Douglas M. Blough
Affiliations: | 1988-1999 | ECE | University of California, Irvine, Irvine, CA |
1999- | ECE | Georgia Institute of Technology, Atlanta, GA |
Area:
wireless networks, distributed systemsGoogle:
"Douglas Blough"Children
Sign in to add traineeHonge Wang | grad student | 2000 | UC Irvine |
Apurva Mohan | grad student | 2007-2011 |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Ge M, Blough DM. (2018) High Throughput and Fair Scheduling for Multi-AP Multiuser MIMO in Dense Wireless Networks Ieee/Acm Transactions On Networking. 26: 2414-2427 |
Cortes-Pena LM, Barry JR, Blough DM. (2015) Jointly optimizing stream allocation, beamforming and combining weights for the MIMO interference channel Ieee Transactions On Wireless Communications. 14: 2245-2256 |
Brown J, Blough DM. (2015) Distributed enforcement of sticky policies with flexible trust Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1202-1209 |
Blough DM, Santi P, Srinivasan R. (2014) On the feasibility of unilateral interference cancellation in MIMO networks Ieee/Acm Transactions On Networking. 22: 1831-1844 |
Mohan A, Blough DM, Kurc T, et al. (2012) Detection of Conflicts and Inconsistencies in Taxonomy-based Authorization Policies. Proceedings. Ieee International Conference On Bioinformatics and Biomedicine. 2011: 590-594 |
Harvesf C, Blough DM. (2011) Replica placement for route diversity in tree-based routing distributed hash tables Ieee Transactions On Dependable and Secure Computing. 8: 419-433 |
Mohan A, Blough DM. (2010) An attribute-based authorization policy framework with dynamic conflict resolution Acm International Conference Proceeding Series. 37-50 |
Blough DM, Resta G, Santi P. (2010) Approximation algorithms for wireless link scheduling with SINR-based interference Ieee/Acm Transactions On Networking. 18: 1701-1712 |
Paci F, Bauer D, Bertino E, et al. (2009) Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239 |
Parameswaran R, Blough DM. (2008) Privacy preserving data obfuscation for inherently clustered data International Journal of Information and Computer Security. 2: 4 |