Search Results - "Hanawal, Manjesh"

Refine Results
  1. 1

    Learning Optimal Phase-Shifts of Holographic Metasurface Transceivers by Ghosh, Debamita, Hanawal, Manjesh K., Zlatanov, Nikola

    “…Holographic metasurface transceivers (HMT) are an emerging technology for enhancing the coverage and rate of wireless communication systems. However, acquiring…”
    Get full text
    Journal Article
  2. 2

    Multi-Player Multi-Armed Bandits for Stable Allocation in Heterogeneous Ad-Hoc Networks by Darak, Sumit J., Hanawal, Manjesh K.

    “…Next generation networks are expected to be ultra-dense and aim to explore spectrum sharing paradigm that allows users to communicate in licensed, shared as…”
    Get full text
    Journal Article
  3. 3

    Zero-Rating of Content and Its Effect on the Quality of Service in the Internet by Malik, Fehmina, Hanawal, Manjesh K., Hayel, Yezekael

    Published in IEEE/ACM transactions on networking (01-12-2020)
    “…The ongoing net neutrality debate has generated a lot of heated discussions on whether or not monetary interactions should be regulated between content and…”
    Get full text
    Journal Article
  4. 4

    Almost exact risk budgeting with return forecasts for portfolio allocation by Bhardwaj, Avinash, Hanawal, Manjesh K., Parthasarathy, Purushottam

    Published in Operations research letters (01-03-2023)
    “…We revisit the portfolio allocation problem with designated risk-budget. We generalize the problem of arbitrary risk budgets with unequal correlations to one…”
    Get full text
    Journal Article
  5. 5

    Regret of Age-of-Information Bandits by Fatale, Santosh, Bhandari, Kavya, Narula, Urvidh, Moharir, Sharayu, Hanawal, Manjesh K.

    Published in IEEE transactions on communications (01-01-2022)
    “…We consider a system with a single source that measures/tracks a time-varying quantity and periodically attempts to report these measurements to a monitoring…”
    Get full text
    Journal Article
  6. 6

    FairNet: A Measurement Framework for Traffic Discrimination Detection on the Internet by Khandkar, Vinod, Hanawal, Manjesh

    “…Network neutrality is related to the nondiscriminatory treatment of packets on the Internet. Any deliberate discrimination of traffic of one application while…”
    Get full text
    Journal Article
  7. 7

    Radar Enhanced Multi-Armed Bandit for Rapid Beam Selection in Millimeter Wave Communications by Sneh, Akanksha, Darak, Sumit, Ram, Shobha Sundar, Hanawal, Manjesh

    Published in IEEE communications letters (01-09-2023)
    “…Multi-arm bandit (MAB) algorithms have been used to learn optimal beams for millimeter wave communication systems. Here, the complexity of learning the optimal…”
    Get full text
    Journal Article
  8. 8

    Profit Sharing Contracts Between Content and Service Providers for Enhanced Network Quality by Malik, Fehmina, Hanawal, Manjesh K., Hayel, Yezekael

    “…It has been a long demand of Internet Service Providers (ISPs) that the Content Providers (CPs) share their profits for investments in network infrastructure…”
    Get full text
    Journal Article
  9. 9

    Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks by Ghosh, Debamita, Hanawal, Manjesh K., Zlatanov, Nikola

    Published in IEEE wireless communications letters (01-06-2021)
    “…We study wireless power transmission by an energy source to multiple energy harvesting nodes with the aim to maximize the energy efficiency. The source…”
    Get full text
    Journal Article
  10. 10

    Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing Codes by Mishra, Adhokshaj, Hanawal, Manjesh K.

    “…Software piracy is one of the concerns in the IT sector. Pirates leverage the debugger tools to reverse engineer the logic that verifies the license keys or…”
    Get full text
    Conference Proceeding
  11. 11

    Fixed Budget Beam Identification in Millimeter Wave Systems via Unimodal Bandits by Ghosh, Debamita, Hanawal, Manjesh K.

    “…The millimeter-wave communication systems suffer from significant attenuation loss due to their small wavelengths, which significantly reduces the data rate…”
    Get full text
    Conference Proceeding
  12. 12

    Multiplay Multiarmed Bandit Algorithm Based Sensing of Noncontiguous Wideband Spectrum for AIoT Networks by Joshi, Himani, Santra, Shubhrajit, Darak, Sumit, Hanawal, Manjesh, Santosh, S. V. Sai

    “…To bring large-scale artificial intelligence of things (AIoT) to reality, wireless networks need intelligence to identify resources in a limited shared…”
    Get full text
    Journal Article
  13. 13

    Evading Malware Analysis Using Reverse Execution by Mishra, Adhokshaj, Roy, Animesh, Hanawal, Manjesh K.

    “…Malware is a security threat, and various means are adapted to detect and block them. In this paper, we demonstrate a method where malware can evade malware…”
    Get full text
    Conference Proceeding
  14. 14

    Revenue sharing on the Internet: A case for going soft on neutrality regulations by Malik, Fehmina, Hanawal, Manjesh K., Hayel, Yezekael, Nair, Jayakrishnan

    Published in Performance evaluation (01-01-2021)
    “…Revenue sharing contracts between Content Providers (CPs) and Internet Service Providers (ISPs) can act as leverage for enhancing the infrastructure of the…”
    Get full text
    Journal Article
  15. 15

    Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits Approach by Verma, Arun, Hanawal, Manjesh K.

    “…In this paper, we study a novel Stochastic Network Utility Maximization (NUM) problem where the utilities of agents are unknown. The utility of each agent…”
    Get full text
    Conference Proceeding
  16. 16

    Multi-Player Age-of-Information Bandits: A Trekking Approach by Gudwani, Hitesh, Hanawal, Manjesh K., Moharir, Sharayu

    “…We study the algorithmic task of scheduling communication in a decentralized manner in a multi-source, single-destination network. The sources share multiple…”
    Get full text
    Conference Proceeding
  17. 17

    Cognitive Networks With In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures by Hanawal, Manjesh K., Nguyen, Diep N., Krunz, Marwan

    “…Although in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link, they are more vulnerable to jamming attacks than their…”
    Get full text
    Journal Article
  18. 18

    Unsupervised Online Feature Selection for Cost-Sensitive Medical Diagnosis by Verma, Arun, Hanawal, Manjesh K., Hemachandra, Nandyala

    “…In medical diagnosis, physicians predict the state of a patient by checking measurements (features) obtained from a sequence of tests, e.g., blood test, urine…”
    Get full text
    Conference Proceeding
  19. 19

    Monitoring COVID Hotspots Using Telecom Data: Voronoi Tessellations for Marking Buffer Zones by Singh, Anupam, Hanawal, Manjesh K.

    “…Human mobility has a strong impact on the spread of epidemics. To control an epidemic, mobility restrictions are enforced in areas that are identified as…”
    Get full text
    Conference Proceeding
  20. 20

    Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool by Khandkar, Vinod S., Hanawal, Manjesh K.

    “…The debate on "Net-neutrality" and events pointing towards its possible violations have led to the development of tools to detect deliberate traffic…”
    Get full text
    Conference Proceeding