2008 |
58 | EE | Wei Yu,
Nan Zhang,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
DSN 2008: 356-365 |
57 | EE | Youngwoo Ahn,
Riccardo Bettati:
Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems.
ECRTS 2008: 102-111 |
56 | EE | Ionut Cardei,
Allalaghatta Pavan,
Riccardo Bettati:
Quality of Service guarantees and fault-tolerant TCP services in mobile wireless optical networks.
IJAHUC 3(3): 146-158 (2008) |
55 | EE | Shengquan Wang,
Riccardo Bettati:
Reactive speed control in temperature-constrained real-time systems.
Real-Time Systems 39(1-3): 73-95 (2008) |
2007 |
54 | EE | Ye Zhu,
Riccardo Bettati:
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information.
ICDCS 2007: 24 |
53 | EE | Tuneesh Leila,
Riccardo Bettati:
Privacy of encrypted voice-over-IP.
SMC 2007: 3063-3068 |
52 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
Analysis of flow-correlation attacks in anonymity network.
IJSN 2(1/2): 137-153 (2007) |
2006 |
51 | | SooHyun Cho,
Riccardo Bettati:
Improving quality of service of TCP flows in strictly prioritized network.
ACST 2006: 240-245 |
50 | EE | Shengquan Wang,
Riccardo Bettati:
Reactive Speed Control in Temperature-Constrained Real-Time Systems.
ECRTS 2006: 161-170 |
49 | EE | SooHyun Cho,
Riccardo Bettati:
Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth.
GLOBECOM 2006 |
48 | EE | Shengquan Wang,
Riccardo Bettati:
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals.
RTSS 2006: 323-334 |
2005 |
47 | | Sangig Rho,
Byung-Kyu Choi,
Riccardo Bettati:
Design Real-Time Java Remote Method Invocation: A Server-Centric Approach.
IASTED PDCS 2005: 269-276 |
46 | EE | Hongyun Xu,
Xinwen Fu,
Ye Zhu,
Riccardo Bettati,
Jianer Chen,
Wei Zhao:
SAS: A Scalar Anonymous Communication System.
ICCNMC 2005: 452-461 |
45 | EE | Xinwen Fu,
Ye Zhu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks.
ICDCS 2005: 493-503 |
44 | EE | Ye Zhu,
Riccardo Bettati:
Anonymity vs. Information Leakage in Anonymity Systems.
ICDCS 2005: 514-524 |
43 | EE | Bryan Graham,
Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
ICPADS (1) 2005: 57-63 |
42 | EE | Shengquan Wang,
Sangig Rho,
Zhibin Mai,
Riccardo Bettati,
Wei Zhao:
Real-Time Component-Based Systems.
IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 428-437 |
41 | EE | Ye Zhu,
Xinwen Fu,
Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
NCA 2005: 215-218 |
40 | EE | SooHyun Cho,
Riccardo Bettati:
Aggregated Aggressiveness Control on Groups of TCP Flows.
NETWORKING 2005: 586-597 |
39 | EE | Ye Zhu,
Riccardo Bettati:
Unmixing Mix Traffic.
Privacy Enhancing Technologies 2005: 110-127 |
2004 |
38 | EE | Shengquan Wang,
Ripal Nathuji,
Riccardo Bettati,
Wei Zhao:
Providing Statistical Delay Guarantees in Wireless Networks.
ICDCS 2004: 48-55 |
37 | EE | Byung-Kyu Choi,
Sangig Rho,
Riccardo Bettati:
Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems.
ISORC 2004: 269-276 |
36 | EE | Xinwen Fu,
Bryan Graham,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Information Hiding 2004: 266-281 |
35 | EE | Ye Zhu,
Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks.
Privacy Enhancing Technologies 2004: 207-225 |
34 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
A quantitative analysis of anonymous communications.
IEEE Transactions on Reliability 53(1): 103-115 (2004) |
33 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing absolute differentiated services for real-time applications in static-priority scheduling networks.
IEEE/ACM Trans. Netw. 12(2): 326-339 (2004) |
2003 |
32 | | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Countermeasures to Traffic Analysis Attacks.
IAW 2003: 188-195 |
31 | | Wei Yu,
Dong Xuan,
Sandeep K. Reddy,
Riccardo Bettati,
Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks.
IAW 2003: 84-91 |
30 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
ICDCS 2003: 340- |
29 | EE | Xinwen Fu,
Bryan Graham,
Riccardo Bettati,
Wei Zhao,
Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
ICPP 2003: 483-492 |
28 | EE | Byung-Kyu Choi,
Sangig Rho,
Riccardo Bettati:
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems.
IPDPS 2003: 122 |
27 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
A Study of Providing Statistical QoS in a Differentiated Sevices Network.
NCA 2003: 297-304 |
26 | | Byung-Kyu Choi,
Dong Xuan,
Riccardo Bettati,
Wei Zhao,
Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication.
Real-Time Systems 24(2): 171-202 (2003) |
2002 |
25 | EE | Yong Guan,
Xinwen Fu,
Riccardo Bettati,
Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols.
ICDCS 2002: 257- |
2001 |
24 | EE | Byung-Kyu Choi,
Riccardo Bettati:
Endpoint Admission Control: Network Based Approach.
ICDCS 2001: 227-235 |
23 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks.
IEEE Real Time Technology and Applications Symposium 2001: 127-129 |
22 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks.
IEEE Real-Time Systems Symposium 2001: 289-298 |
21 | EE | Shengquan Wang,
Dong Xuan,
Riccardo Bettati,
Wei Zhao:
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks.
INFOCOM 2001: 669-678 |
20 | | Yong Guan,
Xinwen Fu,
Dong Xuan,
P. U. Shenoy,
Riccardo Bettati,
Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001) |
2000 |
19 | EE | Byung-Kyu Choi,
Dong Xuan,
Chengzhi Li,
Riccardo Bettati,
Wei Zhao:
Scalable QoS Guaranteed Communication Services for Real-Time Applications.
ICDCS 2000: 180-187 |
18 | EE | Gurudatt Shenoy,
Suresh K. Satapati,
Riccardo Bettati:
HYDRANET-FT: Network Support for Dependable Services.
ICDCS 2000: 699-706 |
17 | EE | Dong Xuan,
Chengzhi Li,
Riccardo Bettati,
Jianer Chen,
Wei Zhao:
Utilization-Based Admission Control for Real-Time Applications.
ICPP 2000: 251- |
16 | EE | Byung-Kyu Choi,
Riccardo Bettati:
Efficient resource management for hard real-time communication over differentiated services architectures.
RTCSA 2000: 119-126 |
15 | EE | Yves Meylan,
Aneema Bajpai,
Riccardo Bettati:
ProtEx: a toolkit for the analysis of distributed real-time systems.
RTCSA 2000: 183- |
1999 |
14 | EE | Chengzhi Li,
Riccardo Bettati,
Wei Zhao:
New Delay Analysis in High Speed Networks.
ICPP 1999: 454-461 |
13 | EE | B. Devalla,
Riccardo Bettati,
Wei Zhao:
Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks .
RTCSA 1999: 340-347 |
12 | EE | Byung-Kyu Choi,
Riccardo Bettati:
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment.
RTCSA 1999: 388- |
11 | EE | Riccardo Bettati,
Wei Zhao,
D. Teodor:
Real-time Intrusion Detection and Suppression in ATM Networks.
Workshop on Intrusion Detection and Network Monitoring 1999: 111-118 |
1998 |
10 | | Hamesh Chawla,
Geoff Dillon,
Riccardo Bettati:
HYDRANET : Network Support for Scaling of Large-Scale Services.
ICCCN 1998: 574-583 |
9 | EE | Chengzhi Li,
Riccardo Bettati,
Wei Zhao:
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals.
ICPP 1998: 432-440 |
1997 |
8 | | Sharad Sundaresan,
Riccardo Bettati:
Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks.
ICDCS 1997: 0- |
7 | EE | Chengzhi Li,
Riccardo Bettati,
Wei Zhao:
Static priority scheduling for ATM networks.
IEEE Real-Time Systems Symposium 1997: 264-273 |
1996 |
6 | | Riccardo Bettati,
Amit Gupta:
Dynamic Resource Allocation Migration for Multiparty Real-Time Communications.
ICDCS 1996: 646-656 |
5 | | Rolf Oppliger,
Amit Gupta,
Mark Moran,
Riccardo Bettati:
A Security Architecture for Tenet Scheme 2.
IDMS 1996: 163-174 |
4 | EE | Jane W.-S. Liu,
Chung Laung Liu,
Zhong Deng,
Too-Seng Tia,
Jun Sun,
Matthew F. Storch,
David Hull,
J. L. Redondo,
Riccardo Bettati,
A. Silberman:
Perts: a Prototyping Environment for Real-Time Systems.
International Journal of Software Engineering and Knowledge Engineering 6(2): 161-177 (1996) |
1995 |
3 | | Riccardo Bettati,
Domenico Ferrari,
Amit Gupta,
W. Heffner,
Wingwai Howe,
Mark Moran,
Quyen Nguyen,
Rajendra Yavatkar:
Connection Establishment for Multi-Party Real-Time Communication.
NOSSDAV 1995: 240-250 |
1992 |
2 | | Riccardo Bettati,
Jane W.-S. Liu:
End-to-End Scheduling to Meet Deadlines in Distributed Systems.
ICDCS 1992: 452-459 |
1990 |
1 | EE | Riccardo Bettati,
Jane W.-S. Liu:
Algorithms for end-to-end scheduling to meet deadlines.
SPDP 1990: 62-67 |