2008 | ||
---|---|---|
48 | EE | George Kesidis, A. Das, Gustavo de Veciana: On flat-rate and usage-based pricing for tiered commodity internet services. CISS 2008: 304-308 |
47 | EE | L. Li, P. Liu, George Kesidis: Threshold Smart Walk for the Containment of Local Worm Outbreak. GLOBECOM 2008: 2124-2128 |
46 | EE | Pushkar Patankar, Gunwoo Nam, George Kesidis, Chita R. Das: Exploring Anti-Spam Models in Large Scale VoIP Systems. ICDCS 2008: 85-92 |
45 | EE | George Kesidis, Takis Konstantopoulos, Perla Sousi: A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks. NET-COOP 2008: 26-36 |
44 | EE | George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic: A model of the spread of randomly scanning Internet worms that saturate access links. ACM Trans. Model. Comput. Simul. 18(2): (2008) |
43 | EE | Glenn Carl, George Kesidis: Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down. ACM Trans. Model. Comput. Simul. 18(3): (2008) |
42 | EE | A. Neishaboori, George Kesidis: Wireless mesh networks based on CDMA. Computer Communications 31(8): 1513-1528 (2008) |
41 | EE | Sungwon Yi, Xidong Deng, George Kesidis, Chita R. Das: A dynamic quarantine scheme for controlling unresponsive TCP sessions. Telecommunication Systems 37(4): 169-189 (2008) |
40 | EE | Sungwon Yi, Martin Kappes, Sachin Garg, Xidong Deng, George Kesidis, Chita R. Das: Proxy-RED: an AQM scheme for wireless local area networks. Wireless Communications and Mobile Computing 8(4): 421-434 (2008) |
2007 | ||
39 | EE | Arnab Das, George Kesidis, Venkat Pothamsetty: Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. BROADNETS 2007: 444-448 |
38 | EE | George Kesidis, A. Neishaboori: Distributed Power Control in Multihop Ad Hoc CDMA Networks. ICC 2007: 96-101 |
37 | EE | Paul Barom Jeon, George Kesidis: GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. ICN 2007: 10 |
36 | EE | Sungwon Yi, Byoung-koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das: Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269 |
35 | EE | Youngmi Jin, George Kesidis: Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs. IEEE Journal on Selected Areas in Communications 25(6): 1113-1123 (2007) |
2006 | ||
34 | EE | Ihab Hamadeh, George Kesidis: Toward a Framework for Forensic Analysis of Scanning Worms. ETRICS 2006: 282-297 |
33 | EE | George Kesidis, Youngmi Jin, B. Mortazavi, T. Konstopoulos: An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population. GLOBECOM 2006 |
32 | EE | Rajesh N. Rao, George Kesidis: On the Relation Between Capacity and Number of Sinks in an Sensor Network. GLOBECOM 2006 |
31 | EE | L. Li, P. Liu, George Kesidis: Visual toolkit for network security experiment specification and data analysis. VizSEC 2006: 7-14 |
30 | EE | Glenn Carl, Shashi Phoha, George Kesidis, Bharat B. Madan: Path preserving scale down for validation of internet inter-domain routing protocols. Winter Simulation Conference 2006: 2210-2218 |
29 | EE | Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai: Denial-of-Service Attack-Detection Techniques. IEEE Internet Computing 10(1): 82-89 (2006) |
28 | EE | Jisheng Wang, David J. Miller, George Kesidis: Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. IEEE Journal on Selected Areas in Communications 24(10): 1929-1941 (2006) |
27 | EE | Youngmi Jin, George Kesidis: Charge sensitive and incentive compatible end-to-end window-based control for selfish users. IEEE Journal on Selected Areas in Communications 24(5): 952-961 (2006) |
26 | EE | Ihab Hamadeh, George Kesidis: A taxonomy of internet traceback. IJSN 1(1/2): 54-61 (2006) |
2005 | ||
25 | EE | Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty: A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. PADS 2005: 191-198 |
24 | EE | Paul Barom Jeon, George Kesidis: Pheromone-aided robust multipath and multipriority routing in wireless MANETs. PE-WASUN 2005: 106-113 |
23 | EE | George Kesidis, Ihab Hamadeh, Soranun Jiwasurat: Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. QoS-IP 2005: 101-109 |
22 | EE | Youngmi Jin, George Kesidis: Dynamics of usage-priced communication networks: the case of a single bottleneck resource. IEEE/ACM Trans. Netw. 13(5): 1041-1053 (2005) |
2004 | ||
21 | Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das: RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks. Communications, Internet, and Information Technology 2004: 369-374 | |
20 | Youngmi Jin, George Kesidis: TCP windowcontrol in a priced network. Communications, Internet, and Information Technology 2004: 596-600 | |
19 | EE | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson: Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72 |
18 | EE | Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) |
17 | EE | Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das: An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks. Computer Communications 27(9): 828-839 (2004) |
16 | EE | Rajesh N. Rao, George Kesidis: Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks. IEEE Trans. Mob. Comput. 3(3): 225-232 (2004) |
15 | EE | Soranun Jiwasurat, George Kesidis: A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. Telecommunication Systems 25(3-4): 173-191 (2004) |
2003 | ||
14 | EE | Youngmi Jin, George Kesidis: Nash equilibria of a generic networking game with applications to circuit-switched networks. INFOCOM 2003 |
2002 | ||
13 | EE | B. M. Ninan, George Kesidis, Michael Devetsikiotis: A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks. MASCOTS 2002: 257- |
2001 | ||
12 | EE | George Kesidis, Leandros Tassiulas: General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud. ICN (2) 2001: 339-347 |
1998 | ||
11 | EE | Anthony Hung, Marie-José Montpetit, George Kesidis: ATM via satellite: A framework and implementation. Wireless Networks 4(2): 141-153 (1998) |
1997 | ||
10 | George Kesidis, Nick McKeown: Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks. ICC (3) 1997: 1684-1688 | |
1996 | ||
9 | Gustavo de Veciana, George Kesidis: Bandwidth allocation for multiple qualities of service using generalized processor sharing. IEEE Transactions on Information Theory 42(1): 268-272 (1996) | |
8 | EE | Anthony Hung, George Kesidis: Bandwidth scheduling for wide-area ATM networks using virtual finishing times. IEEE/ACM Trans. Netw. 4(1): 49-54 (1996) |
1995 | ||
7 | Gustavo de Veciana, George Kesidis, Jean C. Walrand: Resource Management in Wide-Area ATM Networks Using Effective Bandwiths. IEEE Journal on Selected Areas in Communications 13(6): 1081-1090 (1995) | |
1994 | ||
6 | George Kesidis: Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network. MASCOTS 1994: 318-322 | |
1993 | ||
5 | George Kesidis, Jean C. Walrand: A Review of Quick Simulation Methods for Queues. MASCOTS 1993: 17-21 | |
4 | EE | George Kesidis, Jean C. Walrand: Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources. ACM Trans. Model. Comput. Simul. 3(3): 269-276 (1993) |
3 | George Kesidis, Jean C. Walrand: Relative entropy between Markov transition rate matrices. IEEE Transactions on Information Theory 39(3): 1056- (1993) | |
2 | EE | George Kesidis, Jean C. Walrand, Cheng-Shang Chang: Effective bandwidths for multiclass Markov fluids and other ATM sources. IEEE/ACM Trans. Netw. 1(4): 424-428 (1993) |
1991 | ||
1 | Jean C. Walrand, George Kesidis: Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990). IEEE Transactions on Information Theory 37(5): 1493- (1991) |