2002 - IEEE Fellow For contributions to systems for advanced broadband, mobile data and mobile telecommunication networks
His primary areas of study are Computer network, Network packet, Distributed computing, Base station and Telecommunications. His research on Computer network frequently connects to adjacent areas such as Wi-Fi array. His research in Network packet intersects with topics in Forward error correction, FX.25 Forward Error Correction, Electronic engineering and Parity bit.
His Distributed computing research is multidisciplinary, relying on both Algorithm design, Reliability and Social network. His biological study spans a wide range of topics, including Mobile device and Network service. In the field of Telecommunications, his study on Wireless, Common-channel signaling, Channel-associated signaling and Cable modem overlaps with subjects such as Normalization property.
Thomas F. La Porta mainly focuses on Computer network, Distributed computing, Wireless sensor network, Wireless network and Wireless. Computer network connects with themes related to Throughput in his study. In Distributed computing, he works on issues like Scheduling, which are connected to Approximation algorithm.
Thomas F. La Porta interconnects Resource allocation, Data mining, Key distribution in wireless sensor networks, Real-time computing and Mathematical optimization in the investigation of issues within Wireless sensor network. Many of his research projects under Wireless network are closely connected to Android with Android, tying the diverse disciplines of science together. His Mobile computing study combines topics from a wide range of disciplines, such as Software deployment, Mobile device and Mobile telephony.
Thomas F. La Porta mostly deals with Computer network, Distributed computing, Mobile device, Computer security and Wireless network. The study incorporates disciplines such as Wireless, Throughput and Distributed algorithm in addition to Computer network. The concepts of his Distributed computing study are interwoven with issues in Resource allocation, Cellular traffic, Network topology, Analytics and Server.
His Mobile device study incorporates themes from Real-time computing and Deep learning, Convolutional neural network, Video processing, Artificial intelligence. His Side channel attack and Malware study, which is part of a larger body of work in Computer security, is frequently linked to Deception, bridging the gap between disciplines. Adaptive algorithm and Greedy algorithm is closely connected to Testbed in his research, which is encompassed under the umbrella topic of Wireless network.
His primary areas of investigation include Distributed computing, Computer network, Network topology, Mobile device and Mobile computing. His research integrates issues of Forwarding plane, Packet loss and Interdependent networks, Complex network in his study of Distributed computing. His Computer network course of study focuses on Computer security and Bandwidth.
His Network topology research includes elements of Telecommunications network, Mathematical optimization and Identifiability. His Mobile computing research is multidisciplinary, incorporating perspectives in Distributed algorithm, Cellular traffic, Approximation algorithm and Mobile telephony. His Mobile telephony research includes themes of Wireless ad hoc network, Wireless sensor network and Wireless network.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Movement-assisted sensor deployment
Guiling Wang;Guohong Cao;Tom La Porta.
IEEE Transactions on Mobile Computing (2006)
Demo: Medusa: a programming framework for crowd-sensing applications
Moo-Ryong Ra;Bin Liu;Tom F. La Porta;Ramesh Govindan.
international conference on mobile systems, applications, and services (2012)
IP micro-mobility support using HAWAII
S. Thuel;Thomas Porta;L. Salgarelli;R. Ramjee.
(2000)
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)
Two phase local mobility scheme for wireless access to packet based networks
Thomas F. La Porta;Kazutaka Murakami;Ramachandran Ramjee;Sandra R. Thuel.
(1999)
Exploiting open functionality in SMS-capable cellular networks
William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)
SET: Detecting node clones in sensor networks
Heesook Choi;Sencun Zhu;Thomas F. La Porta.
international workshop on security (2007)
Verteilte Datenverarbeitungsarchitektur zum Steuern von Breitband- und Schmalband Netzwerken
Porta Thomas F La;Malathi Veeraraghavan.
(1994)
A Survey of Sensor Selection Schemes in Wireless Sensor Networks
Hosam Rowaihy;Sharanya Eswaran;Matthew Johnson;Dinesh Verma.
Unattended Ground, Sea, and Air Sensor Technologies and Applications IX (2007)
Interactive Call Identification
Thomas F. La Porta;Arun Narayan Netravali.
(1997)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Pennsylvania State University
Pennsylvania State University
University of California, Riverside
City University of New York
Microsoft (United States)
University of Florida
United States Army Research Laboratory
University of Virginia
Johns Hopkins University
Cardiff University
Carnegie Mellon University
Hunan University
University of Cambridge
University of Warwick
Fox Chase Cancer Center
Plymouth Marine Laboratory
United States Geological Survey
University of Minnesota
National Institutes of Health
University of California, Berkeley
Case Western Reserve University
Yale University
University College London
University of Western Ontario
University of Michigan–Ann Arbor
University of California, Los Angeles