Jagmohan Chauhan
TitleCited byYear
Performance evaluation of Yahoo! S4: A first look
J Chauhan, SA Chowdhury, D Makaroff
2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and …, 2012
Gesture-based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
J Chauhan, HJ Asghar, MA Kaafar, A Mahanti
Applied Cryptography and Network Security 9696, 648-665, 2016
BreathPrint: Breathing acoustics-based user authentication
J Chauhan, Y Hu, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Characterization of early smartwatch apps
J Chauhan, S Seneviratne, MA Kaafar, A Mahanti, A Seneviratne
Pervasive Computing and Communication Workshops (PerCom Workshops), 2016 …, 2016
The impact of capacity scheduler configuration settings on mapreduce jobs
J Chauhan, D Makaroff, W Grassmann
Cloud and Green Computing (CGC), 2012 Second International Conference on …, 2012
Simulation and Performance Evaluation of Hadoop Capacity Scheduler
J Chauhan, D Makaroff, W Grassmann
Proceedings of 24th Annual International Conference on Computer Science and …, 2014
Performance evaluation of video-on-demand in virtualized environments: the client perspective
J Chauhan, D Makaroff
Proceedings of the 6th international workshop on Virtualization Technologies …, 2012
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
H Kolamunna, J Chauhan, Y Hu, K Thilakarathna, D Perino, D Makaroff, ...
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 321-329, 2017
Towards the Era of Wearable Computing?
J Chauhan, A Mahanti, MA Kaafar
Proceedings of the 2014 CoNEXT on Student Workshop, 24-25, 2014
Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks
J Chauhan, S Seneviratne, Y Hu, A Misra, A Seneviratne, Y Lee
Computer 51 (5), 60-67, 2018
Are Wearables Ready for Secure and Direct Internet Communication?
H Kolamunna, J Chauhan, Y Hu, K Thilakarathna, D Perino, D Makaroff, ...
GetMobile: Mobile Computing and Communications 21 (3), 5-10, 2017
Empath-D: Empathetic design for accessibility
KTW Choo, RK Balan, TK Wee, J Chauhan, A Misra, Y Lee
Proceedings of the 18th International Workshop on Mobile Computing Systems …, 2017
VM clock synchronization measurements
J Chauhan, D Makaroff, A Arkles
Performance Computing and Communications Conference (IPCCC), 2011 IEEE 30th …, 2011
Performance Characterization of Deep Learning Models for Breathing-based Authentication on Resource-Constrained Devices
J Chauhan, J Rajasegaran, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass
J Chauhan, MA Kaafar, A Mahanti
IEEE Internet Computing 22 (3), 38-47, 2018
BehavioCog: An Observation Resistant Authentication Scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
International Conference on Financial Cryptography and Data Security, 2017
The system can't perform the operation now. Try again later.
Articles 1–16