George Kesidis

According to our database1, George Kesidis authored at least 238 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
Neural Computation, 2019

VNF Placement Optimization at the Edge and Cloud .
Future Internet, 2019

Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification.
CoRR, 2019

A caching system with object sharing.
CoRR, 2019

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.
CoRR, 2019

The distribution of age-of-information performance measures for message processing systems.
CoRR, 2019

Temporal Overbooking of Lambda Functions in the Cloud.
CoRR, 2019

When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
Proceedings of the IEEE International Conference on Acoustics, 2019

Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers.
IEEE Trans. Parallel Distrib. Syst., 2018

Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability.
TAAS, 2018

Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Systems Journal, 2018

When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
CoRR, 2018

A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters.
CoRR, 2018

Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud.
CoRR, 2018

Average age of coupon type and related average age of information.
CoRR, 2018

Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms.
CoRR, 2018

Constrained max-min fair scheduling of variable-length packet-flows to multiple servers.
Annales des Télécommunications, 2018

Considerations for a Successful Network Service Chain Deployment.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Balancing Delay and Cost in Virtual Network Function Placement and Chaining.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Anomaly Detection of Attacks (Ada) on DNN Classifiers at Test Time.
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD).
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Scheduling Distributed Resources in Heterogeneous Private Clouds.
Proceedings of the 26th IEEE International Symposium on Modeling, 2018

An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model.
Proceedings of the 2018 International Conference on Computing, 2018

Stationary Distribution of a Generalized LRU-MRU Content Cache.
Proceedings of the 2018 International Conference on Computing, 2018

A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers.
Proceedings of the IEEE Global Communications Conference, 2018

Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem.
IEEE Trans. Network and Service Management, 2017

A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes.
IEEE Trans. Neural Netw. Learning Syst., 2017

Using Burstable Instances in the Public Cloud: Why, When and How?
POMACS, 2017

Optimal virtualized network function allocation for an SDN enabled cloud.
Computer Standards & Interfaces, 2017

An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers.
CoRR, 2017

When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
CoRR, 2017

Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part II.
CoRR, 2017

Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017

Adversarial Learning: A Critical Review and Active Learning Study.
CoRR, 2017

Efficient max-min and proportional fair constrained multiresource scheduling.
CoRR, 2017

Markovian models of Internet Caches including Closed-Form Stationary Distributions.
CoRR, 2017

Using Burstable Instances in the Public Cloud: Why, When and How?
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

Adversarial learning: A critical review and active learning study.
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017

Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Multicommodity games in public-cloud markets considering subadditive resource demands.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous servers.
Proceedings of the IEEE International Conference on Communications, 2017

Flow based botnet detection through semi-supervised active learning.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Regulating wireless access costs for not vertically integrated content providers.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

A simulation framework for uneconomic virtual bidding in day-ahead electricity markets.
Proceedings of the 2017 American Control Conference, 2017

2016
A Stable Approach for Routing Queries in Unstructured P2P Networks.
IEEE/ACM Trans. Netw., 2016

On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants.
TOMPECS, 2016

A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk.
SIGMETRICS Performance Evaluation Review, 2016

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?
CoRR, 2016

Per-Server Dominant-Share Fairness (PS-DSF): A Multi-Resource Fair Allocation Mechanism for Heterogeneous Servers.
CoRR, 2016

IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Security and Privacy for Emerging Smart Community Infrastructures.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Dynamic virtualized network function allocation in a multi-cloud environment.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

Neutrality in Future Public Clouds: Implications and Challenges.
Proceedings of the 8th USENIX Workshop on Hot Topics in Cloud Computing, 2016

Optimal Power Flow with Random Wind Resources.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Resource Management and Orchestration for a Dynamic Service Chain Steering Model.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows to Multiple Servers.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Profiling Memory Vulnerability of Big-Data Applications.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Migration to a non-neutral internet: Economics modeling and analysis of impact.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Multiperiod subscription pricing for cellular wireless entrants.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Dynamic traffic steering of multi-tenant virtualized network functions in SDN enabled data centers.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

Performance analysis of virtualized network functions on virtualized systems architectures.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

2015
Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems.
IEEE/ACM Trans. Netw., 2015

Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention.
IEEE Trans. Knowl. Data Eng., 2015

Network calculus for parallel processing.
SIGMETRICS Performance Evaluation Review, 2015

Optimizing cluster formation in super-peer networks via local incentive design.
Peer-to-Peer Networking and Applications, 2015

Generation bidding game with potentially false attestation of flexible demand.
EURASIP J. Adv. Sig. Proc., 2015

Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data.
CoRR, 2015

Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015

On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants.
Proceedings of the 23rd IEEE International Symposium on Modeling, 2015

Roaming charges for customers of cellular-wireless entrant providers.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

On Privacy Preserving Partial Image Sharing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design.
Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, 2015

2014
Instance-Level Constraint-Based Semisupervised Learning With Imposed Space-Partitioning.
IEEE Trans. Neural Netw. Learning Syst., 2014

Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model.
SIGMETRICS Performance Evaluation Review, 2014

A Game of Uncoordinated Sharing of Private Spectrum Commons.
SIGMETRICS Performance Evaluation Review, 2014

Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands.
IEEE Journal on Selected Areas in Communications, 2014

Generation bidding game with flexible demand.
CoRR, 2014

Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model.
CoRR, 2014

Market-Based Power Allocation for a Differentially Priced FDMA System.
CoRR, 2014

Network calculus for parallel processing.
CoRR, 2014

Golden-rule capacity allocation for distributed delay management in peer-to-peer networks.
CoRR, 2014

Roaming charges for customers of cellular-wireless entrant and incumbent providers.
CoRR, 2014

An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies.
CoRR, 2014

Capturing Aggregate Flexibility in Demand Response.
CoRR, 2014

Scalable and Anonymous Modeling of Large Populations of Flexible Appliances.
CoRR, 2014

Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks.
Proceedings of the 7th International Conference on NETwork Games, COntrol and OPtimization, 2014

A Hierarchical Demand Response Framework for Data Center Power Cost Optimization under Real-World Electricity Pricing.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Market-based power allocation for a differentially priced FDMA system.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A simple two-sided market model with side-payments and ISP service classes.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Case for Virtualizing the Electric Utility in Cloud Data Centers.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

A Bidding Game for Generators in the Presence of Flexible Demand.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

Detecting anomalous latent classes in a batch of network traffic flows.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Behavior in a shared resource game with cooperative, greedy, and vigilante players.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Capturing aggregate flexibility in Demand Response.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.
IEEE/ACM Trans. Netw., 2013

A model of network neutrality with usage-based prices.
Telecommunication Systems, 2013

Pricing of service in clouds: optimal response and strategic interactions.
SIGMETRICS Performance Evaluation Review, 2013

Distributed medium access control with conditionally altruistic users.
EURASIP J. Wireless Comm. and Networking, 2013

Clustering Consumption in Queues: A Scalable Model for Electric Vehicle Scheduling
CoRR, 2013

The effect of caching on a model of content and access provider revenues in information-centric networks
CoRR, 2013

Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing.
CoRR, 2013

Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity.
CoRR, 2013

Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics.
CoRR, 2013

Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players.
CoRR, 2013

An agent-based framework for performance modeling of an optimistic parallel discrete event simulator.
CASM, 2013

Data Center Power Cost Optimization via Workload Modulation.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Scalable model predictive control of demand for ancillary services.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Hybrid client-server and peer-to-peer caching systems with selfish peers.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Clustering consumption in queues: A scalable model for electric vehicle scheduling.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling.
Neural Computation, 2012

A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users.
IEEE Journal on Selected Areas in Communications, 2012

