Publications

[190]

C. Qiu and M. W. Mutka, “iFrame: Dynamic Indoor Map Construction through Automatic Mobile Sensing,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2016), March 2016.

[189]

J. Zhao, T. Zhao, N. Xi, M. W. Mutka and L. Xiao, “MSU Tailbot: Controlling Aerial Maneuver of a Miniature Tailed Jumping Robot,” IEEE/ASME Transactions on Mechatronics, Vol. 20, No. 6, pp. 2903-2914, December 2015.

[188]

C. Qiu and M. W. Mutka, “AIRLoc: Mobile Robots Assisted Indoor Localization,” Proceedings of the IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 2015), October 2015.

[187]

S. Soltani and M. W. Mutka, “A Decision Tree Cognitive Routing Scheme for Cognitive Radio Mesh Networks,” Wireless Communications and Mobile Computing, vol. 15, no. 10, pp. 1405-1417, July 2015.

[186]

S. Soltani and M. W. Mutka, “ArgMax and ArgMin: Transitional Probabilistic Models in Cognitive Radio Mesh Networks,” Wireless Communications and Mobile Computing, vol. 15, no. 9, pp. 1355-1367, June 2015.

[185]

C. Qiu and M. W. Mutka, “Cooperation among Smartphones to Improve Indoor Position Information,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2015), June 2015.

[184]

J. Zhao, N. Xi, M. W. Mutka and L. Xiao, “Development of a Miniature Water Jumping Robot,” 2015 IEEE International Conference on Robotics and Automation (ICRA 2015), May 2015.

[183]

N. Xi, J. Zhao, B. Gao, J. Xiu, M. W. Mutka, L. Xiao, “Jumping Robot,” United States Patent No. 9,004,201 B2, April 14, 2015.

[182]

M. W. Mutka, F. Zhu and L. Ni, “Private Entity Authentication for Pervasive Computing Environments,” United States Patent No. 8,966,252 B2, February 24, 2015.

[181]

T. Hao, R. Zhou, G. Xing, M. Mutka and J. Chen, “WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 6, pp. 1379-1392, June 2014.

[180]

J. Zhao, W. Yan, N. Xi, M. W. Mutka and L. Xiao, “A Miniature 25 Grams Running and Jumping Robot,” 2014 IEEE International Conference on Robotics and Automation (ICRA 2014), May 2014.

[179]

J. Zhao, T. Zhao, N. Xi, F. Cintron, M. W. Mutka and L. Xiao, “Controlling Aerial Maneuvering of a Miniature Jumping Robot Using Its Tail,” 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2013), November 2013.

[178]

Y. Pei and M. W. Mutka, “STARS: Static Relays for Remote Sensing in Multi-Robot Real-time Search and Monitoring,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 10, pp. 2079-2089, October 2013.

[177]

S. Soltani and M. W. Mutka, “Primary Weight Measure and its Support for Stochastic Routing for Dynamic cognitive Radio Networks,” First ACM Workshop on Cognitive Radio Architectures for Broadband (CRAB 2013), October 2013.

[176]

J. Zhao, J. Xu, B. Gao, N. Xi, F. Cintron, M. W. Mutka and L. Xiao, “MSU Jumper: A Single Motor Actuated Miniature Steerable Jumping Robot,” IEEE Transactions on Robotics, vol. 29, no. 3, pp. 602-614, June 2013.

[175]

Y. Pei, M. W. Mutka and N. Xi, “Connectivity and Bandwidth Aware Real-Time Exploration in Mobile Robot Networks,” Wireless Communications and Mobile Computing, vol. 13, no. 9, pp. 847-863, June 2013.

[174]

P. Huang, L. Xiao, S. Soltani, M. W. Mutka and N. Xi, “The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 101-120, 2013.

[173]

M. Kim, H. Choo, M. W. Mutka, H.-J.  Lim, K. Park, “On QoS Multicast Routing Algorithms Using k-minimum Steiner Trees,” Information Sciences, vol. 238, pp. 190-204, July 2013.

[172]

S. Soltani and M. W. Mutka, “Decision Tree Modeling for Video Routing in Cognitive Radio Mesh Networks,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2013), June 2013.

[171]

J. Zhao, N. Xi, F. Cintron, M. W. Mutka and L. Xiao, “A Single Motor Actuated Miniature Steerable Jumping Robot,” 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2012), October 2012.

[170]

G. Zeng, B. Wang, M. W. Mutka, L. Xiao and E. Torng, “Efficient Link-Heterogeneous Multicast for Wireless Mesh Networks,” Wireless Networks, vol. 18, no. 6, pp. 605-620, June 2012.

[169]

F. Cintron, K. Pongaliur, M. Mutka, L. Xiao, J. Zhao and N. Xi, “Leveraging Height in a Jumping Sensor Network to Extend Network Coverage,” IEEE Transactions on Wireless Communications, vol. 11, no. 5, pp. 1840-1849, May 2012.

[168]

Y. Pei and M. W. Mutka, “Steiner Traveler: Relay Deployment for Remote Sensing in Heterogeneous Multi-Robot Exploration,” 2012 IEEE International Conference on Robotics and Automation (ICRA 2012), May 2012.

[167]

F. Zhu, M. W. Mutka and L. Ni, “Private Entity Authentication for Pervasive Computing Environments,” International Journal of Network Security, vol. 14, no. 1, pp. 123-137, January 2012.

[166]

H. Zhou and M. W. Mutka, “Review of Autoconfiguration for MANETs,” in Wireless Ad-Hoc Networks, InTech, H. Zhou, ed., pp. 123–144, 2012.

[165]

Y. Pei and M. W. Mutka, “Joint Bandwidth-Aware Relay Placement and Routing in Heterogeneous Wireless Networks,” Proceedings of the IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS), December 2011.

[164]

T. Hao, R. Zhou, G. Xing and M. Mutka, “WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization in Wireless Sensor Networks,” 32nd IEEE Real-Time Systems Symposium (RTSS), November-December 2011.

[163]

G. Zeng, P. Huang, M. W. Mutka, L. Xiao and E. Torng, “Efficient Opportunistic Multicast via Tree Backbone for Wireless Mesh Networks,” 8th International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2011), October 2011.

[162]

Y. Pei and M. W. Mutka, “STARS: Static Relays for Multi-Robot Real-time Search,” Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS), June 2011.

[161]

S. Soltani and M. W. Mutka, “On Transitional Probablistic Routing in Cognitive Radio Mesh Networks,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2011), June 2011.

[160]

Y. Pei and M. W. Mutka, “Stream Aggregation in Heterogeneous Range and Rate Mobile Robot Networks,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2011), June 2011.

[159]

M. Kim and M. W. Mutka, “Recycled ID Assignment for Relocation of Hopping Sensors,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2011), June 2011.

[158]

J. Zhao, N. Xi, B. Gao, M. W. Mutka and L. Xiao, “Development of a Controllable and Continuous Jumping Robot,” 2011 IEEE International Conference on Robotics and Automation (ICRA 2011), May 2011.

[157]

M. Kim, M. W. Mutka, H.-Y. Kim, “ESC: Estimation of Selecting Core for Reducing Multicast Delay Variation Under Delay Constraints,” International Journal of Communication Systems (IJCS), vol. 24, no. 1, pp. 40-52, January 2011.

[156]

F. Zhu, W. Zhu, M. W. Mutka and L. Ni, “Service Discovery Architecture and Protocol Design for Pervasive Computing,” in Advanced Design Approaches to Emerging Software Systems: Principles, Methodology and Tools, IGI Global Research Handbook, pp. 83-101, 2011.

[155]

F. Zhu, S. Carpenter, W. Zhu, and M. W. Mutka, “A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments,” International Journal of Information Security and Privacy, vol. 4, no. 4, pp. 1-20, Oct-Dec 2010.

[154]

F. Cintron and M. Mutka, “Hopping Enhanced Sensors for Efficient Sensor Network Connectivity and Coverage,” Seventh International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), November 2010.

[153]

J. Zhao, N. Xi, B. Gao, M. W. Mutka and L. Xiao, “Design and Testing of a Controllable Miniature Jumping Robot,” 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2010), October 2010.

[152]

F. Zhu, M. W. Mutka, A. Bivalkar, A. Demir, Y. Lu and C. Chidambarm, “Toward Secure and Private Service Discovery Anywhere Anytime,” Frontiers of Computer Science in China, vol. 4, no. 3, pp. 311-323, September 2010.

[151]

B. Wang, G. Wang, M. Mutka and L. Xiao, “Routing for Minimum Length Schedule in Multi-channel TDMA based Wireless Mesh Networks,” Proceedings of the IEEE Wireless, Mobile and Multimedia Networks (WoWMoM 2010), June 2010.

[150]

Y. Pei, M. W. Mutka and N. Xi “Coordinated Multi-Robot Real-Time Exploration with Connectivity and Bandwidth Awareness,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2010), May 2010.

[149]

M. Kim, M. W. Mutka, J. Park, H. Choo, “ROAD+: Route Optimization with Additional Destination-Information and its Mobility Management in Mobile Networks,” Journal of Computer Science and Technology, vol. 25, no. 2, pp. 298-312, March 2010.

[148]

M. Kim and M. W. Mutka, “On Relocation of Hopping Sensors for Rugged Terrains,” Proceedings of the Workshop on Mobile Sensor and its Applications (MSA 10), March 2010.

[147]

G. Zeng, B. Wang, Y. Dong, L. Xiao and M. Mutka, “Efficient Multicast Algorithms for Multi-channel Wireless Mesh Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 1, pp. 86-99, January 2010.

[146]

H. Zhou, M. W. Mutka, and L. Ni, “Secure Prophet Address Allocation for MANETS,” Security and Communication Networks; Special Issue on Security in Next Generation Wireless Networks, vol. 31, no. 1, pp. 31-43, January/February 2010.

[145]

G. Zeng, B. Wang, M. W. Mutka, L. Xiao and E. Torng, “Efficient Multicast for Link-Heterogenous Wireless Mesh Networks,” Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC 2009), pp. 177-184, December 2009.

[144]

H. Zhou, M. W. Mutka, and L. Ni, “Secure Autoconfiguration and Public-key Distribution for Mobile Ad-hoc Networks,” Proceedings of IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2009), October 2009.

[143]

Y. Pei, F. Cintron, M. W. Mutka, J. Zhao and N. Xi “Hopping Sensor Relocation in Rugged Terrains,” 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2009), October 2009.

[142]

M. Kim and M. W. Mutka, “Multipath-based Relocation Schemes Considering Balanced Assignment of Hopping Sensors,” 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2009), October 2009.

[141]

J. Zhao, R. Yang, N. Xi B. Gao, X. Fan, M. W. Mutka, and L. Xiao “Development of a Miniature Self-stabilization Jumping Robot,” 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2009), October 2009.

[140]

M. Kim, M. W. Mutka, D.-J.  Hwang, H. Choo, “On Minimum Cost Multicast Routing Based on Cost Prediction,” Journal of Communications and Networks, vol. 11, no. 5, pp. 500-508, October 2009.

[139]

F. Cintron, K. Pongaliur, M. Mutka, and L. Xiao, “Energy Balancing Hopping Sensor Network Model to Maximize Coverage,” IEEE Conference on Computer Communications and Networks (ICCCN 2009), August 2009.

[138]

M. Kim, M. W. Mutka and H. Choo, “A Hierarchical Data Dissemination Protocol using Probability-based Clustering for Wireless Sensor Networks,” Proceedings of the 13th International Conference on Human-Computer Interaction (HCII 2009), LNCS 5618, pp. 149.-158, July 2009.

[137]

M. Kim and M. W. Mutka, “On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors,” 2009 International Conference on Computational Science and Its Applications, LCNS 5593, pp. 361-371, July 2009.

[136]

M. Kim, M. W. Mutka, S-H. Cho and H. Choo, “A Dissemination Protocol to Guarantee Data Accessibility within N-hops for Wireless Sensor Networks,” Hawaii International Conference on System Sciences (HICCS 2009), January 2009.

[135]

J. Seo, M. Kim, S.-H. Cho, H. Choo and M. W. Mutka, “EDAS: An Energy and Distance Aware Data Dissemination Protocol Based on SPIN for Wireless Sensor Networks,” Transactions on Computational Sciences, Springer-Verlag, LNCS 5730, pp. 115-130, 2009.

[134]

I. Shin, M. Kim, M. W. Mutka, H. Choo, T.-J. Lee, “MCBT: Multi-hop Cluster Based Stable Backbone Trees for Data Collection and Dissemination in WSNs,” Sensors, vol. 9, no. 8, pp. 6028-6045, 2009.

[133]

B. Wang, M. Mutka and E. Torng, “Optimization Based Rate Allocation and Scheduling in TDMA Based Wireless Mesh Networks,” Proceedings of the IEEE International Conference on Network Protocols (ICNP 2008), October 2008.

[132]

R.-S. Ko, M. W. Mutka, C.-C. Lai and C.-K.  Yen, “Component-Based Ad Hoc Systems for Ubiquitous Computing,” Journal of Pervasive Computing and Communications, pp. 333-353, vol. 4, no. 4, 2008.

[131]

D. Zhu and M. W. Mutka, “Cooperation Among Peers in an Ad Hoc Network to Support an Energy Efficient IM Service,” Pervasive and Mobile Computing, vol. 4, no. 3, pp. 335-359, June 2008.

[130]

B. Wang and M. W. Mutka, “Path Selection for Mobile Stations in IEEE 802.16 Multihop Relay Networks,” Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2008), June 2008.

[129]

B. Wang and M. W. Mutka, “QoS-Aware Fair Rate Allocation in Wireless Mesh Networks,” Computer Communications, Special Issue on Wireless Mesh Networks, vol. 31, no. 7, pp. 1276-1289, May 2008.

[128]

Z. Cen and M. W. Mutka, “Relocation of Hopping Sensors,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2008), May 2008.

[127]

A. Chobanyan, M. W. Mutka, V. S. Mandrekar and N. Xi, “End-to-End Available Bandwidth as a Random Autocorrelated QoS-Relevant Time-Series,” Computer Networks, vol. 52, no. 6, pp. 1220-1237, April 2008.

[126]

F. Zhu, W. Zhu, M. W. Mutka and L. Ni, “Private and Secure Service Discovery via Progressive and Probabilistic Exposure,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 11, pp. 1565-1577, November 2007 .

[125]

Y. Shen, N. Methil-Sudhakaran, C. Pomeroy, N. Xi, R. Mukherjee, D. Zhu, Z. Cen, M. Mutka, Y. Tan, J. Yang, C. Slomski and K. Apelgren, “Supermedia Interface for Internet Based Tele-diagnostics of Breast Pathology,” International Journal of Robotics Research, vol. 26, No. 11-12, pp. 1235-1250, November/December 2007.

[124]

G. Zeng, B. Wang, Y. Dong, L. Xiao and M. Mutka, “Multicast Algorithms for Multi-channel Wireless Mesh Networks,” Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), October 2007.

[123]

Y. Shen, N. Xi, N. Methil-Sudhakaran, R. Mukherjee, D. Zhu, M. Mutka, C. Zhang, C. Slomski and K. Apelgren, “Networked Human/Robot Cooperative Interface for Tele-diagnostics of Breast Pathology,” Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication, August 2007.

[122]

R.-S. Ko and M. W. Mutka, “An Ad Hoc Approach to Achieve Collaborative Computing with Pervasive Devices,” Proceedings of the International Conference on Grid and Pervasive Computing (GPC 2007), May 2007.

[121]

Y. Shen, N. Xi, N. Methil-Sudhakaran, R. Mukherjee, D. Zhu, Z. Cen, M. Mutka, C. Slomski and K. Apelgren, “Internet Based Tele-diagnostic Interface for Breast Pathology,” Proceedings of the 3rd Int. Conf. on Telehealth 2007, May 2007.

[120]

A. Goradia, Z. Cen, C. Haffner, N. Xi and M. W. Mutka, “Sensor Deployment and Targets Tracking in a Surveillance Network,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2007), April 2007.

[119]

A. Goradia, C. Haffner, N. Xi and M. W. Mutka, “Optimality Framework for Hausdorff Tracking using Mutational Dynamics and Physical Programming,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2007), April 2007.

[118]

H. Zhou, M. W. Mutka, and L. Xi, “Reactive ID Assignment for Sensor Networks,” International Journal of Wireless Information Networks, vol. 13, no. 4,. pp. 317-328, October 2006.

[117]

Z. Cen and M. W. Mutka, “QoS Provision for Remote Sensing and Control in Heterogeneous Environments,” Proceedings of IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2006), October 2006.

[116]

A. Goradia, C. Haffner, M. Huntwork, N. Xi and M. Mutka, “Modeling and Control of Mobile Surveillance Networks using Mutational Hybrid Systems,” Proceedings of IEEE International Conference on Intelligent Robots and Systems, (IROS 2006), October 2006.

[115]

A. Chobanyan, M. W. Mutka, S. Levental, and N. Xi, “Behavior of Available End-to-end Bandwidth: Non-Parametric Approach,” Proceedings of 3rd Int. Conference on the Quantitative Evaluation of Systems (QEST) 2006, pp. 9-18, September 2006.

[114]

M. Huntwork, A. Goradia, N. Xi, C. Haffner, C. Klochko, and M. Mutka, “Pervasive Surveillance Using a Cooperative Mobile Sensor Network,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2006), May 2006.

[113]

N. Methil, Y. Shen, D. Zhu, C. Pomeroy, R. Mukherjee, N. Xi, and M. Mutka, “Development of Supermedia Interface for Telediagnostics of Breast Pathology, Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2006), May 2006.

[112]

H. Wang, Z. Cen, T. Li, and M. W. Mutka, “A Topology-Aware Routing Protocol for the MANET with Multiple Sinks,” Proceedings of the 2006 IEEE International Conference on Electro/Information Technology, May 2006.

[111]

A. Goradia, Z. Cen, C. Haffner, N. Xi, and M. Mutka, “Design, Implementation and Performance Analysis of Pervasive Surveillance Networks,” Proceedings of 19th International FLAIRS Conference, pp. 472-477, May 2006.

[110]

F. Zhu, M. W. Mutka and L. Ni, “A Private, Secure and User-centric Information Exposure Model for Service Discovery Protocols,” IEEE Transactions on Mobile Computing, vol. 5, no. 4, pp. 418-429, April 2006.

[109]

F. Zhu, M. W. Mutka and L. Ni, “The Master Key: A Private Authentication Approach for Pervasive Computing Environments,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2006), pp. 212-221, March 2006.

[108]

Y. Shen, C. A. Pomeroy, N. Xi, N. Methil, R. Mukherjee, D. Zhu, M. W. Mutka, C. A. Slomski, K. N. Apelgren, “Supermedia Interface for Internet Based Tele-diagnostics of Breast Pathology,” Proceedings of 1st IEEE International Conference on Biomedical Robotics and Biomechatronics, February 2006.

[107]

A. L. Chobanyan, S. A. Chobanyan, V. S. Mandrekar and M. W. Mutka, “Some Applications of Transference Lemma to Compact Vector Summation,” Bulletin of the Georgian National Academy of Sciences, vol. 174, no. 2, 2006.

[106]

F. Zhu, M. W. Mutka and L. Ni, “Service Discovery in Pervasive Computing Environments,” IEEE Pervasive Computing. vol. 4, no. 4, pp. 81-90, October-December 2005.

[105]

H. Zhou, M. W. Mutka, and L. Xi, “Reactive ID Assignment for Sensor Networks,” Proceedings of IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2005), November 2005.

[104]

Z. Cen, M. W. Mutka, D. Zhu, and N. Xi, “Improved Transport Service for Remote Sensing and Control over Wireless Networks,” Proceedings of IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2005), November 2005.

[103]

A. Chobanyan, M. W. Mutka, Z. Cen, N. Xi, “One Way Delay Trend Detection for Available Bandwidth Measurement,” Proceedings of IEEE Globecom 2005, November 2005.

[102]

D. Zhu, M. W. Mutka, Z. Cen, “Using Cooperative Multiple Paths to Reduce File Download Latency,” Proceedings of IEEE Globecom 2005, November 2005.

[101]

H. Zhou, M. W. Mutka, and L. Ni, “Multiple-key Cryptography-based Distributed Certificate Authority in Mobile Ad Hoc Networks,” Proceedings of IEEE Globecom 2005, November 2005.

[100]

S.-S. Kang and M. W. Mutka, “A Mobile Peer-to-Peer Approach for Supporting Multimedia Content Sharing using 3G/WLAN Dual Mode Channels,” Wireless Communications and Mobile Computing Journal, Special Issue on WLAN/3G Integration for Next-Generation Heterogeneous Mobile Data Networks, vol. 5, no. 6, pp. 633-645, September 2005.

[99]

Z. Cen, M. W. Mutka, Y. Liu, A. Goradia, and N. Xi, “QoS Management of Supermedia Enhanced Teleoperation via Overlay Networks,” Proceedings of IEEE International Conference on Intelligent Robots and Systems (IROS 2005), August 2005.

[98]

A. Goradia, Z. Cen, N. Xi, and M. W. Mutka, “Modeling and Design of Mobile Surveillance Networks Using a Mutational Analysis Approach,” Proceedings of IEEE International Conference on Intelligent Robots and Systems (IROS 2005), August 2005.

[97]

D. Zhu and M. W. Mutka, “Promoting Cooperation Among Strangers to Access Internet Services from an Ad Hoc Network,” Pervasive and Mobile Computing, vol. 1, no. 2, pp. 213-236, July 2005.

[96]

A. Bakić and M. W. Mutka, “Integrating On-Line Performance Visualization and Real-Time System Design,” Real-Time Systems Journal, vol. 30, no. 3, pp. 163-185, July 2005.

[95]

A. Goradia, N. Xi, M. Prokos, Z. Cen, and M. W. Mutka, “Cooperative Multi-Target Surveillance Using a Mutational Analysis Approach,” IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM 2005) July 2005.

[94]

A. Chobanyan, M. W. Mutka, V. S. Mandrekar, and N. Xi, Modeling Available Bandwidth for an Efficient QoS Characterization of a Network Path,” Proceedings of NETWORKING 2005, 4th International IFIP-TC6 Networking Conference, pp. 316-327, May 2005. In Lecture Notes in Computer Science Vol. 3462, 2005.

[93]

Z. Cen, M. W. Mutka, D. Zhu, and N. Xi, “Supermedia Transport for Teleoperations over Overlay Networks,” Proceedings of NETWORKING 2005, 4th International IFIP-TC6 Networking Conference, pp. 1409-1412, May 2005. In Lecture Notes in Computer Science Vol. 3462, 2005.

[92]

Z. Cen, A. Goradia, M. W. Mutka, N. Xi, W.-K. Fung, and Y-H. Liu, “Improving the Operation Efficiency of Supermedia Enhanced Internet Based Teleoperation via an Overlay Network,” Proceedings of IEEE International Conference on Robotics and Automation (ICRA 2005), April 2005.

[91]

F. Zhu, M. W. Mutka and L. Ni, “Facilitating Secure Ad hoc Service Discovery in Public Environments,” Journal of Systems and Software, vol. 76, no. 1, pp. 45-54, April 2005.

[90]

F. Zhu, W. Zhu, M. W. Mutka and L. Ni, “Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2005), March 2005.

[89]

S.-S. Kang, M. W. Mutka and L. Xiao, “Anonymous Content Sharing in Ad Hoc Networks,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2005), March 2005.

[88]

D. Zhu, M. W. Mutka and Z. Cen, “QoS Aware Wireless Bandwidth Aggregation (QAWBA) by Integrating Cellular and Ad-hoc Networks,” Proceedings of International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2004), pp. 156-163, October 2004.

[87]

H. Zhou, M. W. Mutka, and L. Ni, “IP Address Handoff in the MANET,” Proceedings of IEEE INFOCOM 2004, March 2004.

[86]

F. Zhu, M. W. Mutka and L. Ni, “PrudentExposure: A Private and User-Centric Service Discovery Protocol,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2004), pp. 329-338, March 2004.

[85]

D. Zhu and M. W. Mutka, “Promoting Cooperation Among Strangers to Access Internet Services from an Ad Hoc Network,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2004), pp. 229-238, March 2004.

[84]

S.-S. Kang and M. W. Mutka, “Efficient Mobile Access to Internet Data via a Wireless Peer-to-Peer Network,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2004), pp. 197-205, March 2004.

[83]

S.-S. Kang and M. W. Mutka, “CHUMcast in a Two-Tier Network,” Proceedings of International Conference on Information Networking (ICOIN 2004), pp. 523-532, February 2004. Selected to appear in Lecture Notes in Computer Science, Vol. 3090, pp. 124-133, 2004.

[82]

A. Bakić, M. W. Mutka, and D. T. Rover, “On-Line Performance Visualization Technology,” Software: Practice and Experience, vol. 33, no. 15, pp. 1447-1469, December 2003.

[81]

H. Zhou, L. M. Ni, and M. W. Mutka, “Prophet Address Allocation for Large Scale MANETs,” Ad HOC Networks, vol. 4, no. 1, pp. 423-434, November 2003.

[80]

F. Zhu, M. W. Mutka and L. Ni, “Facilitating Secure Ad hoc Service Discovery in Public Environments,” Proceedings of IEEE Computer Software and Applications Conference (COMPSAC 2003), pp. 433-438, November 2003.

[79]

S. Kang and M. W. Mutka, “Mobile Peer Membership Management to Support Multimedia Streaming,” Proceedings of the Workshop on Mobile and Wireless Networks (with ICDCS’03), pp. 770-775, May 2003.

[78]

H. Zhou, L. Ni, and M. W. Mutka, “Prophet Address Allocation for Large Scale MANETs,” Proceedings of IEEE INFOCOM 2003, March 2003.

[77]

D. Zhu and M. W. Mutka, “Sharing Presence Information and Message Notification in an Ad Hoc Network,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2003), pp. 351-358, March 2003.

[76]

F. Zhu, M. W. Mutka and L. Ni, “Splendor: A Secure, Private, and Location-aware Service Discovery Protocol Supporting Mobile Services,” Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom2003), pp. 235-242, March 2003.

[75]

B. Gelfand, M. W. Mutka and A. H. Esfahanian, “An Agent-Based Approach to Enforcing Fairness in Peer-to-Peer Distributed File Systems,” Proceedings of the 9th International Conference on Parallel and Distributed Systems (ICPADS 2002), pp. 157-162, December 2002.

[74]

B. Gelfand, M. W. Mutka and A. H. Esfahanian, “A-DFS: An Agent-Based Serverless Distributed File System,” Proceedings of PDCS 2002, 15th International Conference on Parallel and Distributed Computing Systems, pp. 545-551, September 2002.

[73]

R.-S. Ko and M. W. Mutka, “FRAME for Achieving Performance Portability within Heterogeneous Environments,” Proceedings of the 9th IEEE Conference on Engineering of Computer-Based Systems (ECBS 2002), pp. 67-76, April 2002.

[72]

R.-S. Ko and M. W. Mutka, “Adaptive Soft Real-Time Java within Heterogeneous Environments,” Proceedings of the Workshop on Parallel and Distributed Real-Time Systems (WPDRTS 2002), pp. 97–102, April 2002.

[71]

R.-S. Ko and M. W. Mutka, “A Component-Based Approach for Adaptive Soft Real-Time Java within Heterogeneous Environments,” Parallel and Distributed Computing Practices, vol. 5, no. 1, pp. 89-104, January 2002.

