To offload or not to offload? the bandwidth and energy costs of mobile cloud computing MV Barbera, S Kosta, A Mei, J Stefa 2013 Proceedings Ieee Infocom, 1285-1293, 2013 | 505 | 2013 |
Random key-assignment for secure wireless sensor networks R Di Pietro, LV Mancini, A Mei Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003 | 413 | 2003 |
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007 | 301 | 2007 |
SWIM: A simple model to generate small mobile worlds A Mei, J Stefa IEEE INFOCOM 2009, 2106-2113, 2009 | 280 | 2009 |
Distributed detection of clone attacks in wireless sensor networks M Conti, R Di Pietro, L Mancini, A Mei IEEE transactions on dependable and secure computing 8 (5), 685-698, 2010 | 241 | 2010 |
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study E Baccarelli, N Cordeschi, A Mei, M Panella, M Shojafar, J Stefa IEEE network 30 (2), 54-61, 2016 | 235 | 2016 |
Social-aware stateless forwarding in pocket switched networks A Mei, G Morabito, P Santi, J Stefa 2011 Proceedings IEEE INFOCOM, 251-255, 2011 | 231 | 2011 |
Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons D Dubhashi, A Mei, A Panconesi, J Radhakrishnan, A Srinivasan Journal of Computer and System Sciences 71 (4), 467-479, 2005 | 201 | 2005 |
Signals from the crowd: uncovering social relationships through smartphone probes MV Barbera, A Epasto, A Mei, VC Perta, J Stefa Proceedings of the 2013 conference on Internet measurement conference, 265-276, 2013 | 176 | 2013 |
Give2get: Forwarding in social mobile wireless networks of selfish individuals A Mei, J Stefa IEEE Transactions on Dependable and Secure Computing 9 (4), 569-582, 2012 | 150 | 2012 |
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks M Conti, R Di Pietro, LV Mancini, A Mei Proceedings of the first ACM conference on Wireless network security, 214-219, 2008 | 150 | 2008 |
Redoubtable sensor networks R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-22, 2008 | 114 | 2008 |
Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks RD Pietro, LV Mancini, A Mei Wireless Networks 12 (6), 709-721, 2006 | 111 | 2006 |
Secure dynamic fragment and replica allocation in large-scale distributed file systems A Mei, LV Mancini, S Jajodia IEEE Transactions on Parallel and Distributed systems 14 (9), 885-896, 2003 | 109 | 2003 |
Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking S Kosta, A Mei, J Stefa 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2010 | 104 | 2010 |
Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests A Di Luzio, A Mei, J Stefa IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 94 | 2016 |
Connectivity properties of secure wireless sensor networks R Di Pietro, LV Mancini, A Mei, A Panconesi, J Radhakrishnan Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 86 | 2004 |
Efficient and resilient key discovery based on pseudo-random key pre-deployment R Di Pietro, LV Mancini, A Mei 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 86 | 2004 |
String matching on multicontext FPGAs using self-reconfiguration RPS Sidhu, A Mei, VK Prasanna Proceedings of the 1999 ACM/SIGDA seventh international symposium on Field …, 1999 | 78 | 1999 |
A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients VC Perta, M Barbera, G Tyson, H Haddadi, A Mei | 77 | 2015 |