default search action
Dwight J. Makaroff
Person information
- affiliation: University of Saskatchewan, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c44]Noah Orensa, Derek L. Eager, Dwight J. Makaroff:
A unified extensible architecture for efficient distributed analytics. CASCON 2021: 123-132 - 2020
- [c43]Kale Yuzik, Dwight J. Makaroff:
Blockchain-based security for heterogeneous IoT systems. CASCON 2020: 63-72
2010 – 2019
- 2019
- [j8]Harini Kolamunna, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne:
Seamless Resource Sharing in Wearable Networks by Application Function Virtualization. IEEE Trans. Mob. Comput. 18(6): 1393-1406 (2019) - [c42]Alireza Montazeri, Dwight J. Makaroff:
Optimal Cache Budget Distribution for Hierarchical ICN Networks. ICIN 2019: 336-343 - [c41]Tonghao Chen, Derek L. Eager, Dwight J. Makaroff:
Efficient Image Transmission Using LoRa Technology In Agricultural Monitoring IoT Systems. iThings/GreenCom/CPSCom/SmartData 2019: 937-944 - [c40]Babatunde Olabenjo, Dwight J. Makaroff:
Information Leakage in Wearable Applications. SpaCCS 2019: 211-224 - 2018
- [c39]Owolabi Adekoya, Habib Sabiu, Derek L. Eager, Winfried K. Grassmann, Dwight J. Makaroff:
A case study of spark resource configuration and management for image processing applications. CASCON 2018: 18-29 - [c38]Alireza Montazeri, Nicholas R. Beaton, Dwight J. Makaroff:
LRU-2 vs 2-LRU: An Analytical Study. LCN 2018: 571-579 - 2017
- [j7]Harini Kolamunna, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne:
Are Wearables Ready for Secure and Direct Internet Communication? GetMobile Mob. Comput. Commun. 21(3): 5-10 (2017) - [c37]Harini Kolamunna, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne:
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables. LCN 2017: 321-329 - [c36]Alireza Montazeri, Dwight J. Makaroff:
Geographically-Distinct Request Patterns for Caching in Information-Centric Networks. LCN 2017: 579-582 - [i2]Harini Kolamunna, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne:
Seamless Resources Sharing in Wearable Networks by Application Function Virtualization. CoRR abs/1711.08495 (2017) - 2016
- [c35]Harini Kolamunna, Yining Hu, Diego Perino, Kanchana Thilakarathna, Dwight J. Makaroff, Xinlong Guan, Aruna Seneviratne:
AFit: adaptive fitness tracking by application function virtualization. UbiComp Adjunct 2016: 309-312 - [c34]Harini Kolamunna, Yining Hu, Diego Perino, Kanchana Thilakarathna, Dwight J. Makaroff, Xinlong Guan, Aruna Seneviratne:
AFV: enabling application function virtualization and scheduling in wearable networks. UbiComp 2016: 981-991 - [i1]Harini Kolamunna, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne:
Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices. CoRR abs/1608.04180 (2016) - 2015
- [c33]Khadija Rasul, Dwight J. Makaroff, Kevin G. Stanley:
Hybrid Community-Based Forwarding: A complete energy efficient algorithm for pocket switched networks. LCN Workshops 2015: 760-768 - 2014
- [c32]Jagmohan Chauhan, Dwight J. Makaroff, Winfried K. Grassmann:
Simulation and performance evaluation of the hadoop capacity scheduler. CASCON 2014: 163-177 - [c31]Shaiful Alam Chowdhury, Dwight J. Makaroff:
Category-based user interaction with online user-generated videos: workload characterization. CASCON 2014: 367-370 - [c30]Khadija Rasul, Shaiful Alam Chowdhury, Dwight J. Makaroff, Kevin G. Stanley:
Community-based forwarding for low-capacity pocket switched networks. MSWiM 2014: 249-257 - 2013
- [c29]Spencer Clark, Dwight J. Makaroff, Kevin G. Stanley:
Developing and evaluating a lossless compression scheme for scientific data from a nanosatellite. CCECE 2013: 1-4 - [c28]Chad Hansen, Nigel Jurgens, Dwight J. Makaroff, David Callele, Philip Dueck:
Network Performance Measurement Framework for Real-Time Multiplayer Mobile Games. NetGames 2013: 7:1-7:2 - [c27]Shaiful Alam Chowdhury, Dwight J. Makaroff:
Category-Based YouTube Request Pattern Characterization. WEBIST (Selected Papers) 2013: 154-169 - [c26]Shaiful Alam Chowdhury, Dwight J. Makaroff:
Popularity Growth Patterns of YouTube Videos - A Category-based Study. WEBIST 2013: 233-242 - 2012
- [c25]Jagmohan Chauhan, Shaiful Alam Chowdhury, Dwight J. Makaroff:
Performance Evaluation of Yahoo! S4: A First Look. 3PGCIC 2012: 58-65 - [c24]Shaiful Alam Chowdhury, Dwight J. Makaroff:
Characterizing Videos and Users in YouTube: A Survey. BWCCA 2012: 244-251 - [c23]Jagmohan Chauhan, Dwight J. Makaroff, Winfried K. Grassmann:
The Impact of Capacity Scheduler Configuration Settings on MapReduce Jobs. CGC 2012: 667-674 - [c22]Jeff Dyck, Carl Gutwin, Dwight J. Makaroff:
Adaptive forward error correction for real-time groupware. GROUP 2012: 121-130 - [c21]Jagmohan Chauhan, Dwight J. Makaroff:
Performance evaluation of video-on-demand in virtualized environments: the client perspective. VTDC@HPDC 2012: 29-36 - 2011
- [j6]Anthony J. Arkles, Dwight J. Makaroff:
MT-WAVE: profiling multi-tier web applications (abstracts only). SIGMETRICS Perform. Evaluation Rev. 39(3): 16 (2011) - [c20]Jagmohan Chauhan, Dwight J. Makaroff, Anthony J. Arkles:
VM clock synchronization measurements. IPCCC 2011: 1-2 - [c19]Anthony J. Arkles, Dwight J. Makaroff:
Mt-wave: profiling multi-tier web applications. ICPE 2011: 247-258 - 2010
- [c18]Jie Feng, Derek L. Eager, Dwight J. Makaroff:
Coverage preserving aggregation protocols for dense sensor networks. LCN 2010: 440-447 - [c17]Jeremy Guebert, Dwight J. Makaroff, Ketan Mayer-Patel:
Request generation for a peer-based PVR. NOSSDAV 2010: 99-104
2000 – 2009
- 2009
- [c16]Jie Feng, Derek L. Eager, Dwight J. Makaroff:
Aggregation Protocols for High Rate, Low Delay Data Collection in Sensor Networks. Networking 2009: 26-39 - 2008
- [c15]Dwight J. Makaroff, Paul Smith, Nicholas J. P. Race, David Hutchison:
Intrusion detection systems for community wireless mesh networks. MASS 2008: 610-616 - [c14]Justice Daka, Dwight J. Makaroff:
Mixed reliability video streaming in wireless networks. WOWMOM 2008: 1-8 - 2007
- [c13]Jie Feng, Derek L. Eager, Dwight J. Makaroff:
Asynchronous Data Aggregation for Real-Time Monitoring in Sensor Networks. Networking 2007: 73-84 - 2006
- [c12]Dylan Griffiths, Dwight J. Makaroff:
Hybrid vs. monolithic OS kernels: a benchmark comparison. CASCON 2006: 349-352 - [c11]David Callele, Dwight J. Makaroff:
Teaching requirements engineering to an unsuspecting audience. SIGCSE 2006: 433-437 - 2005
- [j5]Dwight J. Makaroff, Norman C. Hutchinson:
Development and evolution of a heterogeneous continuous media server: a case study. J. Softw. Maintenance Res. Pract. 17(2): 143-167 (2005) - [c10]Dwight J. Makaroff, Jason Coutu, Fujian Liu:
Disk Performance and VBR Admission Control for Media Servers. DMS 2005: 224-227 - [c9]Fujian Liu, Dwight J. Makaroff, Said Elnaffar:
Classifying e-commerce workloads under dynamic caching. SMC 2005: 2819-2824 - 2004
- [j4]Dwight J. Makaroff, Gerald W. Neufeld, Norman C. Hutchinson:
Performance evaluation for VBR Continuous Media File Server admission control. Softw. Pract. Exp. 34(12): 1187-1210 (2004) - [c8]Fujian Liu, Yanping Zhao, Wenguang Wang, Dwight J. Makaroff:
Database Server Workload Characterization in an E-Commerce Environment. MASCOTS 2004: 475-483 - [c7]Qing Wang, Dwight J. Makaroff, H. Keith Edwards:
Characterizing customer groups for an e-commerce website. EC 2004: 218-227 - 2003
- [c6]Qing Wang, Dwight J. Makaroff, H. Keith Edwards, Ryan Thompson:
Workload characterization for an E-commerce web site. CASCON 2003: 313-327 - 2001
- [j3]Dwight J. Makaroff, Gerald W. Neufeld, Norman C. Hutchinson:
Design and Implementation of a VBR Continuous Media File Server. IEEE Trans. Software Eng. 27(1): 13-28 (2001) - [c5]Andrew T. Campbell, Carsten Griwodz, Jörg Liebeherr, Dwight J. Makaroff, Andreas Mauthe, Giorgio Ventre, Michael Zink:
Panel Discussion: How Will Media Distribution Work in the Internet. IWQoS 2001: 3-5
1990 – 1999
- 1999
- [c4]Dwight J. Makaroff, Gerald W. Neufeld, Norman C. Hutchinson:
Network Bandwidth Allocation and Admission Control for a Continuous Media File Server. IDMS 1999: 337-350 - 1997
- [j2]Johnny W. Wong, Kelly A. Lyons, David Evans, Rolf J. Velthuys, Gregor von Bochmann, Eric Dubois, Nicolas D. Georganas, Gerald W. Neufeld, M. Tamer Özsu, Jeff Brinskelle, Abdelhakim Hafid, Norman C. Hutchinson, Paul Iglinski, Brigitte Kerhervé, Louise Lamont, Dwight J. Makaroff, Duane Szafron:
Enabling Technology for Distributed Multimedia Applications. IBM Syst. J. 36(4): 489-507 (1997) - [c3]Dwight J. Makaroff, Gerald W. Neufeld, Norman C. Hutchinson:
An Evaluation of VBR Disk Admission Algorithms for Continuous Media File Servers. ACM Multimedia 1997: 143-154 - 1995
- [j1]Dwight J. Makaroff, Raymond T. Ng:
Schemes for Implementing Buffer Sharing in Continuous-Media Systems. Inf. Syst. 20(6): 445-464 (1995) - [c2]Gerald W. Neufeld, Dwight J. Makaroff, Norman C. Hutchinson:
The Design of a Variable Bit Rate Continuous Media Server. NOSSDAV 1995: 354-357 - 1990
- [c1]Dwight J. Makaroff, Derek L. Eager:
Disk Cache Performance for Distributed Systems. ICDCS 1990: 212-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint