M. Makki, Niki Pissinou, Ravi Kailat:
Optimal Wavelength Conversion Degree in an All-Optical Network. Communications in Computing 2003: 176-180 - [c44]S. A. M. Makki, Niki Pissinou, Tirthankar Ghosh, Amit Deshpande:
Study of Network Performance in a Simulated Network for Optimized Node Degree and Network Cost. International Conference on Internet Computing 2003: 747-752 - [c43]Niki Pissinou, Kia Makki, Abhay Doshi:
Ad Hoc Wireless Network Fault/Configuration Management. International Conference on Wireless Networks 2003: 139-145 - [c42]Niki Pissinou, Ramon B. Mejia, S. A. M. Makki:
Provisioning an Interactive DVB Satellite Return Channel. International Conference on Wireless Networks 2003: 262-268 - [c41]Kia Makki, Niki Pissinou, Jaydeep Punde, Kang Yen:
Predictive Routing Extensions to AODV to Support Quality of Service. International Conference on Wireless Networks 2003: 343-349 - [c40]Jaydeep Punde, Niki Pissinou, Kia Makki:
On Quality Of Service Routing in Ad-Hoc Networks. LCN 2003: 276-278 - 2002
- [j30]Wei Wayne Li, Kia Makki, Niki Pissinou:
Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls. Comput. Commun. 25(5): 507-515 (2002) - [j29]Gang Feng, Kia Makki, Niki Pissinou:
Efficient implementations of a delay-constrained least-cost multicast algorithm. J. Commun. Networks 4(3): 246-255 (2002) - [j28]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Ouri Wolfson:
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems. SIGMOD Rec. 31(2): 73-79 (2002) - [c39]S. A. M. Makki, Niki Pissinou, S. Kouzalis:
On Routing algorithms in Ad-hoc Networks. International Conference on Internet Computing 2002: 983-990 - [c38]Gang Feng, Christos Douligeris, Sam Kami Makki, Niki Pissinou:
Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation. ICC 2002: 2273-2278 - [c37]Gang Feng, Kia Mao, Niki Pissinou:
Efficient implementations of bounded shortest multicast algorithm. ICCCN 2002: 312-317 - [e8]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Niki Pissinou, Peter Scheuermann:
Developing an Infrastructure for Mobile and Wireless Systems, NSF Workshop IMWS 2001, Scottsdale, AZ, USA, October 15, 2001, Revised Papers. Lecture Notes in Computer Science 2538, Springer 2002, ISBN 3-540-00289-8 [contents] - 2001
- [j27]E. K. Park, Kia Makki, Niki Pissinou, Sujeet Bambawale:
Secure data networking for enterprises. ACIS Int. J. Comput. Inf. Sci. 2(1): 17-23 (2001) - [j26]Niki Pissinou, Ivan Radev, Kia Makki:
Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems. GeoInformatica 5(4): 375-409 (2001) - [j25]Xiaohua Jia, Yongbing Zhang, Niki Pissinou, Sam Makki:
An integrated routing and admission control mechanism for real-time multicast connection establishment. Int. J. Commun. Syst. 14(3): 287-303 (2001) - [j24]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell:
Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems. IEEE Trans. Knowl. Data Eng. 13(6): 1033-1040 (2001) - [c36]Luo Li, Birgitta König-Ries, Niki Pissinou, Kia Makki:
Strategies for Semantic Caching. DEXA 2001: 284-298 - [c35]Gang Feng, Kia Makki, Niki Pissinou, Christos Douligeris:
An efficient approximate algorithm for delay-cost-constrained QoS routing. ICCCN 2001: 395-400 - [c34]S. A. M. Makki, Niki Pissinou, Philippe Daroux:
A new routing algorithm for low Earth orbit satellite networks. ICCCN 2001: 555-561 - [c33]Birgitta König-Ries, Kia Makki, S. A. M. Makki, Charles E. Perkins, Niki Pissinou, Peter L. Reiher, Peter Scheuermann, Jari Veijalainen, Alexander L. Wolf, Ouri Wolfson:
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona. Infrastructure for Mobile and Wireless Systems 2001: 1-37 - 2000
- [j23]Kia Makki, J. Broussard, Niki Pissinou:
On optical communications networks and wideband network architecture. Comput. Commun. 23(10): 901-911 (2000) - [j22]Niki Pissinou, Catalin Dunu, Kia Makki:
A new framework for handling mobile clients in a client-server database system. Comput. Commun. 23(10): 936-941 (2000) - [j21]W. Melody Moh, Madhavi Hegde, Niki Pissinou:
Evaluation of congestion control protocols for ABR traffic over ATM networks. Int. J. Commun. Syst. 13(1): 1-28 (2000) - [j20]Kia Makki, John Dell, Niki Pissinou, W. Melody Moh, Xiaohua Jia:
Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues. J. Supercomput. 16(1-2): 117-132 (2000) - [c32]Kia Makki, Niki Pissinou, Sujeet Bambawale:
The secure model for enterprise connectivity. ICCCN 2000: 176-182 - [c31]Niki Pissinou, Bhagyavati, Kia Makki:
Mobile Agents to Automate Fault Management in Wireless and Mobile Networks. IPDPS Workshops 2000: 1296-1300 - [c30]Niki Pissinou, Kia Makki, Birgitta König-Ries:
A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments. RIDE 2000: 63-70 - [c29]Ivan Radev, George Paschos, Niki Pissinou, Kia Makki:
Video Content Representation Based on Texture and Lighting. VISUAL 2000: 457-466 - [c28]Wei Li, Kia Makki, Niki Pissinou:
Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls. WCNC 2000: 845-849 - [c27]Lionel Robert, Niki Pissinou, Sam Makki:
Third generation wireless network: the integration of GSM and Mobile IP. WCNC 2000: 1291-1296 - [c26]Sam Makki, Niki Pissinou, Philippe Daroux, E. Sardaby:
On fundamental issues in mobile and wireless Internet. WCNC 2000: 1297-1302 - [c25]Sam Makki, Kia Makki, Niki Pissinou, Ashwin Gumaste:
A hybrid method to cellular traffic using optic beam interconnects. WCNC 2000: 1303-1305 - [e7]Ki-Joune Li, Kia Makki, Niki Pissinou, Siva Ravada:
ACM-GIS 2000, Proceedings of the Eighth ACM Symposium on Advances in Geographic Information Systems, November 10-11, 2000, Washington D.C., USA. ACM 2000, ISBN 1-58113-319-7 [contents]
1990 – 1999
- 1999
- [j19]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki:
A Distributed Multicast Routing Protocol for Real-Time Multicast Applications. Comput. Networks 31(1-2): 101-110 (1999) - [j18]Kia Makki, Niki Pissinou:
Efficient detection and resolution of deadlocks in distributed databases. Comput. Commun. 22(7): 637-643 (1999) - [j17]Niki Pissinou, Kia Makki, William J. Campbell:
On the design of a location and query management strategy for mobile and wireless environments. Comput. Commun. 22(7): 651-666 (1999) - [c24]Ivan Radev, Niki Pissinou, Kia Makki, E. K. Park:
Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data. CIKM 1999: 522-530 - [c23]Wei Li, Kia Makki, Niki Pissinou, Eun Kyo Park, Xiaohua Jia:
Performance analysis of a PCS network with state-dependent calls arrival processes and impatient calls. ICCCN 1999: 494-499 - 1998
- [j16]Xiaohua Jia, Kia Makki, Niki Pissinou, Weijia Jia:
Group Channel Routing for Conferencing Systems in Wide Area Networks. Inf. Sci. 107(1-4): 217-232 (1998) - [c22]Caroline St. Clair, Chengwen Liu, Niki Pissinou:
Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process. CIKM 1998: 259-266 - [c21]Xiaohua Jia, Yanchun Zhang, Niki Pissinou, Kia Makki:
An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks. ICCCN 1998: 865-873 - [c20]Niki Pissinou, Ivan Radev, Kia Makki, William J. Campbell:
A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects. RIDE 1998: 17-24 - [e6]Georges Gardarin, James C. French, Niki Pissinou, Kia Makki, Luc Bouganim:
Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, Bethesda, Maryland, USA, November 3-7, 1998. ACM 1998, ISBN 1-58113-061-9 [contents] - [e5]Robert Laurini, Kia Makki, Niki Pissinou:
ACM-GIS '98, Proceedings of the 6th international symposium on Advances in Geographic Information Systems, November 6-7, 1998, Washington, DC, USA. ACM 1998 [contents] - 1997
- [j15]Xiaohua Jia, Niki Pissinou, Kia Makki:
A real-time multicast routing algorithm for multimedia applications. Comput. Commun. 20(12): 1098-1106 (1997) - [j14]Niki Pissinou, Kia Makki, Ravi Krishnamurthy:
An ECA Object Service to Support Active Distributed Objects. Inf. Sci. 100(1-4): 63-104 (1997) - [j13]Kia Makki, Niki Pissinou:
Protocols for Mobile Environments - Editorial. Mob. Networks Appl. 2(3): 225-226 (1997) - [j12]Xiaohua Jia, Kia Makki, Niki Pissinou:
Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications. Simul. 68(1): 44-55 (1997) - [c19]Niki Pissinou, Kia Makki, Mei Hong, Lusheng Ji, Ashok Kumar:
An Agent-Based Mobile System. ER 1997: 361-374 - [c18]Xiaohua Jia, Niki Pissinou, Kia Makki:
A distributed algorithm of delay bounded multicast routing for multimedia applications. ICCCN 1997: 208-213 - [c17]John Dell, Kia Makki, Niki Pissinou, Wuxu Peng:
Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems. PDPTA 1997: 1229-1238 - 1996
- [j11]Wei Liu, E. K. Park, Niki Pissinou:
Encapsulation of ATM cell connections. Comput. Commun. 19(8): 623-627 (1996) - [j10]Xiaohua Jia, C. H. Lee, Kia Makki, Niki Pissinou:
Efficient multicast tree algorithm in ATM networks. Comput. Commun. 19(8): 637-644 (1996) - [j9]Kia Makki, Niki Pissinou, Ophir Frieder:
Efficient Solutions to Multicast Routing in Communication Networks. Mob. Networks Appl. 1(2): 221-232 (1996) - [c16]Niki Pissinou, Kia Makki, E. K. Park, Z. Hu, W. Wong:
An Efficient Distributed Mutual Exclusion Algorithm. ICPP, Vol. 1 1996: 196-203 - [c15]Niki Pissinou, B. K. Rajashekhar, Kia Makki, Kanonkluk Vanapipat:
A Framework for Building Distributed Dynamic Applications. ICPP, Vol. 1 1996: 275-278 - [c14]Niki Pissinou, Kanonkluk Vanapipat, Kia Makki, B. K. Rajashekhar, Eun Kyo Park, B. Wong, Xiaohua Jia:
A framework for modeling applications as distributed active objects. SPDP 1996: 68-72 - [e4]Robert Laurini, Patrick Bergougnoux, Kia Makki, Niki Pissinou:
GIS '96, Proceedings of the fourth ACM workshop on Advances on Advances in Geographic Information Systems, November 15-16, 1996, Rockville, Maryland, USA. ACM 1996, ISBN 0-89791-874-6 [contents] - 1995
- [j8]Niki Pissinou, Vijay V. Raghavan, Kanonkluk Vanapipat:
RIMM: A Reactive Integration Multidatabase Model. Informatica (Slovenia) 19(2) (1995) - [c13]Kia Makki, Niki Pissinou:
Detection and Resolution of Deadlocks in Distributed Database Systems. CIKM 1995: 411-416 - [c12]Kanonkluk Vanapipat, Niki Pissinou, Vijay V. Raghavan:
A Dynamic Framework to Actively Support Interoperability in Multidatabase Systems. RIDE-DOM 1995: 148-153 - [e3]Niki Pissinou, Avi Silberschatz, E. K. Park, Kia Makki:
CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28 - December 2, 1995, Baltimore, Maryland, USA. ACM 1995, ISBN 0-89791-812-6 [contents] - [e2]Patrick Bergougnoux, Kia Makki, Niki Pissinou:
Proceedings of the 3rd ACM International Workshop on Advances in Geographic Information Systems, Baltimore, Maryland, USA, December 1-2, 1995, in conjunction with CIKM 1995. ACM 1995 [contents] - 1994
- [j7]Kia Makki, Ken Been, Niki Pissinou:
A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems. Int. J. Comput. Simul. 4(1): 65-88 (1994) - [j6]Kia Makki, Niki Pissinou:
A new storage organization for temporal data bases. J. Syst. Softw. 27(3): 159-169 (1994) - [j5]Niki Pissinou, Kia Makki:
A coherent architecture for a temporal object data base management system. J. Syst. Softw. 27(3): 195-205 (1994) - [j4]Niki Pissinou, Richard T. Snodgrass, Ramez Elmasri, Inderpal Singh Mumick, M. Tamer Özsu, Barbara Pernici, Arie Segev, Babis Theodoulidis, Umeshwar Dayal:
Towards an Infrastructure for Temporal Databases: Report of an Invitational ARPA/NSF Workshop. SIGMOD Rec. 23(1): 35-51 (1994) - [c11]Niki Pissinou, Kia Makki, E. K. Park:
Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models. CIKM 1994: 280-287 - [c10]Kia Makki, Niki Pissinou, E. K. Park:
An Efficient Solution To The Critical Section Problem In Distributed Systems. ICPP (2) 1994: 77-80 - [c9]Suresh K. Damodaran-Kamal, Joan M. Francioni, Niki Pissinou:
A Modeling Paradigm for Multidatabases. ICPP (3) 1994: 247-250 - [c8]Niki Pissinou, Kia Makki:
On the Representation of Temporal Object Roles in Object Oriented Databases. TIME 1994: 165-172 - [e1]Niki Pissinou, Kia Makki:
Proceedings of the Second ACM Workshop on Advances in Geographic Information Systems, ACM-GIS 1994, Gaithersburg, MD, USA. ACM 1994, ISBN 0-89791-750-2 [contents] - 1993
- [j3]Niki Pissinou, Kia Makki:
A Unified Model and Methodology for Temporal Object Databases. Int. J. Cooperative Inf. Syst. 2(2): 201-224 (1993) - [j2]Kia Makki, Niki Pissinou, Yelena Yesha:
An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm. Informatica (Slovenia) 17(3) (1993) - [j1]Niki Pissinou, Kia Makki, Yelena Yesha:
On Temporal Modeling in the Context of Object Databases. SIGMOD Rec. 22(3): 8-15 (1993) - [c7]Niki Pissinou, Kia Makki:
Separating Semantics from Representation in a Temporal Object Database Domain. CIKM 1993: 295-304 - [c6]Niki Pissinou, Kia Makki, E. K. Park:
Towards the Design and Development of a New Model for Geographic Information Systems. CIKM 1993: 565-573 - [c5]Kia Makki, Ken Been, Niki Pissinou:
A Parallel Algorithm for the Steiner Tree Problem. ICCI 1993: 380-384 - 1992
- [c4]Niki Pissinou, Kia Makki:
A Framework for Temporal Object Databases. CIKM 1992: 86-97 - [c3]Kia Makki, Niki Pissinou:
The Steiner tree problem with minimum number of vertices in graphs. Great Lakes Symposium on VLSI 1992: 204-206 - [c2]Kia Makki, Paul Banta, Ken Been, Niki Pissinou:
On Algorithms for Mutual Exclusion in Distributed Systems. ICPP (2) 1992: 149-152 - [c1]Kia Makki, Paul Banta, Ken Been, Niki Pissinou, E. K. Park:
A Token Based Distributed K Mutual Exclusion Algorithm. SPDP 1992: 408-411
Coauthor Index
aka: Shamila Makki
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint