Folgen
Alessandro Mei
Alessandro Mei
Professor of Computer Science, Sapienza University
Bestätigte E-Mail-Adresse bei di.uniroma1.it
Titel
Zitiert von
Zitiert von
Jahr
To offload or not to offload? the bandwidth and energy costs of mobile cloud computing
MV Barbera, S Kosta, A Mei, J Stefa
2013 Proceedings Ieee Infocom, 1285-1293, 2013
5112013
Random key-assignment for secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
4162003
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
3062007
SWIM: A simple model to generate small mobile worlds
A Mei, J Stefa
IEEE INFOCOM 2009, 2106-2113, 2009
2892009
Distributed detection of clone attacks in wireless sensor networks
M Conti, R Di Pietro, L Mancini, A Mei
IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010
2472010
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study
E Baccarelli, N Cordeschi, A Mei, M Panella, M Shojafar, J Stefa
IEEE network 30 (2), 54-61, 2016
2412016
Social-aware stateless forwarding in pocket switched networks
A Mei, G Morabito, P Santi, J Stefa
2011 Proceedings IEEE INFOCOM, 251-255, 2011
2342011
Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons
D Dubhashi, A Mei, A Panconesi, J Radhakrishnan, A Srinivasan
Journal of Computer and System Sciences 71 (4), 467-479, 2005
2032005
Signals from the crowd: uncovering social relationships through smartphone probes
MV Barbera, A Epasto, A Mei, VC Perta, J Stefa
Proceedings of the 2013 conference on Internet measurement conference, 265-276, 2013
1792013
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
M Conti, R Di Pietro, LV Mancini, A Mei
Proceedings of the first ACM conference on Wireless network security, 214-219, 2008
1512008
Give2get: Forwarding in social mobile wireless networks of selfish individuals
A Mei, J Stefa
IEEE Transactions on Dependable and Secure Computing 9 (4), 569-582, 2012
1502012
Redoubtable sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008
1142008
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
RD Pietro, LV Mancini, A Mei
Wireless Networks 12 (6), 709-721, 2006
1112006
Secure dynamic fragment and replica allocation in large-scale distributed file systems
A Mei, LV Mancini, S Jajodia
IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003
1102003
Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking
S Kosta, A Mei, J Stefa
2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2010
1072010
Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests
A Di Luzio, A Mei, J Stefa
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
982016
Efficient and resilient key discovery based on pseudo-random key pre-deployment
R Di Pietro, LV Mancini, A Mei
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
872004
Connectivity properties of secure wireless sensor networks
R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
862004
A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients
VC Perta, M Barbera, G Tyson, H Haddadi, A Mei
822015
String matching on multicontext FPGAs using self-reconfiguration
RPS Sidhu, A Mei, VK Prasanna
Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999
781999
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20