Brian D. Noble
Affiliations: | University of Michigan, Ann Arbor, Ann Arbor, MI |
Area:
Electronics and Electrical Engineering, Computer ScienceGoogle:
"Brian Noble"Children
Sign in to add traineeMark D. Corner | grad student | 2003 | University of Michigan |
Thomas J. Hacker | grad student | 2004 | University of Michigan |
Minkyong Kim | grad student | 2004 | University of Michigan |
Landon P. Cox | grad student | 2005 | University of Michigan |
Jungkeun Yoon | grad student | 2007 | University of Michigan |
Anthony J. Nicholson | grad student | 2008 | University of Michigan |
Samir Shah | grad student | 2009 | University of Michigan |
Azarias M. Reda | grad student | 2012 | University of Michigan |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Prasad KV, Hodges S, Noble B. (2016) Smart Vehicle Spaces [Guest Editorial] Ieee Pervasive Computing. 15: 19-21 |
Xu Y, Musgrave Z, Noble B, et al. (2014) Workload-aware provisioning in public clouds Ieee Internet Computing. 18: 15-21 |
Schmidt A, Paradiso J, Noble B. (2011) Automotive pervasive computing Ieee Pervasive Computing. 10: 12-13 |
Veeraraghavan K, Nightingale EB, Flinn J, et al. (2010) Qufiles: The right file at the right time Acm Transactions On Storage. 6 |
Nicholson AJ, Wolchok S, Noble BD. (2010) Juggler: Virtual networks for fun and profit Ieee Transactions On Mobile Computing. 9: 31-43 |
Nicholson AJ, Wetherall D, Chawathe Y, et al. (2008) CRAWDAD dataset umich/virgil (v.2008-03-28) Crawdad Wireless Network Data Archive |
Nicholson AJ, Noble BD. (2008) BreadCrumbs: Forecasting mobile connectivity Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 46-57 |
Shah S, Noble BD. (2007) A study of e-mail patterns Software - Practice and Experience. 37: 1515-1538 |
Yoon J, Liu M, Noble B. (2006) A general framework to construct stationary mobility models for the simulation of mobile networks Ieee Transactions On Mobile Computing. 5: 860-871 |
Nicholson AJ, Corner MD, Noble BD. (2006) Mobile Device Security Using Transient Authentication Ieee Transactions On Mobile Computing. 5: 1489-1502 |