Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: George Kesidis
@inproceedings{DBLP:conf/aaai/LiWHGK24, author = {Xi Li and Songhe Wang and Ruiquan Huang and Mahanth Gowda and George Kesidis}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Temporal-Distributed Backdoor Attack against Video Based Action Recognition}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {3199--3207}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i4.28104}, doi = {10.1609/AAAI.V38I4.28104}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/LiWHGK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-16492, author = {Aakash Sharma and Vivek M. Bhasi and Sonali Singh and George Kesidis and Mahmut T. Kandemir and Chita R. Das}, title = {{GPU} Cluster Scheduling for Network-Sensitive Deep Learning}, journal = {CoRR}, volume = {abs/2401.16492}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.16492}, doi = {10.48550/ARXIV.2401.16492}, eprinttype = {arXiv}, eprint = {2401.16492}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-16492.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02034, author = {Xi Li and Hang Wang and David J. Miller and George Kesidis}, title = {Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks}, journal = {CoRR}, volume = {abs/2402.02034}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02034}, doi = {10.48550/ARXIV.2402.02034}, eprinttype = {arXiv}, eprint = {2402.02034}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangMK23, author = {Hang Wang and David J. Miller and George Kesidis}, title = {Anomaly detection of adversarial examples using class-conditional generative adversarial networks}, journal = {Comput. Secur.}, volume = {124}, pages = {102956}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102956}, doi = {10.1016/J.COSE.2022.102956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/questa/KesidisKZ23, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {Age of information using Markov-renewal methods}, journal = {Queueing Syst. Theory Appl.}, volume = {103}, number = {1-2}, pages = {95--130}, year = {2023}, url = {https://doi.org/10.1007/s11134-022-09852-w}, doi = {10.1007/S11134-022-09852-W}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/questa/KesidisKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangKDRECXMK23, author = {Hang Wang and Sahar Karami and Ousmane Dia and Hippolyt Ritter and Ehsan Emamjomeh{-}Zadeh and Jiahui Chen and Zhen Xiang and David J. Miller and George Kesidis}, title = {Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10097244}, doi = {10.1109/ICASSP49357.2023.10097244}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WangKDRECXMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SharmaBSJGMKKD23, author = {Aakash Sharma and Vivek M. Bhasi and Sonali Singh and Rishabh Jain and Jashwant Raj Gunasekaran and Subrata Mitra and Mahmut Taylan Kandemir and George Kesidis and Chita R. Das}, title = {Stash: {A} Comprehensive Stall-Centric Characterization of Public Cloud VMs for Distributed Deep Learning}, booktitle = {43rd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2023, Hong Kong, July 18-21, 2023}, pages = {1--12}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDCS57875.2023.00023}, doi = {10.1109/ICDCS57875.2023.00023}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/SharmaBSJGMKKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/AlfaresK23, author = {Nader Alfares and George Kesidis}, title = {Container Sizing for Microservices with Dynamic Workload by Online Optimization}, booktitle = {Proceedings of the 9th International Workshop on Container Technologies and Container Clouds, WoC 2023, Bologna, Italy, December 11-15, 2023}, pages = {1--6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3631311.3632399}, doi = {10.1145/3631311.3632399}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/AlfaresK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/LiMXK23, author = {Xi Li and David J. Miller and Zhen Xiang and George Kesidis}, editor = {Danilo Comminiello and Michele Scarpiniti}, title = {A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers}, booktitle = {33rd {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2023, Rome, Italy, September 17-20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MLSP55844.2023.10286008}, doi = {10.1109/MLSP55844.2023.10286008}, timestamp = {Mon, 06 Nov 2023 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/mlsp/LiMXK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-04617, author = {Hang Wang and Zhen Xiang and David J. Miller and George Kesidis}, title = {Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection}, journal = {CoRR}, volume = {abs/2308.04617}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.04617}, doi = {10.48550/ARXIV.2308.04617}, eprinttype = {arXiv}, eprint = {2308.04617}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-04617.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-09850, author = {Xi Li and Zhen Xiang and David J. Miller and George Kesidis}, title = {Backdoor Mitigation by Correcting the Distribution of Neural Activations}, journal = {CoRR}, volume = {abs/2308.09850}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.09850}, doi = {10.48550/ARXIV.2308.09850}, eprinttype = {arXiv}, eprint = {2308.09850}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-09850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-11070, author = {Xi Li and Songhe Wang and Ruiquan Huang and Mahanth Gowda and George Kesidis}, title = {Temporal-Distributed Backdoor Attack Against Video Based Action Recognition}, journal = {CoRR}, volume = {abs/2308.11070}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.11070}, doi = {10.48550/ARXIV.2308.11070}, eprinttype = {arXiv}, eprint = {2308.11070}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-11070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-16827, author = {Hang Wang and David J. Miller and George Kesidis}, title = {Post-Training Overfitting Mitigation in {DNN} Classifiers}, journal = {CoRR}, volume = {abs/2309.16827}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.16827}, doi = {10.48550/ARXIV.2309.16827}, eprinttype = {arXiv}, eprint = {2309.16827}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-16827.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/questa/KesidisKZ22, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {In search of the least age of information}, journal = {Queueing Syst. Theory Appl.}, volume = {100}, number = {3-4}, pages = {465--467}, year = {2022}, url = {https://doi.org/10.1007/s11134-022-09833-z}, doi = {10.1007/S11134-022-09833-Z}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/questa/KesidisKZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/XiangMK22, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Detection of Backdoors in Trained Classifiers Without Access to the Training Set}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {33}, number = {3}, pages = {1177--1191}, year = {2022}, url = {https://doi.org/10.1109/TNNLS.2020.3041202}, doi = {10.1109/TNNLS.2020.3041202}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/XiangMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/SonMGJKKU22, author = {Myungjun Son and Shruti Mohanty and Jashwant Raj Gunasekaran and Aman Jain and Mahmut Taylan Kandemir and George Kesidis and Bhuvan Urgaonkar}, title = {Splice: An Automated Framework for Cost-and Performance-Aware Blending of Cloud Services}, booktitle = {22nd {IEEE} International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, Taormina, Italy, May 16-19, 2022}, pages = {119--128}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCGrid54584.2022.00021}, doi = {10.1109/CCGRID54584.2022.00021}, timestamp = {Mon, 25 Jul 2022 16:20:02 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/SonMGJKKU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/XiangMCLK22, author = {Zhen Xiang and David J. Miller and Siheng Chen and Xi Li and George Kesidis}, title = {Detecting Backdoor Attacks against Point Cloud Classifiers}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {3159--3163}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9747194}, doi = {10.1109/ICASSP43922.2022.9747194}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/XiangMCLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LiXMK22, author = {Xi Li and Zhen Xiang and David J. Miller and George Kesidis}, title = {Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {3333--3337}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9746573}, doi = {10.1109/ICASSP43922.2022.9746573}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/LiXMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/XiangMK22, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios}, booktitle = {The Tenth International Conference on Learning Representations, {ICLR} 2022, Virtual Event, April 25-29, 2022}, publisher = {OpenReview.net}, year = {2022}, url = {https://openreview.net/forum?id=MSgB8D4Hy51}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/XiangMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/ChoiUKK22, author = {Wonil Choi and Bhuvan Urgaonkar and Mahmut Taylan Kandemir and George Kesidis}, editor = {Paolo Bellavista and Kaiwen Zhang and Abdelouahed Gherbi and Saurabh Bagchi and Marta Pati{\~{n}}o and Giuseppe Di Modica and Julien Gascon{-}Samson}, title = {Multi-resource fair allocation for consolidated flash-based caching systems}, booktitle = {Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7 - 11, 2022}, pages = {202--215}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528535.3565245}, doi = {10.1145/3528535.3565245}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/ChoiUKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08474, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios}, journal = {CoRR}, volume = {abs/2201.08474}, year = {2022}, url = {https://arxiv.org/abs/2201.08474}, eprinttype = {arXiv}, eprint = {2201.08474}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-06900, author = {Hang Wang and Zhen Xiang and David J. Miller and George Kesidis}, title = {Universal Post-Training Backdoor Detection}, journal = {CoRR}, volume = {abs/2205.06900}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.06900}, doi = {10.48550/ARXIV.2205.06900}, eprinttype = {arXiv}, eprint = {2205.06900}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-06900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-04594, author = {Nader Alfares and Ata F. Baarzi and George Kesidis and Aman Jain}, title = {IaaS Procurement by Simulated Annealing}, journal = {CoRR}, volume = {abs/2207.04594}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.04594}, doi = {10.48550/ARXIV.2207.04594}, eprinttype = {arXiv}, eprint = {2207.04594}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-04594.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-14344, author = {Aakash Sharma and Vivek M. Bhasi and Sonali Singh and Rishabh Jain and Jashwant Raj Gunasekaran and Subrata Mitra and Mahmut Taylan Kandemir and George Kesidis and Chita R. Das}, title = {Analysis of Distributed Deep Learning in the Cloud}, journal = {CoRR}, volume = {abs/2208.14344}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.14344}, doi = {10.48550/ARXIV.2208.14344}, eprinttype = {arXiv}, eprint = {2208.14344}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-14344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-10272, author = {Hang Wang and Sahar Karami and Ousmane Dia and H. Ritter and Ehsan Emamjomeh{-}Zadeh and Jiahui Chen and Zhen Xiang and David J. Miller and George Kesidis}, title = {Training set cleansing of backdoor poisoning by self-supervised representation learning}, journal = {CoRR}, volume = {abs/2210.10272}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10272}, doi = {10.48550/ARXIV.2210.10272}, eprinttype = {arXiv}, eprint = {2210.10272}, timestamp = {Sun, 05 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiangMK21, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing}, journal = {Comput. Secur.}, volume = {106}, pages = {102280}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102280}, doi = {10.1016/J.COSE.2021.102280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiangMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neco/XiangMWK21, author = {Zhen Xiang and David J. Miller and Hang Wang and George Kesidis}, title = {Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set}, journal = {Neural Comput.}, volume = {33}, number = {5}, pages = {1329--1371}, year = {2021}, url = {https://doi.org/10.1162/neco\_a\_01376}, doi = {10.1162/NECO\_A\_01376}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neco/XiangMWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/SharmaDKD21, author = {Aakash Sharma and Saravanan Dhakshinamurthy and George Kesidis and Chita R. Das}, editor = {Laurent Lef{\`{e}}vre and Stacy Patterson and Young Choon Lee and Haiying Shen and Shashikant Ilager and Mohammad Goudarzi and Adel Nadjaran Toosi and Rajkumar Buyya}, title = {{CASH:} {A} Credit Aware Scheduling for Public Cloud Platforms}, booktitle = {21st {IEEE/ACM} International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2021, Melbourne, Australia, May 10-13, 2021}, pages = {227--236}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCGrid51090.2021.00032}, doi = {10.1109/CCGRID51090.2021.00032}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/SharmaDKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/BaarziK21, author = {Ataollah Fatahi Baarzi and George Kesidis}, editor = {Carlo Curino and Georgia Koutrika and Ravi Netravali}, title = {{SHOWAR:} Right-Sizing And Efficient Scheduling of Microservices}, booktitle = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November 1 - 4, 2021}, pages = {427--441}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472883.3486999}, doi = {10.1145/3472883.3486999}, timestamp = {Sun, 31 Oct 2021 09:45:45 +0100}, biburl = {https://dblp.org/rec/conf/cloud/BaarziK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/BaarziKJS21, author = {Ataollah Fatahi Baarzi and George Kesidis and Carlee Joe{-}Wong and Mohammad Shahrad}, editor = {Carlo Curino and Georgia Koutrika and Ravi Netravali}, title = {On Merits and Viability of Multi-Cloud Serverless}, booktitle = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November 1 - 4, 2021}, pages = {600--608}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472883.3487002}, doi = {10.1145/3472883.3487002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud/BaarziKJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/Xiang0K21, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021}, pages = {3745--3749}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICASSP39728.2021.9414562}, doi = {10.1109/ICASSP39728.2021.9414562}, timestamp = {Thu, 08 Jul 2021 17:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icassp/Xiang0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/Xiang0CLK21, author = {Zhen Xiang and David J. Miller and Siheng Chen and Xi Li and George Kesidis}, title = {A Backdoor Attack against 3D Point Cloud Classifiers}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {7577--7587}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00750}, doi = {10.1109/ICCV48922.2021.00750}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/Xiang0CLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-05808, author = {Zhen Xiang and David J. Miller and Siheng Chen and Xi Li and George Kesidis}, title = {A Backdoor Attack against 3D Point Cloud Classifiers}, journal = {CoRR}, volume = {abs/2104.05808}, year = {2021}, url = {https://arxiv.org/abs/2104.05808}, eprinttype = {arXiv}, eprint = {2104.05808}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-05808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08050, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {Age of information without service preemption}, journal = {CoRR}, volume = {abs/2104.08050}, year = {2021}, url = {https://arxiv.org/abs/2104.08050}, eprinttype = {arXiv}, eprint = {2104.08050}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-11393, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {Age of information distribution under dynamic service preemption}, journal = {CoRR}, volume = {abs/2104.11393}, year = {2021}, url = {https://arxiv.org/abs/2104.11393}, eprinttype = {arXiv}, eprint = {2104.11393}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-11393.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-10101, author = {Hang Wang and David J. Miller and George Kesidis}, title = {Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/2105.10101}, year = {2021}, url = {https://arxiv.org/abs/2105.10101}, eprinttype = {arXiv}, eprint = {2105.10101}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-10101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13530, author = {Xi Li and David J. Miller and Zhen Xiang and George Kesidis}, title = {A {BIC} based Mixture Model Defense against Data Poisoning Attacks on Classifiers}, journal = {CoRR}, volume = {abs/2105.13530}, year = {2021}, url = {https://arxiv.org/abs/2105.13530}, eprinttype = {arXiv}, eprint = {2105.13530}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08473, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {Age of Information for Small Buffer Systems}, journal = {CoRR}, volume = {abs/2106.08473}, year = {2021}, url = {https://arxiv.org/abs/2106.08473}, eprinttype = {arXiv}, eprint = {2106.08473}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13124, author = {Xi Li and George Kesidis and David J. Miller and Maxime Bergeron and Ryan Ferguson and Vladimir Lucic}, title = {Robust and Active Learning for Deep Neural Network Regression}, journal = {CoRR}, volume = {abs/2107.13124}, year = {2021}, url = {https://arxiv.org/abs/2107.13124}, eprinttype = {arXiv}, eprint = {2107.13124}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02381, author = {Xi Li and George Kesidis and David J. Miller and Vladimir Lucic}, title = {Backdoor Attack and Defense for Deep Regression}, journal = {CoRR}, volume = {abs/2109.02381}, year = {2021}, url = {https://arxiv.org/abs/2109.02381}, eprinttype = {arXiv}, eprint = {2109.02381}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-10354, author = {Zhen Xiang and David J. Miller and Siheng Chen and Xi Li and George Kesidis}, title = {Detecting Backdoor Attacks Against Point Cloud Classifiers}, journal = {CoRR}, volume = {abs/2110.10354}, year = {2021}, url = {https://arxiv.org/abs/2110.10354}, eprinttype = {arXiv}, eprint = {2110.10354}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-10354.