• Publications
  • Influence
Real-time dynamic voltage scaling for low-power embedded operating systems
In recent years, there has been a rapid and wide spread of non-traditional computing platforms, especially mobile and portable computing devices. Expand
  • 1,199
  • 134
  • PDF
Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks
  • Hyoil Kim, K. Shin
  • Computer Science
  • IEEE Transactions on Mobile Computing
  • 1 May 2008
Sensing/monitoring of spectrum-availability has been identified as a key requirement for dynamic spectrum allocation in cognitive radio networks (CRNs). Expand
  • 814
  • 78
  • PDF
Minimum-time control of robotic manipulators with geometric path constraints
Conventionally, robot control algorithms are divided into two stages, namely, path or trajectory planning and path tracking (or path control). This division has been adopted mainly as a means ofExpand
  • 959
  • 68
  • PDF
Goodput Analysis and Link Adaptation for IEEE 802.11a Wireless LANs
In this paper, we present a generic method to analyze the goodput performance of an 802.11a system under the distributed coordination function (DCF) and express the expected effective goodput as a closed-form function of the data payload length, the frame retry count, the wireless channel condition, and the selected data transmission rate. Expand
  • 619
  • 54
  • PDF
The BLUE active queue management algorithms
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the ietf has been considering the deployment of active queue management techniques such as Red, which use packet loss and link idle events to manage congestion. Expand
  • 560
  • 53
  • PDF
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
We propose an anomaly-based intrusion detection system (IDS), called Clock-based IDS (CIDS). Expand
  • 220
  • 51
  • PDF
A self-configuring RED gateway
In this paper, we first show that the effectiveness of RED depends, to a large extent, on the appropriate parameterization of the RED queue. Expand
  • 586
  • 45
Automated control of multiple virtualized resources
We present AutoControl, a resource control system that automatically adapts to dynamic workload changes to achieve application SLOs. Expand
  • 538
  • 40
  • PDF
Detecting SYN flooding attacks
We propose a simple and robust mechanism for detecting SYN flooding attacks. Expand
  • 658
  • 37
  • PDF
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
We use feedback control theory to achieve overload protection, performance guarantees, and service differentiation in the presence of load unpredictability. Expand
  • 633
  • 33
  • PDF