default search action
Stephan Bohacek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Fatema Bannat Wala, Stephan Bohacek:
Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSEC. DSN-S 2024: 104-110 - 2022
- [i1]Yan Zheng, Stephan Bohacek:
Energy Savings When Migrating Workloads to the Cloud. CoRR abs/2208.06976 (2022) - 2021
- [j21]Jonghyun Kim, Pratik K. Biswas, Stephan Bohacek, Sharon J. Mackey, Siamak Samoohi, Mitesh P. Patel:
Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks. J. Netw. Comput. Appl. 181: 103037 (2021)
2010 – 2019
- 2019
- [j20]Jonghyun Kim, Stephan Bohacek:
Efficient modeling of network flooding performance with proactive retransmissions in mobile ad hoc networks. Wirel. Networks 25(5): 2423-2436 (2019) - 2018
- [c41]Jonghyun Kim, Stephan Bohacek, Pratik K. Biswas, Siamak Samoohi, Sharon J. Mackey, Mitesh P. Patel:
Friendly-Jamming-Aware Routing Protocols for Tactical Networks. IPCCC 2018: 1-6 - 2012
- [c40]Carlos Rodrigo Aponte, Stephan Bohacek:
OLSR and approximate distance routing: Loops, black holes, and path stretch. COMSNETS 2012: 1-10 - 2011
- [j19]Ivan D. Barrera, Gonzalo R. Arce, Stephan Bohacek:
Statistical approach for congestion control in gateway routers. Comput. Networks 55(3): 572-582 (2011) - [j18]Peng Wang, Stephan Bohacek:
Practical computation of optimal schedules in multihop wireless networks. IEEE/ACM Trans. Netw. 19(2): 305-318 (2011) - [c39]Stephan Bohacek, Andres Medina:
A Model of Path Stretch in Proactive Routing in MANETs. ICCCN 2011: 1-7 - [c38]Jonghyun Kim, Khushboo Shah, Stephan Bohacek:
Detecting P2P traffic from the P2P flow graph. IWCMC 2011: 1795-1800 - 2010
- [j17]Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce:
Statistical detection of congestion in routers. IEEE Trans. Signal Process. 58(3): 957-968 (2010) - [j16]Peng Wang, Stephan Bohacek:
Computational aspects of optimal schedules with power control and multiple bitrates selection in multihop wireless networks. Wirel. Networks 16(6): 1639-1656 (2010) - [c37]Edmond A. Jonckheere, Stephan Bohacek:
LDV control over compact riemannian manifolds. CDC 2010: 7099-7104 - [c36]Andres Medina, Stephan Bohacek:
Performance model of flooding in OLSR. PE-WASUN 2010: 58-65 - [c35]Andres Medina, Stephan Bohacek:
A performance model of neighbor discovery in proactive routing protocols. PE-WASUN 2010: 66-70 - [c34]Peng Wang, Stephan Bohacek:
Fast computation of schedules for dynamic traffic in wireless mesh networks. WOWMOM 2010: 1-7
2000 – 2009
- 2009
- [j15]Jonghyun Kim, Vinay Sridhara, Stephan Bohacek:
Realistic mobility simulation of urban mesh networks. Ad Hoc Networks 7(2): 411-430 (2009) - 2008
- [j14]Vinay Sridhara, Hweechul Shin, Stephan Bohacek:
Performance of 802.11b/g in the interference limited regime. Comput. Commun. 31(8): 1579-1587 (2008) - [j13]Stephan Bohacek:
Performance Improvements Provided by Route Diversity in Multihop Wireless Networks. IEEE Trans. Mob. Comput. 7(3): 372-384 (2008) - [c33]Chansook Lim, Stephan Bohacek, João P. Hespanha, Katia Obraczka:
On the Effectiveness of Proactive Path-Diversity Based Routing for Robustness to Path Failures. Networking 2008: 574-585 - [c32]Andres Medina, Stephan Bohacek:
The impact of delayed topology information in proactive routing protocols for MANETS. PE-WASUN 2008: 42-49 - [c31]Stephan Bohacek, Peng Wang:
Communication models for throughput optimization in mesh networks. PE-WASUN 2008: 80-87 - [c30]Andres Medina, Stephan Bohacek:
A model of topology cache in reactive routing protocols for MANETs. WICON 2008: 3 - [c29]Peng Wang, Stephan Bohacek:
On the practical complexity of solving the maximum weighted independent set problem for optimal scheduling in wireless networks. WICON 2008: 15 - 2007
- [j12]Vinay Sridhara, Stephan Bohacek:
Realistic propagation simulation of urban mesh networks. Comput. Networks 51(12): 3392-3412 (2007) - [j11]Khushboo Shah, Edmond A. Jonckheere, Stephan Bohacek:
Dynamic Modeling of Internet Traffic for Intrusion Detection. EURASIP J. Adv. Signal Process. 2007 (2007) - [j10]Peng Wang, Stephan Bohacek:
An overview of tractable computation of optimal scheduling and routing in mesh networks. SIGMETRICS Perform. Evaluation Rev. 35(2): 18-20 (2007) - [j9]Junsoo Lee, Stephan Bohacek, João P. Hespanha, Katia Obraczka:
Modeling communication networks with hybrid systems. IEEE/ACM Trans. Netw. 15(3): 630-643 (2007) - [j8]Stephan Bohacek, João Pedro Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka:
Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks. IEEE Trans. Parallel Distributed Syst. 18(9): 1227-1240 (2007) - [c28]Kejing Liu, Stephan Bohacek, Javier Garcia-Frías:
Interference Mitigating in Wireless Networks Using Prior Knowledge. CISS 2007: 655-660 - [c27]Vinay Sridhara, Hweechul Shin, Stephan Bohacek:
Performance of 802.11b/g in the Interference Limited Regime. ICCCN 2007: 979-984 - [c26]Stephan Bohacek, Peng Wang:
Toward Tractable Computation of the Capacity of Multi-Hop Wireless Networks. INFOCOM 2007: 2099-2107 - [c25]Jonghyun Kim, Stephan Bohacek:
A comparison of opportunistic and deterministic forwarding in mobile multihop wireless networks. MobiOpp@MobiSys 2007: 9-16 - [c24]Peng Wang, Stephan Bohacek:
The Practical Performance of Subgradient Computational Techniques for Mesh Network Utility Optimization. NET-COOP 2007: 84-94 - 2006
- [j7]Stephan Bohacek, João Pedro Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka:
A new TCP for persistent packet reordering. IEEE/ACM Trans. Netw. 14(2): 369-382 (2006) - [c23]Jonghyun Kim, Stephan Bohacek:
Exploiting multihop diversity through efficient localized searching with CDMA and route metric-based power control. MSWiM 2006: 155-164 - [c22]Stephan Bohacek:
Achievable performance improvements provided by cooperative diversity. WiOpt 2006: 73-82 - [c21]Stephan Bohacek, Vinay Sridhara, Lei Lou:
Efficient paging in large-scale urban mesh networks. WMASH 2006: 81-90 - 2005
- [c20]Chansook Lim, Stephan Bohacek, João P. Hespanha, Katia Obraczka:
Hierarchical max-flow routing. GLOBECOM 2005: 6 - [c19]Khushboo Shah, Stephan Bohacek:
High short-term bit-rates from TCP Flows. MASCOTS 2005: 55-66 - [c18]Jonghyun Kim, Stephan Bohacek:
Selection Metrics for Cooperative Multihop Relaying. Med-Hoc-Net 2005: 397-406 - [c17]Vinay Sridhara, Jonghyun Kim, Stephan Bohacek:
Performance of urban mesh networks. MSWiM 2005: 269-277 - [c16]Stephan Bohacek, Andjela Ilic, Vinay Sridhara:
On the Predictability of Link Lifetimes in Urban MANETs. WiOpt 2005: 209-218 - 2004
- [j6]Stephan Bohacek, Boris Rozovskii:
A diffusion model of roundtrip time. Comput. Stat. Data Anal. 45(1): 25-50 (2004) - [j5]Stephan Bohacek, Khushboo Shah, Gonzalo R. Arce, Mike Davis:
Signal processing challenges in active queue management. IEEE Signal Process. Mag. 21(5): 69-79 (2004) - [c15]Khushboo Shah, Stephan Bohacek, Andre Broido:
Feasibility of detecting TCP-SYN scanning at a backbone router. ACC 2004: 988-995 - [c14]Khushboo Shah, Stephan Bohacek, Edmond A. Jonckheere:
On the performance limitation of active queue management (AQM). CDC 2004: 1016-1022 - [c13]Stephan Bohacek, Khushboo Shah:
TCP throughput and timeout - steady state and time-varying dynamics. GLOBECOM 2004: 1334-1340 - 2003
- [j4]Stephan Bohacek, Edmond A. Jonckheere:
Relationships between Linear Dynamically Varying Systems and Jump Linear Systems. Math. Control. Signals Syst. 16(2-3): 207-224 (2003) - [c12]Khushboo Shah, Stephan Bohacek, Edmond A. Jonckheere:
On the predictability of data network traffic. ACC 2003: 1619-1624 - [c11]Stephan Bohacek, João P. Hespanha, Junsoo Lee, Chansook Lim, Katia Obraczka:
TCP-PR: TCP for Persistent Packet Reorderin. ICDCS 2003: 222- - [c10]Stephan Bohacek:
A Stochastic Model of TCP and Fair Video Transmission. INFOCOM 2003: 1134-1144 - [c9]Stephan Bohacek, João P. Hespanha, Junsoo Lee, Katia Obraczka:
A hybrid systems modeling framework for fast and accurate simulation of data communication networks. SIGMETRICS 2003: 58-69 - 2002
- [j3]Stephan Bohacek, Edmond A. Jonckheere:
Nonlinear Tracking Over Compact Sets with Linear Dynamically Varying Hinfinity Control. SIAM J. Control. Optim. 40(4): 1042-1071 (2002) - [c8]Edmond A. Jonckheere, Khushboo Shah, Stephan Bohacek:
Dynamic modeling of Internet traffic for intrusion detection. ACC 2002: 2436-2442 - [c7]Stephan Bohacek, João P. Hespanha, Katia Obraczka:
Saddle policies for secure routing in communication networks. CDC 2002: 1416-1421 - [c6]Stephan Bohacek:
Optimal filtering for denial of service mitigation. CDC 2002: 1428-1433 - [c5]Stephan Bohacek, João P. Hespanha, Katia Obraczka, Junsoo Lee, Chansook Lim:
Enhancing security via stochastic routing. ICCCN 2002: 58-62 - 2001
- [j2]Stephan Bohacek, Edmond A. Jonckheere:
Structural stability of linear dynamically varying (LDV) controllers. Syst. Control. Lett. 44(3): 177-187 (2001) - [j1]Stephan Bohacek, Edmond A. Jonckheere:
Linear dynamically varying LQ control of nonlinear systems over compact sets. IEEE Trans. Autom. Control. 46(6): 840-852 (2001) - [c4]João Pedro Hespanha, Stephan Bohacek:
Preliminary results in routing games. ACC 2001: 1904-1909 - [c3]João P. Hespanha, Stephan Bohacek, Katia Obraczka, Junsoo Lee:
Hybrid Modeling of TCP Congestion Control. HSCC 2001: 291-304 - 2000
- [c2]Stephan Bohacek, Edmond A. Jonckheere:
Analysis and synthesis for linear set-valued dynamically varying systems. ACC 2000: 2770-2774 - [c1]Stephan Bohacek:
Stability of hop-by-hop congestion control. CDC 2000: 67-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint