dblp.uni-trier.dewww.uni-trier.de

George Kesidis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
48EEGeorge Kesidis, A. Das, Gustavo de Veciana: On flat-rate and usage-based pricing for tiered commodity internet services. CISS 2008: 304-308
47EEL. Li, P. Liu, George Kesidis: Threshold Smart Walk for the Containment of Local Worm Outbreak. GLOBECOM 2008: 2124-2128
46EEPushkar Patankar, Gunwoo Nam, George Kesidis, Chita R. Das: Exploring Anti-Spam Models in Large Scale VoIP Systems. ICDCS 2008: 85-92
45EEGeorge Kesidis, Takis Konstantopoulos, Perla Sousi: A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks. NET-COOP 2008: 26-36
44EEGeorge Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic: A model of the spread of randomly scanning Internet worms that saturate access links. ACM Trans. Model. Comput. Simul. 18(2): (2008)
43EEGlenn Carl, George Kesidis: Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down. ACM Trans. Model. Comput. Simul. 18(3): (2008)
42EEA. Neishaboori, George Kesidis: Wireless mesh networks based on CDMA. Computer Communications 31(8): 1513-1528 (2008)
41EESungwon Yi, Xidong Deng, George Kesidis, Chita R. Das: A dynamic quarantine scheme for controlling unresponsive TCP sessions. Telecommunication Systems 37(4): 169-189 (2008)
40EESungwon Yi, Martin Kappes, Sachin Garg, Xidong Deng, George Kesidis, Chita R. Das: Proxy-RED: an AQM scheme for wireless local area networks. Wireless Communications and Mobile Computing 8(4): 421-434 (2008)
2007
39EEArnab Das, George Kesidis, Venkat Pothamsetty: Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. BROADNETS 2007: 444-448
38EEGeorge Kesidis, A. Neishaboori: Distributed Power Control in Multihop Ad Hoc CDMA Networks. ICC 2007: 96-101
37EEPaul Barom Jeon, George Kesidis: GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. ICN 2007: 10
36EESungwon Yi, Byoung-koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das: Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269
35EEYoungmi Jin, George Kesidis: Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs. IEEE Journal on Selected Areas in Communications 25(6): 1113-1123 (2007)
2006
34EEIhab Hamadeh, George Kesidis: Toward a Framework for Forensic Analysis of Scanning Worms. ETRICS 2006: 282-297
33EEGeorge Kesidis, Youngmi Jin, B. Mortazavi, T. Konstopoulos: An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population. GLOBECOM 2006
32EERajesh N. Rao, George Kesidis: On the Relation Between Capacity and Number of Sinks in an Sensor Network. GLOBECOM 2006
31EEL. Li, P. Liu, George Kesidis: Visual toolkit for network security experiment specification and data analysis. VizSEC 2006: 7-14
30EEGlenn Carl, Shashi Phoha, George Kesidis, Bharat B. Madan: Path preserving scale down for validation of internet inter-domain routing protocols. Winter Simulation Conference 2006: 2210-2218
29EEGlenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai: Denial-of-Service Attack-Detection Techniques. IEEE Internet Computing 10(1): 82-89 (2006)
28EEJisheng Wang, David J. Miller, George Kesidis: Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. IEEE Journal on Selected Areas in Communications 24(10): 1929-1941 (2006)
27EEYoungmi Jin, George Kesidis: Charge sensitive and incentive compatible end-to-end window-based control for selfish users. IEEE Journal on Selected Areas in Communications 24(5): 952-961 (2006)
26EEIhab Hamadeh, George Kesidis: A taxonomy of internet traceback. IJSN 1(1/2): 54-61 (2006)
2005
25EEIhab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty: A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. PADS 2005: 191-198
24EEPaul Barom Jeon, George Kesidis: Pheromone-aided robust multipath and multipriority routing in wireless MANETs. PE-WASUN 2005: 106-113
23EEGeorge Kesidis, Ihab Hamadeh, Soranun Jiwasurat: Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. QoS-IP 2005: 101-109
22EEYoungmi Jin, George Kesidis: Dynamics of usage-priced communication networks: the case of a single bottleneck resource. IEEE/ACM Trans. Netw. 13(5): 1041-1053 (2005)
2004
21 Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das: RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks. Communications, Internet, and Information Technology 2004: 369-374
20 Youngmi Jin, George Kesidis: TCP windowcontrol in a priced network. Communications, Internet, and Information Technology 2004: 596-600
19EENicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson: Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72
18EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
17EEHao Zhu, Guohong Cao, George Kesidis, Chita R. Das: An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks. Computer Communications 27(9): 828-839 (2004)
16EERajesh N. Rao, George Kesidis: Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks. IEEE Trans. Mob. Comput. 3(3): 225-232 (2004)
15EESoranun Jiwasurat, George Kesidis: A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. Telecommunication Systems 25(3-4): 173-191 (2004)
2003
14EEYoungmi Jin, George Kesidis: Nash equilibria of a generic networking game with applications to circuit-switched networks. INFOCOM 2003
2002
13EEB. M. Ninan, George Kesidis, Michael Devetsikiotis: A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks. MASCOTS 2002: 257-
2001
12EEGeorge Kesidis, Leandros Tassiulas: General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud. ICN (2) 2001: 339-347
1998
11EEAnthony Hung, Marie-José Montpetit, George Kesidis: ATM via satellite: A framework and implementation. Wireless Networks 4(2): 141-153 (1998)
1997
10 George Kesidis, Nick McKeown: Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks. ICC (3) 1997: 1684-1688
1996
9 Gustavo de Veciana, George Kesidis: Bandwidth allocation for multiple qualities of service using generalized processor sharing. IEEE Transactions on Information Theory 42(1): 268-272 (1996)
8EEAnthony Hung, George Kesidis: Bandwidth scheduling for wide-area ATM networks using virtual finishing times. IEEE/ACM Trans. Netw. 4(1): 49-54 (1996)
1995
7 Gustavo de Veciana, George Kesidis, Jean C. Walrand: Resource Management in Wide-Area ATM Networks Using Effective Bandwiths. IEEE Journal on Selected Areas in Communications 13(6): 1081-1090 (1995)
1994
6 George Kesidis: Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network. MASCOTS 1994: 318-322
1993
5 George Kesidis, Jean C. Walrand: A Review of Quick Simulation Methods for Queues. MASCOTS 1993: 17-21
4EEGeorge Kesidis, Jean C. Walrand: Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources. ACM Trans. Model. Comput. Simul. 3(3): 269-276 (1993)
3 George Kesidis, Jean C. Walrand: Relative entropy between Markov transition rate matrices. IEEE Transactions on Information Theory 39(3): 1056- (1993)
2EEGeorge Kesidis, Jean C. Walrand, Cheng-Shang Chang: Effective bandwidths for multiclass Markov fluids and other ATM sources. IEEE/ACM Trans. Netw. 1(4): 424-428 (1993)
1991
1 Jean C. Walrand, George Kesidis: Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990). IEEE Transactions on Information Theory 37(5): 1493- (1991)

Coauthor Index

1Ruzena Bajcsy [18]
2Terry Benzel [18]
3Matt Bishop [18]
4Robert Braden [18]
5Carla E. Brodley [18]
6Richard R. Brooks [29]
7Guohong Cao [17]
8Glenn Carl [29] [30] [43]
9Cheng-Shang Chang [2]
10A. Das [48]
11Chita R. Das [17] [21] [36] [40] [41] [46]
12Arnab Das [39]
13Xidong Deng [21] [40] [41]
14Michael Devetsikiotis [13]
15Sonia Fahmy [18]
16Sally Floyd [18]
17Sachin Garg [40]
18Ihab Hamadeh [19] [23] [25] [26] [34] [44]
19W. Hardaker [18]
20Jason Hart [25]
21Anthony Hung [8] [11]
22Jongsoo Jang [36]
23Paul Barom Jeon [24] [37]
24Youngmi Jin [14] [20] [22] [27] [33] [35] [44]
25Soranun Jiwasurat [15] [23] [44]
26Anthony D. Joseph [18]
27Martin Kappes [40]
28Byoung-koo Kim [36]
29Takis Konstantopoulos [45]
30T. Konstopoulos [33]
31Karl N. Levitt [18]
32L. Li [31] [47]
33Robert Lindell [18]
34P. Liu [31] [47]
35Peng Liu [18]
36Bharat B. Madan [30]
37Nick McKeown [10]
38David Miller [18]
39David J. Miller [28]
40Marie-José Montpetit [11]
41B. Mortazavi [33]
42Russ Mundy [18]
43Gunwoo Nam [46]
44A. Neishaboori [38] [42]
45Cliford Neuman [18]
46B. M. Ninan [13]
47Jintae Oh [36]
48Ron Ostrenga [18]
49Pushkar Patankar [46]
50Vern Paxson [18] [19]
51Shashi Phoha [30]
52Phillip A. Porras [18]
53Venkat Pothamsetty [25] [39]
54Suresh Rai [29]
55Rajesh N. Rao [16] [32]
56Catherine Rosenberg [18]
57Shankar Sastry (Shankar S. Sastry) [18]
58Perla Sousi [45]
59Daniel F. Sterne [18]
60Leandros Tassiulas [12]
61J. Doug Tygar (J. D. Tygar) [18]
62Gustavo de Veciana [7] [9] [48]
63Milan Vojnovic [44]
64Jean C. Walrand [1] [2] [3] [4] [5] [7]
65Jisheng Wang [28]
66Nicholas Weaver [19]
67Shyhtsun Felix Wu [18]
68Sungwon Yi [21] [36] [40] [41]
69Hao Zhu [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)