throbber
TREWS
`
`Prasant Mohapatra, Ph.D.
`Department of Computer
`Science University of California
`
`
`Davis, CA 95616
`
`
`_____________________________________________________________________________
`
`RESEARCH INTERESTS
`Computer Networks, Wireless Networks and Mobile Systems, Sensor Networks,
`Wireless Security, Cyber Security, and Internet Quality of Support.
`
`TEACHING EXPERIENCE
`
`Undergraduate Courses:
`Computer Networks
`
`Computer System Architecture
`Computer Organization
`Introduction to Computer Science
`
`Graduate Courses:
`Advanced Computer Networks
`Wireless and Mobile Networks
`Computer System Performance
`Computer Architecture
`
`EDUCATION
`
`Ph.D.
`
`M.S.
`
`B. S.
`
`The Pennsylvania State University
`University Park, PA
`The University of Rhode Island
`Kingston, RI
`National Institute of Technology
`Rourkela, India
`
`1993
`
`1989
`
`1987
`
`PROFESSIONAL EXPERIENCE
`
`2003 --
`
`2014 --
`
`Professor, Computer Science Department,
`University of California, Davis, CA
`
`Associate Chancellor, University of California, Davis, CA
`
`2013 -- 2014
`
`Interim Vice-Provost and CIO, University of California, Davis, CA
`
`2009 -- 2013
`
`Tim Bucher Family Endowed Chair, University of California, Davis, CA
`
`2007 -- 2013
`
`2001 -- 2003
`
`1999 – 2001
`
`Chair, Computer Science Department,
`University of California, Davis, CA
`
`Associate Professor, Computer Science Department,
`University of California, Davis, CA
`
`Associate Professor, Computer Science & Engineering Department
`Michigan State University, East Lansing, MI
`
`1998-1999
`
`Associate Professor, Electrical and Computer Engineering Department
`
`Page 1
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 1
`
`

`
`
`
`
`
`1993-1998
`
`
`
`
`
`
`Iowa State University, Ames, IA 50011
`
`Assistant Professor, Electrical and Computer Engineering Department
`Iowa State University, Ames, IA 50011
`
`
`
`HONORS AND AWARDS
`
` •
`
` Fellow of AAAS, 2013
`• Fellow of the IEEE, 2010
`• Outstanding Engineering Alumni Award, Pennsylvania State University, 2008
`• Outstanding Engineering Faculty Award, College of Engineering, UC Davis, 2011.
`• HP Labs Innovation Award, 2011, 2012, 2013
`• Editor-in-Chief, IEEE Transactions on Mobile Computing, 2014-
`• Paper published in ICCD-2000 was selected among the four most influential work during the
`first 30 years of ICCD conference (A Retrospective presented at the 30th ICCD-2012)
`• Best Paper Awards:
`o
`IFIP Networking, 2014
`o ACM BodyNets, 2013
`o
`IEEE ICCCN, 2013
`o
`International Symposium on Wireless Personal Multimedia Communications, 2011.
`o
`IEEE Wireless Mobile Computing (WiMob) Conference, 2009
`
`
`
`LITIGATION RELATED CONSULTING
`
`
`• Patent Infringement case between US Ethernet Innovations and Savemart, Topic:
`Ethernet Packet Forwarding, 2011.
`• Patent Infringement case between Rockus Wireless, Inc and Netgear, Inc., Topic:
`Wireless Mesh Networks, 2013 (Gave Deposition)
`• Patent Re-Examination, Walker Digital LLC, Topic: Remote Video Surveillance, 2013
`• Patent Inter Partes Review of Patent, Clouding LLC and Oracle, Inc., Topic: Web Access
`on Pervasive Devices, 2013
`Inter Partes Review of Patent, Clouding LLC and Oracle, Inc., Topic: Dynamic
`Distributed Data Systems, 2013
`Inter Partes Review of Patent, Clouding LLC and Oracle, Inc., Topic: Key Management
`for Network Configurations, 2013
`Inter Partes Review of Patent, Clouding LLC and Oracle, Inc., Topic: Configuration of
`Dynamic Computing Environments, 2013
`Inter Partes Review of Patent, General Growth, Westfield, etc. and George Peshchke,
`Topic: Layout-Based Method for Map Navigation, 2013.
`• Patent Infringement case between Polaris Wireless and TruePosition, Inc, Topic:
`Location based Services in Wireless Applications, 2014.
`Inter Partes Review of Patent, Kinetics Technologies, Inc and Skyworks Solutions, Inc.,
`Topic: Integrated Devices with Serial Inputs for Pulses, 2014.
`Inter Partes Review of Patent, Rackspace Hosting, Inc and Clouding IP, LLC, Inc.,
`Topic: Replica Synchronization Using Copy-on-Read, 2014. (Gave Deposition)
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`
`
`Page 2
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 2
`
`

`
`•
`
`Inter Partes Review of Patent, Unified Patents Inc / SAP America Inc and Clouding IP,
`LLC, Inc., Topic: Methods and Apparatus for File Synchronization and Updating Using
`a Signature List, 2014. (Gave Deposition)
`Inter Partes Review, Arista Networks vs Cisco, 2015.
`•
`• Patent Invalidation Case, Apple vs IXI, 2015.
`• Patent Invalidation Case, AT&T vs Intellectual Ventures, 2015.
`
`
`
`RECENT GRANTS AND CONTRACTS
`
`[25] P. Mohapatra (Co-PI), $23.2M (plus $25.0M for 5-yr extension), Army Research
`Laboratory, Cybersecurity Research Alliance, “Models
`for Enabling Continuous
`Reconfigurability of Secure Missions,” 2013-19. (PI: P. MacDaniel, Co-PIs: K. Levitt, Z. Su,
`T. LaPorta, T. Jaeger, S. Krishnamurthy, H. Madhyastha, I. Neamtiu, J. Camp, B. Bertenthal,
`D. Henshel, L. Cranor, L. Bauer, N. Christin, C. Gonzalez)
`
`
`[24] P. Mohapatra (Co-PI), $500,000, National Science Foundation, “Towards a User-Centric
`Battery Management System for Smartphones,” 2013-16. (Co-PI: Srikanth Krishnamurthy)
`
`
`[23] P. Mohapatra (PI), $75,000, Hewlett Packard Company, “Location Based Communications
`and Services,” 2013-14.
`
`
`[22] P. Mohapatra (PI), $150,000, National Science Foundation, “Deep Network Inspection,”
`2012-14.
`
`
`[21] P. Mohapatra (PI), $95,000, Hewlett Packard Company, “Location Based Communications
`and Services,” 2012-13.
`
`
`[20] P. Mohapatra (PI), $119,500, US Army Research Laboratory, “Trusted Networks,” 2011-12.
`
`[19] P. Mohapatra (PI), $195,000, US Army Research Office, “Mobility and Security in Wireless
`Networks,” 2011-12.
`
`
`[18] P. Mohapatra (PI), $75,000, Hewlett Packard Company, “Location Based Communications
`and Services,” 2011-12.
`
`
`[17] P. Mohapatra (PI), Total $35.5M, $7,000,000 (UC Davis Share), Army Research
`Laboratory, Collaborative Technology Alliance (CTA), “Quality of Information Aware
`Networks for Tactical Applications,” (Co-PIs: K. Levitt, F. Wu, R. D’Souza, Q. Zhao), 2009-
`2019.
`
`
`[16] P. Mohapatra (Co-PI), $65,000, Intel Corporation, “SWiM: Scalable Wireless Mesh
`Networks,” 2008-09 (PI: X. Liu).
`
`
`[15] P. Mohapatra (PI), $200,000, National Science Foundation “Cross-layer Design for
`Streaming Video in Multihop Wireless Mesh Networks” 2008-11.
`
`
`[14] P. Mohapatra (PI), $20,000, Intel Corporation “Diversity Research Program” 2008-09.
`
`
`
`
`Page 3
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 3
`
`

`
`[13] P. Mohapatra (Co-PI), $65,000, Intel Corporation, “WiMO: Wireless Management
`Overlays” 2007-08 (PI: C. N. Chuah).
`
`
`[12] P. Mohapatra (PI), $290,000, National Science Foundation, “Cooperative Security
`Mechanisms for DNS” 2007-10.
`
`
`[11] P. Mohapatra (PI), $280,000, National Science Foundation, “QuRiNet: A Wide-Area
`Outdoor Mesh Test-bed” 2007-11 (Co-PIs: X. Liu, V. Boucher).
`
`
`[10] P. Mohapatra (PI), $6,250,000, Department of Defense (Army Research Office),
`“ARSENAL: A Cross-Layer Architecture for Secure Resilient Tactical Mobile Ad Hoc
`Networks,” 2006-07 (Co-PIs: K. Levitt, F. Wu, S. Krishnamurthy, M. Falutsos, L.
`Swindlehurst, M. Jensen, S. Kasera, T. La Porta, G. Cao, P. Krishnamurthy, D. Tipper, J. J.
`Garcia-Luna-Aceves), 2007-2012.
`
`
`[9] P. Mohapatra (PI), $25,000, Hewlett Packard Company, “Video over Wireless Mesh
`Networks,” 2007-08.
`
`
`[8] P. Mohapatra (Co-PI), $70,000, Intel Corporation, “Management of Wireless Mesh
`Networks” 2006-07 (PI: C. N. Chuah).
`
`
`[7] P. Mohapatra (Co-PI), $65,000, Intel Corporation, “Scalable Enterprise Mesh Networks,”
`2006-07 (PI: X. Liu).
`
`
`[6] P. Mohapatra (PI), $150,000, Intel Corporation, “Trusted Autonomics,” 2006-07 (Co-PI: K.
`Levitt).
`
`
`[5] P. Mohapatra (PI), $40,000, Hewlett Packard Corporation, “QoS in Wireless Mesh
`Networks,” 2005-2006.
`
`
`[4] P. Mohapatra (PI), $70,000, Intel Corporation, “Wireless Management Overlays,” 2005-2006
`(with C. N. Chuah).
`
`
`[3] P. Mohapatra and G. Manimaran, $360,000, National Science Foundation, “DiffServ-Aware
`Multicasting,” 2003-2006.
`
`
`[2] P. Mohapatra, $200,000, National Science Foundation (subcontract from UCLA), “Scalable
`Testbed for Next Generation Mobile Wireless Networking Technologies,” 2003-2006.
`
`
`[1] P. Mohapatra and L. N. Bhuyan, $441,645, National Science Foundation, “Scalable Software
`Systems for Large Internet Servers,” 2003-2007.
`
`
`
`PATENTS:
`
`[3] US Patent Pending: Signal Space Based Navigation, (With S. Sen, K. H. Kim, J. Zhu).
`
`[2] US Patent Number: 8,965,398: Bluetooth Beacon Based Location Determination, (With J.
`Zhu, K. Zeng, K. H. Kim), February 24, 2015.
`
`
`
`
`
`Page 4
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 4
`
`

`
`[1] US Patent Number: 6,466,978: Multimedia File Systems Using File Managers Located on
`Clients for Managing Network Attached Storage Devices, (With S. Mukherjee and I. Kamel),
`October 15, 2002.
`
`
`
`RECENT TECHNICAL PUBLICATIONS [From over 300 Publications]
`
`Selected Journal Papers
`
`[75] E. Baik, A. Pande, and P. Mohapatra, “Efficient MAC for Real-time Video Streaming over
`Wireless LAN,” To appear in the ACM Transactions on Multimedia Computing
`Communications and Applications (TOMM).
`
`
`[74] C. Lyu, D. Gu, Y. Zeng, and P. Mohapatra, “PBA: Prediction-based Authentication for
`Vehicle-to-Vehicle Communications,” To appear in the IEEE Transactions on Dependable
`and Secure Computing.
`
`
`[73] S. Chen, A. Pande, K. Zeng, and P. Mohapatra, “Live Video Forensics: Source
`Identification in Lossy Wireless Networks,” To appear in the IEEE Transactions on
`Information Forensics and Security.
`
`
`[72] P. Pathak, R. Dutta, and P. Mohapatra, “On Availability-Performability Trade-off in
`Wireless Mesh Networks,” To appear in the IEEE Transactions on Mobile Computing.
`
`
`[71] C. C. Chen, P. Sun, L. Yuan, D. A. Maltz, C. N. Chuah, and P. Mohapatra, “SWIM: Switch
`Manager for Data Center Networks,” IEEE Internet Computing. pp. 30-36, No. 4, Jul-
`Aug, 2014.
`
`
`[70] S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, “Predicting User Traits from
`a Snapshot of Apps Installed on a Smartphone,” Mobile Computing and Communications
`Review (MC2R), Vol. 18, No. 2, pp. 1-8, April 2014.
`
`
`[69] X. Wang, W. Cheng, P. Mohapatra, and T. Abdulzaher, “Enabling Reputation and Trust in
`Privacy-Preserving Mobile Sensing,” IEEE Transactions on Mobile Computing, Vol. 13,
`No. 12, pp. 2777-2790, Dec. 2014.
`
`
`[68] S. Chen, K. Zeng, and P. Mohapatra, “Efficient Data Capturing for Network Forensics in
`Cognitive Radio Networks,” IEEE/ACM Transactions on Networking, Vol. 22, No. 6, pp.
`1988-2000, Dec. 2014.
`
`
`[67] C. C. Chen, L. Yuan, A. Greenberg, C. N. Chuah, and P. Mohapatra, “Routing-as-a-Service
`(RaaS): A Framework for Tenant-Directed Route Control in Data Centers,” IEEE/ACM
`Transactions on Networking, pp. 1401-1414, October 2014.
`
`
`[66] P. Congdon, P. Mohapatra, M. Farrens, and V. Akella, “Simultaneously Reducing Latency
`and Power Consumption in OpenFlow Switches,” IEEE/ACM Transactions on Networking,
`pp. 1007-1020, June 2014.
`
`
`
`
`
`Page 5
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 5
`
`

`
`[65] D. Ghosh and P. Mohapatra, “Resource Allocation Using Link State Propagation in
`OFDMA Femto Networks,” Computer Communications, vol. 46, pp. 3-9, June 2014.
`
`
`[64] A. Pande, S. Chen, P. Mohapatra, and J. Zambreno, “Hardware Architecture for Video
`Authentication using Sensor Pattern Noise,” IEEE Transactions on Circuits and Systems for
`Video Technology, Vol. 24, No. 1, pp. 157-167, January 2014.
`
`
`[63] S. Jana, K. Zeng, W. Cheng, and P. Mohapatra, “Trusted Collaborative Spectrum Sensing
`for Mobile Cognitive Radio Networks,” IEEE Transactions on Information Forensics &
`Security, Vol. 8, No. 9, pp. 1497-1507, September 2013.
`
`
`[62] A. Pande, V. Ramamurthi, and P. Mohapatra, “Quality-oriented Video delivery over LTE,”
`Journal of Computer Science and Engineering, KIISE, vol. 7, No. 3, pp.168-176, September
`2013 (Invited Paper).
`
`
`[61] K. Tang, K. Kim, Y. Xin, S. Rangarajan, and P. Mohapatra, “RECOG: A Sensing-based
`Cognitive Radio System with Real-Time Application Support,” IEEE Journal on Selected
`Areas in Communications, Vol. 31, No. 11, pp. 2504-16, November 2013.
`
`
`[60] A. Pande, V. Ahuja, R. Sivaraj, E. Baik, and P. Mohapatra, “Video Delivery Challenges and
`Opportunities in 4G Networks,” IEEE Multimedia, pp. 88-94, July-Sept. 2013.
`
`
`[59] S. Jana, A. Pande, A. Chan, and P. Mohapatra, “Mobile Video Chat: Issues and Challenges,”
`IEEE Communications, Vol. 51 (6), pp. 144-151, June 2013.
`
`
`[58] K. Tan, S. Jana, P. H. Pathak, and P. Mohapatra, “On Insider Misbehavior Detection in
`Cognitive Radio Networks,” IEEE Network, Vol. 27 (3), pp. 4-9, 2013.
`
`
`[57] P. McDonagh, A. Pande, L. Murphy, and P. Mohapatra, “Towards Deployable Methods for
`Assessment of Quality for Scalable IPTV Services,” IEEE Transactions on Broadcasting,
`vol. 59, No. 2, pp. 223-237, June 2013.
`
`
`[56] L. Yuan, C. C. Chen, P. Mohapatra, and C. N. Chuah, “A Proxy View of Quality of Domain
`Name Service, Poisoning Attacks and Survival Strategies,” ACM Transactions on Internet
`Technology, vol. 12, Issue 3, pp. 9/1-26, May 2013.
`
`
`[55] Y. Wei, K. Zeng, P. Mohapatra, “Adaptive Wireless Channel Probing for Shared Key
`Generation based on PID Controller,” IEEE Transactions on Mobile Computing. Vol. 12,
`No. 9, 2013.
`
`
`[54] A. Pande, P. Mohapatra, and J. Zambreno, “Securing Multimedia Content using Joint
`Compression and Encryption,” IEEE Multimedia, pp. 50-61, Vol. 20, No. 4, Oct-Dec 2013.
`
`
`[53] S. Chen, K. Zeng, and P. Mohapatra, “Hearing is Believing: Detecting Wireless Microphone
`Emulation Attack in White Space,” IEEE Transactions on Mobile Computing, Vol. 12, No.
`3, 2013.
`
`
`[52] A. Pande, J. Zambreno, and P. Mohapatra “Arithmetic Coding as a non-linear dynamical
`system,” Communications in Nonlinear Science and Numerical Simulation, pp. 4536-43,
`Vol. 12, No. 12, 2012.
`
`
`
`Page 6
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 6
`
`

`
`
`[51] L. Zhang, D. Gupta, and P. Mohapatra, “How Expensive are Free Smartphone Apps,”
`Mobile Computing and Communications Review, pp. 21-32, Vol. 16, No. 3, July 2012.
`
`
`[50] C.T. Deccio, J. Sedayao, K. Kant, and P. Mohapatra, “Quantifying DNS Namespace
`Influence,” Computer Networks, Vol. 56, No. 2, pp. 780-794, 2012.
`
`
`[49] K. Govindan, K. Zeng, and P. Mohapatra, “Probability Density of the Received Power in
`Mobile Networks,” IEEE Transactions on Wireless Communications, Vol. 10, Issue 11, pp.
`3616-3619, 2011.
`
`
`[48] K. Govindan and P. Mohapatra, “Trust Computations and Trust Dynamics in Mobile Ad
`Hoc Networks,” IEEE Communications Surveys and Tutorials, Vol. 14, Issue 2, pp. 279-
`298, 2012.
`
`
`[47] D. Gupta, P. Mohapatra, and C. N. Chuah, “Seeker: A Bandwidth-based Association Control
`Framework for Wireless Mesh Networks,” ACM/Springer Wireless Networks, Vol. 17, No.
`5, pp. 1287-1304, 2011.
`
`
`[46] N. Cheng, K. Govindan and P. Mohapatra, “Rendezvous-based Trust Propagation to
`Enhance Distributed Network Security,” International Journal of Security and Networks
`(IJSN), No. 2/3, Vol. 6, pp. 112-122, 2011.
`
`
`[45] K. Tan, D. Wu, A. Chan, and P. Mohapatra, “Comparing Simulation Tools and
`Experimental Testbeds for Wireless Mesh Networks,” Pervasive and Mobile Computing
`Journal, Vol.7, Issue 4, pp. 434-448, Aug. 2011.
`
`
`[44] P. Djukic and P. Mohapatra, “Soft-TDMAC: A Software-based 802.11 Overlay TDMA
`MAC with Microsecond Synchronization,” IEEE Transactions on Mobile Computing, pp.
`253-258, March 2011.
`
`
`[43] W. Wang, X. Liu, J. Vicente, and P. Mohapatra, “Integration Gain of Heterogeneous
`WiFi/WiMax Networks,” IEEE Transactions on Mobile Computing, pp. 1131-1143, August
`2011.
`
`
`[42] D. Wu, D. Gupta, and P. Mohapatra, “QuRiNet: A Wide-Area Wireless Mesh Testbed for
`Research and Experimental Evaluations,” Ad Hoc Networks, Vol. 9, Issue 7, pp. 1221-1237,
`September 2011.
`
`
`[41] L. Yuan, C. N. Chuah, and P. Mohapatra, “ProgME: Towards Programmable Network
`Measurements,” IEEE/ACM Transactions on Networking, Vol. 19, No. 1, pp. 115-128, Feb.
`2011.
`
`
`[40] M. Huynh, P. Mohapatra, S. Goose, and R. Liao, “Rapid Ring Recovery: Sub-millisecond
`Decentralized Recovery for Ethernet Ring,” IEEE Transactions on Computers, vol. 60, No.
`11, pp. 1561-70, Nov. 2011.
`
`
`[39] A. Gupta, D. Ghosh, and P. Mohapatra, “Scheduling Prioritized Services in Multihop
`OFDMA Networks,” IEEE/ACM Transactions on Networking, vol. 18, No. 6, pp. 1780-
`1792, December 2010.
`
`
`
`Page 7
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 7
`
`

`
`
`[38] K. Zeng, K. Govindan, and P. Mohapatra, “Non-Cryptographic Authentication and
`Identification in Wireless Networks,” IEEE Wireless Communications, Vol. 17, Issue 5, pp.
`56-62, October 2010.
`
`
`[37] M. Huynh, S. Goose, and P. Mohapatra, “Resilience Technologies in Ethernet,” Computer
`Networks, Vol. 54, Issue 1, pp. 57-78, Jan. 2010.
`
`
`[36] D. Gupta, D. Wu, P. Mohapatra, and C. N. Chuah, “A Study of Overheads and Accuracy for
`Efficient Monitoring of Wireless Mesh Networks,” Journal of Pervasive and Mobile
`Computing, pp. 93-111, Vol. 6, Issue 1, Feb. 2010.
`
`
`[35] A. Sahoo, K. Kant, and P. Mohapatra, “BGP Convergence Delay after Multiple
`Simultaneous Router Failures: Characterization and Solutions,” Computer Communications,
`Vol. 32, pp. 1207-1218, May, 2009.
`
`
`[34] J. Li and P. Mohapatra, “Adaptive Per-Hop Differentiation for End-to-End Delay Assurance
`in Multihop Wireless Networks,” Ad Hoc Networks, Vol. 7, pp. 1169-1182, 2009.
`
`
`[33] M. Huynh, S. Goose, and P. Mohapatra, “Spanning Tree Elevation Protocol,” Computer
`Communications, vol. 32, Issue 4, pp. 750-765, March 2009.
`
`
`[32] D.S. Kim, D. H. Choi, and P. Mohapatra, “Real-Time Scheduling Method for Networked
`Discrete Control Systems,” Control engineering Practice, vol. 17, No. 5, pp. 564-570, 2009.
`
`
`[31] D. Ghosh, A. Gupta, and P. Mohapatra, “Scheduling in Multihop WiMAX Networks,”
`Mobile Computing and Communications Review (MC2R), Invited Paper, Vol. 12, No. 2,
`April 2008.
`
`
`[30] H. Yu, P. Mohapatra, and X. Liu, “Channel Assignment and Link Scheduling in Multi-
`channel Multi-radio Wireless Mesh Networks,” ACM Mobile Networks and Applications
`(MONET), vol. 13, pp. 169-185, April 2008.
`
`
`[29] M. Huynh and P. Mohapatra, “Metropolitan Ethernet Network: A Move from LAN to
`MAN,” Computer Networks, vol. 51, pp. 4867-4894, Dec. 2007.
`
`
`[28] Z. Li, L. Yuan, P. Mohapatra, and C. N. Chuah “On the Analysis of Overlay Failure
`Detection and Recovery,” Computer Networks, vol. 51, Issue 13, pp. 3828-3843, Sept.
`2007.
`
`
`[27] A. Gupta and P. Mohapatra, “Ultra Wide Band Medium Access Control Schemes,”
`Computer Networks, vol. 51, pp. 2976-2993, August 2007.
`
`
`[26] C. Gui and P. Mohapatra, "A Framework for Self-Healing and Optimizing Routing
`Techniques for Mobile Ad Hoc Networks,” ACM/Springer Wireless Networks (WINET),
`pp. 29-46, Vol. 14, Feb. 2008.
`
`
`[25] X. Liu and P. Mohapatra, “On the Deployment of Data Backhaul Nodes for Wireless Sensor
`Networks,” IEEE Transactions on Wireless Communications, pp. 1426-1436, Vol. 6, No. 4,
`April 2007.
`
`
`
`Page 8
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 8
`
`

`
`
`[24] J. Li and P. Mohapatra, “Analytical Modeling and Mitigation Techniques for the Energy
`Hole Problems in Sensor Networks,” Pervasive and Mobile Computing Journal, vol. 3, Issue
`3, pp. 233-254, June 2007.
`
`
`[23] K. Kredo and P. Mohapatra, “Medium Access Control in Wireless Sensor Networks,”
`Computer Networks, Vol. 51, pp. 961-994, March 2007.
`
`
`[22] L. Zhi and P. Mohapatra, “On the Investigation of Overlay Service Topologies,” Computer
`Networks, Vol. 51, Issue 1, pp. 54-68, Jan. 2007.
`
`
`[21] J. Li and P. Mohapatra, "LAKER: Learning from Past Actions to Guide Future Behaviors in
`Ad Hoc Routing," Wireless Communications and Mobile Computing (WCMC), Vol. 7, pp.
`495-511, 2007.
`
`
`[20] C. Gui and P. Mohapatra, “Overlay Multicast for MANETs Using Dynamic Virtual Mesh,”
`ACM/Springer Wireless Networks (WINET), pp. 77-91, Vol. 13, January 2007.
`
`
`[19] H. Chen and P. Mohapatra, “A Context-Aware HTML/XML Document Transmission
`Process for Mobile Wireless Clients,” World Wide Web Journal, pp. 439-461, December
`2005.
`
`
`[18] C. Gui and P. Mohapatra, "Hierarchical Multicasting Techniques and Scalability in Mobile
`Ad Hoc Networks" Ad Hoc Networks Journal, pp. 586-606, Sept. 2006.
`
`
`[17] J. Li and P. Mohapatra, "PANDA: A Novel Mechanism for Flooding Based Route
`Discovery in Ad Hoc Networks" ACM/Springer Wireless Networks (WINET), vol. 12, No.
`6, pp. 771-787, Dec. 2006.
`
`
`[16] Z. Li and P. Mohapatra, “QoS-Aware Multicasting in DiffServ Domains,” ACM Sigcomm
`Computer Communications Review, Vol. 34, No. 5, pp. 47-58, October 2004.
`
`
`[15] B. Yang and P. Mohapatra, “Diffserv-Aware Multicasting,” Journal of High-Speed
`Networks, vol. 13, No. 1, pp. 37-57, Aug 2004.
`
`
`[14] P. Mohapatra, C. Gui, and L. Jian, “Group Communications in Mobile Ad Hoc Networks,”
`Special Issue on Ad Hoc Networks, IEEE Computer, pp. 52-60, February 2004.
`
`
`[13] Z. Li and P. Mohapatra, QRON: QoS-Aware Routing in Overlay Networks,” IEEE Journal
`of Selected Areas in Communications, Special Issue on Service Overlay Networks, vol. 22,
`No. 1, pp. 29-40, January 2004.
`
`
`[12] B. Yang and P. Mohapatra, “Multicasting in MPLS Domains,” Computer Communications
`Journal, Vol. 27, pp. 162-170, February 2004.
`
`
`[11] P. Mohapatra, J. Li, and C. Gui, "QoS in Mobile Ad hoc Networks," Special Issue on QoS in
`Next-Generation Wireless Multimedia Communications Systems in IEEE Wireless
`Communications, pp. 44-53, June 2003.
`
`
`
`
`
`Page 9
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 9
`
`

`
`[10] H. Chen and P. Mohapatra, “Overload Control in QoS-Aware Web Servers,” Computer
`Networks, vol. 42/1, pp. 119-133, 2003.
`
`
`[9] X. Chen, H. Chen, and P. Mohapatra, “ACES: An Admission Control Scheme for QoS-
`Aware Web Servers,” Computer Communications Journal, pp. 1581-1593, August 2003.
`
`
`[8] Z. Li and P. Mohapatra, ``QMBF: A QoS-Aware Multicast Routing Protocol," Computer
`Communications Journal, vol. 26/6, pp. 611-621, 2003.
`
`
`[7] X. Chen and P. Mohapatra, “Performance Evaluation of Service Differentiating Internet
`Servers," IEEE Transactions of Computers, pp. 1368-1375, November 2002.
`
`
`[6] P. Mohapatra and H. Chen, “WebGraph: A Framework for Managing Dynamic Content in the
`Web,” IEEE Journal of Selected Areas in Communications, vol. 20, No. 7, pp. 1414-1425,
`September 2002.
`
`
`[5] F. Wang, P. Mohapatra, S. Mukherjee, and D. Bushmitch, “An Efficient Bandwidth
`Management Scheme for Real-Time Internet Applications,” Computer Communications
`Journal, vol. 25/17, pp. 1596-1605, September 2002.
`
`
`[4] F. Wang and P. Mohapatra, “Using Differentiated Services to Support Internet Telephony,”
`Computer Communications Journal, pp. 1846-1854, Dec. 2001.
`
`
`[3] K. Kant and P. Mohapatra, “Current Research Trends in Internet Servers,” ACM
`Performance Evaluation Review, pp. 5-7, September 2001.
`
`
`[2] F. Wang, P. Mohapatra, S. Mukherjee, and D. Bushmitch "A Random Early Demotion and
`Promotion Marker for Assured Services in the Internet," Special Issue on the QoS in the
`Internet, IEEE Journal of Selected Areas in Communications, pp. 2640-2650, Dec. 2000.
`
`
`[1] K. Kant and P. Mohapatra, “Scalable Internet Servers: Issues and Challenges,” ACM
`Performance Evaluation Review, September 2000.
`
`
`
`Selected Conference Papers
`
`[112] M. Wu, P. Pathak, and P. Mohapatra, “Enabling Privacy-Preserving First-Person Cameras
`Using Low Power Sensors,” IEEE SECON, 2015.
`
`[111] A. Das, P. Pathak, C. N. Chuah, and P. Mohapatra, “Characterization of Wireless Multi-
`Device Users,” IEEE SECON, 2015.
`
`[110] L. Zhang, P. Pathak, M. Wu, Y. Zhao, and P. Mohapatra, “AccelWord: Energy Efficient
`Hotword Detection through Accelerometer,” ACM MobiSys, 2015.
`
`[109] S. Seneviratne, A. Seneviratne, M. A. Kaafar, A. Mahanti, and P. Mohapatra, “Early
`Detection of Spam Mobile Apps,” International World Wide Web Conference (WWW-
`2015), 2015.
`
`
`
`Page 10
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 10
`
`

`
`[108] C. Xu, P. Pathak, and P. Mohapatra, “Finger-writing with Smartwatch: A Case for Finger
`and Hand gesture Recognition using Smartwatch,” ACM International Workshop on Mobile
`Computing Systems and Applications (ACM HotMobile), 2015.
`
`[107] L. Zhang, C. Xu, P. Pathak, and P. Mohapatra, “Characterizing Instant Messaging Apps on
`Smartphones,” Passive and Active Measurement Conference (PAM), 2015.
`
`[106] F. Jiang, E. Zarepour, M. Hassan, A. Seneviratne, and P. Mohapatra, “When to Type, Talk,
`or Swype: Characterizing Energy Consumption of Mobile Input Modalities,” IEEE
`International Conference on Pervasive Computing and Communications (PerCom), 2015.
`
`[105] P. Hu, H. Li, H. Fu, D. Cansever, and P. Mohapatra, “Dynamic Defense Strategy against
`Advanced Persistent Threat with Insiders,” IEEE INFOCOM, 2015.
`
`[104] E. Baik, A. Pande, C. Stover, P. Mohapatra, “Video Acuity Assessment in Mobile
`Devices,” IEEE INFOCOM, 2015.
`
`[103] R. Sivaraj, I. Broustis, N. Shankaranarayanan, V. Aggarwal, and P. Mohapatra, “Mitigating
`Macro-Cell Outage in LTE-Advanced Deployments,” IEEE INFOCOM, 2015.
`
`[102] J. Zhu, S. Sen, P. Mohapatra, “Navigating in Signal Space: A Crowd-sourced Sensing Map
`Construction for Navigation,” IEEE International Conference on Mobile Ad-hoc and Sensor
`Systems (MASS), 2014.
`
`[101] Y. Zeng, P. Pathak, C. Xu, and P. Mohapatra, “Your AP Knows How You Move: Fine-
`grained Device Motion Recognition Through WiFi,” ACM Workshop on Hot Topics in
`Wireless (HotWireless), 2014.
`
`[100] S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, “Your Installed Apps
`Reveal Your Gender and More,” ACM Workshop on Security and Privacy in Mobile
`Environments (SPME), 2014.
`
`[99] J. Ning, I. Singh, H. Madhyastha, S. Krishnamurthy, G. Cao, and P. Mohapatra, “Secret
`Message Sharing Using Online Social Media,” IEEE Conference on Communications and
`Network Security (CNS), 2014.
`
`[98] R. Jin, L. Shi, K. Zeng, A. Pande, and P. Mohapatra, “MagPairing: Exploiting
`Magnetometers for Pairing Smartphones in Close Proximity,” IEEE Conference on
`Communications and Network Security (CNS), 2014.
`
`[97] S. Chen, A. Pande, and P. Mohapatra, “Sensor-Assisted Facial Recognition: An Enhanced
`Biometric Authentication System for Smartphones,” ACM Mobisys, 2014.
`
`[96] S. Jana, E. Baik, A. Pande, and P. Mohapatra, “Improving Mobile Video Telephony,” IEEE
`SECON, 2014.
`
`[95] W. Cheng, J. Zhu, P. Mohapatra, and J. Wang, “Time and Energy Efficient Localization,”
`IEEE SECON, 2014.
`
`[94] L. Zhang, C. Stover, A. Lins, C. Buckley, and P. Mohapatra, "Characterizing Mobile Open
`APIs in Smartphone Apps,” IFIP Networking, 2014. (AR=25%)
`
`
`
`Page 11
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 11
`
`

`
`[93] Y. Zeng, P. Pathak, and P. Mohapatra, "A First Look at 802.11ac in Action: Energy
`Efficiency and Interference Characterization,” IFIP Networking, 2014. Best Paper Award.
`
`[92] A. K. Das, P. Pathak, C. N. Chuah, and P. Mohapatra, "Contextual Localization Through
`Network Traffic Analysis," IEEE Infocom, 2014.
`
`[91] J. Kwak, O. Choi, S. Chong, and P. Mohapatra, "Dynamic Speed Scaling for Energy
`Minimization in Delay-Tolerant Smartphone Applications," IEEE Infocom, 2014. (AR=19%)
`
`[90] A. Pande, S. Chen, G. Pande, and P. Mohapatra, "Architecture for Blocking Detection in
`Wireless Video Source Authentication," IEEE International Conference on VLSI Design,
`2014.
`
`[89] A. Pande, Y. Zeng, A. Das, P. Mohapatra, S. Miyamoto, E. Seto, E. Henricson, J. Han,
`"Energy Expenditure Estimation with Smartphone Body Sensors,” International Conference
`on Body Area Networks (BODYNETS), 2013. Best Paper Award.
`
`[88] X. Wang, J. Zhu, A. Pande, A. Raghuramu, P. Mohapatra, T. Abdelzaher, and R. Ganti,
`"STAMP: Ah Hoc Spatial-Temporal Provenance Assurance for Mobile Users," IEEE
`Conference Network Protocols (ICNP), 2013.
`
`[87] A. Pande, Y. Zeng, A. Das, S. Miyamoto, E. Henricson, E. Seto, J. Han, and P. Mohapatra,
`“Accurate Energy Expenditure Estimation Using Smartphone Sensors," Wireless Health,
`2013.
`
`[86] A. Pande, E. Baik, and P. Mohapatra, "Efficient Health Data Compression on Mobile
`Devices," ACM Mobihoc Workshop on Pervasive Wireless Heathcare (MobileHealth), 2013.
`
`[85] S. Jana, A. Pande, A. Chan, and P. Mohapatra, "Network Characterization and Perceptual
`Evaluation of Skype Mobile Videos," IEEE International Conference on Computer
`Communications and Networks (ICCCN), 2013.
`
`[84] D. Ghosh and P. Mohapatra, "Resource Allocation in OFDMA Femto Networks," IEEE
`International Conference on Computer Communications and Networks (ICCCN), 2013. (Best
`Paper Award).
`
`[83] K. Tan and P. Mohapatra, “Design and Implementation of a Frequency-aware Wireless
`Video Communication System,” IEEE Conference on Sensing and Communication in
`Wireless Networks (SECON), 2013.
`
`[82] J. Zhu, K. H. Kim, P. Mohapatra, and P. T. Congdon, “An Adaptive Privacy-Preserving
`Scheme for Location Tracking of a Mobile User,” IEEE Conference on Sensing and
`Communication in Wireless Networks (SECON), 2013.
`
`[81] X. Cheng, G. R. Gupta, and P. Mohapatra, “Joint Carrier Aggregation and Packet
`Scheduling in LTE-Advanced Networks,” IEEE Conference on Sensing and Communication
`in Wireless Networks (SECON), 2013.
`
`[80] R. Sivaraj, A. Pande, and P. Mohapatra, “Spectrum-aware Radio Resource Management for
`scalable video multicast in LTE-Advanced Systems,” IFIP Networking, 2013.
`
`
`
`Page 12
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 12
`
`

`
`[79] W. Hu, G. Cao, S. V. Krishnamurthy, and P. Mohapatra, “Mobility-Assisted Energy-Aware
`User Contact Detection in Mobile Social Networks, IEEE International Conference on
`Distributed Computing Systems (ICDCS), 2013.
`
`[78] X. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, “ARTSense: Anonymous
`Reputation and Trust in Participatory Sensing,” IEEE INFOCOM 2013.
`
`[77] W. Cheng, K. Tan, V. Omwando, J. Zhu, and P. Mohapatra, “RSS-Ratio for Enhancing
`Performance of RSS-based Applications,” IEEE INFOCOM 2013.
`
`[76] N. Cheng, X. Wang, W. Cheng, P. Mohapatra, A. Seneviratne, “Characterizing Privacy
`Leakage of Public WiFi Networks for Users on Travel,” IEEE INFOCOM 2013.
`
`[75] S. Chen, A. Pande, K. Zeng, and P. Mohapatra, “Live Video Forensics: Source
`Identification in Lossy Wireless Networks,” IEEE INFOCOM Miniconference, 2013.
`
`[74] K. Tan, K. Zeng, D. Wu, and P. Mohapatra, “Detecting Spectrum Misuse in Wireless
`Networks,” IEEE MASS, 2012.
`
`[73] E. Baik, A. Pande, and P. Mohapatra, “Cross-Layer Coordination for Efficient Content
`Delivery in LTE eMBMS Traffic,” IEEE MASS, 2012.
`
`[72] X. Cheng and P. Mohapatra, “Quality-optimized Downlink Scheduling for Video Streaming
`Applications in LTE Networks,” IEEE GLOBECOM, 2012.
`
`[71] N. Cheng, M. Cunche, M. A. Kaafar, R. Boreli, and P. Mohapatra, “Inferring User
`Relationship from Hidden Information in WLANs,” IEEE MILCOM, 2012.
`
`[70] A. Chan, A. Pande, E. Baik, and P. Mohapatra, “Temporal Quality Assessment for Mobile
`Videos,” ACM MOBICOM, 2012.
`
`[69] L. Zhang, K. Tan, K. Zeng, and P. Mohapatra, “Fast Rendezvous for Cognitive Radios by
`Exploiting Power Leakage at Adjacent Channels,” IEEE Int. Conference on Personal, Indoor
`and Mobile Radio Communications (PIMRC), 2012.
`
`[68] R. Sivaraj, A. Pande, K. Zeng, K. Govindan, and P. Mohapatra, “Edge-prioritized Channel-
`and Traffic-aware Uplink Carrier Aggregation
`in LTE-Advanced Systems, IEEE
`WOWMOM 2012.
`
`[67] J. Zhu, K. Zeng, K. H. Kim, and P. Mohapatra, “Improving Crowd-Sourced Wi-Fi
`Localization Systems using Bluetooth Beacons, IEEE SECON, 2012.
`
`[66] S. Chen, K. Zeng, N. Cheng, and P. Mohapatra, “Transmit Power Estimation with a Single
`Monitor in Multi-band Networks, IEEE SECON, 2012.
`
`[65] S. Jana, K. Zeng, and P. Mohapatra, “Trusted Collaborative Spectrum Sensing for Mobile
`Cognitive Radio Networks,” IEEE Infocom Miniconference, 2012.
`
`[64] S. Chen, K. Zeng, and P. Mohapatra, “Efficient Data Capturing for Network Forensics in
`Cognitive Radio Networks,” IEEE International Conference on Network Protocols (ICNP),
`2011. (AR=16%)
`
`
`
`Page 13
`
`6/5/2015
`
`Petitioner Unified - Exhibit 1003 - Page 13
`
`

`
`[63] A. Pande, V. Ramamurthi, and P. Mohapatra, “Quality-oriented Video delivery over LTE
`using Adaptive Modulation and Coding,” IEEE Globecom 2011.
`
`[62] P. McDonagh, C. Vallati, A. Pande,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket