Skip to main content
""Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the... more
    • by 
    •   11  
      Electrical EngineeringComputer ScienceComputer EngineeringComputer Networks
Internet Protocol Television (IPTV) and Voice over Internet Protocol (VoIP) have gained unprecedented growth rates in the past few years. Data rate and high coverage area of IEEE 802.11n motivate the concept of combined IPTV and VoIP over... more
    • by 
    •   12  
      Electrical EngineeringSoftware EngineeringComputer EngineeringComputer Networks
In this paper we study the time evolution of academic collaboration networks by predicting the appearance of new links between authors. The accurate prediction of new collaborations between members of a collaboration network can help... more
    • by  and +2
    •   10  
      Electrical EngineeringComputer ScienceSocial Research Methods and MethodologySocial Networks
"Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of... more
    • by 
    • Computer Networks
The breach of privacy in encrypted instant messenger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advantage of... more
    • by  and +1
    •   15  
      Information SystemsProbability TheoryComputer ScienceInformation Technology
Tremendous growth rates of Internet Protocol Television (IPTV) and Voice over Internet Protocol (VoIP) have demanded the shift of paradigm from wired to wireless applications. Increased packet loss with continuously varying wireless... more
    • by 
    •   9  
      Electrical EngineeringComputer ScienceComputer EngineeringComputer Networks
The identification of encrypted Instant Messaging (IM) channels between users is made difficult by the presence of variable and high levels of uncorrelated background traffic. In this paper, we propose a novel Cross-correlation Outlier... more
    • by  and +2
    •   12  
      Information SystemsProbability TheoryComputer ScienceComputer Security And Reliability
The identification of encrypted Instant Messaging (IM) channels between users is made difficult by the presence of variable and high levels of uncorrelated background traffic. In this paper, we propose a novel Cross-correlation Outlier... more
    • by  and +1
The breach of privacy in encrypted instant messenger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advantage of... more
    • by  and +3
In this paper we study the time evolution of academic collaboration networks by predicting the appearance of new links between authors. The accurate prediction of new collaborations between members of a collaboration network can help... more
    • by  and +4
The popular uprisings in a number of countries in the Middle East and North Africa in the Spring of 2011 were broadcasted live and enabled by local populations' access to social networking services such as Twitter and Facebook. The goal... more
    • by  and +2
    •   10  
      Information SystemsComputer ScienceInformation ScienceArtificial Intelligence
This paper addresses the problem of sentiment classification of short messages on microblogging platforms. We apply machine learning and pattern recognition techniques to design and implement a classification system for microblog messages... more
    • by  and +3
    •   11  
      Information SystemsElectrical EngineeringComputer ScienceInformation Retrieval
OpenFlow enabled networks split and separate the data and control planes of traditional networks. This design com-modifies network switches and enables centralized control of the network. Control decisions are made by an OpenFlow... more
    • by  and +3
    •   10  
      EngineeringElectrical EngineeringComputer ScienceSoftware Engineering
Software defined networks (SDNs) introduced the concept of decoupling control and data planes which is a paradigm shift. The OpenFlow protocol is one of a number of technologies that enables this decoupling and, in effect, commodifies... more
    • by  and +3
    •   12  
      EngineeringElectrical EngineeringComputer ScienceSoftware Engineering
Every day 645 million Twitter users generate approximately 58 million tweets. This motivates the question if it is possible to generate a summary of events from this rich set of tweets only. Key challenges in post summarization from... more
    • by  and +1
    •   7  
      EngineeringComputer ScienceHuman Computer InteractionSocial Networks
The broadcast nature of communication channels in infrastructureless wireless networks poses challenges to security. In this paper, we propose a novel technique namely Secure Multi-channel Group Key Generation (MuGKeG) algorithm. We... more
    • by  and +1
    •   11  
      Electrical EngineeringInformation SecurityWireless Mesh NetworksWireless Sensor Network Security
Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In this survey paper, we summarize, analyze, classify and... more
    • by  and +1
    •   8  
      Electrical EngineeringComputer ScienceComputer ArchitectureInformation Security
The Internet relies heavily on programmable matchaction processors for matching network packets against locally available network rules and taking actions, such as forwarding and modification of network packets. This match-action process... more
    • by 
    •   4  
      Computer NetworksNanotechnologyData Communication and Computer NetworksSoftware defined networking
Match-action processors play a crucial role of communicating end-users in the Internet by computing network paths and enforcing administrator policies. The computation process uses a specialized memory called Ternary Content Addressable... more
    • by 
    •   3  
      Computer NetworksNanotechnologySoftware Defined Networks (SDN)
The high performance requirements of nowadays computer networks are limiting their ability to support important requirements of the future. Two important properties essential in assuring cost-efficient computer networks and supporting new... more
    • by 
    •   4  
      Computer NetworksNetwork Protocols and ArchitecturesCognitive NetworksNeuromorphic Computing