Journals

The following are peer-reviewed journal articles.  For attribution purposes with respect to students, post-docs, and collaborators, please refer to the PDF version of my CV.

  1. Z. Li, Q. Liao, A. D. Striegel, “A Game-theoretic Analysis on the Economic Viability of Mobile Content Pre-Staging,” Wireless Networks, 26:667–683, Jan 2020. DOI: 10.1007/s11276-019-02176-3
  2. S. Liu, D. Hachen, O. Lizardo, C. Poellabauer, A. Striegel, T. Milenkovic, “Network analysis of the NetHealth data: Exploring co-evolution of individuals’ social network positions and physical activities,” Applied Network Science, Dec 2018. DOI: 10.1007/s41109-018-0103-2
  3. L. Meng, A. Striegel, T. Milenkovic, “Local versus Global Biological Network Alignment,” Bioinformatics, vol.32, no. 20, October 2016. DOI: 10.1093/bioinformatics/btw348
  4. L. Meng, Y. Hulovatyy, T. Milenkovic, A. Striegel, “On the Interplay Between Individuals’ Evolving Interaction Patters and Traits in Dynamic Multiplex Social Networks,” IEEE Transactions on Network Science and Engineering (TNSE), vol. 3, no. 1, pp. 32-43, Jan 2016. DOI: 10.1109/TNSE.2016.2523798
  5. L. Meng, S. Liu, A. Striegel, “Analyzing the longitudinal impact of proximity, location, and personality on smartphone usage,” Computational Social Networks, 1:6, Dec 2014.
  6. M. Kazjer, J. D’Arcy, C. R. Crowell, A. Striegel, D. Van Bruggen, “An exploratory investigation of message-person congruence in information security awareness campaigns,” Computers & Security, vol. 43, pp. 64-76, June 2014.
  7. M. Kennedy, C. Crowell, A. Striegel, M. Villano, J. Schmiedeler, “Relative efficacy of various strategies for visual feedback in standing balance activities,” Experimental Brain Research, vol. 230, no. 1, pp. 117-125, Sep 2013.
  8. @S. Liu, +Y. Jiang, A. Striegel, “Face-to-Face Proximity Estimation Using Bluetooth On Smartphones,” IEEE Transactions on Mobile Computing, vol. 13, no. 4, pp. 811-823, April 2014.
  9. @Q. Liao, A. Striegel, Z. Li, “Could Firewall Rules Be Public — A Game Theoretical Perspective”, in Security and Communications, vol. 5, no. 2, pp. 197-210, Feb. 2012. DOI: 10.1002/sec.307
  10. @Q. Liao, @A. Blaich, @D. VanBruggen, A. Striegel, “Managing Networks through Context: Graph Visualization and Exploration,” Computer Networks, vol. 54, no. 16, pp. 2809-2824, Nov. 2010.
  11. Q. Liao, Z. Li, @A. Blaich, A. Striegel, “Fighting Botnets with Economic Uncertainty,” Security and Communication Networks, vol 4, no. 10, pp. 1104-1113, October 2011.
  12. @A. Blaich, A. Striegel, D. Thain, “Reflections on The Virtues of Modularity: A Case Study in Linux Security Modules,” Software: Practices and Experience, vol. 39, no. 15, pp. 1235-1251, Oct. 2009.
  13. @Y. Jiang, A. Striegel, “An Analysis of the Effects of State Granularity Through (m,k) Real-Time Streams,” IEEE Transactions on Computers, vol. 58, no. 6, pp. 784-798, June 2009.
  14. P. Brenner, @J. M. Wozniak, D. Thain, A. Striegel, J. W. Peng, J. A. Izaguirre, “Biomolecular Committor Probability Calculation Enabled by Processing in Network Storage,” Parallel Computing, vol. 34, no. 11, pp. 652-680, Nov 2008.
  15. @Q. Liao, @D. Cieslak, A. Striegel, N. Chawla, “Using Selective, Short-Term Memory to Improve Resilience Against DDoS Exhaustion Attacks,” Security and Communication Networks, vol. 1, no. 4, pp. 287-299, Jul/Aug 2008.
  16. @C. Mano, @A. Blaich, @Q. Liao, @Y. Jiang, @D. Cieslak, @D. Salyers, A. Striegel, “RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning,” ACM Transactions on Information and System Security (TISSEC), vol. 11, no. 2, pp. 1-23, March 2008.
  17. @J. M. Wozniak, P. Brenner, D. Thain, A. Striegel, J. A. Izaguirre, “Making the Best of a Bad Situation: Prioritized Storage Management in GEMS,” Future Generation Computer Systems, vol. 24, no. 1, pp. 10-16, January 2008.
  18. @D. Salyers, @Y. Jiang, A. Striegel, C. Poellabauer, “JumboGen: Dynamic Jumbo Frame Generation for Network Performance Scalability,” ACM Computer Communications Review (CCR), vol. 37, no. 5, pp. 53-64, October 2007.
  19. @X. Li, A. Striegel, “A Case for Passive Application Layer Multicast,” Computer Networks, vol. 51, no. 11, pp. 3157-3171, Aug 2007.
  20. @C. D. Mano, *J. Smith, *W. Bordogna, *A. Matta, *D. Dugovic, A. Striegel, “CLog: Low Cost Gigabit Full Packet Logging,” Journal of Communications, vol. 1, no. 7, pp. 17-23, Nov/Dec 2006
  21. @Y. Jiang, A. Striegel, “A Distributed Traffic Control Scheme based on Edge-Centric Resource Management,” ACM Computer Communications Review (CCR), vol. 36, no. 2, pp. 5-16, April 2006.
  22. A. Striegel, G. Manimaran, “DSMCast: A Scalable Approach for DiffServ Multicasting,” Computer Networks, vol. 44, no. 6, pp. 713-735, April 2004.
  23. A. Striegel, G. Manimaran, “Dynamic Class-Based Queue Management for Scalable Media Servers,” Journal of Systems and Software (JSS), vol. 66, no. 2, pp. 119-128, June 2003.
  24. A. Striegel, G. Manimaran, “A Survey of QoS Multicasting Issues,” IEEE Communications, vol. 40, no. 6, pp. 82-87, June 2002.
  25. A. Striegel, G. Manimaran, “Packet Scheduling with Delay and Loss Differentiation,” Computer Communications, vol.25, no.1, pp.21-31, Jan. 2002.
  26. A. Striegel, G. Manimaran “Best-effort Scheduling of (m,k)-firm Real-time Streams in Multihop Networks,” Computer Communications, vol.23, no.13, pp.1292-1300, July 2000.