• Publications
  • Influence
Cognitive radio: making software radios more personal
With RKRL, cognitive radio agents may actively manipulate the protocol stack to adapt known etiquettes to better satisfy the user's needs and transforms radio nodes from blind executors of predefined protocols to radio-domain-aware intelligent agents that search out ways to deliver the services the user wants even if that user does not know how to obtain them. Expand
IP-Based Protocols for Mobile Internetworking
This work presents protocols that seamlessly integrate mobile hosts into the current IP networking infrastructure, primarily targeted at supporting a campus environment with mobile computers, but also extend gracefully to accomodate hosts moving between different networks. Expand
Metron: NFV Service Chains at the True Speed of the Underlying Hardware
In this paper we present Metron, a Network Functions Virtualization (NFV) platform that achieves high resource utilization by jointly exploiting the underlying network and commodity servers’ resourExpand
A class of mobile motion prediction algorithms for wireless mobile computing and communications
A class of mobile motion prediction algorithms predicts the “future” location of a mobile user according to the user's movement history, i.e., previous movement patterns, so that the user can immediately receive service or data with virtually the same efficiency as at the previous location. Expand
MIPMANET: mobile IP for mobile ad hoc networks
MIPMANET provides Internet access by using Mobile IP with foreign agent care-of addresses and reverse tunneling and shows that the ability to choose the closest access point to the Internet is worth extra work, as less traffic is generated in the network resulting in lower delays and fewer dropped packets. Expand
Comparison and evaluation of retrospective intermodality image registration techniques
A prospective method based on fiducial markers is used as a 'gold standard' to perform an objective, blinded evaluation of the accuracy of several retrospective image-to-image registration techniques. Expand
SNF: Synthesizing high performance NFV service chains
In this paperwe introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layerExpand
IP-based protocols for mobile internetworking
This paper explores the concept of providing continuous network access to mobile computers, and presents a set of IP-based protocols that achieve that goal, primarily targeted at supporting a campus environment with mobile computers but also extend gracefully to accommodate hosts moving between different networks. Expand
Positive Patient Identification using RFID and Wireless Networks
The increased focus on patient safety in hospitals has yielded a flood of new technologies and tools seeking to improve the quality of patient care at the point-of-care. Hospitals are complex instiExpand
A new CT method for measuring cup orientation after total hip arthroplastyA study of 10 patients
It is concluded that the implant angles of the acetabular component in relation to the pelvis could be detected repeatedly using CT, independently of patient positioning. Expand