How do I tell a network what I want it to do?
J. William Atwood
- Distinguished Professor Emeritus
- Department of Computer Science and Software Engineering
- autonomic networking2
- multicast2
- communication protocols8
- network security12
- wireless networks19
- distributed/parallel systems25
- network resource allocation3
- protocol independent multicast
- internet group management protocol
- mobile ad hoc networks11
- routing protocols7
- MPLS (multiprotocol label switching)2
- playout algorithms
- cybersecurity16
- formal methods6
- validation3
- network performance evaluation4
- quality management8
- ICT29
-
Lata Narayanan
networks, algorithm design, robotics
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Chadi Assi
wireless networks, network design, network optimization
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Jun Cai
machine learning, distributed/parallel systems, energy efficiency
-
Abdelhak Bentaleb
multimedia systems and communication, video streaming architecture, access networks
-
Sandra Céspedes
wireless networks, internet of things (IoT), vehicular networking
-
Rodolfo W. L. Coutinho
internet of underwater things (IoUT), internet of things (IoT), edge computing
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Roch Glitho
end-user services architectures, virtualization, cloud computing
-
Brigitte Jaumard
autonomic networking, graph theory, operations research
-
Lingyu Wang
network security, privacy, security metrics
-
Walaa Hamouda
wireless communications, compressed sensing, channel coding
-
Otmane Aït Mohamed
functional verification, formal methods, reliability analysis
-
Dhrubajyoti Goswami
high performance computing, parallel architectural skeletons, distributed/parallel systems
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Essam Mansour
distributed/parallel systems, web data management, large-scale analytics on strings
-
Yousef R. Shayan
wireless communications, MIMO wireless, wireless networks
-
Carol Fung
network management, cybersecurity, network security
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Sofiène Tahar
communication protocols, hardware specification, functional verification
-
M. N. S. Swamy
image processing, video signal processing, statistical signal processing
-
Ferhat Khendek
software engineering, ICT, service engineering
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Amir G. Aghdam
adaptive control, decentralized large-scale systems, control systems
-
M. Reza Soleymani
wireless networks, ICT, cognitive radio networks
-
Jamal Bentahar
software agents, multi-agent systems, formal logic
-
John Xiupu Zhang
quantum dot lasers, InP broadband photodetectors, radio over fibre
-
Wei-Ping Zhu
signal processing, speech processing, image processing