Search the dblp DataBase
John S. Baras :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Konstantinos Stathatos , Nick Roussopoulos , John S. Baras Adaptive Data Broadcast in Hybrid Networks. [Citation Graph (1, 17)][DBLP ] VLDB, 1997, pp:326-335 [Conf ] Jayant R. Haritsa , Michael O. Ball , Nick Roussopoulos , Anindya Datta , John S. Baras MANDATE: MAnaging Networks Using DAtabase TEchnology. [Citation Graph (1, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:9, pp:1360-1372 [Journal ] Alvaro A. Cárdenas , John S. Baras B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets. [Citation Graph (0, 0)][DBLP ] AAAI, 2006, pp:- [Conf ] Do J. Byun , John S. Baras A New Rate-based Active Queue Management: Adaptive Virtual Queue RED. [Citation Graph (0, 0)][DBLP ] CNSR, 2007, pp:389-396 [Conf ] Radha Poovendran , John S. Baras An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:624-638 [Conf ] Vijay G. Bharadwaj , John S. Baras A Framework for Automated Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:216-221 [Conf ] Himanshu Khurana , Serban I. Gavrila , Rakeshbabu Bobba , Radostina K. Koleva , Anuja Sonalker , Emilian Dinu , Virgil D. Gligor , John S. Baras Integrated Security Services for Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:38-40 [Conf ] Xiaobo Tan , John S. Baras Optimal Control of Hysteresis in Smart Actuators: A Viscosity Solutions Approach. [Citation Graph (0, 0)][DBLP ] HSCC, 2002, pp:451-464 [Conf ] Yimin Jiang , Feng-Wen Sun , John S. Baras On the True Cramer-Rao Lower Bound for the DA Joint Estimation of Carrier Phase and Timing Offsets. [Citation Graph (0, 0)][DBLP ] ICC (1), 2000, pp:331-335 [Conf ] Tao Jiang , John S. Baras Ant-Based Adaptive Trust Evidence Distribution in MANET. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2004, pp:588-593 [Conf ] Konstantinos Stathatos , Stephen Kelley , Nick Roussopoulos , John S. Baras Consistency and Performance of Concurrent Interactive Database Applications. [Citation Graph (0, 11)][DBLP ] ICDE, 1996, pp:602-609 [Conf ] Nikolaos Sidiropoulos , John S. Baras , Carlos Alberto Berenstein On morphological openings and closings of signals in shaped noise. [Citation Graph (0, 0)][DBLP ] ICIP, 1995, pp:518-521 [Conf ] Dinesh Dharmaraju , Ayan Roy Chowdhury , Pedram Hovareshti , John S. Baras INORA - A Unified Signaling and Routing Mechanism for QoS Support in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2002, pp:86-93 [Conf ] Mingyan Liu , Manish Karir , John S. Baras Caching and Multicasting in DBS Systems. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:56-0 [Conf ] S. Varma , John S. Baras Tool Wear Estimation from Acoustic Emissions: A Model Incorporating Wear-Rate. [Citation Graph (0, 0)][DBLP ] ICPR (1), 2002, pp:492-495 [Conf ] Jayant R. Haritsa , Michael O. Ball , Nick Roussopoulos , John S. Baras , Anindya Datta Design f the MANDATE MIB. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1993, pp:85-96 [Conf ] John S. Baras , Arthur J. Dorsey Adaptive Control of two Competing Queues. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1983, pp:427-435 [Conf ] Nelson Liu , John S. Baras Statistical Modeling and Performance Analysis of Multi-Scaling Traffic. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Radha Poovendran , Peter J. Keleher , John S. Baras A Decision-Process Analysis of Implicit Coscheduling. [Citation Graph (0, 0)][DBLP ] IPDPS, 2000, pp:115-120 [Conf ] John S. Baras , Maben Rabi Intrusion Detection with Support Vector Machines and Generative Models. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:32-47 [Conf ] Dana S. Nau , Michael Ball , John S. Baras , Abdur Chowdhury , Edward Lin , Jeff Meyer , Ravi Rajamani , John Splain , Vinai Trichur Integrated Product and Process Design of Microwave Modules using AI Planning and Integer Programming. [Citation Graph (0, 0)][DBLP ] Knowledge Intensive CAD, 2000, pp:147-158 [Conf ] Hongjun Li , John S. Baras A Framework for Supporting Intelligent Fault and Performance Management for Communication Networks. [Citation Graph (0, 0)][DBLP ] MMNS, 2001, pp:227-240 [Conf ] John S. Baras , Anthony LaVigna Convergence of a Neural Network Classifier. [Citation Graph (0, 0)][DBLP ] NIPS, 1990, pp:839-845 [Conf ] Vijay G. Bharadwaj , John S. Baras Towards Automated Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:111-119 [Conf ] Aniruddha Bhalekar , John S. Baras Cumulative Caching for Reduced User-Perceived Latency for WWW Transfers on Networks with Satellite Links. [Citation Graph (0, 0)][DBLP ] SAPIR, 2004, pp:179-186 [Conf ] Alvaro A. Cárdenas , Svetlana Radosavac , John S. Baras Detection and prevention of MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:17-22 [Conf ] Svetlana Radosavac , John S. Baras , George V. Moustakides Impact of optimal MAC layer attacks on the network layer. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:135-146 [Conf ] Shahan Yang , John S. Baras Modeling vulnerabilities of ad hoc routing protocols. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:12-20 [Conf ] Ayan Roy Chowdhury , John S. Baras Key Management for Secure Multicast in Hybrid Satellite Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:533-548 [Conf ] Alvaro A. Cárdenas , John S. Baras , Karl Seamon A Framework for the Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:63-77 [Conf ] Laurent Eschenauer , Virgil D. Gligor , John S. Baras On Trust Establishment in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:47-66 [Conf ] Virgil D. Gligor , Himanshu Khurana , Radostina K. Koleva , Vijay G. Bharadwaj , John S. Baras On the Negotiation of Access Control Policies. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:188-201 [Conf ] George Theodorakopoulos , John S. Baras Trust evaluation in ad-hoc networks. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2004, pp:1-10 [Conf ] John S. Baras Simulation of large networks: modeling and simulation of telecommunication networks for control and management. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2003, pp:431-440 [Conf ] Jonathan McGee , Manish Karir , John S. Baras Implementing Ad Hoc to Terrestrial Network Gateways. [Citation Graph (0, 0)][DBLP ] WWIC, 2004, pp:132-142 [Conf ] Roshni Srinivasan , John S. Baras Analyzing the Performance of Data Users in Packet Switched Wireless Systems with Prioritized Voice Traffic. [Citation Graph (0, 0)][DBLP ] WWIC, 2004, pp:236-247 [Conf ] Dana S. Nau , Michael Ball , John S. Baras , Abdur Chowdhury , Edward Lin , Jeff Meyer , Ravi Rajamani , John Splain , Vinai Trichur Generating and evaluating designs and plans for microwave modules. [Citation Graph (0, 0)][DBLP ] AI EDAM, 2000, v:14, n:4, pp:289-304 [Journal ] Archan Misra , Teunis J. Ott , John S. Baras Predicting bottleneck bandwidth sharing by generalized TCP flows. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:40, n:4, pp:557-576 [Journal ] Alex T. Nguyen , Michael H. Hadjitheodosiou , John S. Baras Broadband communication support for earth observation from the International Space Station. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:3, pp:375-388 [Journal ] John S. Baras , Demetrios G. Lainiotis Chandrasekhar algorithms for linear time varying distributed systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1979, v:17, n:2, pp:153-167 [Journal ] Svetlana Radosavac , Alvaro A. Cárdenas , John S. Baras , George V. Moustakides Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:103-128 [Journal ] Nicholas D. Sidiropoulos , John S. Baras , Carlos Alberto Berenstein Optimal filtering of digital binary images corrupted by union/intersection noise. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1994, v:3, n:4, pp:382-403 [Journal ] Nikolaos Sidiropoulos , John S. Baras , Carlos Alberto Berenstein Further results on MAP optimality and strong consistency of certain classes of morphological filters. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1996, v:5, n:5, pp:762-764 [Journal ] John S. Baras , Subhrakanti Dey Combined compression and classification with learning vector quantization. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:6, pp:1911-1920 [Journal ] Yimin Jiang , Feng-Wen Sun , John S. Baras On the performance limits of data-aided synchronization. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:191-203 [Journal ] Radha Poovendran , John S. Baras An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:2824-2834 [Journal ] Feng-Wen Sun , Yimin Jiang , John S. Baras On the convergence of the inverses of Toeplitz matrices and its applications. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:180-190 [Journal ] Mingyan Liu , John S. Baras Fixed point approximation for multirate multihop loss networks with state-dependent routing. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:361-374 [Journal ] Alvaro A. Cárdenas , Svetlana Radosavac , John S. Baras Performance Comparison of Detection Schemes for MAC Layer Misbehavior. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:1496-1504 [Conf ] George Theodorakopoulos , John S. Baras Malicious Users in Unstructured Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:884-891 [Conf ] Tao Jiang , John S. Baras Trust Evaluation in Anarchy: A Case Study on Autonomous Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Giovanni Di Crescenzo , Maria Striki , John S. Baras Modeling key agreement in multi-hop ad hoc networks. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:39-44 [Conf ] Alvaro A. Cárdenas , George V. Moustakides , John S. Baras Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models. [Citation Graph (0, 0)][DBLP ] CISS, 2007, pp:911-916 [Conf ] George Theodorakopoulos , John S. Baras A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Hui Zeng , Michael H. Hadjitheodosiou , John S. Baras Two-Level Dynamic Bandwidth Allocation for a Space-to-Ground Relay Network. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Convergence results for ant routing algorithms viastochastic approximation. [Citation Graph (, )][DBLP ] Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks. [Citation Graph (, )][DBLP ] Component Based Performance Modelling of Wireless Routing Protocols. [Citation Graph (, )][DBLP ] On Optimal Watermarking Schemes in Uncertain Gaussian Channels. [Citation Graph (, )][DBLP ] Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications. [Citation Graph (, )][DBLP ] New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks. [Citation Graph (, )][DBLP ] Multi-hop mobile wireless network design: implicit cross-layer loss models and performance sensitivities. [Citation Graph (, )][DBLP ] Multicarrier authentication at the physical layer. [Citation Graph (, )][DBLP ] A framework for MAC protocol misbehavior detection in wireless networks. [Citation Graph (, )][DBLP ] Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks. [Citation Graph (, )][DBLP ] Aerial Platform Placement Algorithm to Satisfy Connectivity and Capacity Constraints in Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP ] Trust Credential Distribution in Autonomic Networks. [Citation Graph (, )][DBLP ] A Lightweight Certificate-Based Source Authentication Protocol for Group Communications in Hybrid Wireless/Satellite Networks. [Citation Graph (, )][DBLP ] BGP-Inspect - Extracting Information from Raw BGP Data. [Citation Graph (, )][DBLP ] Clustering Characteristics of Millimeter Wave Indoor Channels. [Citation Graph (, )][DBLP ] Loss network models and multiple metric performance sensitivity analysis for mobile wireless multi-hop networks. [Citation Graph (, )][DBLP ] Effects of topology in networked systems: Stochastic methods and small worlds. [Citation Graph (, )][DBLP ] Almost sure convergence to consensus in Markovian random graphs. [Citation Graph (, )][DBLP ] Average consensus over small world networks: A probabilistic framework. [Citation Graph (, )][DBLP ] Achieving symmetric Pareto Nash equilibria using biased replicator dynamics. [Citation Graph (, )][DBLP ] Efficient and robust communication topologies for distributed decision making in networked systems. [Citation Graph (, )][DBLP ] Context-dependent multi-class classification with unknown observation and class distributions with applications to bioinformatics. [Citation Graph (, )][DBLP ] Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.009secs