Submissions from 2022
Optimal resource allocation for flexible-grid entanglement distribution networks, Jude Alnas, Muneer Alshowkan, Nageswara S. V. Rao, Nicholas A. Peters, and Joseph M. Lukens
Advanced architectures for high-performance quantum networking, Muneer Alshowkan, Philip G. Evans, Brian P. Williams, Nageswara S. V. Rao, Claire E. Marvinney, Yun-Yi Pai, Benjamin J. Lawrie, Nicholas A. Peters, and Joseph M. Lukens
A simulation study of in-situ NAPL remediation treatment by using surfactant and foam processes in a military base South Korea, Betty Cepeda-Salgado, Hazem Fleifel, Gyu S. Lee, and Seung I. Kam
Water leak control for the oil-producing wells using Downhole Water Sink Technology, Wenting Qin, Pingya Luo, Lijie Guo, and Andrew K. Wojtanowicz
An iteratively coupled model for flow, deformation, and fracture propagation in fractured unconventional reservoirs, Harun Rashid, Olufemi Olorode, and Chukwudi Chukwudozie
An GPU-accelerated particle tracking method for Eulerian–Lagrangian simulations using hardware ray tracing cores, Bin Wang, Ingo Wald, Nate Morrical, Will Usher, Lin Mu, Karsten Thompson, and Richard Hughes
Submissions from 2021
Long term assessment of the geochemical integrity of offshore wellbore cement– results from numerical modeling, Temitope Ajayi and Ipsita Gupta
Reconfigurable Quantum Local Area Network Over Deployed Fiber, Muneer Alshowkan, Brian P. Williams, Philip G. Evans, Nageswara S.V. Rao, Emma M. Simmerman, Hsuan-Hao Lu, Navin B. Lingaraju, Andrew M. Weiner, Claire E. Marvinney, Yun-Yi Pai, et al.
Fluorescent visualization of oil displacement in a microfluidic device for enhanced oil recovery applications, Khashayar R. Bajgiran, Hannah C. Hymel, Shayan Sombolestani, Nathalie Dante, Nora Safa, James A. Dorman, Dandina Rao, and Adam T. Melvin
Simulating gas hydrate formation in the southern hydrate ridge, Cascadia Margin, Sulav Dhakal and Ipsita Gupta
Mass Spectrometric Calibration Procedure For Real-Time Detection Of Lighter Hydrocarbons, M F. Mbaegbu, P L. Adhikari, I Gupta, and M Rowe
A comparative study of oriented perforating and fracture initiation in seven shale gas plays, Andreas Michael and Ipsita Gupta
Low-Frequency Distributed Acoustic Sensing for Early Gas Detection in a Wellbore, Jyotsna Sharma, Theo Cuny, Oloruntoba Ogunsanwo, and Otto Santos
An Open-Source Code For Fluid Flow Simulations In Unconventional Fractured Reservoirs, B Wang and C Fidelibus
Viscosity Robust Weak Galerkin Finite Element Methods For Stokes Problems, B Wang and L Mu
Full-Sample X-ray Microcomputed Tomography Analysis of Supercritical CO2 Fracturing in Tight Sandstone: Effect of Stress on Fracture Dynamics, Bing Yang, Haizhu Wang, Zhonghou Shen, Olufemi Olorode, Bin Wang, Yong Zheng, Wanjuan Yan, and Zhaoyang Jia
Submissions from 2020
Insights into nanoscalewettability effects of low salinity and nanofluid enhanced oil recovery techniques, Dayo Afekare, Jayne C. Garno, and Dandina Rao
A solution for funding the development of technology in oilwell drilling, Dalmo S. Amorim, Otto L. A. Santos, Ricardo C. Azevedo, and Ana Carolina Chieregati
Predictive modeling of thermogenic methane hydrate formation and geobody distribution – Results from numerical simulations, S. Dhakal and I. Gupta
Integrating Fiber Optic Data in Numerical Reservoir Simulation Using Intelligent Optimization Workflow, Giuseppe Feo, Jyotsna Sharma, and Stephen Cunningham
Distributed Fiber Optic Sensing for Real-Time Monitoring of Gas in Riser during Offshore Drilling, Giuseppe Feo, Jyotsna Sharma, Dmitry Kortukov, Wesley Williams, and Toba Ogunsanwo
Three-Dimensional Projection-Based Embedded Discrete-Fracture Model for Compositional Simulation of Fractured Reservoirs, Olufemi Olorode, Bin Wang, and Harun Ur Rashid
Nanomaterial-Based CO Sensors, Marwan Y. Rezk, Jyotsna Sharma, and Manas Ranjan Gartia
Submissions from 2019
A fishtail well design for cyclic steam injection—A case study from Yarega heavy oil field in Russia, German A. Abzaletdinov, Temitope Ajayi, Youssuf A. Elnoamany, Sergey Durkin, and Ipsita Gupta
A statistical solution for cost estimation in oil well drilling, Dalmo Souza Amorim Jr., Otto Luiz Alcântara Santos, and Ricardo Cabral de Azevedo
New Industry Standards to Increase the Reliability of Drilling Operations, Dalmo S. Amorim Jr., Otto Luiz Alcantara Santos, and Ricardo Cabral De Azevedo
Fluid-Driven Fracture Initiation During Loss of Control Situations, Andreas Michael and Ipsita Gupta
Network Detection of Radiation Sources Using Localization-Based Approaches, Chase Qishi Wu, Mark Lee Berry, Kayla Marie Grieme, Satyabrata Sen, Nageswara S.V. Rao, Richard R. Brooks, and Guthrie Cordone
Advising Big Data Transfer Over Dedicated Connections Based on Profiling Optimization, Daqing Yun, Chase Q. Wu, Nageswara S. V. Rao, and Rajkumar Kettimuthu
Response surface modeling of CO 2 dynamic storage efficiency factor in high permeability thick sandstones, Muhammad Zulqarnain, Mehdi Zeidouni, and Richard G. Hughes
Submissions from 2018
Experimental investigation of upward vertical two-phase high-velocity flows in large-diameter pipes, Matheus S. Capovilla, Renato P. Coutinho, Pedro C. de Sousa, and Paulo J. Waltrich
ON/OFF State Classification of a Reactor Facility Using Gas Effluence Measurements, Camila Ramirez and Nageswara S. V. Rao
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures, Nageswara Rao
Submissions from 2017
A study of fluid flow in sediments and the effect of tidal pumping, Paulo Waltrich, John Whitehead, Richard Hughes, and Karsten Thompson
Submissions from 2016
Advance bandwidth scheduling in software-defined networks, P. Dharam, C.Q. Wu, and N.S.V. Rao
Staggered scheduling of sensor estimation and fusion for tracking over long-haul links, Q. Liu, N.S.V. Rao, and X. Wang
Effect of Retransmission and Retrodiction on Estimation and Fusion in Long-Haul Sensor Networks, Q. Liu, X. Wang, N.S.V. Rao, K. Brigham, and B.V.K. Vijaya Kumar
A simplified model to predict transient liquid loading in gas wells, Erika V. Pagan and Paulo J. Waltrich
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models, N.S.V. Rao, S.W. Poole, C.Y.T. Ma, F. He, J. Zhuang, and D.K.Y. Yau
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach, J. Won, C.Y.T. Ma, D.K.Y. Yau, and N.S.V. Rao
Submissions from 2015
Accuracy and consistency in estimation and fusion over long-haul sensor networks, Q. Liu, X. Wang, and N.S.V. Rao
Artificial neural networks for estimation and fusion in long-haul sensor networks, Q. Liu, X. Wang, and N.S.V. Rao
On resilience of cyber-physical infrastructures using discrete product-form games, N.S.V. Rao, C.Y.T. Ma, U. Shah, J. Zhuang, F. He, and D.K.Y. Yau
Network algorithms for detection of radiation sources, N.S.V. Rao, S. Sen, N.J. Prins, D.A. Cooper, R.J. Ledoux, J.B. Costales, K. Kamieniecki, S.E. Korbly, J.K. Thompson, J. Batcheler, et al.
Sustained wide-area TCP memory transfers over dedicated connections, N.S.V. Rao, D. Towsley, G. Vardoyan, B.W. Settlemyer, I.T. Foster, and R. Kettimuthu
Association of TNF-α-308(GG), IL-10-819(TT), IL-10-1082(GG) and IL-1R1+1970(CC) genotypes with the susceptibility and progression of leprosy in North Indian population, M. Tarique, R.A. Naqvi, K.V. Santosh, V.K. Kamal, N. Khanna, and D.N. Rao
Experimental investigation on the prediction of liquid loading initiation in gas wells using a long vertical tube, Paulo J. Waltrich, Catalina Posada, Jessica Martinez, Gioia Falcone, and Jader R. Barbosa Jr.
Profiling transport performance for big data transfer over dedicated channels, D. Yun, C.Q. Wu, N.S.V. Rao, B.W. Settlemyer, J. Lothian, R. Kettimuthu, and V. Vishwanath
Submissions from 2014
Fusion of State Estimates Over Long-Haul Sensor Networks With Random Loss and Delay, Q. Liu, X. Wang, and N.S.V. Rao
Information feedback for estimation and fusion in long-haul sensor networks, Q. Liu, X. Wang, and N.S.V. Rao
On undecidability aspects of resilient computations and implications to exascale, N.S.V. Rao
Cyber-physical correlations for infrastructure resilience: A game-theoretic approach, N.S.V. Rao, C.Y.T. Ma, F. He, J. Zhuang, and D.K.Y. Yau
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering, J. Won, C.Y.T. Ma, D.K.Y. Yau, and N.S.V. Rao
Submissions from 2013
Learning-based approaches to nonlinear multisensor fusion in target tracking, K. Brigham, B.V.K.V. Kumar, and N.S.V. Rao
Game-theoretic resilience analysis of Cyber-Physical Systems, F. He, J. Zhuang, N.S.V. Rao, C.Y.T. Ma, and D.K.Y. Yau
Staggered scheduling of estimation and fusion in long-haul sensor networks, Q. Liu, X. Wang, and N.S.V. Rao
Markov game analysis for attack-defense of power networks under possible misinformation, C.Y.T. Ma, D.K.Y. Yau, X. Lou, and N.S.V. Rao
Scalable solutions of Markov games for smart-grid infrastructure protection, C.Y.T. Ma, D.K.Y. Yau, and N.S.V. Rao
Privacy vulnerability of published anonymous mobility traces, C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, and N.S.V. Rao
Fault detection in multi-core processors using chaotic maps, N.S.V. Rao
Resiliency in exascale systems and computations using chaotic-identity maps, N.S.V. Rao
Infrastructure resilience using cyber-physical game-theoretic approach, N.S.V. Rao, S.W. Poole, C.Y.T. Ma, F. He, J. Zhuang, and D.K.Y. Yau
Submissions from 2012
On state fusers over long-haul sensor networks, K. Brigham, B.V.K.V. Kumar, N.S.V. Rao, Q. Liu, and X. Wang
Game-theoretic analysis of attack and defense in cyber-physical network infrastructures, F. He, J. Zhuang, and N.S.V. Rao
Fusion of state estimates over long-haul sensor networks under random delay and loss, Q. Liu, X. Wang, and N.S.V. Rao
Performance of state estimate fusion in long-haul sensor networks with message retransmission, Q. Liu, X. Wang, N.S.V. Rao, K. Brigham, and B.V.K.V. Kumar
Fusion performance in long-haul sensor networks with message retransmission and retrodiction, Q. Liu, X. Wang, N.S.V. Rao, K. Brigham, and B.V.K. Vijaya Kumar
Stochastic steepest descent optimization of multiple-objective mobile sensor coverage, C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, N.S.V. Rao, and J. Chen
Chaotic-identity maps for robustness estimation of exascale computations, N.S.V. Rao
Effects of computing and communications on state fusion over long-haul sensor networks, N.S.V. Rao, K. Brigham, B.V.K.V. Kumar, Q. Liu, and X. Wang
On performance of individual, collective and network detection of propagative sources, N.S.V. Rao, C.Y.T. Ma, and D.K.Y. Yau
An analytical framework for cyber-physical networks, N.S.V. Rao, Y. Narahari, C.E. Veni Madhavan, D.K.Y. Yau, and C.Y.T. Ma
Cloud computing infrastructure robustness: A game theory approach, N.S.V. Rao, S.W. Poole, F. He, J. Zhuang, C.Y.T. Ma, and D.K.Y. Yau
Experimental analysis of 10Gbps transfers over physical and emulated dedicated connections, B.W. Settlemyer, N.S.V. Rao, S.W. Poole, S.W. Hodson, S.E. Hicks, and P.M. Newman
Submissions from 2011
Efficient and robust localization of multiple radiation sources in complex environments, J.-C. Chin, D.K.Y. Yau, and N.S.V. Rao
Analyzing execution dynamics of scientific workflows for latency minimization in resource sharing environments, Y. Gu, Q. Wu, and N.S.V. Rao
A game theoretic study of attack and defense in cyber-physical systems, C.Y.T. Ma, N.S.V. Rao, and D.K.Y. Yau
Localization-based detection under network losses, N.S.V. Rao
Testbed and experiments for high-performance networking, N.S.V. Rao, S.E. Hicks, S.W. Poole, and P. Newman
On robustness of a class of Cyber-Physical Network Infrastructures, N.S.V. Rao, C.Y.T. Ma, and D.K.Y. Yau
Copula-based fusion of correlated decisions, A. Sundaresan, P.K. Varshney, and N.S.V. Rao
Submissions from 2010
Identification of low-level point radioactive sources using a sensor network, J.-C. Chin, N.S.V. Rao, D.K.Y. Yau, M. Shankar, Y. Yang, J.C. Hou, S. Srivathsan, and S. Iyengar
Bayesian source detection and parameter estimation of a plume model based on sensor network measurements, C. Huang, T. Hsing, N. Cressie, A.R. Ganguly, V.A. Protopopescu, and N.S. Rao
Bayesian source detection and parameter estimation of a plume model based on sensor network measurements' by C. Huang et al.: Rejoinder, C. Huang, T. Hsing, N. Cressie, A.R. Ganguly, V.A. Protopopescu, and N.S. Rao
On parallel UDP-based transport control over dedicated connections, X. Lu, Q. Wu, N.S.V. Rao, and Z. Wang
Privacy vulnerability of published anonymous mobility traces, C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, and N.S.V. Rao
Stochastic steepest-descent optimization of multiple-objective mobile sensor coverage, C.Y.T. Ma, D.K.Y. Yau, N.K. Yip, N.S.V. Rao, and J. Chen
Localization leads to improved distributed detection under non-smooth distributions, N.S.V. Rao, J.-C. Chin, D.K.Y. Yau, and C.Y.T. Ma
Cyber-physical trade-offs in distributed detection networks, N.S.V. Rao, J.-C. Chin, D.K.Y. Yau, C.Y.T. Ma, and R.N. Madan
Optimizing cluster heads for energy efficiency in large-scale heterogeneous wireless sensor networks, Q. Wu, Y. Gu, and N.S.V. Rao
Stabilizing transport dynamics of control channels over wide-area networks, Q. Wu, N.S.V. Rao, X. Lu, and K.-H. Kwon
System design and algorithmic development for computational steering in distributed environments, Q. Wu, M. Zhu, Y. Gu, and N.S.V. Rao
A computational geometry method for localization using differences of distances, X. Xu, N.S.V. Rao, and S. Sahni
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage, D.K.Y. Yau, N.K. Yip, C.Y.T. Ma, N.S.V. Rao, and M. Shankar
Fusion of threshold rules for target detection in wireless sensor networks, M. Zhu, S. Ding, Q. Wu, R.R. Brooks, N.S.V. Rao, and S.S. Iyengar
Submissions from 2009
Optimizing base station deployment in wireless sensor networks under one-hop and multi-hop communication models, Y. Lin, Q. Wu, X. Cai, and N.S.V. Rao
Routing scalability in multi-domain DWDM networks, Q. Liu, C. Xie, T. Frangieh, N. Ghani, A. Gumaste, and N.S.V. Rao
On performance-adaptive flow control for large data transfer in high speed networks, X. Lu, Q. Wu, N.S.V. Rao, and Z. Wang
Performance-adaptive prediction-based transport control over dedicated links, X. Lu, Q. Wu, N.S.V. Rao, and Z. Wang
Matching and fairness in threat-based mobile sensor coverage, C.Y.T. Ma, D.K.Y. Yau, J.-C. Chin, N.S.V. Rao, and M. Shankar