R. Jain
R. Jain


  Affiliation history
Bibliometrics: publication history
Average citations per article14.97
Citation Count913
Publication count61
Publication years1985-2017
Available for download10
Average downloads per article533.70
Downloads (cumulative)5,337
Downloads (12 Months)144
Downloads (6 Weeks)17
ACM Fellow
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles

See all colleagues of this author

See all subject areas


61 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 61
Result page: 1 2 3 4

Sort by:

December 2017 Mobile Networks and Applications: Volume 22 Issue 6, December 2017
Publisher: Springer-Verlag New York, Inc.
Citation Count: 0

December 2012 International Journal of Communication Networks and Distributed Systems: Volume 8 Issue 1/2, December 2012
Publisher: Inderscience Publishers
Citation Count: 4

Future wireless networks (FWNs) are expected to be a convergence of different kinds of wireless technologies, such as cellular technologies, wireless local area networks (WLANs), wireless metropolitan area networks, wireless sensor networks, and traditional wired networks. The internet protocol (IP) will be potentially adopted as the common networking protocol for ...

February 2011 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 55 Issue 2, February, 2011
Publisher: Elsevier North-Holland, Inc.
Citation Count: 1

Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and ...
Keywords: Channel, Mobility, Multi-tier, Multihoming, Next generation wireless networks, Privacy, FWNs, Future internet, Future wireless internet, NGWNs, SAE, ID/Locator split, Object, Virtual channel, Virtual object, Virtual object to virtual object communication, Future Wireless Networks, Network architecture, System Architecture Evolution

January 2011 Computer Communications: Volume 34 Issue 1, January, 2011
Publisher: Elsevier Science Publishers B. V.
Citation Count: 35

Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet. We present a comprehensive survey of such research projects and activities. The topics covered include various ...
Keywords: Future Internet design (FIND), Global Environment for Networking Innovations (GENI), Next generation Internet, Future Internet architecture survey, Future network architecture

September 2010 International Journal of Internet Protocol Technology: Volume 5 Issue 3, September 2010
Publisher: Inderscience Publishers
Citation Count: 1

Current networking protocols designed around single interface stationary end-systems clearly fail to represent the present communication context of mobile, multi-interface end-systems. Also, the convergence of wired and wireless technologies into an all-IP (AIP) next generation network will make available multiple diversified contexts that can be leveraged for better fault tolerance, ...
Keywords: ID-locator split, future cellular networks, future wireless internet, mobile IP, mobile IPv6, multi-interface selection, internet protocol, location privacy, mobility, multihoming, NGWNs, next generation wireless networks, virtual identity

June 2010 MMEDIA '10: Proceedings of the 2010 Second International Conferences on Advances in Multimedia
Publisher: IEEE Computer Society
Citation Count: 2

In this paper, we introduce an innovative way to model and predict high-definition (HD) video traces encoded with H.264/AVC encoding standard. Our results are based on comparing over 50 HD video traces. We show through our results that our model: simplified seasonal ARIMA (SAM) provides a good representation for HD ...
Keywords: Modeling Video Traces, Traffic and Workload Modeling and Characterization, High Definition Video Traces. AVC Video Encoding, Seasonal ARIMA model, SAM Model, Video Traffic Prediction

April 2010 IEEE Journal on Selected Areas in Communications: Volume 28 Issue 3, April 2010
Publisher: IEEE Press
Citation Count: 8

The key to proper resource allocation for mobile video on wireless networks is to have a good model for the resource demands. In this paper, we present the results of analysis of a number of mobile video streams and show that a simple seasonal ARIMA model (SAM) can provide a ...
Keywords: Deficit Round Robin, IEEE 802.16e, Seasonal ARIMA, Video Modeling, deficit round robin, resource allocation, scheduling, traffic generator, Scheduling, Mobile WiMAX, Resource Allocation, Traffic Generator, Earliest Deadline First, QoS, earliest deadline first, mobile WiMAX, seasonal ARIMA, video modeling

8 published by ACM
February 2010 MMSys '10: Proceedings of the first annual ACM SIGMM conference on Multimedia systems
Publisher: ACM
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 6,   Downloads (Overall): 148

Full text available: PDFPDF
We propose a simple model that is capable of capturing the statistical characteristics of mobile video traces encoded using MPEG4-Part2, AVC and SVC-TS encoding standards. The model can be adjusted to adapt to diverse workload configurations, which gives fellow researchers a great flexibility to evaluate different network traffic scenarios. We ...
Keywords: seasonal ARIMA, video coding, video modeling, SAM model, SVC, broadband wireless networks, mobile video, traffic generation, workload characterization, AVC

January 2010 CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Publisher: IEEE Press
Citation Count: 2

Cellular networking standards organizations such as the 3rd Generation Partnership Project (3GPP) are currently developing System Architecture Evolution (SAE) as their core network architecture. SAE is all-IP based. However, IP-based networks face several known issues, such as mobility, multihoming, location privacy, path preference, etc. Mobile IP (MIP) and its variants, ...
Keywords: mobile IP, mobility, ID/locator split, NGWN, multi-homing, virtual identity, user location privacy

January 2010 Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking: Volume 2010, January 2010
Publisher: Hindawi Limited
Citation Count: 17
Downloads (6 Weeks): 1,   Downloads (12 Months): 2,   Downloads (Overall): 385

Full text available: PDFPDF
We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters ...

December 2009 WD'09: Proceedings of the 2nd IFIP conference on Wireless days
Publisher: IEEE Press
Citation Count: 7

Mobile WiMAX systems based on the IEEE 802.16e standard require all downlink allocations to be mapped to a rectangular region in the two dimensional subcarrier-time map. Many published resource allocation schemes ignore this requirement. It is possible that the allocations when mapped to rectangular regions may exceed the capacity of ...
Keywords: two-dimensional downlink mapping, mobile WiMAX, IEEE 802.16e, burst mapping, component, scheduling

October 2009 APCC'09: Proceedings of the 15th Asia-Pacific conference on Communications
Publisher: IEEE Press
Citation Count: 2

Most of IEEE 802.16e resource allocation proposals only focus on how to allocate the resources to meet QoS parameters such as throughput, delay, and delay-jitter. As described in the standard, the mapping from the allocation into downlink subframe for each burst needs to be in a rectangular shape. The rectangular ...
Keywords: QoS, mobile WiMAX, IEEE 802.16e, burst mapping, resource allocation, scheduling, WiMAX, two-dimensional downlink mapping

June 2009 ICC'09: Proceedings of the 2009 IEEE international conference on Communications
Publisher: IEEE Press
Citation Count: 11

MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) [1] has been proposed to address the naming and addressing challenges for NGI (Next Generation Internet). we present several design enhancements for MILSA which include a hybrid architectural design that combines "core-edge separation approach" and "split approach", a security-enabled and logically ...
Keywords: MILSA, mobility, multihoming, naming and addressing, identifier locator split, next generation internet architecture

June 2009 IEEE Communications Magazine: Volume 47 Issue 6, June 2009
Publisher: IEEE Press
Citation Count: 8

The mobile WiMAX system is based on IEEE 802.16e, which defines radio interface supporting several classes of Internet Protocol applications and services. While the mobile WiMAX system is being deployed, IEEE 802.16m TG is developing an amendment to the IEEE 802.16e to greatly improve the system performance, and it is ...

March 2009 SARNOFF'09: Proceedings of the 32nd international conference on Sarnoff symposium
Publisher: IEEE Press
Citation Count: 3

Deficit Round Robin (DRR) is a fair packet-based scheduling discipline commonly used in wired networks where link capacities do not change with time. In wireless networks especially wireless broadband networks such as IEEE 802.16e Mobile WiMAX, the link capacity can change over time and also depends on the user location. ...
Keywords: QoS, fairness, mobile WiMAX, IEEE 802.16e, deficit round robin, fragmentation, resource allocation, scheduling

December 2008 ISM '08: Proceedings of the 2008 Tenth IEEE International Symposium on Multimedia
Publisher: IEEE Computer Society
Citation Count: 3

Wireless broadband technologies like WiMAX2 are spreading especially in areas where wired broadband is not expected to reach. Video streaming is continuously acquiring a larger share of Internet’s traffic resulting in a need to have a reliable video traffic model. In this paper, we analyze several video streams compressed for ...
Keywords: ARIMA, mobile TV, Video Traffic Model, Video Traces, WiMAX

September 2008 VoCS'08: Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Publisher: BCS Learning & Development Ltd.
Citation Count: 6

The host centric design of the current Internet does not recognise data and endusers as integral entities of the system. The first generation of Internet has been very successful and yet business, organizations, governments are finding it difficult to enforce their policies on their networks with the same ease that ...
Keywords: zones, naming, virtualization, policies, mapping and negotiation, name binding, next generation internet, realms

November 2007 International Journal of High Performance Computing and Networking: Volume 5 Issue 1/2, November 2007
Publisher: Inderscience Publishers
Citation Count: 1

We propose Adaptive Multi-level ECN (AMECN), a new TCP congestion scheme, as an extension to Multi-level Explicit Congestion Notification (MECN). AMECN allows network operators to achieve high throughput and low delays. However, AMECN performance depends its parameter settings and the level of congestion, hence, no guarantees can be given about ...
Keywords: TCP congestion control, QoS, multilevel ECN, network congestion, simulation, internet, adaptive congestion management, congestion notification, quality of service

October 2006 MILCOM'06: Proceedings of the 2006 IEEE conference on Military communications
Publisher: IEEE Press
Citation Count: 21

The basic ideas of the Internet architecture were developed 30+ years ago. In these 30 years, we have learnt a lot about networking and packet switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt to answer this ...

September 2006 DEXA '06: Proceedings of the 17th International Conference on Database and Expert Systems Applications
Publisher: IEEE Computer Society
Citation Count: 0

With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is talking to whom over a public network. This work develops a novel approach to hide the senders and the receivers of ...

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us