Follow
Scott F. Midkiff
Title
Cited by
Cited by
Year
Denial-of-service in wireless sensor networks: Attacks and defenses
DR Raymond, SF Midkiff
IEEE Pervasive Computing 7 (1), 74-81, 2008
6862008
On energy provisioning and relay node placement for wireless sensor networks
YT Hou, Y Shi, HD Sherali, SF Midkiff
IEEE Transactions on Wireless Communications 4 (5), 2579-2590, 2005
4982005
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
DR Raymond, RC Marchany, MI Brownfield, SF Midkiff
IEEE transactions on vehicular technology 58 (1), 367-380, 2008
3502008
Multi-node wireless energy charging in sensor networks
L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff
IEEE/ACM transactions on networking 23 (2), 437-450, 2014
2182014
On renewable sensor networks with wireless energy transfer: The multi-node case
L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff
2012 9th annual IEEE communications society conference on sensor, mesh and …, 2012
2042012
Bundling mobile base station and wireless energy transfer: Modeling and optimization
L Xie, Y Shi, YT Hou, W Lou, HD Sherali, SF Midkiff
2013 Proceedings IEEE INFOCOM, 1636-1644, 2013
1392013
Heuristic technique for processor and link assignment in multicomputers
SW Bollinger, SF Midkiff
IEEE Transactions on Computers 40 (03), 325-333, 1991
1351991
Prolonging sensor network lifetime with energy provisioning and relay node placement
YT Hou, Y Shi, HD Sherali, SF Midkiff
2005 Second Annual IEEE Communications Society Conference on Sensor and Ad …, 2005
1192005
Processor and Link Assignment in Multicomputers Using Simulated Annealing.
SW Bollinger, SF Midkiff
International Conference on Parallel Processing (ICPP), 1-7, 1988
1171988
Multipath routing for multiple description video in wireless ad hoc networks
S Mao, YT Hou, X Cheng, HD Sherali, SF Midkiff
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
1142005
Leveraging the web for synchronous versus asynchronous distance learning
SF Midkiff, LA DaSilva
International Conference on Engineering Education 2000, 14-18, 2000
1142000
An analysis of Bluetooth security vulnerabilities
CT Hager, SF MidKiff
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 1825-1831, 2003
1082003
A real-time medium access control protocol for ad hoc wireless local area networks
RO Baldwin, NJ Davis IV, SF Midkiff
ACM SIGMOBILE Mobile Computing and Communications Review 3 (2), 20-27, 1999
941999
A mobile platform for wireless charging and data collection in sensor networks
L Xie, Y Shi, YT Hou, W Lou, HD Sherali, H Zhou, SF Midkiff
IEEE Journal on Selected Areas in Communications 33 (8), 1521-1533, 2015
932015
Rapidly-deployable broadband wireless networks for disaster and emergency response
SF Midkiff, CW Bostian
Proc. First IEEE Workshop on Disaster Recover Networks, 2002
932002
Performance evaluation of radio environment map-enabled cognitive spectrum-sharing networks
Y Zhao, D Raymond, C da Silva, JH Reed, SF Midkiff
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
852007
A framework for wireless ad hoc routing protocols
T Lin, SF Midkiff, JS Park
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 2, 1162-1167, 2003
852003
Maximizing the lifetime of wireless sensor networks through optimal single-session flow routing
YT Hou, Y Shi, J Pan, SF Midkiff
IEEE Transactions on mobile computing 5 (9), 1255-1266, 2006
822006
Test generation for I/sub DDQ/testing of bridging faults in CMOS circuits
SW Bollinger, SF Midkiff
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 1994
791994
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance
C Jiang, Y Shi, YT Hou, W Lou, S Kompella, SF Midkiff
2012 Proceedings IEEE INFOCOM, 424-432, 2012
782012
The system can't perform the operation now. Try again later.
Articles 1–20