CSMA Local Area Networking under Dynamic Altruism
CoRR, 2012

Stochastic Loss Aversion for Random Medium Access
CoRR, 2012

Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012

Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Avoiding overages by deferred aggregate demand for PEV charging on the smart grid.
Proceedings of IEEE International Conference on Communications, 2012

A study of unsupervised adaptive crowdsourcing.
Proceedings of IEEE International Conference on Communications, 2012

Side-payment profitability under convex demand-response modeling congestion-sensitive applications.
Proceedings of IEEE International Conference on Communications, 2012

Stochastic Loss Aversion for Random Medium Access.
Proceedings of the Game Theory for Networks, 2012

Semisupervised domain adaptation for mixture model based classifiers.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Decentralized capacity reallocation for a loss network.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Distributed Medium Access Control with Dynamic Altruism.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Denial-of-Service Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Flow Classifier with Tamper-Resistant Features and an Evaluation of Its Portability to New Domains.
IEEE Journal on Selected Areas in Communications, 2011

A Study of Unsupervised Adaptive Crowdsourcing
CoRR, 2011

Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications.
CoRR, 2011

Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra.
Computer Networks, 2011

Salting Public Traces with Attack Traffic to Test Flow Classifiers.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Sybil Detection via Distributed Sparse Cut Monitoring.
Proceedings of IEEE International Conference on Communications, 2011

An Epidemic Model of Bit Torrent with Control.
Proceedings of IEEE International Conference on Communications, 2011

Iterative partitioning scheme for distributed simulation of dynamic networks.
Proceedings of the 16th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2011

2010
An Introduction to Models of Online Peer-to-Peer Social Networking
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, 2010

Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions.
IEEE Trans. Neural Networks, 2010

PWC: a proactive worm containment solution for enterprise networks.
Security and Communication Networks, 2010

Application Neutrality and a Paradox of Side Payments
CoRR, 2010

A Study of Non-Neutral Networks with Usage-based Prices
CoRR, 2010

Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior
CoRR, 2010

Worm virulence estimation for the containment of local worm outbreak.
Computers & Security, 2010

Congestion control alternatives for residential broadband access.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Improved Fine-Grained Component-Conditional Class Labeling with Active Learning.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

A Study of Non-neutral Networks with Usage-Based Prices.
Proceedings of the Incentives, 2010

File-sharing costs and quality-of-service.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A sybil-proof referral system based on multiplicative reputation chains.
IEEE Communications Letters, 2009

A quantum computer network
CoRR, 2009

Peer-to-peer unstructured anycasting using correlated swarms.
Proceedings of the 21st International Teletraffic Congress, 2009

Clock-like Flow Replacement Schemes for Resilient Flow Monitoring.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Robust Sybil Detection for MANETs.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

A simple reputation model for BitTorrent-like incentives.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Wireless mesh networking games.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
Proxy-RED: an AQM scheme for wireless local area networks.
Wireless Communications and Mobile Computing, 2008

A model of the spread of randomly scanning Internet worms that saturate access links.
ACM Trans. Model. Comput. Simul., 2008

Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down.
ACM Trans. Model. Comput. Simul., 2008

A dynamic quarantine scheme for controlling unresponsive TCP sessions.
Telecommunication Systems, 2008

Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling.
EURASIP J. Adv. Sig. Proc., 2008

Wireless mesh networks based on CDMA.
Computer Communications, 2008

A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks.
Proceedings of the Network Control and Optimization, Second Euro-NF Workshop, 2008

SINR-sensitive routing in wireless 802.11 mesh networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Exploring Anti-Spam Models in Large Scale VoIP Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification.
Proceedings of the IEEE International Conference on Acoustics, 2008

Threshold Smart Walk for the Containment of Local Worm Outbreak.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On flat-rate and usage-based pricing for tiered commodity internet services.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs.
IEEE Journal on Selected Areas in Communications, 2007

Evaluation of Collaborative Worm Containments on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

PWC: A proactive worm containment solution for enterprise networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Distributed Power Control in Multihop Ad Hoc CDMA Networks.
Proceedings of IEEE International Conference on Communications, 2007

