K P. Subbalakshmi

Affiliations: 
Stevens Institute of Technology 
Area:
Electronics and Electrical Engineering, Computer Science
Google:
"K Subbalakshmi"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Mahmoodi SE, Uma RN, Subbalakshmi KP. (2019) Optimal Joint Scheduling and Cloud Offloading for Mobile Applications Ieee Transactions On Cloud Computing. 7: 301-313
Louni A, Subbalakshmi KP. (2018) Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths Ieee Transactions On Computational Social Systems. 5: 335-343
Huang J, Gao Y, Subbalakshmi KP. (2018) Introduction to the Special Section From the IEEE GLOBECOM 2017 Conference Ieee Transactions On Cognitive Communications and Networking. 4: 344-346
Sagar V, Chandramouli R, Subbalakshmi KP. (2016) Software defined access for HetNets Ieee Communications Magazine. 54: 84-89
Anand S, Venkataraman M, Subbalakshmi KP, et al. (2015) Spatio-Temporal Analysis of Passive Consumption in Internet Media Ieee Transactions On Knowledge and Data Engineering. 27: 2839-2850
Safavi SE, Subbalakshmi KP. (2015) Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks Ieee Transactions On Cognitive Communications and Networking. 1: 175-184
Safavi E, Subbalakshmi KP. (2015) Delay analysis of multi-user dynamic spectrum access networks 2015 Ieee International Symposium On Dynamic Spectrum Access Networks, Dyspan 2015. 319-325
Malik H, Subbalakshmi KP, Chandramouli R. (2015) Joint-channel modeling to attack QIM steganography Multimedia Tools and Applications
Mahmoodi SE, Subbalakshmi KP, Chandramouli R, et al. (2014) Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay Eai Endorsed Transactions On Wireless Spectrum. 1
Anand S, Sengupta S, Hong K, et al. (2014) Exploiting channel fragmentation and aggregation/bonding to create security vulnerabilities Ieee Transactions On Vehicular Technology. 63: 3867-3874
See more...