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-03350, author = {Xi Li and Zhen Xiang and David J. Miller and George Kesidis}, title = {Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks}, journal = {CoRR}, volume = {abs/2112.03350}, year = {2021}, url = {https://arxiv.org/abs/2112.03350}, eprinttype = {arXiv}, eprint = {2112.03350}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-03350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LiuJKALSMXKODS20, author = {Weiqiang Liu and Maximilian John and Andreas Karrenbauer and Adam Allerhand and Fabrizio Lombardi and Michael Shulte and David J. Miller and Zhen Xiang and George Kesidis and Antti Oulasvirta and Niraj Ramesh Dayama and Morteza Shiripour}, title = {Scanning the Issue}, journal = {Proc. {IEEE}}, volume = {108}, number = {3}, pages = {400--401}, year = {2020}, url = {https://doi.org/10.1109/JPROC.2020.2975522}, doi = {10.1109/JPROC.2020.2975522}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pieee/LiuJKALSMXKODS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/MillerXK20, author = {David J. Miller and Zhen Xiang and George Kesidis}, title = {Adversarial Learning Targeting Deep Neural Network Classification: {A} Comprehensive Review of Defenses Against Attacks}, journal = {Proc. {IEEE}}, volume = {108}, number = {3}, pages = {402--433}, year = {2020}, url = {https://doi.org/10.1109/JPROC.2020.2970615}, doi = {10.1109/JPROC.2020.2970615}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/MillerXK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/questa/KesidisKZ20, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {The distribution of age-of-information performance measures for message processing systems}, journal = {Queueing Syst. Theory Appl.}, volume = {95}, number = {3}, pages = {203--250}, year = {2020}, url = {https://doi.org/10.1007/s11134-020-09655-x}, doi = {10.1007/S11134-020-09655-X}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/questa/KesidisKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/KesidisK20, author = {George Kesidis and Takis Konstantopoulos}, title = {{TB/GI/1} queues with arrival traffic envelopes}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {48}, number = {2}, pages = {27--29}, year = {2020}, url = {https://doi.org/10.1145/3439602.3439613}, doi = {10.1145/3439602.3439613}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmetrics/KesidisK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LotfiSK20, author = {Mohammad Hassan Lotfi and Saswati Sarkar and George Kesidis}, title = {Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {4}, pages = {1435--1448}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.2981259}, doi = {10.1109/TNET.2020.2981259}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LotfiSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dddas/LiMXK20, author = {Xi Li and David J. Miller and Zhen Xiang and George Kesidis}, editor = {Frederica Darema and Erik Blasch and Sai Ravela and Alex Aved}, title = {A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers}, booktitle = {Dynamic Data Driven Applications Systems - Third International Conference, {DDDAS} 2020, Boston, MA, USA, October 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12312}, pages = {262--273}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61725-7\_31}, doi = {10.1007/978-3-030-61725-7\_31}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dddas/LiMXK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/BaarziKFS20, author = {Ataollah Fatahi Baarzi and George Kesidis and Dan Fleck and Angelos Stavrou}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {Microservices made attack-resilient using unsupervised service fissioning}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {31--36}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391395}, doi = {10.1145/3380786.3391395}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/BaarziKFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/XiangMK20, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Revealing Backdoors, Post-Training, in {DNN} Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification}, booktitle = {2020 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2020, Barcelona, Spain, May 4-8, 2020}, pages = {3827--3831}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICASSP40776.2020.9054581}, doi = {10.1109/ICASSP40776.2020.9054581}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/XiangMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/ShanKJUKL20, author = {Yuquan Shan and George Kesidis and Aman Jain and Bhuvan Urgaonkar and Jalal Khamse{-}Ashari and Ioannis Lambadaris}, title = {Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Cloud}, booktitle = {Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, WOC@Middleware 2020, Delft, The Netherlands, December 07-11, 2020}, pages = {7--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3429885.3429962}, doi = {10.1145/3429885.3429962}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/ShanKJUKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/JainBKUAK20, author = {Aman Jain and Ata F. Baarzi and George Kesidis and Bhuvan Urgaonkar and Nader Alfares and Mahmut T. Kandemir}, editor = {Dilma Da Silva and R{\"{u}}diger Kapitza}, title = {SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS}, booktitle = {Middleware '20: 21st International Middleware Conference, Delft, The Netherlands, December 7-11, 2020}, pages = {236--250}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3423211.3425695}, doi = {10.1145/3423211.3425695}, timestamp = {Tue, 15 Dec 2020 14:01:23 +0100}, biburl = {https://dblp.org/rec/conf/middleware/JainBKUAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/Xiang0WK20, author = {Zhen Xiang and David J. Miller and Hang Wang and George Kesidis}, title = {Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic}, booktitle = {30th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2020, Espoo, Finland, September 21-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MLSP49062.2020.9231861}, doi = {10.1109/MLSP49062.2020.9231861}, timestamp = {Mon, 26 Oct 2020 17:35:16 +0100}, biburl = {https://dblp.org/rec/conf/mlsp/Xiang0WK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-04561, author = {Aakash Sharma and Saravanan Dhakshinamurthy and George Kesidis and Chita R. Das}, title = {{CASH:} {A} Credit Aware Scheduling for Public Cloud Platforms}, journal = {CoRR}, volume = {abs/2009.04561}, year = {2020}, url = {https://arxiv.org/abs/2009.04561}, eprinttype = {arXiv}, eprint = {2009.04561}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-04561.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07489, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing}, journal = {CoRR}, volume = {abs/2010.07489}, year = {2020}, url = {https://arxiv.org/abs/2010.07489}, eprinttype = {arXiv}, eprint = {2010.07489}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09987, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {{L-RED:} Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set}, journal = {CoRR}, volume = {abs/2010.09987}, year = {2020}, url = {https://arxiv.org/abs/2010.09987}, eprinttype = {arXiv}, eprint = {2010.09987}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09987.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/LeivadeasKIL19, author = {Aris Leivadeas and George Kesidis and Mohamed Ibnkahla and Ioannis Lambadaris}, title = {{VNF} Placement Optimization at the Edge and Cloud \({}^{\mbox{{\textdagger}}}\)}, journal = {Future Internet}, volume = {11}, number = {3}, pages = {69}, year = {2019}, url = {https://doi.org/10.3390/fi11030069}, doi = {10.3390/FI11030069}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/LeivadeasKIL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/Khamse-AshariLK19, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers}, journal = {{IEEE} Netw. Lett.}, volume = {1}, number = {1}, pages = {34--37}, year = {2019}, url = {https://doi.org/10.1109/lnet.2019.2893532}, doi = {10.1109/LNET.2019.2893532}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeenl/Khamse-AshariLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neco/MillerWK19, author = {David J. Miller and Yujia Wang and George Kesidis}, title = {When Not to Classify: Anomaly Detection of Attacks {(ADA)} on {DNN} Classifiers at Test Time}, journal = {Neural Comput.}, volume = {31}, number = {8}, pages = {1624--1670}, year = {2019}, url = {https://doi.org/10.1162/neco\_a\_01209}, doi = {10.1162/NECO\_A\_01209}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neco/MillerWK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/GunasekaranTKUK19, author = {Jashwant Raj Gunasekaran and Prashanth Thinakaran and Mahmut Taylan Kandemir and Bhuvan Urgaonkar and George Kesidis and Chita R. Das}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {Spock: Exploiting Serverless Functions for {SLO} and Cost Aware Resource Procurement in Public Cloud}, booktitle = {12th {IEEE} International Conference on Cloud Computing, {CLOUD} 2019, Milan, Italy, July 8-13, 2019}, pages = {199--208}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CLOUD.2019.00043}, doi = {10.1109/CLOUD.2019.00043}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/GunasekaranTKUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/JainBAKUK19, author = {Aman Jain and Ata F. Baarzi and Nader Alfares and George Kesidis and Bhuvan Urgaonkar and Mahmut T. Kandemir}, title = {SpIitServe: Efficiently Splitting Complex Workloads Across FaaS and IaaS}, booktitle = {Proceedings of the {ACM} Symposium on Cloud Computing, SoCC 2019, Santa Cruz, CA, USA, November 20-23, 2019}, pages = {487}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357223.3366027}, doi = {10.1145/3357223.3366027}, timestamp = {Tue, 19 May 2020 13:51:06 +0200}, biburl = {https://dblp.org/rec/conf/cloud/JainBAKUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/Wang0K19, author = {Yujia Wang and David J. Miller and George Kesidis}, title = {When Not to Classify: Detection of Reverse Engineering Attacks on {DNN} Image Classifiers}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019}, pages = {8063--8066}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICASSP.2019.8682578}, doi = {10.1109/ICASSP.2019.8682578}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/Wang0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/Kesidis19, author = {George Kesidis}, title = {Overbooking Lambda Functions in the Cloud}, booktitle = {Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, WOC@Middleware 2019, Davis, CA, USA, December 09-13, 2019}, pages = {1--6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3366615.3368351}, doi = {10.1145/3366615.3368351}, timestamp = {Tue, 12 Nov 2019 12:42:15 +0100}, biburl = {https://dblp.org/rec/conf/middleware/Kesidis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/Xiang0K19, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And {A} Novel Defense}, booktitle = {29th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MLSP.2019.8918908}, doi = {10.1109/MLSP.2019.8918908}, timestamp = {Thu, 12 Dec 2019 12:15:35 +0100}, biburl = {https://dblp.org/rec/conf/mlsp/Xiang0K19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09842, author = {George Kesidis}, title = {Temporal Overbooking of Lambda Functions in the Cloud}, journal = {CoRR}, volume = {abs/1901.09842}, year = {2019}, url = {http://arxiv.org/abs/1901.09842}, eprinttype = {arXiv}, eprint = {1901.09842}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05924, author = {George Kesidis and Takis Konstantopoulos and Michael A. Zazanis}, title = {The distribution of age-of-information performance measures for message processing systems}, journal = {CoRR}, volume = {abs/1904.05924}, year = {2019}, url = {http://arxiv.org/abs/1904.05924}, eprinttype = {arXiv}, eprint = {1904.05924}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05924.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-06292, author = {David J. Miller and Zhen Xiang and George Kesidis}, title = {Adversarial Learning in Statistical Classification: {A} Comprehensive Review of Defenses Against Attacks}, journal = {CoRR}, volume = {abs/1904.06292}, year = {2019}, url = {http://arxiv.org/abs/1904.06292}, eprinttype = {arXiv}, eprint = {1904.06292}, timestamp = {Fri, 26 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-06292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-07641, author = {George Kesidis and Bhuvan Urgaonkar and Mahmut T. Kandemir and Takis Konstantopoulos}, title = {A caching system with object sharing}, journal = {CoRR}, volume = {abs/1905.07641}, year = {2019}, url = {http://arxiv.org/abs/1905.07641}, eprinttype = {arXiv}, eprint = {1905.07641}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-07641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-10498, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Revealing Backdoors, Post-Training, in {DNN} Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification}, journal = {CoRR}, volume = {abs/1908.10498}, year = {2019}, url = {http://arxiv.org/abs/1908.10498}, eprinttype = {arXiv}, eprint = {1908.10498}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-10498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-08032, author = {George Kesidis and David J. Miller}, title = {Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers}, journal = {CoRR}, volume = {abs/1910.08032}, year = {2019}, url = {http://arxiv.org/abs/1910.08032}, eprinttype = {arXiv}, eprint = {1910.08032}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-08032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-07970, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic}, journal = {CoRR}, volume = {abs/1911.07970}, year = {2019}, url = {http://arxiv.org/abs/1911.07970}, eprinttype = {arXiv}, eprint = {1911.07970}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-07970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/Khamse-AshariKL18, author = {Jalal Khamse{-}Ashari and George Kesidis and Ioannis Lambadaris and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Constrained max-min fair scheduling of variable-length packet-flows to multiple servers}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {73}, number = {3-4}, pages = {219--237}, year = {2018}, url = {https://doi.org/10.1007/s12243-017-0599-y}, doi = {10.1007/S12243-017-0599-Y}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/Khamse-AshariKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LinLKV18, author = {Ying{-}Dar Lin and Yuan{-}Cheng Lai and George Kesidis and Athanasios V. Vasilakos}, title = {Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {1}, pages = {7--9}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2017.2783458}, doi = {10.1109/JSYST.2017.2783458}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LinLKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taas/WangUKGCB18, author = {Cheng Wang and Bhuvan Urgaonkar and George Kesidis and Aayush Gupta and Lydia Y. Chen and Robert Birke}, title = {Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability}, journal = {{ACM} Trans. Auton. Adapt. Syst.}, volume = {13}, number = {1}, pages = {2:1--2:25}, year = {2018}, url = {https://doi.org/10.1145/3139291}, doi = {10.1145/3139291}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taas/WangUKGCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/Khamse-AshariLK18, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {29}, number = {12}, pages = {2686--2699}, year = {2018}, url = {https://doi.org/10.1109/TPDS.2018.2841915}, doi = {10.1109/TPDS.2018.2841915}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/Khamse-AshariLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FleckSKNSK18, author = {Daniel Fleck and Angelos Stavrou and George Kesidis and Neda Nasiriani and Yuquan Shan and Takis Konstantopoulos}, title = {Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625162}, doi = {10.1109/DESEC.2018.8625162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/FleckSKNSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eenergy/NasirianiKW18, author = {Neda Nasiriani and George Kesidis and Di Wang}, editor = {Hartmut Schmeck and Veit Hagenmeyer}, title = {Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response}, booktitle = {Proceedings of the Ninth International Conference on Future Energy Systems, e-Energy 2018, Karlsruhe, Germany, June 12-15, 2018}, pages = {21--32}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3208903.3208938}, doi = {10.1145/3208903.3208938}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eenergy/NasirianiKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/Khamse-AshariLK18, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647675}, doi = {10.1109/GLOCOM.2018.8647675}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/Khamse-AshariLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/NasirianiK18, author = {Neda Nasiriani and George Kesidis}, title = {Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model}, booktitle = {2018 International Conference on Computing, Networking and Communications, {ICNC} 2018, Maui, HI, USA, March 5-8, 2018}, pages = {58--62}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCNC.2018.8390416}, doi = {10.1109/ICCNC.2018.8390416}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/NasirianiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/Kesidis18, author = {George Kesidis}, title = {Stationary Distribution of a Generalized {LRU-MRU} Content Cache}, booktitle = {2018 International Conference on Computing, Networking and Communications, {ICNC} 2018, Maui, HI, USA, March 5-8, 2018}, pages = {676--681}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCNC.2018.8390281}, doi = {10.1109/ICCNC.2018.8390281}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/Kesidis18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/KesidisSFSK18, author = {George Kesidis and Yuquan Shan and Daniel Fleck and Angelos Stavrou and Takis Konstantopoulos}, title = {An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance\({}^{\mbox{*}}\)}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {61--67}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659359}, doi = {10.1109/MALWARE.2018.8659359}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/KesidisSJUKL18, author = {George Kesidis and Yuquan Shan and Aman Jain and Bhuvan Urgaonkar and Jalal Khamse{-}Ashari and Ioannis Lambadaris}, title = {Scheduling Distributed Resources in Heterogeneous Private Clouds}, booktitle = {26th {IEEE} International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2018, Milwaukee, WI, USA, September 25-28, 2018}, pages = {102--108}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/MASCOTS.2018.00018}, doi = {10.1109/MASCOTS.2018.00018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/KesidisSJUKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/0001KQ18, author = {David J. Miller and George Kesidis and Zhicong Qiu}, title = {Unsupervised Parsimonious Cluster-Based Anomaly Detection {(PCAD)}}, booktitle = {28th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2018, Aalborg, Denmark, September 17-20, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MLSP.2018.8517014}, doi = {10.1109/MLSP.2018.8517014}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/0001KQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/0001WK18, author = {David J. Miller and Yujia Wang and George Kesidis}, title = {Anomaly Detection of Attacks (Ada) on {DNN} Classifiers at Test Time}, booktitle = {28th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2018, Aalborg, Denmark, September 17-20, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MLSP.2018.8517069}, doi = {10.1109/MLSP.2018.8517069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mlsp/0001WK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/LeivadeasFLKLI18, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and George Kesidis and Chung{-}Horng Lung and Mohamed Ibnkahla}, title = {Considerations for a Successful Network Service Chain Deployment}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {288--292}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8459934}, doi = {10.1109/NETSOFT.2018.8459934}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/LeivadeasFLKLI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/LeivadeasFLIK18, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and Mohamed Ibnkahla and George Kesidis}, title = {Balancing Delay and Cost in Virtual Network Function Placement and Chaining}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {433--440}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8459956}, doi = {10.1109/NETSOFT.2018.8459956}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/LeivadeasFLIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-00922, author = {Yuquan Shan and Aman Jain and George Kesidis and Bhuvan Urgaonkar and Jalal Khamse{-}Ashari and Ioannis Lambadaris}, title = {Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms}, journal = {CoRR}, volume = {abs/1803.00922}, year = {2018}, url = {http://arxiv.org/abs/1803.00922}, eprinttype = {arXiv}, eprint = {1803.00922}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-00922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-00443, author = {George Kesidis}, title = {Average age of coupon type and related average age of information}, journal = {CoRR}, volume = {abs/1808.00443}, year = {2018}, url = {http://arxiv.org/abs/1808.00443}, eprinttype = {arXiv}, eprint = {1808.00443}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-00443.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00988, author = {Yuquan Shan and George Kesidis and Bhuvan Urgaonkar and J{\"{o}}rg Schad and Jalal Khamse{-}Ashari and Ioannis Lambadaris}, title = {Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud}, journal = {CoRR}, volume = {abs/1810.00988}, year = {2018}, url = {http://arxiv.org/abs/1810.00988}, eprinttype = {arXiv}, eprint = {1810.00988}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-00121, author = {David J. Miller and Xinyi Hu and Zhen Xiang and George Kesidis}, title = {A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters}, journal = {CoRR}, volume = {abs/1811.00121}, year = {2018}, url = {http://arxiv.org/abs/1811.00121}, eprinttype = {arXiv}, eprint = {1811.00121}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-00121.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-02658, author = {Yujia Wang and David J. Miller and George Kesidis}, title = {When Not to Classify: Detection of Reverse Engineering Attacks on {DNN} Image Classifiers}, journal = {CoRR}, volume = {abs/1811.02658}, year = {2018}, url = {http://arxiv.org/abs/1811.02658}, eprinttype = {arXiv}, eprint = {1811.02658}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-02658.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeivadeasFLK17, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and George Kesidis}, title = {Optimal virtualized network function allocation for an {SDN} enabled cloud}, journal = {Comput. Stand. Interfaces}, volume = {54}, pages = {266--278}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2017.01.001}, doi = {10.1016/J.CSI.2017.01.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LeivadeasFLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pomacs/WangUNK17, author = {Cheng Wang and Bhuvan Urgaonkar and Neda Nasiriani and George Kesidis}, title = {Using Burstable Instances in the Public Cloud: Why, When and How?}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {1}, number = {1}, pages = {11:1--11:28}, year = {2017}, url = {https://doi.org/10.1145/3084448}, doi = {10.1145/3084448}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/WangUNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/QiuMK17, author = {Zhicong Qiu and David J. Miller and George Kesidis}, title = {A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {28}, number = {4}, pages = {917--933}, year = {2017}, url = {https://doi.org/10.1109/TNNLS.2016.2514401}, doi = {10.1109/TNNLS.2016.2514401}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/QiuMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LeivadeasKFL17, author = {Aris Leivadeas and George Kesidis and Matthias Falkner and Ioannis Lambadaris}, title = {A Graph Partitioning Game Theoretical Approach for the {VNF} Service Chaining Problem}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {14}, number = {4}, pages = {890--903}, year = {2017}, url = {https://doi.org/10.1109/TNSM.2017.2732699}, doi = {10.1109/TNSM.2017.2732699}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/LeivadeasKFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/ShanPK017, author = {Yuquan Shan and Chiara Lo Prete and George Kesidis and David J. Miller}, title = {A simulation framework for uneconomic virtual bidding in day-ahead electricity markets}, booktitle = {2017 American Control Conference, {ACC} 2017, Seattle, WA, USA, May 24-26, 2017}, pages = {2705--2712}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ACC.2017.7963361}, doi = {10.23919/ACC.2017.7963361}, timestamp = {Fri, 03 Dec 2021 13:04:31 +0100}, biburl = {https://dblp.org/rec/conf/amcc/ShanPK017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanKF17, author = {Yuquan Shan and George Kesidis and Daniel Fleck}, editor = {Bhavani Thuraisingham and Ghassan Karame and Angelos Stavrou}, title = {Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems}, booktitle = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {1--10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140649.3140650}, doi = {10.1145/3140649.3140650}, timestamp = {Thu, 12 Oct 2023 12:32:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShanKF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/HuKB17, author = {Xinyi Hu and George Kesidis and Seung Jun Baek}, title = {Regulating wireless access costs for not vertically integrated content providers}, booktitle = {13th International Conference on Network and Service Management, {CNSM} 2017, Tokyo, Japan, November 26-30, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.23919/CNSM.2017.8255995}, doi = {10.23919/CNSM.2017.8255995}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/HuKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/WangUGKL17, author = {Cheng Wang and Bhuvan Urgaonkar and Aayush Gupta and George Kesidis and Qianlin Liang}, editor = {Gustavo Alonso and Ricardo Bianchini and Marko Vukolic}, title = {Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud}, booktitle = {Proceedings of the Twelfth European Conference on Computer Systems, EuroSys 2017, Belgrade, Serbia, April 23-26, 2017}, pages = {620--634}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3064176.3064220}, doi = {10.1145/3064176.3064220}, timestamp = {Tue, 06 Nov 2018 16:58:31 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/WangUGKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/Qiu0K17, author = {Zhicong Qiu and David J. Miller and George Kesidis}, title = {Flow based botnet detection through semi-supervised active learning}, booktitle = {2017 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017}, pages = {2387--2391}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICASSP.2017.7952584}, doi = {10.1109/ICASSP.2017.7952584}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/Qiu0K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Khamse-AshariLK17, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Per-Server Dominant-Share Fairness {(PS-DSF):} {A} multi-resource fair allocation mechanism for heterogeneous servers}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996727}, doi = {10.1109/ICC.2017.7996727}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/Khamse-AshariLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Khamse-AshariKL17, author = {Jalal Khamse{-}Ashari and George Kesidis and Ioannis Lambadaris and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors}, booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Atlanta, GA, USA, May 1-4, 2017}, pages = {48--53}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFCOMW.2017.8116351}, doi = {10.1109/INFCOMW.2017.8116351}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Khamse-AshariKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KesidisNSUL17, author = {George Kesidis and Neda Nasiriani and Yuquan Shan and Bhuvan Urgaonkar and Ioannis Lambadaris}, title = {Multicommodity games in public-cloud markets considering subadditive resource demands}, booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Atlanta, GA, USA, May 1-4, 2017}, pages = {654--658}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFCOMW.2017.8116454}, doi = {10.1109/INFCOMW.2017.8116454}, timestamp = {Thu, 30 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/KesidisNSUL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ShanKFS17, author = {Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {67--74}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323958}, doi = {10.1109/MALWARE.2017.8323958}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/ShanKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/NasirianiKW17, author = {Neda Nasiriani and George Kesidis and Di Wang}, title = {Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits}, booktitle = {25th {IEEE} International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2017, Banff, AB, Canada, September 20-22, 2017}, pages = {164--174}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MASCOTS.2017.27}, doi = {10.1109/MASCOTS.2017.27}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mascots/NasirianiKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/KesidisSNU17, author = {George Kesidis and Uday V. Shanbhag and Neda Nasiriani and Bhuvan Urgaonkar}, title = {Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response}, booktitle = {25th {IEEE} International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2017, Banff, AB, Canada, September 20-22, 2017}, pages = {244--254}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MASCOTS.2017.24}, doi = {10.1109/MASCOTS.2017.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/KesidisSNU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/MillerHQK17, author = {David J. Miller and Xinyi Hu and Zhicong Qiu and George Kesidis}, editor = {Naonori Ueda and Shinji Watanabe and Tomoko Matsui and Jen{-}Tzung Chien and Jan Larsen}, title = {Adversarial learning: {A} critical review and active learning study}, booktitle = {27th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2017, Tokyo, Japan, September 25-28, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MLSP.2017.8168163}, doi = {10.1109/MLSP.2017.8168163}, timestamp = {Tue, 30 Jun 2020 10:25:30 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/MillerHQK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/WangUNK17, author = {Cheng Wang and Bhuvan Urgaonkar and Neda Nasiriani and George Kesidis}, editor = {Bruce E. Hajek and Sewoong Oh and Augustin Chaintreau and Leana Golubchik and Zhi{-}Li Zhang}, title = {Using Burstable Instances in the Public Cloud: Why, When and How?}, booktitle = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05 - 09, 2017}, pages = {56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078505.3078591}, doi = {10.1145/3078505.3078591}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/WangUNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kesidis17, author = {George Kesidis}, title = {Markovian models of Internet Caches including Closed-Form Stationary Distributions}, journal = {CoRR}, volume = {abs/1704.04849}, year = {2017}, url = {http://arxiv.org/abs/1704.04849}, eprinttype = {arXiv}, eprint = {1704.04849}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kesidis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShanKFS17, author = {Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems}, journal = {CoRR}, volume = {abs/1704.06794}, year = {2017}, url = {http://arxiv.org/abs/1704.06794}, eprinttype = {arXiv}, eprint = {1704.06794}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShanKFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KesidisSWUKL17, author = {George Kesidis and Yuquan Shan and Yujia Wang and Bhuvan Urgaonkar and Jalal Khamse{-}Ashari and Ioannis Lambadaris}, title = {Efficient max-min and proportional fair constrained multiresource scheduling}, journal = {CoRR}, volume = {abs/1705.06102}, year = {2017}, url = {http://arxiv.org/abs/1705.06102}, eprinttype = {arXiv}, eprint = {1705.06102}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KesidisSWUKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MillerHQK17, author = {David J. Miller and Xinyi Hu and Zhicong Qiu and George Kesidis}, title = {Adversarial Learning: {A} Critical Review and Active Learning Study}, journal = {CoRR}, volume = {abs/1705.09823}, year = {2017}, url = {http://arxiv.org/abs/1705.09823}, eprinttype = {arXiv}, eprint = {1705.09823}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MillerHQK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-08961, author = {Mohammad Hassan Lotfi and Saswati Sarkar and George Kesidis}, title = {Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part {II}}, journal = {CoRR}, volume = {abs/1711.08961}, year = {2017}, url = {http://arxiv.org/abs/1711.08961}, eprinttype = {arXiv}, eprint = {1711.08961}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-08961.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-01102, author = {Neda Nasiriani and Yuquan Shan and George Kesidis and Daniel Fleck and Angelos Stavrou}, title = {Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks}, journal = {CoRR}, volume = {abs/1712.01102}, year = {2017}, url = {http://arxiv.org/abs/1712.01102}, eprinttype = {arXiv}, eprint = {1712.01102}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-01102.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-06646, author = {David J. Miller and Yujia Wang and George Kesidis}, title = {When Not to Classify: Anomaly Detection of Attacks {(ADA)} on {DNN} Classifiers at Test Time}, journal = {CoRR}, volume = {abs/1712.06646}, year = {2017}, url = {http://arxiv.org/abs/1712.06646}, eprinttype = {arXiv}, eprint = {1712.06646}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-06646.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-10114, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers}, journal = {CoRR}, volume = {abs/1712.10114}, year = {2017}, url = {http://arxiv.org/abs/1712.10114}, eprinttype = {arXiv}, eprint = {1712.10114}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-10114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/ShanPKM16, author = {Yuquan Shan and Chiara Lo Prete and George Kesidis and David J. Miller}, title = {A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {44}, number = {3}, pages = {30}, year = {2016}, url = {https://doi.org/10.1145/3040230.3040238}, doi = {10.1145/3040230.3040238}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/ShanPKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tompecs/NasirianiWKUCB16, author = {Neda Nasiriani and Cheng Wang and George Kesidis and Bhuvan Urgaonkar and Lydia Y. Chen and Robert Birke}, title = {On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants}, journal = {{ACM} Trans. Model. Perform. Evaluation Comput. Syst.}, volume = {2}, number = {1}, pages = {3:1--3:28}, year = {2016}, url = {https://doi.org/10.1145/2970815}, doi = {10.1145/2970815}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tompecs/NasirianiWKUCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ShahVK16, author = {Virag Shah and Gustavo de Veciana and George Kesidis}, title = {A Stable Approach for Routing Queries in Unstructured {P2P} Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {5}, pages = {3136--3147}, year = {2016}, url = {https://doi.org/10.1109/TNET.2015.2509967}, doi = {10.1109/TNET.2015.2509967}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ShahVK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/LeivadeasFLK16, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and George Kesidis}, title = {Dynamic traffic steering of multi-tenant virtualized network functions in {SDN} enabled data centers}, booktitle = {21st {IEEE} International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, {CAMAD} 2016, Toronto, ON, Canada, October 23-25, 2016}, pages = {65--70}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CAMAD.2016.7790332}, doi = {10.1109/CAMAD.2016.7790332}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/camad/LeivadeasFLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/FalknerLLK16, author = {Matthias Falkner and Aris Leivadeas and Ioannis Lambadaris and George Kesidis}, title = {Performance analysis of virtualized network functions on virtualized systems architectures}, booktitle = {21st {IEEE} International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, {CAMAD} 2016, Toronto, ON, Canada, October 23-25, 2016}, pages = {71--76}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CAMAD.2016.7790333}, doi = {10.1109/CAMAD.2016.7790333}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/FalknerLLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/HuSKSDF16, author = {Xinyi Hu and Yuquan Shan and George Kesidis and Saswati Sarkar and Ravi Dhar and Serge Fdida}, title = {Multiperiod subscription pricing for cellular wireless entrants}, booktitle = {2016 Annual Conference on Information Science and Systems, {CISS} 2016, Princeton, NJ, USA, March 16-18, 2016}, pages = {326--330}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISS.2016.7460523}, doi = {10.1109/CISS.2016.7460523}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciss/HuSKSDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/Khamse-AshariKL16, author = {Jalal Khamse{-}Ashari and George Kesidis and Ioannis Lambadaris and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin}, booktitle = {2016 Annual Conference on Information Science and Systems, {CISS} 2016, Princeton, NJ, USA, March 16-18, 2016}, pages = {390--395}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISS.2016.7460534}, doi = {10.1109/CISS.2016.7460534}, timestamp = {Fri, 04 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/Khamse-AshariKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/LotfiSK16, author = {Mohammad Hassan Lotfi and Saswati Sarkar and George Kesidis}, title = {Migration to a non-neutral internet: Economics modeling and analysis of impact}, booktitle = {2016 Annual Conference on Information Science and Systems, {CISS} 2016, Princeton, NJ, USA, March 16-18, 2016}, pages = {511--516}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISS.2016.7460555}, doi = {10.1109/CISS.2016.7460555}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/LotfiSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RameshanBNVUKSC16, author = {Navaneeth Rameshan and Robert Birke and Leandro Navarro and Vladimir Vlassov and Bhuvan Urgaonkar and George Kesidis and Martin L. Schmatz and Lydia Y. Chen}, title = {Profiling Memory Vulnerability of Big-Data Applications}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {258--261}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN-W.2016.58}, doi = {10.1109/DSN-W.2016.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RameshanBNVUKSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HeLKBWJK16, author = {Jianping He and Bin Liu and Deguang Kong and Xuan Bao and Na Wang and Hongxia Jin and George Kesidis}, title = {{PUPPIES:} Transformation-Supported Personalized Privacy Preserving Partial Image Sharing}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {359--370}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.40}, doi = {10.1109/DSN.2016.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HeLKBWJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/Khamse-AshariKL16, author = {Jalal Khamse{-}Ashari and George Kesidis and Ioannis Lambadaris and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows to Multiple Servers}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841686}, doi = {10.1109/GLOCOM.2016.7841686}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/Khamse-AshariKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LeivadeasFLK16, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and George Kesidis}, title = {Resource Management and Orchestration for a Dynamic Service Chain Steering Model}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842225}, doi = {10.1109/GLOCOM.2016.7842225}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LeivadeasFLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ShanK16, author = {Yuquan Shan and George Kesidis}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Optimal Power Flow with Random Wind Resources}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {2426--2434}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.303}, doi = {10.1109/HICSS.2016.303}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ShanK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotcloud/KesidisUNW16, author = {George Kesidis and Bhuvan Urgaonkar and Neda Nasiriani and Cheng Wang}, editor = {Austin Clements and Tyson Condie}, title = {Neutrality in Future Public Clouds: Implications and Challenges}, booktitle = {8th {USENIX} Workshop on Hot Topics in Cloud Computing, HotCloud 2016, Denver, CO, USA, June 20-21, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/hotcloud16/workshop-program/presentation/kesidis}, timestamp = {Tue, 09 Feb 2021 08:31:40 +0100}, biburl = {https://dblp.org/rec/conf/hotcloud/KesidisUNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/WangUGCBK16, author = {Cheng Wang and Bhuvan Urgaonkar and Aayush Gupta and Lydia Y. Chen and Robert Birke and George Kesidis}, editor = {Samuel Kounev and Holger Giese and Jie Liu}, title = {Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability}, booktitle = {2016 {IEEE} International Conference on Autonomic Computing, {ICAC} 2016, Wuerzburg, Germany, July 17-22, 2016}, pages = {95--104}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICAC.2016.10}, doi = {10.1109/ICAC.2016.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icac/WangUGCBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/LeivadeasFLK16, author = {Aris Leivadeas and Matthias Falkner and Ioannis Lambadaris and George Kesidis}, title = {Dynamic virtualized network function allocation in a multi-cloud environment}, booktitle = {23rd International Conference on Telecommunications, {ICT} 2016, Thessaloniki, Greece, May 16-18, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICT.2016.7500394}, doi = {10.1109/ICT.2016.7500394}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/LeivadeasFLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/CoposLRKCK16, author = {Bogdan Copos and Karl N. Levitt and Jeff Rowe and Parisa Kianmajd and Chen{-}Nee Chuah and George Kesidis}, editor = {Muthu Ramachandran and Gary B. Wills and Robert John Walters and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Victor Chang}, title = {Security and Privacy for Emerging Smart Community Infrastructures}, booktitle = {Proceedings of the International Conference on Internet of Things and Big Data, IoTBD 2016, Rome, Italy, April 23-25, 2016}, pages = {148--155}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005929901480155}, doi = {10.5220/0005929901480155}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/CoposLRKCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/Kesidis0Q16, author = {George Kesidis and David J. Miller and Zhicong Qiu}, editor = {Jerry Brand and Matthew C. Valenti and Akinwale Akinpelu and Bharat T. Doshi and Bonnie L. Gorsic}, title = {IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric}, booktitle = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore, MD, USA, November 1-3, 2016}, pages = {812--816}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MILCOM.2016.7795429}, doi = {10.1109/MILCOM.2016.7795429}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/Kesidis0Q16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Khamse-AshariLK16, author = {Jalal Khamse{-}Ashari and Ioannis Lambadaris and George Kesidis and Bhuvan Urgaonkar and Yiqiang Q. Zhao}, title = {Per-Server Dominant-Share Fairness {(PS-DSF):} {A} Multi-Resource Fair Allocation Mechanism for Heterogeneous Servers}, journal = {CoRR}, volume = {abs/1611.00404}, year = {2016}, url = {http://arxiv.org/abs/1611.00404}, eprinttype = {arXiv}, eprint = {1611.00404}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Khamse-AshariLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LotfiSK16, author = {Mohammad Hassan Lotfi and Saswati Sarkar and George Kesidis}, title = {Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?}, journal = {CoRR}, volume = {abs/1611.10191}, year = {2016}, url = {http://arxiv.org/abs/1611.10191}, eprinttype = {arXiv}, eprint = {1611.10191}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LotfiSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/ShanRK0SRL15, author = {Yuquan Shan and Jayaram Raghuram and George Kesidis and David J. Miller and Anna Scaglione and Jeff Rowe and Karl N. Levitt}, title = {Generation bidding game with potentially false attestation of flexible demand}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2015}, pages = {29}, year = {2015}, url = {https://doi.org/10.1186/s13634-015-0212-3}, doi = {10.1186/S13634-015-0212-3}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/ShanRK0SRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/KurveG0K15, author = {Aditya Kurve and Christopher Griffin and David J. Miller and George Kesidis}, title = {Optimizing cluster formation in super-peer networks via local incentive design}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {1}, pages = {1--21}, year = {2015}, url = {https://doi.org/10.1007/s12083-013-0206-6}, doi = {10.1007/S12083-013-0206-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/KurveG0K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/KesidisSUL15, author = {George Kesidis and Yuquan Shan and Bhuvan Urgaonkar and J{\"{o}}rg Liebeherr}, title = {Network calculus for parallel processing}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {43}, number = {2}, pages = {48--50}, year = {2015}, url = {https://doi.org/10.1145/2825236.2825256}, doi = {10.1145/2825236.2825256}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/KesidisSUL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/Kurve0K15, author = {Aditya Kurve and David J. Miller and George Kesidis}, title = {Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {27}, number = {3}, pages = {794--809}, year = {2015}, url = {https://doi.org/10.1109/TKDE.2014.2327026}, doi = {10.1109/TKDE.2014.2327026}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/Kurve0K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JinKSKY15, author = {Youngmi Jin and George Kesidis and Jinwoo Shin and Fatih Kocak and Yung Yi}, title = {Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {6}, pages = {1818--1831}, year = {2015}, url = {https://doi.org/10.1109/TNET.2014.2347035}, doi = {10.1109/TNET.2014.2347035}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JinKSKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eenergy/WangNKUWCGB15, author = {Cheng Wang and Neda Nasiriani and George Kesidis and Bhuvan Urgaonkar and Qian Wang and Lydia Y. Chen and Aayush Gupta and Robert Birke}, editor = {Shivkumar Kalyanaraman and Deva P. Seetharam and Rajeev Shorey and Sarvapali D. Ramchurn and Mani Srivastava}, title = {Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design}, booktitle = {Proceedings of the 2015 {ACM} Sixth International Conference on Future Energy Systems, e-Energy 2015, Bangalore, India, July 14-17, 2015}, pages = {141--150}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2768510.2768541}, doi = {10.1145/2768510.2768541}, timestamp = {Fri, 08 Jul 2022 23:03:27 +0200}, biburl = {https://dblp.org/rec/conf/eenergy/WangNKUWCGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/HeLBJK15, author = {Jianping He and Bin Liu and Xuan Bao and Hongxia Jin and George Kesidis}, title = {On Privacy Preserving Partial Image Sharing}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {758--759}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.95}, doi = {10.1109/ICDCS.2015.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/HeLBJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KesidisMGF15, author = {George Kesidis and Douglas Mercer and Christopher Griffin and Serge Fdida}, title = {Roaming charges for customers of cellular-wireless entrant providers}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7442433}, doi = {10.1109/INFCOMW.2015.7442433}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/KesidisMGF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/NasirianiWKUCB15, author = {Neda Nasiriani and Cheng Wang and George Kesidis and Bhuvan Urgaonkar and Lydia Y. Chen and Robert Birke}, title = {On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants}, booktitle = {23rd {IEEE} International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, {MASCOTS} 2015, Atlanta, GA, USA, October 5-7, 2015}, pages = {51--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MASCOTS.2015.23}, doi = {10.1109/MASCOTS.2015.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/NasirianiWKUCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/Qiu0K15, author = {Zhicong Qiu and David J. Miller and George Kesidis}, editor = {Deniz Erdogmus and Murat Ak{\c{c}}akaya and Suleyman Serdar Kozat and Jan Larsen}, title = {Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data}, booktitle = {25th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2015, Boston, MA, USA, September 17-20, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MLSP.2015.7324326}, doi = {10.1109/MLSP.2015.7324326}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/Qiu0K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Qiu0K15, author = {Zhicong Qiu and David J. Miller and George Kesidis}, title = {Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data}, journal = {CoRR}, volume = {abs/1511.01047}, year = {2015}, url = {http://arxiv.org/abs/1511.01047}, eprinttype = {arXiv}, eprint = {1511.01047}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Qiu0K15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/DaoudKL14, author = {Ashraf Al Daoud and George Kesidis and J{\"{o}}rg Liebeherr}, title = {Zero-Determinant Strategies: {A} Game-Theoretic Approach for Sharing Licensed Spectrum Bands}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {32}, number = {11}, pages = {2297--2308}, year = {2014}, url = {https://doi.org/10.1109/JSAC.2014.141126}, doi = {10.1109/JSAC.2014.141126}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/DaoudKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/DaoudKL14, author = {Ashraf Al Daoud and George Kesidis and J{\"{o}}rg Liebeherr}, title = {A Game of Uncoordinated Sharing of Private Spectrum Commons}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {42}, number = {3}, pages = {42}, year = {2014}, url = {https://doi.org/10.1145/2695533.2695550}, doi = {10.1145/2695533.2695550}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/DaoudKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/LotfiKS14, author = {Mohammad Hassan Lotfi and George Kesidis and Saswati Sarkar}, title = {Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {42}, number = {3}, pages = {44}, year = {2014}, url = {https://doi.org/10.1145/2695533.2695552}, doi = {10.1145/2695533.2695552}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/LotfiKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/Raghuram0K14, author = {Jayaram Raghuram and David J. Miller and George Kesidis}, title = {Instance-Level Constraint-Based Semisupervised Learning With Imposed Space-Partitioning}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {25}, number = {8}, pages = {1520--1537}, year = {2014}, url = {https://doi.org/10.1109/TNNLS.2013.2294459}, doi = {10.1109/TNNLS.2013.2294459}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/Raghuram0K14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/AlizadehSGK14, author = {Mahnoosh Alizadeh and Anna Scaglione and Andrea J. Goldsmith and George Kesidis}, title = {Capturing aggregate flexibility in Demand Response}, booktitle = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles, CA, USA, December 15-17, 2014}, pages = {6439--6445}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CDC.2014.7040399}, doi = {10.1109/CDC.2014.7040399}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/AlizadehSGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/GriffinK14, author = {Christopher Griffin and George Kesidis}, title = {Behavior in a shared resource game with cooperative, greedy, and vigilante players}, booktitle = {48th Annual Conference on Information Sciences and Systems, {CISS} 2014, Princeton, NJ, USA, March 19-21, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISS.2014.6814129}, doi = {10.1109/CISS.2014.6814129}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciss/GriffinK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/Kocak0K14, author = {Fatih Kocak and David J. Miller and George Kesidis}, title = {Detecting anomalous latent classes in a batch of network traffic flows}, booktitle = {48th Annual Conference on Information Sciences and Systems, {CISS} 2014, Princeton, NJ, USA, March 19-21, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CISS.2014.6814181}, doi = {10.1109/CISS.2014.6814181}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/Kocak0K14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/feedback/RaghuramKGL0RS14, author = {Jayaram Raghuram and George Kesidis and Christopher Griffin and Karl N. Levitt and David J. Miller and Jeff Rowe and Anna Scaglione}, editor = {Jie Liu and Sharad Singhal and Bhuvan Urgaonkar}, title = {A Bidding Game for Generators in the Presence of Flexible Demand}, booktitle = {9th International Workshop on Feedback Computing, Philadelphia, PA, USA, June 17, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/feedbackcomputing14/workshop-program/presentation/raghuram}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/feedback/RaghuramKGL0RS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotcloud/WangUKSW14, author = {Cheng Wang and Bhuvan Urgaonkar and George Kesidis and Uday V. Shanbhag and Qian Wang}, editor = {Michael A. Kozuch and Minlan Yu}, title = {A Case for Virtualizing the Electric Utility in Cloud Data Centers}, booktitle = {6th {USENIX} Workshop on Hot Topics in Cloud Computing, HotCloud '14, Philadelphia, PA, USA, June 17-18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/hotcloud14/workshop-program/presentation/wang}, timestamp = {Tue, 09 Feb 2021 08:31:38 +0100}, biburl = {https://dblp.org/rec/conf/hotcloud/WangUKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Kesidis14, author = {George Kesidis}, title = {A simple two-sided market model with side-payments and {ISP} service classes}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {595--597}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849298}, doi = {10.1109/INFCOMW.2014.6849298}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Kesidis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LotfiKS14, author = {Mohammad Hassan Lotfi and George Kesidis and Saswati Sarkar}, title = {Market-based power allocation for a differentially priced {FDMA} system}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1011--1015}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6874985}, doi = {10.1109/ISIT.2014.6874985}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/LotfiKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/WangUWK14, author = {Cheng Wang and Bhuvan Urgaonkar and Qian Wang and George Kesidis}, title = {A Hierarchical Demand Response Framework for Data Center Power Cost Optimization under Real-World Electricity Pricing}, booktitle = {{IEEE} 22nd International Symposium on Modelling, Analysis {\&} Simulation of Computer and Telecommunication Systems, {MASCOTS} 2014, Paris, France, September 9-11, 2014}, pages = {305--314}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MASCOTS.2014.45}, doi = {10.1109/MASCOTS.2014.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/WangUWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netcoop/KesidisP14, author = {George Kesidis and Guodong Pang}, title = {Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks}, booktitle = {7th International Conference on NETwork Games, COntrol and OPtimization, NetGCoop 2014, Trento, Italy, October 29-31, 2014}, pages = {70--74}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7943431/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netcoop/KesidisP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DaoudKL14, author = {Ashraf Al Daoud and George Kesidis and J{\"{o}}rg Liebeherr}, title = {An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies}, journal = {CoRR}, volume = {abs/1401.3373}, year = {2014}, url = {http://arxiv.org/abs/1401.3373}, eprinttype = {arXiv}, eprint = {1401.3373}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DaoudKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KesidisP14, author = {George Kesidis and Guodong Pang}, title = {Golden-rule capacity allocation for distributed delay management in peer-to-peer networks}, journal = {CoRR}, volume = {abs/1402.0214}, year = {2014}, url = {http://arxiv.org/abs/1402.0214}, eprinttype = {arXiv}, eprint = {1402.0214}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KesidisP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LotfiKS14, author = {Mohammad Hassan Lotfi and George Kesidis and Saswati Sarkar}, title = {Market-Based Power Allocation for a Differentially Priced {FDMA} System}, journal = {CoRR}, volume = {abs/1402.3225}, year = {2014}, url = {http://arxiv.org/abs/1402.3225}, eprinttype = {arXiv}, eprint = {1402.3225}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LotfiKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LotfiKS14a, author = {Mohammad Hassan Lotfi and George Kesidis and Saswati Sarkar}, title = {Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model}, journal = {CoRR}, volume = {abs/1404.1782}, year = {2014}, url = {http://arxiv.org/abs/1404.1782}, eprinttype = {arXiv}, eprint = {1404.1782}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LotfiKS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlizadehSGK14, author = {Mahnoosh Alizadeh and Anna Scaglione and Andrea Goldsmith and George Kesidis}, title = {Capturing Aggregate Flexibility in Demand Response}, journal = {CoRR}, volume = {abs/1404.1955}, year = {2014}, url = {http://arxiv.org/abs/1404.1955}, eprinttype = {arXiv}, eprint = {1404.1955}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlizadehSGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlizadehSAKL14, author = {Mahnoosh Alizadeh and Anna Scaglione and Andy Applebaum and George Kesidis and Karl N. Levitt}, title = {Scalable and Anonymous Modeling of Large Populations of Flexible Appliances}, journal = {CoRR}, volume = {abs/1404.1958}, year = {2014}, url = {http://arxiv.org/abs/1404.1958}, eprinttype = {arXiv}, eprint = {1404.1958}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlizadehSAKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShanRKGL0RS14, author = {Yuquan Shan and Jayaram Raghuram and George Kesidis and Christopher Griffin and Karl N. Levitt and David J. Miller and Jeff Rowe and Anna Scaglione}, title = {Generation bidding game with flexible demand}, journal = {CoRR}, volume = {abs/1408.6689}, year = {2014}, url = {http://arxiv.org/abs/1408.6689}, eprinttype = {arXiv}, eprint = {1408.6689}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShanRKGL0RS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KesidisUSKL14, author = {George Kesidis and Bhuvan Urgaonkar and Yuquan Shan and S. Kamarava and J{\"{o}}rg Liebeherr}, title = {Network calculus for parallel processing}, journal = {CoRR}, volume = {abs/1409.0820}, year = {2014}, url = {http://arxiv.org/abs/1409.0820}, eprinttype = {arXiv}, eprint = {1409.0820}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KesidisUSKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KesidisMGF14, author = {George Kesidis and Douglas Mercer and Christopher Griffin and Serge Fdida}, title = {Roaming charges for customers of cellular-wireless entrant and incumbent providers}, journal = {CoRR}, volume = {abs/1409.6281}, year = {2014}, url = {http://arxiv.org/abs/1409.6281}, eprinttype = {arXiv}, eprint = {1409.6281}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KesidisMGF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/casm/KurveKK13, author = {Aditya Kurve and Khashayar Kotobi and George Kesidis}, title = {An agent-based framework for performance modeling of an optimistic parallel discrete event simulator}, journal = {Complex Adapt. Syst. Model.}, volume = {1}, pages = {12}, year = {2013}, url = {https://doi.org/10.1186/2194-3206-1-12}, doi = {10.1186/2194-3206-1-12}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/casm/KurveKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/AntoniadisFGJK13, author = {Panayotis Antoniadis and Serge Fdida and Christopher Griffin and Youngmi Jin and George Kesidis}, title = {Distributed medium access control with conditionally altruistic users}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2013}, pages = {202}, year = {2013}, url = {https://doi.org/10.1186/1687-1499-2013-202}, doi = {10.1186/1687-1499-2013-202}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/AntoniadisFGJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmetrics/UrgaonkarKSW13, author = {Bhuvan Urgaonkar and George Kesidis and Uday V. Shanbhag and Cheng Wang}, title = {Pricing of service in clouds: optimal response and strategic interactions}, journal = {{SIGMETRICS} Perform. Evaluation Rev.}, volume = {41}, number = {3}, pages = {28--30}, year = {2013}, url = {https://doi.org/10.1145/2567529.2567538}, doi = {10.1145/2567529.2567538}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmetrics/UrgaonkarKSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/AltmanBCKRW13, author = {Eitan Altman and Pierre Bernhard and St{\'{e}}phane Caron and George Kesidis and Julio Rojas{-}Mora and Sulan Wong}, title = {A model of network neutrality with usage-based prices}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {601--609}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9504-6}, doi = {10.1007/S11235-011-9504-6}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/AltmanBCKRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JinKJ13, author = {Youngmi Jin and George Kesidis and Ju Wook Jang}, title = {Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {21}, number = {1}, pages = {28--40}, year = {2013}, url = {https://doi.org/10.1109/TNET.2012.2189891}, doi = {10.1109/TNET.2012.2189891}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JinKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/AlizadehKS13, author = {Mahnoosh Alizadeh and George Kesidis and Anna Scaglione}, editor = {Michael B. Matthews}, title = {Clustering consumption in queues: {A} scalable model for electric vehicle scheduling}, booktitle = {2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 3-6, 2013}, pages = {374--378}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ACSSC.2013.6810299}, doi = {10.1109/ACSSC.2013.6810299}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/AlizadehKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Kurve0K13, author = {Aditya Kurve and David J. Miller and George Kesidis}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {140--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_9}, doi = {10.1007/978-3-319-02786-9\_9}, timestamp = {Tue, 10 Sep 2019 13:47:28 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Kurve0K13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JinYKKS13, author = {Youngmi Jin and Yung Yi and George Kesidis and Fatih Kocak and Jinwoo Shin}, title = {Hybrid client-server and peer-to-peer caching systems with selfish peers}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {1744--1752}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566972}, doi = {10.1109/INFCOM.2013.6566972}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JinYKKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/LuPK13, author = {Hongyuan Lu and Guodong Pang and George Kesidis}, title = {Automated scheduling of deferrable {PEV/PHEV} load by power-profile unevenness}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {235--240}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6687963}, doi = {10.1109/SMARTGRIDCOMM.2013.6687963}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/LuPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AlizadehSK13, author = {Mahnoosh Alizadeh and Anna Scaglione and George Kesidis}, title = {Scalable model predictive control of demand for ancillary services}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {684--689}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6688038}, doi = {10.1109/SMARTGRIDCOMM.2013.6688038}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AlizadehSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/KocakKPF13, author = {Fatih Kocak and George Kesidis and Tuan{-}Minh Pham and Serge Fdida}, title = {The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {45--50}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.13}, doi = {10.1109/SOCIALCOM.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/KocakKPF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/He0K13, author = {Jianping He and David J. Miller and George Kesidis}, title = {Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {162--167}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.31}, doi = {10.1109/SOCIALCOM.2013.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/He0K13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/WangUWKS13, author = {Cheng Wang and Bhuvan Urgaonkar and Qian Wang and George Kesidis and Anand Sivasubramaniam}, title = {Data Center Power Cost Optimization via Workload Modulation}, booktitle = {{IEEE/ACM} 6th International Conference on Utility and Cloud Computing, {UCC} 2013, Dresden, Germany, December 9-12, 2013}, pages = {260--263}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/UCC.2013.52}, doi = {10.1109/UCC.2013.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucc/WangUWKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-1942, author = {Fatih Kocak and George Kesidis and Tuan{-}Minh Pham and Serge Fdida}, title = {The effect of caching on a model of content and access provider revenues in information-centric networks}, journal = {CoRR}, volume = {abs/1304.1942}, year = {2013}, url = {http://arxiv.org/abs/1304.1942}, eprinttype = {arXiv}, eprint = {1304.1942}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-1942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-6753, author = {Mahnoosh Alizadeh and George Kesidis and Anna Scaglione}, title = {Clustering Consumption in Queues: {A} Scalable Model for Electric Vehicle Scheduling}, journal = {CoRR}, volume = {abs/1304.6753}, year = {2013}, url = {http://arxiv.org/abs/1304.6753}, eprinttype = {arXiv}, eprint = {1304.6753}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-6753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GriffinK13, author = {Christopher Griffin and George Kesidis}, title = {Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players}, journal = {CoRR}, volume = {abs/1306.3127}, year = {2013}, url = {http://arxiv.org/abs/1306.3127}, eprinttype = {arXiv}, eprint = {1306.3127}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GriffinK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GriffinKAF13, author = {Christopher Griffin and George Kesidis and Panayotis Antoniadis and Serge Fdida}, title = {Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics}, journal = {CoRR}, volume = {abs/1306.3160}, year = {2013}, url = {http://arxiv.org/abs/1306.3160}, eprinttype = {arXiv}, eprint = {1306.3160}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GriffinKAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kurve0K13, author = {Aditya Kurve and David J. Miller and George Kesidis}, title = {Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity}, journal = {CoRR}, volume = {abs/1307.7332}, year = {2013}, url = {http://arxiv.org/abs/1307.7332}, eprinttype = {arXiv}, eprint = {1307.7332}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kurve0K13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangUWKS13, author = {Cheng Wang and Bhuvan Urgaonkar and Qian Wang and George Kesidis and Anand Sivasubramaniam}, title = {Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing}, journal = {CoRR}, volume = {abs/1308.0585}, year = {2013}, url = {http://arxiv.org/abs/1308.0585}, eprinttype = {arXiv}, eprint = {1308.0585}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangUWKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/JinKJ12, author = {Youngmi Jin and George Kesidis and Ju Wook Jang}, title = {A Channel Aware {MAC} Protocol in an {ALOHA} Network with Selfish Users}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {30}, number = {1}, pages = {128--137}, year = {2012}, url = {https://doi.org/10.1109/JSAC.2012.120112}, doi = {10.1109/JSAC.2012.120112}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/JinKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neco/MillerRKC12, author = {David J. Miller and Jayaram Raghuram and George Kesidis and Christopher M. Collins}, title = {Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling}, journal = {Neural Comput.}, volume = {24}, number = {7}, pages = {1926--1966}, year = {2012}, url = {https://doi.org/10.1162/NECO\_a\_00284}, doi = {10.1162/NECO\_A\_00284}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neco/MillerRKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhocnets/AntoniadisFGJK12, author = {Panayotis Antoniadis and Serge Fdida and Christopher Griffin and Youngmi Jin and George Kesidis}, editor = {Jun Zheng and Nathalie Mitton and Jun Li and Pascal Lorenz}, title = {Distributed Medium Access Control with Dynamic Altruism}, booktitle = {Ad Hoc Networks - 4th International {ICST} Conference, {ADHOCNETS} 2012, Paris, France, October 16-17, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {111}, pages = {29--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36958-2\_3}, doi = {10.1007/978-3-642-36958-2\_3}, timestamp = {Tue, 21 Mar 2023 21:01:39 +0100}, biburl = {https://dblp.org/rec/conf/adhocnets/AntoniadisFGJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/KurvePKV12, author = {Aditya Kurve and Guodong Pang and George Kesidis and Gustavo de Veciana}, title = {Decentralized capacity reallocation for a loss network}, booktitle = {46th Annual Conference on Information Sciences and Systems, {CISS} 2012, Princeton, NJ, USA, March 21-23, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISS.2012.6310748}, doi = {10.1109/CISS.2012.6310748}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/KurvePKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/RaghuramMK12, author = {Jayaram Raghuram and David J. Miller and George Kesidis}, title = {Semisupervised domain adaptation for mixture model based classifiers}, booktitle = {46th Annual Conference on Information Sciences and Systems, {CISS} 2012, Princeton, NJ, USA, March 21-23, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CISS.2012.6310708}, doi = {10.1109/CISS.2012.6310708}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ciss/RaghuramMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/KesidisJ12, author = {George Kesidis and Youngmi Jin}, editor = {Vikram Krishnamurthy and Qing Zhao and Minyi Huang and Yonggang Wen}, title = {Stochastic Loss Aversion for Random Medium Access}, booktitle = {Game Theory for Networks - Third International {ICST} Conference, GameNets 2012, Vancouver, BC, Canada, May 24-26, 2012, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {105}, pages = {236--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35582-0\_18}, doi = {10.1007/978-3-642-35582-0\_18}, timestamp = {Tue, 30 Jun 2020 12:26:15 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/KesidisJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KesidisK12, author = {George Kesidis and Aditya Kurve}, title = {A study of unsupervised adaptive crowdsourcing}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {1438--1442}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364014}, doi = {10.1109/ICC.2012.6364014}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/KesidisK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Kesidis12, author = {George Kesidis}, title = {Side-payment profitability under convex demand-response modeling congestion-sensitive applications}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {2785--2789}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364113}, doi = {10.1109/ICC.2012.6364113}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Kesidis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PangKK12, author = {Guodong Pang and George Kesidis and Takis Konstantopoulos}, title = {Avoiding overages by deferred aggregate demand for {PEV} charging on the smart grid}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {3322--3327}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363650}, doi = {10.1109/ICC.2012.6363650}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PangKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShahVK12, author = {Virag Shah and Gustavo de Veciana and George Kesidis}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Learning to route queries in unstructured {P2P} networks: Achieving throughput optimality subject to query resolution constraints}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2327--2335}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195620}, doi = {10.1109/INFCOM.2012.6195620}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShahVK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/0001KK12, author = {David J. Miller and Fatih Kocak and George Kesidis}, title = {Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection}, booktitle = {{IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2012, Santander, Spain, September 23-26, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MLSP.2012.6349793}, doi = {10.1109/MLSP.2012.6349793}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/0001KK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2011, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31909-9}, doi = {10.1007/978-3-642-31909-9}, isbn = {978-3-642-31908-2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-1776, author = {George Kesidis and Youngmi Jin}, title = {Stochastic Loss Aversion for Random Medium Access}, journal = {CoRR}, volume = {abs/1201.1776}, year = {2012}, url = {http://arxiv.org/abs/1201.1776}, eprinttype = {arXiv}, eprint = {1201.1776}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-1776.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-4847, author = {Panayotis Antoniadis and Serge Fdida and Christopher Griffin and Youngmi Jin and George Kesidis}, title = {{CSMA} Local Area Networking under Dynamic Altruism}, journal = {CoRR}, volume = {abs/1204.4847}, year = {2012}, url = {http://arxiv.org/abs/1204.4847}, eprinttype = {arXiv}, eprint = {1204.4847}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-4847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarlK11, author = {Glenn Carl and George Kesidis}, title = {Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra}, journal = {Comput. Networks}, volume = {55}, number = {10}, pages = {2361--2379}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.03.013}, doi = {10.1016/J.COMNET.2011.03.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarlK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZouKM11, author = {Guixi Zou and George Kesidis and David J. Miller}, title = {A Flow Classifier with Tamper-Resistant Features and an Evaluation of Its Portability to New Domains}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {29}, number = {7}, pages = {1449--1460}, year = {2011}, url = {https://doi.org/10.1109/JSAC.2011.110810}, doi = {10.1109/JSAC.2011.110810}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZouKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/KurveGK11, author = {Aditya Kurve and Christopher Griffin and George Kesidis}, title = {Iterative partitioning scheme for distributed simulation of dynamic networks}, booktitle = {16th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, {CAMAD} 2011, Kyoto, Japan, June 10-11, 2011}, pages = {92--96}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CAMAD.2011.5941125}, doi = {10.1109/CAMAD.2011.5941125}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/camad/KurveGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GriffinKAF11, author = {Christopher Griffin and George Kesidis and Panayotis Antoniadis and Serge Fdida}, title = {An Epidemic Model of Bit Torrent with Control}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5962823}, doi = {10.1109/ICC.2011.5962823}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/GriffinKAF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KurveK11, author = {Aditya Kurve and George Kesidis}, title = {Sybil Detection via Distributed Sparse Cut Monitoring}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963402}, doi = {10.1109/ICC.2011.5963402}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KurveK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/teletraffic/KurveGK11, author = {Aditya Kurve and C. Griffin and George Kesidis}, editor = {Piet Van Mieghem and Udo R. Krieger and Yi Qian and Kurt Tutschku}, title = {A graph partitioning game for distributed simulation of networks}, booktitle = {Proceedings of the 2011 International Workshop on Modeling, Analysis, and Control of Complex Networks, Cnet@ITC 2011, San Francisco, California, USA, 9 September 2011}, pages = {9--16}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/doi/10.5555/2043527.2043529}, doi = {10.5555/2043527.2043529}, timestamp = {Wed, 04 May 2022 13:02:13 +0200}, biburl = {https://dblp.org/rec/conf/teletraffic/KurveGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CelikRK011, author = {Z. Berkay Celik and Jayaram Raghuram and George Kesidis and David J. Miller}, editor = {Sean Peisert and Stephen Schwab}, title = {Salting Public Traces with Attack Traffic to Test Flow Classifiers}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/salting-public-traces-attack-traffic-test-flow-classifiers}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/CelikRK011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Kesidis11, author = {George Kesidis}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Denial-of-Service Detection}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {323--328}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_266}, doi = {10.1007/978-1-4419-5906-5\_266}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Kesidis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-1779, author = {George Kesidis}, title = {Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications}, journal = {CoRR}, volume = {abs/1110.1779}, year = {2011}, url = {http://arxiv.org/abs/1110.1779}, eprinttype = {arXiv}, eprint = {1110.1779}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-1779.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-1781, author = {George Kesidis and Aditya Kurve}, title = {A Study of Unsupervised Adaptive Crowdsourcing}, journal = {CoRR}, volume = {abs/1110.1781}, year = {2011}, url = {http://arxiv.org/abs/1110.1781}, eprinttype = {arXiv}, eprint = {1110.1781}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-1781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2010Kesidis, author = {George Kesidis}, title = {An Introduction to Models of Online Peer-to-Peer Social Networking}, series = {Synthesis Lectures on Communication Networks}, publisher = {Morgan {\&} Claypool Publishers}, year = {2010}, url = {https://doi.org/10.2200/S00313ED1V01Y201011CNT008}, doi = {10.2200/S00313ED1V01Y201011CNT008}, isbn = {978-3-031-79997-6}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/synthesis/2010Kesidis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiLLK10, author = {Yoon{-}Ho Choi and Lunquan Li and Peng Liu and George Kesidis}, title = {Worm virulence estimation for the containment of local worm outbreak}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {104--123}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.002}, doi = {10.1016/J.COSE.2009.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoiLLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JhiLLGJK10, author = {Yoon{-}chan Jhi and Peng Liu and Lunquan Li and Qijun Gu and Jiwu Jing and George Kesidis}, title = {{PWC:} a proactive worm containment solution for enterprise networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {334--354}, year = {2010}, url = {https://doi.org/10.1002/sec.112}, doi = {10.1002/SEC.112}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/AksuMKY10, author = {Yaman Aksu and David J. Miller and George Kesidis and Qing X. Yang}, title = {Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions}, journal = {{IEEE} Trans. Neural Networks}, volume = {21}, number = {5}, pages = {701--717}, year = {2010}, url = {https://doi.org/10.1109/TNN.2010.2041069}, doi = {10.1109/TNN.2010.2041069}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/AksuMKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/KesidisJAA10, author = {George Kesidis and Youngmi Jin and Amar Prakash Azad and Eitan Altman}, title = {Stable Nash equilibria of {ALOHA} medium access games under symmetric, socially altruistic behavior}, booktitle = {Proceedings of the 49th {IEEE} Conference on Decision and Control, {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}}, pages = {1071--1075}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CDC.2010.5717121}, doi = {10.1109/CDC.2010.5717121}, timestamp = {Fri, 04 Mar 2022 13:28:01 +0100}, biburl = {https://dblp.org/rec/conf/cdc/KesidisJAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/TangpongK10, author = {Athichart Tangpong and George Kesidis}, title = {File-sharing costs and quality-of-service}, booktitle = {44th Annual Conference on Information Sciences and Systems, {CISS} 2010, Princeton, NJ, USA, 17-19 March 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CISS.2010.5464800}, doi = {10.1109/CISS.2010.5464800}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/TangpongK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/CaronKA10, author = {St{\'{e}}phane Caron and George Kesidis and Eitan Altman}, editor = {Bob Briscoe and Peter Steenkiste}, title = {Application neutrality and a paradox of side payments}, booktitle = {Proceedings of the Re-Architecting the Internet Workshop, ReARCH@CoNEXT 2010, Philadelphia, Pennsylvania, USA, November 30, 2010}, pages = {9:1--9:6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1921233.1921245}, doi = {10.1145/1921233.1921245}, timestamp = {Thu, 09 Dec 2021 09:56:21 +0100}, biburl = {https://dblp.org/rec/conf/conext/CaronKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etm/AltmanBCKRW10, author = {Eitan Altman and Pierre Bernhard and St{\'{e}}phane Caron and George Kesidis and Julio Rojas{-}Mora and Sulan Wong}, editor = {Burkhard Stiller and Tobias Ho{\ss}feld and George D. Stamoulis}, title = {A Study of Non-neutral Networks with Usage-Based Prices}, booktitle = {Incentives, Overlays, and Economic Traffic Control, Third International Workshop, {ETM} 2010, Amsterdam, The Netherlands, September 6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6236}, pages = {76--84}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15485-0\_8}, doi = {10.1007/978-3-642-15485-0\_8}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/etm/AltmanBCKRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/MillerLKC10, author = {David J. Miller and Chu{-}Fang Lin and George Kesidis and Christopher M. Collins}, editor = {Sorin Draghici and Taghi M. Khoshgoftaar and Vasile Palade and Witold Pedrycz and M. Arif Wani and Xingquan Zhu}, title = {Improved Fine-Grained Component-Conditional Class Labeling with Active Learning}, booktitle = {The Ninth International Conference on Machine Learning and Applications, {ICMLA} 2010, Washington, DC, USA, 12-14 December 2010}, pages = {3--8}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICMLA.2010.8}, doi = {10.1109/ICMLA.2010.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmla/MillerLKC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Kesidis10, author = {George Kesidis}, editor = {Yoshiaki Kiriha and Lisandro Zambenedetti Granville and Deep Medhi and Toshio Tonouchi and Myung{-}Sup Kim}, title = {Congestion control alternatives for residential broadband access}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010, 19-23 April 2010, Osaka, Japan}, pages = {874--877}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/NOMS.2010.5488352}, doi = {10.1109/NOMS.2010.5488352}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/Kesidis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-5324, author = {George Kesidis and Youngmi Jin and Amar Prakash Azad and Eitan Altman}, title = {Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior}, journal = {CoRR}, volume = {abs/1003.5324}, year = {2010}, url = {http://arxiv.org/abs/1003.5324}, eprinttype = {arXiv}, eprint = {1003.5324}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-5324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-3894, author = {Eitan Altman and Pierre Bernhard and St{\'{e}}phane Caron and George Kesidis and Julio Rojas{-}Mora and Sulan Wong}, title = {A Study of Non-Neutral Networks with Usage-based Prices}, journal = {CoRR}, volume = {abs/1006.3894}, year = {2010}, url = {http://arxiv.org/abs/1006.3894}, eprinttype = {arXiv}, eprint = {1006.3894}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-3894.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-2267, author = {Eitan Altman and St{\'{e}}phane Caron and George Kesidis}, title = {Application Neutrality and a Paradox of Side Payments}, journal = {CoRR}, volume = {abs/1008.2267}, year = {2010}, url = {http://arxiv.org/abs/1008.2267}, eprinttype = {arXiv}, eprint = {1008.2267}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-2267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/KesidisTG09, author = {George Kesidis and Athichart Tangpong and Christopher Griffin}, title = {A sybil-proof referral system based on multiplicative reputation chains}, journal = {{IEEE} Commun. Lett.}, volume = {13}, number = {11}, pages = {862--864}, year = {2009}, url = {https://doi.org/10.1109/LCOMM.2009.091400}, doi = {10.1109/LCOMM.2009.091400}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/KesidisTG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/0002NK09, author = {Arnab Das and Azin Neishaboori and George Kesidis}, editor = {Tamer Basar and Hitay {\"{O}}zbay}, title = {Wireless mesh networking games}, booktitle = {1st International Conference on Game Theory for Networks, {GAMENETS} 2009, Istanbul, Turkey, May 13-15, 2009}, pages = {565--574}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GAMENETS.2009.5137446}, doi = {10.1109/GAMENETS.2009.5137446}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/0002NK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/TangpongK09, author = {Athichart Tangpong and George Kesidis}, editor = {Tamer Basar and Hitay {\"{O}}zbay}, title = {A simple reputation model for BitTorrent-like incentives}, booktitle = {1st International Conference on Game Theory for Networks, {GAMENETS} 2009, Istanbul, Turkey, May 13-15, 2009}, pages = {603--610}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GAMENETS.2009.5137450}, doi = {10.1109/GAMENETS.2009.5137450}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/TangpongK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/NamPKDS09, author = {Gunwoo Nam and Pushkar Patankar and George Kesidis and Chita R. Das and Cetin Seren}, title = {Mass Purging of Stale {TCP} Flows in Per-Flow Monitoring Systems}, booktitle = {Proceedings of the 18th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA, August 3-6, 2009}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICCCN.2009.5235390}, doi = {10.1109/ICCCN.2009.5235390}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/NamPKDS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/TangpongKHH09, author = {Athichart Tangpong and George Kesidis and Hung{-}Yuan Hsu and Ali R. Hurson}, title = {Robust Sybil Detection for MANETs}, booktitle = {Proceedings of the 18th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA, August 3-6, 2009}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICCCN.2009.5235387}, doi = {10.1109/ICCCN.2009.5235387}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/TangpongKHH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/NamPLSKD09, author = {Gunwoo Nam and Pushkar Patankar and Seung{-}Hwan Lim and Bikash Sharma and George Kesidis and Chita R. Das}, title = {Clock-like Flow Replacement Schemes for Resilient Flow Monitoring}, booktitle = {29th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada}, pages = {129--136}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDCS.2009.53}, doi = {10.1109/ICDCS.2009.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/NamPLSKD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/teletraffic/PatankarNKKD09, author = {Pushkar Patankar and Gunwoo Nam and George Kesidis and Takis Konstantopoulos and Chita R. Das}, title = {Peer-to-peer unstructured anycasting using correlated swarms}, booktitle = {21st International Teletraffic Congress, {ITC} 2009, Paris, France, September 15-17, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/document/5300270/}, timestamp = {Sat, 12 Nov 2022 12:58:30 +0100}, biburl = {https://dblp.org/rec/conf/teletraffic/PatankarNKKD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-1597, author = {George Kesidis}, title = {A quantum computer network}, journal = {CoRR}, volume = {abs/0908.1597}, year = {2009}, url = {http://arxiv.org/abs/0908.1597}, eprinttype = {arXiv}, eprint = {0908.1597}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-1597.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NeishabooriK08, author = {Azin Neishaboori and George Kesidis}, title = {Wireless mesh networks based on {CDMA}}, journal = {Comput. Commun.}, volume = {31}, number = {8}, pages = {1513--1528}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.01.020}, doi = {10.1016/J.COMCOM.2008.01.020}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NeishabooriK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/MillerZK08, author = {David J. Miller and Yanxin Zhang and George Kesidis}, title = {Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/674974}, doi = {10.1155/2008/674974}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/MillerZK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/YiDKD08, author = {Sungwon Yi and Xidong Deng and George Kesidis and Chita R. Das}, title = {A dynamic quarantine scheme for controlling unresponsive {TCP} sessions}, journal = {Telecommun. Syst.}, volume = {37}, number = {4}, pages = {169--189}, year = {2008}, url = {https://doi.org/10.1007/s11235-008-9104-2}, doi = {10.1007/S11235-008-9104-2}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/YiDKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomacs/KesidisHJJV08, author = {George Kesidis and Ihab Hamadeh and Youngmi Jin and Soranun Jiwasurat and Milan Vojnovic}, title = {A model of the spread of randomly scanning Internet worms that saturate access links}, journal = {{ACM} Trans. Model. Comput. Simul.}, volume = {18}, number = {2}, pages = {6:1--6:14}, year = {2008}, url = {https://doi.org/10.1145/1346325.1346327}, doi = {10.1145/1346325.1346327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomacs/KesidisHJJV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomacs/CarlK08, author = {Glenn Carl and George Kesidis}, title = {Large-scale testing of the Internet's Border Gateway Protocol {(BGP)} via topological scale-down}, journal = {{ACM} Trans. Model. Comput. Simul.}, volume = {18}, number = {3}, pages = {11:1--11:30}, year = {2008}, url = {https://doi.org/10.1145/1371574.1371577}, doi = {10.1145/1371574.1371577}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomacs/CarlK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/YiKGDKD08, author = {Sungwon Yi and Martin Kappes and Sachin Garg and Xidong Deng and George Kesidis and Chita R. Das}, title = {Proxy-RED: an {AQM} scheme for wireless local area networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {8}, number = {4}, pages = {421--434}, year = {2008}, url = {https://doi.org/10.1002/wcm.460}, doi = {10.1002/WCM.460}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/YiKGDKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/KesidisDV08, author = {George Kesidis and A. Das and Gustavo de Veciana}, title = {On flat-rate and usage-based pricing for tiered commodity internet services}, booktitle = {42nd Annual Conference on Information Sciences and Systems, {CISS} 2008, Princeton, NJ, USA, 19-21 March 2008}, pages = {304--308}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CISS.2008.4558540}, doi = {10.1109/CISS.2008.4558540}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/KesidisDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiLK08, author = {Lunquan Li and Peng Liu and George Kesidis}, title = {Threshold Smart Walk for the Containment of Local Worm Outbreak}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {2124--2128}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.409}, doi = {10.1109/GLOCOM.2008.ECP.409}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LiLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/MillerZK08, author = {David J. Miller and Yanxin Zhang and George Kesidis}, title = {A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, {USA}}, pages = {1865--1868}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICASSP.2008.4517997}, doi = {10.1109/ICASSP.2008.4517997}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/MillerZK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/PatankarNKD08, author = {Pushkar Patankar and Gunwoo Nam and George Kesidis and Chita R. Das}, title = {Exploring Anti-Spam Models in Large Scale VoIP Systems}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2008), 17-20 June 2008, Beijing, China}, pages = {85--92}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.2008.71}, doi = {10.1109/ICDCS.2008.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/PatankarNKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/NeishabooriK08, author = {Azin Neishaboori and George Kesidis}, title = {SINR-sensitive routing in wireless 802.11 mesh networks}, booktitle = {{IEEE} 5th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2008, 29 September - 2 October 2008, Atlanta, Georgia, {USA}}, pages = {623--628}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/MAHSS.2008.4660103}, doi = {10.1109/MAHSS.2008.4660103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/NeishabooriK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netcoop/KesidisKS08, author = {George Kesidis and Takis Konstantopoulos and Perla Sousi}, editor = {Eitan Altman and Augustin Chaintreau}, title = {A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks}, booktitle = {Network Control and Optimization, Second Euro-NF Workshop, {NET-COOP} 2008, Paris, France, September 8-10, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5425}, pages = {26--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00393-6\_4}, doi = {10.1007/978-3-642-00393-6\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/netcoop/KesidisKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/JinK07, author = {Youngmi Jin and George Kesidis}, title = {Distributed Contention Window Control for Selfish Users in {IEEE} 802.11 Wireless LANs}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {25}, number = {6}, pages = {1113--1123}, year = {2007}, url = {https://doi.org/10.1109/JSAC.2007.070806}, doi = {10.1109/JSAC.2007.070806}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/JinK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadnets/0002KP07, author = {Arnab Das and George Kesidis and Venkat Pothamsetty}, title = {Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution}, booktitle = {Fourth International Conference on Broadband Communications, Networks and Systems, {(BROADNETS} 2007), 10-14 September 2007, Raleigh, North-Carolina, {USA}}, pages = {444--448}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/BROADNETS.2007.4550467}, doi = {10.1109/BROADNETS.2007.4550467}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/broadnets/0002KP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/KesidisKS07, author = {George Kesidis and Takis Konstantopoulos and Perla Sousi}, title = {Modeling file-sharing with BitTorrent-like incentives}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April 15-20, 2007}, pages = {1333--1336}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICASSP.2007.367324}, doi = {10.1109/ICASSP.2007.367324}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/KesidisKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KesidisN07, author = {George Kesidis and Azin Neishaboori}, title = {Distributed Power Control in Multihop Ad Hoc {CDMA} Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {96--101}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.25}, doi = {10.1109/ICC.2007.25}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/KesidisN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/JeonK07, author = {Paul Barom Jeon and George Kesidis}, title = {GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks}, booktitle = {Sixth International Conference on Networking {(ICN} 2007), 22-28 April 2007, Sainte-Luce, Martinique, France}, pages = {10}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICN.2007.43}, doi = {10.1109/ICN.2007.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icn/JeonK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YiKOJKD07, author = {Sungwon Yi and Byoung{-}Koo Kim and Jintae Oh and Jongsoo Jang and George Kesidis and Chita R. Das}, editor = {Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo}, title = {Memory-efficient content filtering hardware for high-speed intrusion detection systems}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007}, pages = {264--269}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1244002.1244068}, doi = {10.1145/1244002.1244068}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/YiKOJKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JhiLLGJK07, author = {Yoon{-}chan Jhi and Peng Liu and Lunquan Li and Qijun Gu and Jiwu Jing and George Kesidis}, title = {{PWC:} {A} proactive worm containment solution for enterprise networks}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {433--442}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550364}, doi = {10.1109/SECCOM.2007.4550364}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/JhiLLGJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Li0JK07, author = {Lunquan Li and Peng Liu and Yoon{-}chan Jhi and George Kesidis}, editor = {Terry V. Benzel and George Kesidis}, title = {Evaluation of Collaborative Worm Containments on {DETER} Testbed}, booktitle = {{DETER} Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/deter-2007/evaluation-collaborative-worm-containments-deter-testbed}, timestamp = {Mon, 01 Feb 2021 08:43:10 +0100}, biburl = {https://dblp.org/rec/conf/uss/Li0JK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2007deter, editor = {Terry V. Benzel and George Kesidis}, title = {{DETER} Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/deter2007}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2007deter.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HamadehK06, author = {Ihab Hamadeh and George Kesidis}, title = {A taxonomy of internet traceback}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {54--61}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010823}, doi = {10.1504/IJSN.2006.010823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/CarlKBR06, author = {Glenn Carl and George Kesidis and Richard R. Brooks and Suresh Rai}, title = {Denial-of-Service Attack-Detection Techniques}, journal = {{IEEE} Internet Comput.}, volume = {10}, number = {1}, pages = {82--89}, year = {2006}, url = {https://doi.org/10.1109/MIC.2006.5}, doi = {10.1109/MIC.2006.5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/CarlKBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/JinK06, author = {Youngmi Jin and George Kesidis}, title = {Charge sensitive and incentive compatible end-to-end window-based control for selfish users}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {5}, pages = {952--961}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2006.872876}, doi = {10.1109/JSAC.2006.872876}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/JinK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/WangMK06, author = {Jisheng Wang and David J. Miller and George Kesidis}, title = {Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {10}, pages = {1929--1941}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2006.877216}, doi = {10.1109/JSAC.2006.877216}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/WangMK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/MortazaviK06, author = {B. Mortazavi and George Kesidis}, title = {Cumulative Reputation Systems for Peer-to-Peer Content Distribution}, booktitle = {40th Annual Conference on Information Sciences and Systems, {CISS} 2006, Princeton, NJ, USA, 22-24 March 2006}, pages = {1546--1552}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CISS.2006.286385}, doi = {10.1109/CISS.2006.286385}, timestamp = {Wed, 10 May 2023 17:14:27 +0200}, biburl = {https://dblp.org/rec/conf/ciss/MortazaviK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/HamadehK06, author = {Ihab Hamadeh and George Kesidis}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {Toward a Framework for Forensic Analysis of Scanning Worms}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {282--297}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_20}, doi = {10.1007/11766155\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/etrics/HamadehK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KesidisJMK06, author = {George Kesidis and Youngmi Jin and B. Mortazavi and T. Konstopoulos}, title = {An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.430}, doi = {10.1109/GLOCOM.2006.430}, timestamp = {Fri, 21 Feb 2020 18:38:36 +0100}, biburl = {https://dblp.org/rec/conf/globecom/KesidisJMK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RaoK06, author = {Rajesh N. Rao and George Kesidis}, title = {On the Relation Between Capacity and Number of Sinks in an Sensor Network}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.510}, doi = {10.1109/GLOCOM.2006.510}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/RaoK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/NeishabooriK06, author = {Azin Neishaboori and George Kesidis}, title = {Routing and Uplink-Downlink Scheduling in Ad Hoc {CDMA} Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {926--931}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.254826}, doi = {10.1109/ICC.2006.254826}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/NeishabooriK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WangHK006, author = {Jisheng Wang and Ihab Hamadeh and George Kesidis and David J. Miller}, title = {Polymorphic worm detection and defense: system design, experimental methodology, and data resources}, booktitle = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, pages = {169--176}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1162666.1162676}, doi = {10.1145/1162666.1162676}, timestamp = {Thu, 03 Feb 2022 15:46:18 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WangHK006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LiLK06, author = {Lunquan Li and Peng Liu and George Kesidis}, editor = {William Yurcik and Stefan Axelsson and Kiran Lakkaraju and Soon Tee Teoh}, title = {Visual toolkit for network security experiment specification and data analysis}, booktitle = {3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006}, pages = {7--14}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179576.1179579}, doi = {10.1145/1179576.1179579}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LiLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/CarlPKM06, author = {Glenn Carl and Shashi Phoha and George Kesidis and Bharat B. Madan}, editor = {L. Felipe Perrone and Barry Lawson and Jason Liu and Frederick P. Wieland}, title = {Path preserving scale down for validation of internet inter-domain routing protocols}, booktitle = {Proceedings of the Winter Simulation Conference {WSC} 2006, Monterey, California, USA, December 3-6, 2006}, pages = {2210--2218}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WSC.2006.323023}, doi = {10.1109/WSC.2006.323023}, timestamp = {Mon, 29 Apr 2024 16:19:40 +0200}, biburl = {https://dblp.org/rec/conf/wsc/CarlPKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JinK05, author = {Youngmi Jin and George Kesidis}, title = {Dynamics of usage-priced communication networks: the case of a single bottleneck resource}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {13}, number = {5}, pages = {1041--1053}, year = {2005}, url = {https://doi.org/10.1109/TNET.2005.857120}, doi = {10.1109/TNET.2005.857120}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JinK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JiwasuratKM05, author = {Soranun Jiwasurat and George Kesidis and David J. Miller}, title = {Hierarchical shaped deficit round-robin scheduling}, booktitle = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM} '05, St. Louis, Missouri, USA, 28 November - 2 December 2005}, pages = {6}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/GLOCOM.2005.1577729}, doi = {10.1109/GLOCOM.2005.1577729}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/JiwasuratKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LockwoodKH05, author = {John W. Lockwood and George Kesidis and Changcheng Huang}, title = {Advances for networks {\&} internet}, booktitle = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM} '05, St. Louis, Missouri, USA, 28 November - 2 December 2005}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/GLOCOM.2005.1577031}, doi = {10.1109/GLOCOM.2005.1577031}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LockwoodKH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/HamadehHKP05, author = {Ihab Hamadeh and Jason Hart and George Kesidis and Venkat Pothamsetty}, title = {A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast}, booktitle = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055, Monterey, CA, USA, June 1-3, 2005}, pages = {191--198}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PADS.2005.2}, doi = {10.1109/PADS.2005.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pads/HamadehHKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pe-wasun/JeonK05, author = {Paul Barom Jeon and George Kesidis}, editor = {Mohamed Ould{-}Khaoua and Mineo Takai}, title = {Pheromone-aided robust multipath and multipriority routing in wireless MANETs}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, {PE-WASUN} 2005, Montreal, Quebec, Canada, October 10-13, 2005}, pages = {106--113}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1089803.1089974}, doi = {10.1145/1089803.1089974}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pe-wasun/JeonK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qosip/KesidisHJ05, author = {George Kesidis and Ihab Hamadeh and Soranun Jiwasurat}, editor = {Marco Ajmone Marsan and Giuseppe Bianchi and Marco Listanti and Michela Meo}, title = {Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms}, booktitle = {Quality of Service in Multiservice {IP} Networks, Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3375}, pages = {101--109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30573-6\_8}, doi = {10.1007/978-3-540-30573-6\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/qosip/KesidisHJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04, author = {Ruzena Bajcsy and Terry Benzel and Matt Bishop and Robert Braden and Carla E. Brodley and Sonia Fahmy and Sally Floyd and Wes Hardaker and Anthony D. Joseph and George Kesidis and Karl N. Levitt and Robert Lindell and Peng Liu and David J. Miller and Russ Mundy and Clifford Neuman and Ron Ostrenga and Vern Paxson and Phillip A. Porras and Catherine Rosenberg and J. Doug Tygar and Shankar Sastry and Daniel F. Sterne and Shyhtsun Felix Wu}, title = {Cyber defense technology networking and evaluation}, journal = {Commun. {ACM}}, volume = {47}, number = {3}, pages = {58--61}, year = {2004}, url = {https://doi.org/10.1145/971617.971646}, doi = {10.1145/971617.971646}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuCKD04, author = {Hao Zhu and Guohong Cao and George Kesidis and Chita R. Das}, title = {An adaptive power-conserving service discipline for bluetooth {(APCB)} wireless networks}, journal = {Comput. Commun.}, volume = {27}, number = {9}, pages = {828--839}, year = {2004}, url = {https://doi.org/10.1016/j.comcom.2004.01.027}, doi = {10.1016/J.COMCOM.2004.01.027}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhuCKD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/JiwasuratK04, author = {Soranun Jiwasurat and George Kesidis}, title = {A Class of Shaped Deficit Round-Robin {(SDRR)} Schedulers}, journal = {Telecommun. Syst.}, volume = {25}, number = {3-4}, pages = {173--191}, year = {2004}, url = {https://doi.org/10.1023/B:TELS.0000014780.33289.ad}, doi = {10.1023/B:TELS.0000014780.33289.AD}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/JiwasuratK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/RaoK04, author = {Rajesh N. Rao and George Kesidis}, title = {Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {3}, number = {3}, pages = {225--232}, year = {2004}, url = {https://doi.org/10.1109/TMC.2004.26}, doi = {10.1109/TMC.2004.26}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/RaoK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciit/DengYKD04, author = {Xidong Deng and Sungwon Yi and George Kesidis and Chita R. Das}, editor = {M. H. Hamza}, title = {{RL-RED:} {A} flowcontrol mechanism for 802.11-basedwireless ad hoc networks}, booktitle = {{IASTED} International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin Islands, {USA}}, pages = {369--374}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Thu, 05 Jul 2018 07:27:58 +0200}, biburl = {https://dblp.org/rec/conf/ciit/DengYKD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciit/JinK04, author = {Youngmi Jin and George Kesidis}, editor = {M. H. Hamza}, title = {{TCP} windowcontrol in a priced network}, booktitle = {{IASTED} International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin Islands, {USA}}, pages = {596--600}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Thu, 25 Jan 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciit/JinK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JiZMK04, author = {Xiang Ji and Hongyuan Zha and John J. Metzner and George Kesidis}, title = {Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2004, Paris, France, 20-24 June 2004}, pages = {3807--3811}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICC.2004.1313265}, doi = {10.1109/ICC.2004.1313265}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/JiZMK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worm/WeaverHKP04, author = {Nicholas Weaver and Ihab Hamadeh and George Kesidis and Vern Paxson}, editor = {Vern Paxson}, title = {Preliminary results using scale-down to explore worm dynamics}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004, Washington, DC, USA, October 29, 2004}, pages = {65--72}, publisher = {{ACM} Press}, year = {2004}, url = {https://doi.org/10.1145/1029618.1029628}, doi = {10.1145/1029618.1029628}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/WeaverHKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/YiDKD03, author = {Sungwon Yi and Xidong Deng and George Kesidis and Chita R. Das}, title = {HaTCh: a two-level caching scheme for estimating the number of active flows}, booktitle = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui, Hawaii, USA, December 9-12, 2003}, pages = {2829--2834}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CDC.2003.1273054}, doi = {10.1109/CDC.2003.1273054}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdc/YiDKD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DengYKD03, author = {Xidong Deng and Sungwon Yi and George Kesidis and Chita R. Das}, title = {A control theoretic approach for designing adaptive {AQM} schemes}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {2947--2951}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258774}, doi = {10.1109/GLOCOM.2003.1258774}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DengYKD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RaoK03, author = {Rajesh N. Rao and George Kesidis}, title = {Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {2957--2961}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258776}, doi = {10.1109/GLOCOM.2003.1258776}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RaoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JinK03, author = {Youngmi Jin and George Kesidis}, title = {Nash equilibria of a generic networking game with applications to circuit-switched networks}, booktitle = {Proceedings {IEEE} {INFOCOM} 2003, The 22nd Annual Joint Conference of the {IEEE} Computer and Communications Societies, San Franciso, CA, USA, March 30 - April 3, 2003}, pages = {1242--1249}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/INFCOM.2003.1208960}, doi = {10.1109/INFCOM.2003.1208960}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/JinK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/JinK02, author = {Youngmi Jin and George Kesidis}, title = {Equilibria of a noncooperative game for heterogeneous users of an {ALOHA} network}, journal = {{IEEE} Commun. Lett.}, volume = {6}, number = {7}, pages = {282--284}, year = {2002}, url = {https://doi.org/10.1109/LCOMM.2002.801326}, doi = {10.1109/LCOMM.2002.801326}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/JinK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YiDKD02, author = {Sungwon Yi and Xidong Deng and George Kesidis and Chita R. Das}, title = {Providing fairness in DiffServ architecture}, booktitle = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM} '02, Taipei, Taiwan, 17-21 November, 2002}, pages = {1435--1439}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/GLOCOM.2002.1188435}, doi = {10.1109/GLOCOM.2002.1188435}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YiDKD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DengYKD02, author = {Xidong Deng and Sungwon Yi and George Kesidis and Chita R. Das}, title = {Stabilized virtual buffer {(SVB)} - an active queue management scheme for Internet quality-of-service}, booktitle = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM} '02, Taipei, Taiwan, 17-21 November, 2002}, pages = {1628--1632}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/GLOCOM.2002.1188473}, doi = {10.1109/GLOCOM.2002.1188473}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DengYKD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuCKD02, author = {Hao Zhu and Guohong Cao and George Kesidis and Chita R. Das}, title = {An adaptive power-conserving service discipline for Bluetooth}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2002, April 28 - May 2, 2002, New York City, NY, {USA}}, pages = {303--307}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICC.2002.996865}, doi = {10.1109/ICC.2002.996865}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZhuCKD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/NinanKD02, author = {Bobby M. Ninan and George Kesidis and Michael Devetsikiotis}, title = {A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks}, booktitle = {10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2002), 11-16 October 2002, Fort Worth, Texas, {USA}}, pages = {257}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/MASCOT.2002.1167085}, doi = {10.1109/MASCOT.2002.1167085}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/NinanKD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/KesidisT01, author = {George Kesidis and Leandros Tassiulas}, editor = {Pascal Lorenz}, title = {General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an {MPLS} Internet Cloud}, booktitle = {Networking - {ICN} 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2}, series = {Lecture Notes in Computer Science}, volume = {2094}, pages = {339--347}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47734-9\_34}, doi = {10.1007/3-540-47734-9\_34}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/KesidisT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/KesidisK00, author = {George Kesidis and Takis Konstantopoulos}, title = {Worst-case performance of a buffer with independent shaped arrival processes}, journal = {{IEEE} Commun. Lett.}, volume = {4}, number = {1}, pages = {26--28}, year = {2000}, url = {https://doi.org/10.1109/4234.823539}, doi = {10.1109/4234.823539}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/KesidisK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/KesidisCT00, author = {George Kesidis and Kaushik Chakraborty and Leandros Tassiulas}, title = {Traffic shaping for a loss system}, journal = {{IEEE} Commun. Lett.}, volume = {4}, number = {12}, pages = {417--419}, year = {2000}, url = {https://doi.org/10.1109/4234.898726}, doi = {10.1109/4234.898726}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/KesidisCT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/KesidisK00, author = {George Kesidis and Takis Konstantopoulos}, title = {Extremal shape-controlled traffic patterns in high-speed networks}, journal = {{IEEE} Trans. Commun.}, volume = {48}, number = {5}, pages = {813--819}, year = {2000}, url = {https://doi.org/10.1109/26.843194}, doi = {10.1109/26.843194}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/KesidisK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/HungMK98, author = {Anthony Hung and Marie{-}Jos{\'{e}} Montpetit and George Kesidis}, title = {{ATM} via satellite: {A} framework and implementation}, journal = {Wirel. Networks}, volume = {4}, number = {2}, pages = {141--153}, year = {1998}, url = {https://doi.org/10.1023/A:1019191619926}, doi = {10.1023/A:1019191619926}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/HungMK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/HungKM98, author = {Anthony Hung and George Kesidis and Nick McKeown}, title = {{ATM} input-buffered switches with the guaranteed-rate property}, booktitle = {Proceedings of the Third {IEEE} Symposium on Computers and Communications {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece}, pages = {331--335}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISCC.1998.702542}, doi = {10.1109/ISCC.1998.702542}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/HungKM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/MontpetitK97, author = {Marie{-}Jos{\'{e}} Montpetit and George Kesidis}, title = {Broadband via Satellite}, journal = {{IEEE} Commun. Mag.}, volume = {35}, number = {7}, pages = {28}, year = {1997}, url = {https://doi.org/10.1109/MCOM.1997.601739}, doi = {10.1109/MCOM.1997.601739}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/MontpetitK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KesidisM97, author = {George Kesidis and Nick McKeown}, title = {Output-Buffer {ATM} Packet Switching for Integrated-Services Communication Networks}, booktitle = {1997 {IEEE} International Conference on Communications: Towards the Knowledge Millennium, {ICC} 1997, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, June 8-12, 1997}, pages = {1684--1688}, publisher = {{IEEE}}, year = {1997}, url = {https://doi.org/10.1109/ICC.1997.595074}, doi = {10.1109/ICC.1997.595074}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KesidisM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/VecianaK96, author = {Gustavo de Veciana and George Kesidis}, title = {Bandwidth allocation for multiple qualities of service using generalized processor sharing}, journal = {{IEEE} Trans. Inf. Theory}, volume = {42}, number = {1}, pages = {268--272}, year = {1996}, url = {https://doi.org/10.1109/18.481801}, doi = {10.1109/18.481801}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/VecianaK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/HungK96, author = {Anthony Hung and George Kesidis}, title = {Bandwidth scheduling for wide-area {ATM} networks using virtual finishing times}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {4}, number = {1}, pages = {49--54}, year = {1996}, url = {https://doi.org/10.1109/90.503761}, doi = {10.1109/90.503761}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/HungK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/VecianaKW95, author = {Gustavo de Veciana and George Kesidis and Jean C. Walrand}, title = {Resource Management in Wide-Area {ATM} Networks Using Effective Bandwiths}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {13}, number = {6}, pages = {1081--1090}, year = {1995}, url = {https://doi.org/10.1109/49.400663}, doi = {10.1109/49.400663}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/VecianaKW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/CourcoubetisKRWW95, author = {Costas Courcoubetis and George Kesidis and Ad Ridder and Jean C. Walrand and Richard R. Weber}, title = {Admission control and routing in {ATM} networks using inferences from measured buffer occupancy}, journal = {{IEEE} Trans. Commun.}, volume = {43}, number = {2/3/4}, pages = {1778--1784}, year = {1995}, url = {https://doi.org/10.1109/26.380228}, doi = {10.1109/26.380228}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/CourcoubetisKRWW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/Kesidis95, author = {George Kesidis}, title = {Analog optimization with Wong's stochastic neural network}, journal = {{IEEE} Trans. Neural Networks}, volume = {6}, number = {1}, pages = {258--260}, year = {1995}, url = {https://doi.org/10.1109/72.363429}, doi = {10.1109/72.363429}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/Kesidis95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/Kesidis94, author = {George Kesidis}, editor = {Vijay K. Madisetti and Erol Gelenbe and Jean C. Walrand}, title = {Modeling to Obtain the Effective Bandwidth of a Traffic Source in an {ATM} Network}, booktitle = {{MASCOTS} '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31 - February 2, 1994, Durham, North Carolina, {USA}}, pages = {318--322}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/MASCOT.1994.284405}, doi = {10.1109/MASCOT.1994.284405}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/Kesidis94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KesidisW93, author = {George Kesidis and Jean C. Walrand}, title = {Relative entropy between Markov transition rate matrices}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {3}, pages = {1056--1057}, year = {1993}, url = {https://doi.org/10.1109/18.256516}, doi = {10.1109/18.256516}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KesidisW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomacs/KesidisW93, author = {George Kesidis and Jean C. Walrand}, title = {Quick Simulation of {ATM} Buffers with On-Off Multiclass Markov Fluid Sources}, journal = {{ACM} Trans. Model. Comput. Simul.}, volume = {3}, number = {3}, pages = {269--276}, year = {1993}, url = {https://doi.org/10.1145/174153.174162}, doi = {10.1145/174153.174162}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomacs/KesidisW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/KesidisWC93, author = {George Kesidis and Jean C. Walrand and Cheng{-}Shang Chang}, title = {Effective bandwidths for multiclass Markov fluids and other {ATM} sources}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {1}, number = {4}, pages = {424--428}, year = {1993}, url = {https://doi.org/10.1109/90.251894}, doi = {10.1109/90.251894}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/KesidisWC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/KesidisW93, author = {George Kesidis and Jean C. Walrand}, editor = {Herbert D. Schwetman and Jean C. Walrand and Kallol Kumar Bagchi and Doug DeGroot}, title = {A Review of Quick Simulation Methods for Queues}, booktitle = {{MASCOTS} '93, Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 17-20, 1993, La Jolla, San Diego, CA, {USA}}, pages = {17--21}, publisher = {The Society for Computer Simulation}, year = {1993}, timestamp = {Mon, 29 Apr 2002 14:15:18 +0200}, biburl = {https://dblp.org/rec/conf/mascots/KesidisW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WalrandK91, author = {Jean C. Walrand and George Kesidis}, title = {Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {37}, number = {5}, pages = {1493}, year = {1991}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WalrandK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.