George Kesidis
Orcid: 0000-0001-7947-8127Affiliations:
- Pennsylvania State University, University Park, USA
According to our database1,
George Kesidis
authored at least 278 papers
between 1991 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cse.psu.edu
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks.
CoRR, 2024
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection.
Proceedings of the 34th IEEE International Workshop on Machine Learning for Signal Processing, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Queueing Syst. Theory Appl., February, 2023
Anomaly detection of adversarial examples using class-conditional generative adversarial networks.
Comput. Secur., 2023
Proceedings of the 33rd IEEE International Workshop on Machine Learning for Signal Processing, 2023
Proceedings of the 9th International Workshop on Container Technologies and Container Clouds, 2023
Stash: A Comprehensive Stall-Centric Characterization of Public Cloud VMs for Distributed Deep Learning.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023
2022
IEEE Trans. Neural Networks Learn. Syst., 2022
Training set cleansing of backdoor poisoning by self-supervised representation learning.
CoRR, 2022
Proceedings of the Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7, 2022
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios.
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Splice: An Automated Framework for Cost-and Performance-Aware Blending of Cloud Services.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set.
Neural Comput., 2021
Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks.
CoRR, 2021
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing.
Comput. Secur., 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set.
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021
2020
IEEE/ACM Trans. Netw., 2020
SIGMETRICS Perform. Evaluation Rev., 2020
The distribution of age-of-information performance measures for message processing systems.
Queueing Syst. Theory Appl., 2020
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks.
Proc. IEEE, 2020
Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020
Proceedings of the Middleware '20: 21st International Middleware Conference, 2020
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 13th European Workshop on Systems Security, 2020
A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers.
Proceedings of the Dynamic Data Driven Applications Systems, 2020
2019
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
Neural Comput., 2019
IEEE Netw. Lett., 2019
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
CoRR, 2019
Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers.
CoRR, 2019
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.
CoRR, 2019
A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense.
Proceedings of the 29th IEEE International Workshop on Machine Learning for Signal Processing, 2019
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019
Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability.
ACM Trans. Auton. Adapt. Syst., 2018
Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters.
CoRR, 2018
CoRR, 2018
Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms.
CoRR, 2018
Constrained max-min fair scheduling of variable-length packet-flows to multiple servers.
Ann. des Télécommunications, 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018
Proceedings of the 26th IEEE International Symposium on Modeling, 2018
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance<sup>*</sup>.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Computing, 2018
A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers.
Proceedings of the IEEE Global Communications Conference, 2018
Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
IEEE Trans. Netw. Serv. Manag., 2017
A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes.
IEEE Trans. Neural Networks Learn. Syst., 2017
Proc. ACM Meas. Anal. Comput. Syst., 2017
Comput. Stand. Interfaces, 2017
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017
CoRR, 2017
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017
CoRR, 2017
CoRR, 2017
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017
Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017
Proceedings of the 25th IEEE International Symposium on Modeling, 2017
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Multicommodity games in public-cloud markets considering subadditive resource demands.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous servers.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud.
Proceedings of the Twelfth European Conference on Computer Systems, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 9th Cloud Computing Security Workshop, 2017
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets.
Proceedings of the 2017 American Control Conference, 2017
2016
IEEE/ACM Trans. Netw., 2016
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk.
SIGMETRICS Perform. Evaluation Rev., 2016
IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the 23rd International Conference on Telecommunications, 2016
Proceedings of the 8th USENIX Workshop on Hot Topics in Cloud Computing, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
Dynamic traffic steering of multi-tenant virtualized network functions in SDN enabled data centers.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016
Performance analysis of virtualized network functions on virtualized systems architectures.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016
2015
Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems.
IEEE/ACM Trans. Netw., 2015
Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention.
IEEE Trans. Knowl. Data Eng., 2015
Peer-to-Peer Netw. Appl., 2015
EURASIP J. Adv. Signal Process., 2015
Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design.
Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, 2015
2014
Instance-Level Constraint-Based Semisupervised Learning With Imposed Space-Partitioning.
IEEE Trans. Neural Networks Learn. Syst., 2014
Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model.
SIGMETRICS Perform. Evaluation Rev., 2014
SIGMETRICS Perform. Evaluation Rev., 2014
Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands.
IEEE J. Sel. Areas Commun., 2014
Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model.
CoRR, 2014
Golden-rule capacity allocation for distributed delay management in peer-to-peer networks.
CoRR, 2014
CoRR, 2014
An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies.
CoRR, 2014
CoRR, 2014
Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks.
Proceedings of the 7th International Conference on NETwork Games, COntrol and OPtimization, 2014
A Hierarchical Demand Response Framework for Data Center Power Cost Optimization under Real-World Electricity Pricing.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014
Proceedings of the 9th International Workshop on Feedback Computing, 2014
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014
2013
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.
IEEE/ACM Trans. Netw., 2013
SIGMETRICS Perform. Evaluation Rev., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing.
CoRR, 2013
Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity.
CoRR, 2013
CoRR, 2013
Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players.
CoRR, 2013
An agent-based framework for performance modeling of an optimistic parallel discrete event simulator.
Complex Adapt. Syst. Model., 2013
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013
The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the 2013 Asilomar Conference on Signals, 2013
2012
Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling.
Neural Comput., 2012
IEEE J. Sel. Areas Commun., 2012
Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012
Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Side-payment profitability under convex demand-response modeling congestion-sensitive applications.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Game Theory for Networks, 2012
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
A Flow Classifier with Tamper-Resistant Features and an Evaluation of Its Portability to New Domains.
IEEE J. Sel. Areas Commun., 2011
Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications.
CoRR, 2011
Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra.
Comput. Networks, 2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
Proceedings of the 2011 International Workshop on Modeling, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 16th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2011
2010
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, ISBN: 978-3-031-79998-3, 2010
Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions.
IEEE Trans. Neural Networks, 2010
Secur. Commun. Networks, 2010
Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior
CoRR, 2010
Comput. Secur., 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010
Proceedings of the Incentives, 2010
Proceedings of the Re-Architecting the Internet Workshop, 2010
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010
Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
2009
IEEE Commun. Lett., 2009
Proceedings of the 21st International Teletraffic Congress, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
2008
Wirel. Commun. Mob. Comput., 2008
A model of the spread of randomly scanning Internet worms that saturate access links.
ACM Trans. Model. Comput. Simul., 2008
Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down.
ACM Trans. Model. Comput. Simul., 2008
Telecommun. Syst., 2008
Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling.
EURASIP J. Adv. Signal Process., 2008
A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks.
Proceedings of the Network Control and Optimization, Second Euro-NF Workshop, 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification.
Proceedings of the IEEE International Conference on Acoustics, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008
2007
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs.
IEEE J. Sel. Areas Commun., 2007
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution.
Proceedings of the Fourth International Conference on Broadband Communications, 2007
2006
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification.
IEEE J. Sel. Areas Commun., 2006
Charge sensitive and incentive compatible end-to-end window-based control for selfish users.
IEEE J. Sel. Areas Commun., 2006
Path preserving scale down for validation of internet inter-domain routing protocols.
Proceedings of the Winter Simulation Conference WSC 2006, 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Polymorphic worm detection and defense: system design, experimental methodology, and data resources.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006
2005
Dynamics of usage-priced communication networks: the case of a single bottleneck resource.
IEEE/ACM Trans. Netw., 2005
Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
IEEE Trans. Mob. Comput., 2004
An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks.
Comput. Commun., 2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks.
Proceedings of IEEE International Conference on Communications, 2004
TCP windowcontrol in a priced network.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
2003
Nash equilibria of a generic networking game with applications to circuit-switched networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited.
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003
2002
IEEE Commun. Lett., 2002
A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks.
Proceedings of the 10th International Workshop on Modeling, 2002
Proceedings of the IEEE International Conference on Communications, 2002
Proceedings of the Global Telecommunications Conference, 2002
Stabilized virtual buffer (SVB) - an active queue management scheme for Internet quality-of-service.
Proceedings of the Global Telecommunications Conference, 2002
2001
General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud.
Proceedings of the Networking, 2001
2000
IEEE Trans. Commun., 2000
IEEE Commun. Lett., 2000
1998
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
1997
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997
1996
IEEE/ACM Trans. Netw., 1996
Bandwidth allocation for multiple qualities of service using generalized processor sharing.
IEEE Trans. Inf. Theory, 1996
1995
IEEE Trans. Neural Networks, 1995
Admission control and routing in ATM networks using inferences from measured buffer occupancy.
IEEE Trans. Commun., 1995
IEEE J. Sel. Areas Commun., 1995
1994
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994
1993
IEEE/ACM Trans. Netw., 1993
ACM Trans. Model. Comput. Simul., 1993
IEEE Trans. Inf. Theory, 1993
A Review of Quick Simulation Methods for Queues.
Proceedings of the MASCOTS '93, 1993
1991
Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990).
IEEE Trans. Inf. Theory, 1991