Radu Stoleru, Ph.D.
Affiliations: | 2007 | University of Virginia, Charlottesville, VA |
Area:
Computer ScienceGoogle:
"Radu Stoleru"Parents
Sign in to add mentorJohn A. Stankovic | grad student | 2007 | UVA | |
(Robust node localization for wireless sensor networks.) |
Children
Sign in to add traineeMyounggyu Won | grad student | 2013 | Texas A & M |
Harsha Chenji | grad student | 2014 | Texas A & M |
Amin Hassanzadeh | grad student | 2014 | Texas A & M |
Chien-An Chen | grad student | 2015 | Texas A & M |
Mahima Agumbe Suresh | grad student | 2015 | Texas A & M |
Wei Zhang | grad student | 2017 | Texas A & M |
Chen Yang | grad student | 2018 | Texas A & M |
Ala Altaweel | grad student | 2019 | Texas A & M |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
George J, Chen C, Stoleru R, et al. (2019) Hadoop MapReduce for Mobile Clouds Ieee Transactions On Cloud Computing. 7: 224-236 |
Feng Y, Stoleru R, Chen C, et al. (2017) A Routing-Protocol-Independent Caching Framework for Mobile Clouds Ieee Transactions On Emerging Topics in Computing. 5: 353-366 |
Yang C, Stoleru R. (2016) Hybrid routing in wireless networks with diverse connectivity Proceedings of the International Symposium On Mobile Ad Hoc Networking and Computing (Mobihoc). 5: 71-80 |
Yang C, Stoleru R. (2016) On balancing the energy consumption of routing protocols for opportunistic social networks 2015 Ieee 34th International Performance Computing and Communications Conference, Ipccc 2015 |
Zhang W, Suresh MA, Zhou Y, et al. (2016) On the coexistence of 802.11 and 802.15.4 networks with delay constraints 2015 Ieee 34th International Performance Computing and Communications Conference, Ipccc 2015 |
Altaweel A, Stoleru R, Mandal S. (2016) On secure shared key establishment for mobile devices using contextual information 2015 Ieee 34th International Performance Computing and Communications Conference, Ipccc 2015 |
Gong W, Suresh MA, Smith L, et al. (2016) Mobile sensor networks for optimal leak and backflow detection and localization in municipal water networks Environmental Modelling and Software. 80: 306-321 |
Hassanzadeh A, Xu Z, Stoleru R, et al. (2016) PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks Computers and Security. 62: 114-132 |
Suresh MA, Zhang W, Gong W, et al. (2015) Toward optimal monitoring of flow-based systems using mobile wireless sensor networks Acm Transactions On Sensor Networks. 11: 48 |
Mandal S, Yang C, Altaweel A, et al. (2015) An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds 2015 Ieee 11th International Conference On Wireless and Mobile Computing, Networking and Communications, Wimob 2015. 627-634 |