default search action
Jay Aikat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [i1]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - 2017
- [j4]Jay Aikat, Thomas M. Carsey, Karamarie Fecho, Kevin Jeffay, Ashok Kumar Krishnamurthy, Peter J. Mucha, Arcot Rajasekar, Stanley C. Ahalt:
Scientific Training in the Era of Big Data: A New Pedagogy for Graduate Education. Big Data 5(1): 12-18 (2017) - [j3]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [c14]Ben Newton, Jay Aikat, Kevin Jeffay:
Explicit topology management for continental-scale airborne networks. INFOCOM Workshops 2017: 72-77 - 2016
- [c13]Ben Newton, Jay Aikat, Kevin Jeffay:
Geographic Routing in Extreme-Scale Highly-Dynamic Mobile Ad Hoc Networks. MASCOTS 2016: 205-210 - [c12]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - 2015
- [c11]Sean Sanders, Gautam Sanka, Jay Aikat, Jasleen Kaur:
The Influence of Client Platform on Web Page Content: Measurements, Analysis, and Implications. WISE (2) 2015: 1-16 - [c10]Ben Newton, Jay Aikat, Kevin Jeffay:
Simulating large-scale airborne networks with ns-3. WNS3 2015: 32-39 - 2014
- [c9]Ben Newton, Jay Aikat, Kevin Jeffay:
Analysis of Topology Algorithms for Commercial Airborne Networks. ICNP 2014: 368-373 - 2013
- [c8]Derek ONeill, Jay Aikat, Kevin Jeffay:
Experiment Replication Using ProtoGENI nodes. GREE 2013: 9-15 - [c7]Andrew Reed, Jay Aikat:
Modeling, identifying, and simulating Dynamic Adaptive Streaming over HTTP. ICNP 2013: 1-2 - [c6]Ben Newton, Kevin Jeffay, Jay Aikat:
The Continued Evolution of Web Traffic. MASCOTS 2013: 80-89 - 2012
- [j2]John W. Byers, Jeffrey C. Mogul, Fadel Adib, Jay Aikat, Danai Chasaki, Ming-Hung Chen, Marshini Chetty, Romain Fontugne, Vijay Gabale, László Gyarmati, Katrina LaCurts, Qi Liao, Marc Mendonca, Trang Cao Minh, S. H. Shah Newaz, Pawan Prakash, Yan Shvartzshnaider, Praveen Yalagandula, Chun-Yu Yang:
Report on the SIGCOMM 2011 conference. Comput. Commun. Rev. 42(1): 80-96 (2012) - [c5]Jay Aikat, Shaddi Hasan, Kevin Jeffay, F. Donelson Smith:
Towards Traffic Benchmarks for Empirical Networking Research: The Role of Connection Structure in Traffic Workload Modeling. MASCOTS 2012: 78-86 - [c4]Jay Aikat, Kevin Jeffay:
Introduction to network experiments using the GENI cyberinfrastructure. SIGMETRICS 2012: 433-434
2000 – 2009
- 2007
- [j1]Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith:
The effects of active queue management and explicit congestion notification on web performance. IEEE/ACM Trans. Netw. 15(6): 1217-1230 (2007) - 2004
- [c3]Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith:
Differential Congestion Notification: Taming the Elephants. ICNP 2004: 118-128 - 2003
- [c2]Jay Aikat, Jasleen Kaur, F. Donelson Smith, Kevin Jeffay:
Variability in TCP round-trip times. Internet Measurement Conference 2003: 279-284 - [c1]Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith:
The effects of active queue management on web performance. SIGCOMM 2003: 265-276
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint