Douglas M. Blough

Affiliations: 
1988-1999 ECE University of California, Irvine, Irvine, CA 
 1999- ECE Georgia Institute of Technology, Atlanta, GA 
Area:
wireless networks, distributed systems
Google:
"Douglas Blough"

Children

Sign in to add trainee
Honge Wang grad student 2000 UC Irvine
Apurva Mohan grad student 2007-2011
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ge M, Blough DM. (2018) High Throughput and Fair Scheduling for Multi-AP Multiuser MIMO in Dense Wireless Networks Ieee/Acm Transactions On Networking. 26: 2414-2427
Cortes-Pena LM, Barry JR, Blough DM. (2015) Jointly optimizing stream allocation, beamforming and combining weights for the MIMO interference channel Ieee Transactions On Wireless Communications. 14: 2245-2256
Brown J, Blough DM. (2015) Distributed enforcement of sticky policies with flexible trust Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1202-1209
Blough DM, Santi P, Srinivasan R. (2014) On the feasibility of unilateral interference cancellation in MIMO networks Ieee/Acm Transactions On Networking. 22: 1831-1844
Mohan A, Blough DM, Kurc T, et al. (2012) Detection of Conflicts and Inconsistencies in Taxonomy-based Authorization Policies. Proceedings. Ieee International Conference On Bioinformatics and Biomedicine. 2011: 590-594
Harvesf C, Blough DM. (2011) Replica placement for route diversity in tree-based routing distributed hash tables Ieee Transactions On Dependable and Secure Computing. 8: 419-433
Mohan A, Blough DM. (2010) An attribute-based authorization policy framework with dynamic conflict resolution Acm International Conference Proceeding Series. 37-50
Blough DM, Resta G, Santi P. (2010) Approximation algorithms for wireless link scheduling with SINR-based interference Ieee/Acm Transactions On Networking. 18: 1701-1712
Paci F, Bauer D, Bertino E, et al. (2009) Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239
Parameswaran R, Blough DM. (2008) Privacy preserving data obfuscation for inherently clustered data International Journal of Information and Computer Security. 2: 4
See more...