Search the dblp DataBase
George Kesidis :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ihab Hamadeh , George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. [Citation Graph (0, 0)][DBLP ] ETRICS, 2006, pp:282-297 [Conf ] George Kesidis , Nick McKeown Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks. [Citation Graph (0, 0)][DBLP ] ICC (3), 1997, pp:1684-1688 [Conf ] George Kesidis , Leandros Tassiulas General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud. [Citation Graph (0, 0)][DBLP ] ICN (2), 2001, pp:339-347 [Conf ] Paul Barom Jeon , George Kesidis GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICN, 2007, pp:10- [Conf ] Youngmi Jin , George Kesidis Nash equilibria of a generic networking game with applications to circuit-switched networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] George Kesidis Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1994, pp:318-322 [Conf ] George Kesidis , Jean C. Walrand A Review of Quick Simulation Methods for Queues. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1993, pp:17-21 [Conf ] B. M. Ninan , George Kesidis , Michael Devetsikiotis A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2002, pp:257-0 [Conf ] Ihab Hamadeh , Jason Hart , George Kesidis , Venkat Pothamsetty A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:191-198 [Conf ] Paul Barom Jeon , George Kesidis Pheromone-aided robust multipath and multipriority routing in wireless MANETs. [Citation Graph (0, 0)][DBLP ] PE-WASUN, 2005, pp:106-113 [Conf ] George Kesidis , Ihab Hamadeh , Soranun Jiwasurat Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. [Citation Graph (0, 0)][DBLP ] QoS-IP, 2005, pp:101-109 [Conf ] Sungwon Yi , Byoung-Koo Kim , Jintae Oh , Jongsoo Jang , George Kesidis , Chita R. Das Memory-efficient content filtering hardware for high-speed intrusion detection systems. [Citation Graph (0, 0)][DBLP ] SAC, 2007, pp:264-269 [Conf ] L. Li , P. Liu , George Kesidis Visual toolkit for network security experiment specification and data analysis. [Citation Graph (0, 0)][DBLP ] VizSEC, 2006, pp:7-14 [Conf ] Glenn Carl , Shashi Phoha , George Kesidis , Bharat B. Madan Path preserving scale down for validation of internet inter-domain routing protocols. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2006, pp:2210-2218 [Conf ] Youngmi Jin , George Kesidis TCP windowcontrol in a priced network. [Citation Graph (0, 0)][DBLP ] Communications, Internet, and Information Technology, 2004, pp:596-600 [Conf ] Xidong Deng , Sungwon Yi , George Kesidis , Chita R. Das RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Communications, Internet, and Information Technology, 2004, pp:369-374 [Conf ] Nicholas Weaver , Ihab Hamadeh , George Kesidis , Vern Paxson Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:65-72 [Conf ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Hao Zhu , Guohong Cao , George Kesidis , Chita R. Das An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:9, pp:828-839 [Journal ] Glenn Carl , George Kesidis , Richard R. Brooks , Suresh Rai Denial-of-Service Attack-Detection Techniques. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2006, v:10, n:1, pp:82-89 [Journal ] Gustavo de Veciana , George Kesidis , Jean C. Walrand Resource Management in Wide-Area ATM Networks Using Effective Bandwiths. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1995, v:13, n:6, pp:1081-1090 [Journal ] Soranun Jiwasurat , George Kesidis A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2004, v:25, n:3-4, pp:173-191 [Journal ] George Kesidis , Jean C. Walrand Relative entropy between Markov transition rate matrices. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1056-0 [Journal ] Gustavo de Veciana , George Kesidis Bandwidth allocation for multiple qualities of service using generalized processor sharing. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:268-272 [Journal ] Jean C. Walrand , George Kesidis Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1991, v:37, n:5, pp:1493-0 [Journal ] Rajesh N. Rao , George Kesidis Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2004, v:3, n:3, pp:225-232 [Journal ] George Kesidis , Jean C. Walrand Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources. [Citation Graph (0, 0)][DBLP ] ACM Trans. Model. Comput. Simul., 1993, v:3, n:3, pp:269-276 [Journal ] Anthony Hung , George Kesidis Bandwidth scheduling for wide-area ATM networks using virtual finishing times. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1996, v:4, n:1, pp:49-54 [Journal ] George Kesidis , Jean C. Walrand , Cheng-Shang Chang Effective bandwidths for multiclass Markov fluids and other ATM sources. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1993, v:1, n:4, pp:424-428 [Journal ] Youngmi Jin , George Kesidis Dynamics of usage-priced communication networks: the case of a single bottleneck resource. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2005, v:13, n:5, pp:1041-1053 [Journal ] Anthony Hung , Marie-José Montpetit , George Kesidis ATM via satellite: A framework and implementation. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 1998, v:4, n:2, pp:141-153 [Journal ] G. Kesidis , Y. Jin , B. Mortazavi , T. Konstopoulos An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Rajesh N. Rao , George Kesidis On the Relation Between Capacity and Number of Sinks in an Sensor Network. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. [Citation Graph (, )][DBLP ] Distributed Power Control in Multihop Ad Hoc CDMA Networks. [Citation Graph (, )][DBLP ] Exploring Anti-Spam Models in Large Scale VoIP Systems. [Citation Graph (, )][DBLP ] Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. [Citation Graph (, )][DBLP ] On flat-rate and usage-based pricing for tiered commodity internet services. [Citation Graph (, )][DBLP ] Threshold Smart Walk for the Containment of Local Worm Outbreak. [Citation Graph (, )][DBLP ] A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks. [Citation Graph (, )][DBLP ] Congestion control alternatives for residential broadband access. [Citation Graph (, )][DBLP ] A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification. [Citation Graph (, )][DBLP ] A Study of Non-neutral Networks with Usage-Based Prices. [Citation Graph (, )][DBLP ] Wireless mesh networks based on CDMA. [Citation Graph (, )][DBLP ] Worm virulence estimation for the containment of local worm outbreak. [Citation Graph (, )][DBLP ] A quantum computer network [Citation Graph (, )][DBLP ] Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior [Citation Graph (, )][DBLP ] A Study of Non-Neutral Networks with Usage-based Prices [Citation Graph (, )][DBLP ] Application Neutrality and a Paradox of Side Payments [Citation Graph (, )][DBLP ] Search in 0.040secs, Finished in 0.042secs