[70]

S.-S. Kang and M. W. Mutka, “Provisioning Service Differentiation in Ad Hoc Networks by the Modification of the Backoff Algorithm,” Proceedings of the International Conference of Computer Communications and Networks (ICCCN2001), pp. 577-580, October 2001.

[69]

A. Bakić, M. W. Mutka, D. T. Rover, and A. Waheed, “Performance Optimization of Distributed Applications in an Extensible, Adaptive Environment,” Future Generation Computer Systems, vol. 18, no. 1, pp. 131-145, September 2001.

[68]

W. Tang, L. Cherkasova, L. Russel, M. W. Mutka, “Modular TCP Handoff Design in STREAMS-Based TCP/IP Implementation,” Proceedings of the International Conference on Networking (ICN’01), Part II, in Springer: Lecture Notes in Computer Science LNCS 2094, pp. 71-81, July 2001.

[67]

H. Smith, M. W. Mutka and L. Yang, “Feedback Scalability for Multicast Videoconferencing,” Proceedings of the International Conference on Networking (ICN’01), Part I, in Springer: Lecture Notes in Computer Science LNCS 2093, pp. 640-648, July 2001.

[66]

W. Tang, L. Cherkasova, L. Russel, M. W. Mutka, “Customized Library of Modules for STREAMS-based TCP/IP Implementation to Support Content-Aware Request Processing for Web Applications,” Proceedings of the 3nd International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2001), June 2001.

[65]

A. Bakić and M. W. Mutka, “An Integrated Approach to Real-Time System Design and On-Line Performance Visualization with Steering,” Proceedings of the Real-Time Systems Symposium (RTSS 2000), pp. 141-150, November 2000.

[64]

H. Smith and M. W. Mutka, “Fair Link Sharing with Layered Multicast Videoconferencing,” Proceedings of Globecom 2000, pp. 1360-1364, November 2000.

[63]

A. Bakić, M. W. Mutka, and D. T. Rover, “BRISK: A Portable and Flexible Distributed Instrumentation System,” Software: Practice and Experience,, vol. 30, no.12, pp. 1353-1373, October 2000.

[62]

W. Tang and M. W. Mutka, “Load Distribution via Static Scheduling and Client Redirection for Replicated Web Servers,” Proceedings of the First Workshop on Scalable Web Services, pp. 127-133, August 2000.

[61]

Diane T. Rover, Betty Cheng, Chin-Long Wey, and Matt W. Mutka, “Incorporating Large-Scale Projects into a Multi-Disciplinary Approach to Embedded Systems,” Proceedings of the 2000 International Conference on Engineering Education (ICEE 2000),” Taipei, Taiwan, pp. 105-108, August 2000.

[60]

W. Tang, F. Du, M. W. Mutka, L. Ni, and A. Esfahanian, “Supporting Global Replicated Services by a Routing-Metric-Aware DNS,” 2nd International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), pp. 67-74, June 2000.

[59]

E. V. V. Reed and M. W. Mutka, “Mobile Computing Software Development,” Proceedings of the ASEE Conference on Engineering Education, June 2000.

[58]

W. Tang and M. W. Mutka, “Intelligent Browser Initiated Server Pushing,” IEEE International Performance, Computing, and Communications Conference (IPCCC-2000), pp. 17-23, February 2000.

[57]

J. R. Fernandez and M. W. Mutka, “A Burst-Level Priority Scheme for Bursty Traffic in ATM Networks,” Computer Networks, vol. 31, no. 1-2, pp. 31-43, January 1999.

[56]

A. Waheed, D. T. Rover, M. W. Mutka, H. Smith, and A. Bakić, “Modeling, Evaluation, and Adaptive Control of an Instrumentation System,” Int. Journal of Parallel and Distributed Systems and Networks, vol. 2, no. 3, pp. 142-154, 1999.

[55]

A. Bakić and M. W. Mutka, “A Compiler-Based Approach to Design and Engineering of Complex Real-Time Systems,” IEEE International Conference on Distributed Computing Systems (ICDCS’99), pp. 306-313, June 1999.

[54]

H. Smith, M. W. Mutka, and E. Torng, “Bandwidth Allocation for Layered Multicasted Video,” Proceedings of IEEE International Conference of Multimedia Computing and Systems (ICMCS’99), June 1999.

[53]

R. McFall and M. W. Mutka, “Automatic Maintenance of Referential Integrity in XML Documents,” Proceedings of WWW8 Conference Poster Session, May 1999.

[52]

A. Bakić, M. W. Mutka, and D. T. Rover, “BRISK: A Portable and Flexible Distributed Instrumentation System,” Proceedings of the IEEE International Parallel Processing Symposium/Symposium on Parallel and Distributed Processing , pp. 387-391, April 1999.

[51]

A. Bakić, M. W. Mutka, and D. T. Rover, “On-Line Performance Visualization Technology,” Proceedings of the IEEE Workshop on Heterogeneous Computing Systems pp. 47-59, April 1999.

[50]

H. Smith, M. W. Mutka, and D. T. Rover, “A Feedback Based Rate Control Algorithm for Multicast Transmitted Video Conferencing,” Journal of High Speed Networks, vol. 7, no. 3-4, pp. 259-279, 1998.

[49]

D. T. Rover, A. Waheed, M. W. Mutka, and A. Bakić, “Software Tools for Complex Distributed Systems: Toward Integrated Tool Environments,” IEEE Concurrency, vol. 6, no. 2, pp. 40-54, 1998.

[48]

M. W. Mutka and A. Bakić, “Teaching Undergraduate Computer Science and Engineering Students Techniques for the Design and Analysis of Real-Time Applications,” Proceedings of the 1998 Frontiers in Education Conference, November 1998.

[47]

B. Cheng, D. T. Rover, and M. W. Mutka, “A Multi-Pronged Approach to Bringing Embedded Systems into Undergraduate Education,” Proceedings of the ASEE Conference on Engineering Education, June 1998.

[46]

A. Bakić, M. W. Mutka, and D. T. Rover, “Real-Time System Performance Visualization and Analysis Using Distributed Visual Objects,” Proceedings IEEE Workshop on Middleware for Distributed Real-Time Systems and Services, pp. 154-161, December 1997.

[45]

J. R. Fernandez and M. W. Mutka, “A Burst-Level Priority Scheme for Bursty Traffic in ATM Networks,” Proceedings of the Sixth International Conference on Computer Communications and Networks, pp. 11-16, September 1997.

[44]

A. Bakić, M. W. Mutka, D. T. Rover and A. Waheed, “Performance Optimization of Distributed Applications in an Extensible, Adaptive Environment,” Proceedings of the Workshop on Performance Data Mining, 1997 ACM International Conference on Supercomputing, Vienna, Austria, July 1997.

[43]

A. Waheed, D. T. Rover, M. W. Mutka, H. Smith, and A. Bakić, “Modeling, Evaluation, and Adaptive Control of an Instrumentation System,” in Proceedings of the IEEE Real-Time Technology and Applications Symposium (RTAS’97), pp. 100-110, June 1997.

[42]

M. W. Mutka and D. T. Rover, “A VESL for Real-Time Computing in an Undergraduate Computer Engineering Program,” in Proceedings of the 2nd IEEE Real-Time Education Workshop (RTEW’97), pp. 86-89, June 1997.

[41]

H. Smith and M. W. Mutka, “Pattern Smoothing for Compressed Video Transmission,” in Proceedings of the IEEE International Conference on Communications (ICC’97), pp. 1335-1339, June 1997.

[40]

S. Perkins and M. W. Mutka, “Dependency Removal for Transport Protocol Header Compression over Noisy Channels,” in Proceedings of the IEEE International Conference on Communications (ICC’97), pp. 1025-1029, June 1997.

[39]

R. Sass and M. W. Mutka, “Statistical Behavior of Cluster Computing Applications,” in Proceedings of the Cluster Computing Conference (CCC ’97), March 1997.

[38]

J.-P. Li and M. W. Mutka, “Real-Time Virtual Channel Flow Control,” Journal of Parallel and Distributed Computing, vol. 32, no. 1, pp. 49-65, January 1996.

[37]

D. Min and M. W. Mutka, “A Model for Analyzing Interactions in 2-D Mesh Wormhole-Routed Multicomputers,” Parallel Computing, vol. 22, pp. 675-699, 1996.

[36]

A. Bakić, M. W. Mutka, D. T. Rover, and A. Waheed, “Extensible Tool Environment Support for Complex, Distributed Systems,” in Proceedings of the Symposium on Parallel and Distributed Processing Workshop on Instrumentation and Visualization for Real-Time Systems, October 1996.

[35]

S. J. Perkins and M. W. Mutka, “Characteristics of Low-Bandwidth Conversations,” in Proceedings of the IEEE International Conference on Communications (ICC’96), pp. 1591-1595, June 1996.

[34]

S. J. Perkins and M. W. Mutka, “Low-Bandwidth Access: An Evaluation of Application Level Protocol Compressibility,” in Proceedings of the 4th International Conference on Telecommunication Systems, pp. 97-108, March 1996.

[33]

A. Waheed, D. T. Rover, M. W. Mutka, A. Bakic, and D. Pierce, “Vista: A Framework for Instrumentation System Design for Multidisciplinary Application,” Proceedings of the International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS ’96) Tools Fair, February 1996.

[32]

J.-P. Li and M. W. Mutka, “A Tool for Allocating Periodic Real-Time Tasks to a Set of Processors,” Journal of Systems and Software, 29, No. 2, pp. 135-148, May 1995.

[31]

M. Litzkow, M. Livny, and M. W. Mutka, “Condor - A Hunter of Idle Workstation,” in Scheduling and Load Balancing in Parallel and Distributed Systems, (reprint of paper from Proceedings of the 1988 Conference on Distributed Computing Systems (ICDCS)), IEEE Computer Society Press, B. Shirazi, A. R. Hurson, and K. M. Kavi, eds., pp. 382–389, 1995.

[30]

J. R. Fernandez and M. W. Mutka, “Model and Call Admission Control for Distributed Applications with Correlated Bursty Traffic,” in Proceedings of Supercomputing ’95, December 1995.

[29]

D. Min and M. W. Mutka, “Efficient Job Scheduling in a Mesh Multicomputer Without Discrimination Against Large Jobs,” Proceedings of the IEEE Symposium on Parallel and Distributed Processing, pp. 52-59, October 1995.

[28]

J. R. Fernandez and M. W. Mutka, “A Burst-Oriented Traffic Control Framework for ATM Networks,” Proceedings of the Fourth International Conference on Computer Communications and Networks, pp. 132-139, September 1995.

[27]

D. Min and M. W. Mutka, “Effects of Job Interactions Due to Job Partitioning and Placement,” Proceedings of the 8th International Conference on Parallel and Distributed Computing Systems, pp. 262-267, September 1995.

[26]

M. W. Mutka, “Considering Deadline Constraints When Allocating the Shared Capacity of Private Workstations,” International Journal of Computer Simulation, vol. 4, no. 1, pp. 41-63 1994.

[25]

M. W. Mutka and L. Ni, “A Highly Available Personal File System,” Readings in Distributed Computing, IEEE Computer Society Press, T. L. Casavant and M. Singhal, eds., 425–446 1994.

[24]

R. Sass and M. W. Mutka, “Enabling Unimodular Transformations,” Proceedings of Supercomputing ’94, pp. 753-762, November 1994.

[23]

R. Sass and M. W. Mutka, “Transformations on Doubly Nested Loops,” PACT ’94, Proceedings of the International Parallel Architectures and Compilation Techniques Conference, August, pp. 343-346, 1994.

[22]

J.-P. Li and M. W. Mutka, “Priority Based Real-Time Communication for Large Scale Wormhole Networks,” Proceedings of the IEEE IPPS ’94, 8th International Parallel Processing Symposium, pp. 433-438, April 1994.

[21]

D. Min and M. W. Mutka, “A Multipath Contention Model for Analyzing Job Interactions in 2-D Mesh Multicomputers,” Proceedings of the IEEE IPPS ’94, 8th International Parallel Processing Symposium, pp. 744-751, April 1994.

[20]

J.-P. Li and M. W. Mutka, “Real-Time Virtual Channel Flow Control,” Proceedings of the IEEE International Phoenix Conference on Computers and Communications, pp. 97-103, April 1994.

[19]

M. W. Mutka, “Using Rate Monotonic Scheduling Technology to Support Real-Time Communications in Wormhole Networks,” Proceedings of the Second Workshop on Distributed and Parallel Real-Time Systems, pp. 194-199, April 1994.

[18]

C.-M. Chiang and M. W. Mutka, “Characteristics of User File Usage Patterns,” Journal of Systems and Software, 23(3) pp. 257-268, December 1993.

[17]

M. W. Mutka and P. K. McKinley, “Supporting a Simulation Environment with OpenSim,” Simulation, 61(4), pp. 223-235, October 1993.

[16]

D. Min and M. W. Mutka, “Determining External Contention Delay Due to Job Interactions in a 2-D Mesh Wormhole Routed Multicomputer,” Proceedings of the IEEE Symposium on Parallel and Distributed Processing, pp. 258-265, December 1993.

[15]

D. Min and M. W. Mutka, “Effects of Job Size Irregularity on the Dynamic Resource Scheduling of a 2-D Mesh Multicomputer,” Proceedings of PARLE ’93, Parallel Architectures and Language Europe Conference, pp. 476–487, June 1993.

[14]

D. Min and M. W. Mutka, “A Framework for Predicting Delay Due to Job Interaction in a 2-D Mesh Multicomputer,” Proceedings of the IEEE IPPS ’93, 7th International Parallel Processing Symposium, pp. 350-357, April 1993.

[13]

J.-P. Li and M. W. Mutka, “Dynamic Scheduling Overhead of Time-Constrained Task Groups on Mesh Multiprocessors,” Proceedings of the First Workshop on Parallel and Distributed Real-Time Systems, pp. 127-136, April 1993.

[12]

C. M. Chiang, M. W. Mutka, Q. Du, and R. Sass, “An Empirical Study of Scalable Domain Decomposition Methods for a 2-D Parabolic Equation Solver,” Proceedings of the Sixth SIAM Conference on Parallel Processing for Scientific Computing, pp. 687–690, March 1993.

[11]

M. W. Mutka, “Estimating Capacity for Sharing in a Privately Owned Workstation Environment,” IEEE Transactions on Software Engineering, 18(4), pp. 319-328, April 1992.

[10]

C.-M. Chiang and M. W. Mutka, “Characteristics of User File Usage Patterns,” Proceedings of the Fifth ISMM Int. Conference on Parallel and Distributed Computing and Systems,” pp. 50–55, October 1992.

[9]

M. W. Mutka and L. Ni, “Managing Personal Files Across Independent File Management Units,” Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems in the 1990’s, pp. 254–261, April 1992.

[8]

M. W. Mutka and P. K. McKinley, “The OpenSim Approach — Tools for Management and Analysis of Simulation Jobs,” Proceedings of the 1992 Winter USENIX Technical Conference, pp. 291–304, January 1992.

[7]

M. W. Mutka and M. Livny, “The Available Capacity of a Privately Owned Workstation Environment,” Performance Evaluation, 12(4) pp. 269-284, July 1991.

[6]

M. W. Mutka, “An Examination of Strategies for Estimating Capacity to Share Among Private Workstations,” Proceedings of the 1991 ACM Symposium on Small Systems, pp. 41-49, June 1991.

[5]

M. W. Mutka, “A Comparison of Workload Models of the Capacity Available for Sharing Among Privately Owned Workstations,” Proceedings of the 24th Hawaii International Conference on System Sciences, vol. 1, pp. 353-362, January 1991.

[4]

M. W. Mutka, “Executing Jobs with Deadline Constraints in a Privately Owned Workstation Environment,” Proceedings of COMPSAC 90, Computer Software and Applications Conference, pp. 687-692, October 1990.

[3]

M. Litzkow, M. Livny, and M. W. Mutka, “Condor - A Hunter of Idle Workstations,” Proceedings of the 8th International Conference of Distributed Computing Systems (ICDCS), pp. 104-111, June 1988.

[2]

M. W. Mutka and M. Livny, “Profiling Workstations’ Available Capacity For Remote Execution,” Performance ’87, Proceedings of the 12th IFIP WG 7.3 Symposium on Computer Performance, pp. 529-544, December 1987.

[1]

M. W. Mutka and M. Livny, “Scheduling Remote Processing Capacity In A Workstation-Processing Bank Computing System,” Proceedings of the 7th International Conference of Distributed Computing Systems (ICDCS), pp. 2-9, September 1987.