Modeling file-sharing with BitTorrent-like incentives.
Proceedings of the IEEE International Conference on Acoustics, 2007

Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification.
IEEE Journal on Selected Areas in Communications, 2006

Charge sensitive and incentive compatible end-to-end window-based control for selfish users.
IEEE Journal on Selected Areas in Communications, 2006

Denial-of-Service Attack-Detection Techniques.
IEEE Internet Computing, 2006

A taxonomy of internet traceback.
IJSN, 2006

Path preserving scale down for validation of internet inter-domain routing protocols.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Visual toolkit for network security experiment specification and data analysis.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006

Routing and Uplink-Downlink Scheduling in Ad Hoc CDMA Networks.
Proceedings of IEEE International Conference on Communications, 2006

On the Relation Between Capacity and Number of Sinks in an Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Toward a Framework for Forensic Analysis of Scanning Worms.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Dynamics of usage-priced communication networks: the case of a single bottleneck resource.
IEEE/ACM Trans. Netw., 2005

Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005

Pheromone-aided robust multipath and multipriority routing in wireless MANETs.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

Advances for networks & internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Hierarchical shaped deficit round-robin scheduling.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks.
IEEE Trans. Mob. Comput., 2004

A Class of Shaped Deficit Round-Robin (SDRR) Schedulers.
Telecommunication Systems, 2004

An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks.
Computer Communications, 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Preliminary results using scale-down to explore worm dynamics.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks.
Proceedings of IEEE International Conference on Communications, 2004

TCP windowcontrol in a priced network.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
Nash equilibria of a generic networking game with applications to circuit-switched networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited.
Proceedings of the Global Telecommunications Conference, 2003

A control theoretic approach for designing adaptive AQM schemes.
Proceedings of the Global Telecommunications Conference, 2003

2002
Equilibria of a noncooperative game for heterogeneous users of an ALOHA network.
IEEE Communications Letters, 2002

A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks.
Proceedings of the 10th International Workshop on Modeling, 2002

An adaptive power-conserving service discipline for Bluetooth.
Proceedings of the IEEE International Conference on Communications, 2002

Providing fairness in DiffServ architecture.
Proceedings of the Global Telecommunications Conference, 2002

Stabilized virtual buffer (SVB) - an active queue management scheme for Internet quality-of-service.
Proceedings of the Global Telecommunications Conference, 2002

2001
General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud.
Proceedings of the Networking, 2001

2000
Extremal shape-controlled traffic patterns in high-speed networks.
IEEE Trans. Communications, 2000

Worst-case performance of a buffer with independent shaped arrival processes.
IEEE Communications Letters, 2000

Traffic shaping for a loss system.
IEEE Communications Letters, 2000

1998
ATM via satellite: A framework and implementation.
Wireless Networks, 1998

ATM input-buffered switches with the guaranteed-rate property.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1997
Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Bandwidth scheduling for wide-area ATM networks using virtual finishing times.
IEEE/ACM Trans. Netw., 1996

Bandwidth allocation for multiple qualities of service using generalized processor sharing.
IEEE Trans. Information Theory, 1996

1995
Analog optimization with Wong's stochastic neural network.
IEEE Trans. Neural Networks, 1995

Admission control and routing in ATM networks using inferences from measured buffer occupancy.
IEEE Trans. Communications, 1995

Resource Management in Wide-Area ATM Networks Using Effective Bandwiths.
IEEE Journal on Selected Areas in Communications, 1995

1994
Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Effective bandwidths for multiclass Markov fluids and other ATM sources.
IEEE/ACM Trans. Netw., 1993

Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources.
ACM Trans. Model. Comput. Simul., 1993

Relative entropy between Markov transition rate matrices.
IEEE Trans. Information Theory, 1993

A Review of Quick Simulation Methods for Queues.
Proceedings of the MASCOTS '93, 1993

1991
Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990).
IEEE Trans. Information Theory, 1991


  Loading...