The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George Kesidis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ihab Hamadeh, George Kesidis
    Toward a Framework for Forensic Analysis of Scanning Worms. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:282-297 [Conf]
  2. George Kesidis, Nick McKeown
    Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICC (3), 1997, pp:1684-1688 [Conf]
  3. George Kesidis, Leandros Tassiulas
    General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:339-347 [Conf]
  4. Paul Barom Jeon, George Kesidis
    GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN, 2007, pp:10- [Conf]
  5. Youngmi Jin, George Kesidis
    Nash equilibria of a generic networking game with applications to circuit-switched networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2003, pp:- [Conf]
  6. George Kesidis
    Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1994, pp:318-322 [Conf]
  7. George Kesidis, Jean C. Walrand
    A Review of Quick Simulation Methods for Queues. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1993, pp:17-21 [Conf]
  8. B. M. Ninan, George Kesidis, Michael Devetsikiotis
    A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2002, pp:257-0 [Conf]
  9. Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty
    A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:191-198 [Conf]
  10. Paul Barom Jeon, George Kesidis
    Pheromone-aided robust multipath and multipriority routing in wireless MANETs. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2005, pp:106-113 [Conf]
  11. George Kesidis, Ihab Hamadeh, Soranun Jiwasurat
    Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. [Citation Graph (0, 0)][DBLP]
    QoS-IP, 2005, pp:101-109 [Conf]
  12. Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das
    Memory-efficient content filtering hardware for high-speed intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:264-269 [Conf]
  13. L. Li, P. Liu, George Kesidis
    Visual toolkit for network security experiment specification and data analysis. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:7-14 [Conf]
  14. Glenn Carl, Shashi Phoha, George Kesidis, Bharat B. Madan
    Path preserving scale down for validation of internet inter-domain routing protocols. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2006, pp:2210-2218 [Conf]
  15. Youngmi Jin, George Kesidis
    TCP windowcontrol in a priced network. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2004, pp:596-600 [Conf]
  16. Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das
    RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2004, pp:369-374 [Conf]
  17. Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson
    Preliminary results using scale-down to explore worm dynamics. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:65-72 [Conf]
  18. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  19. Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das
    An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:9, pp:828-839 [Journal]
  20. Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai
    Denial-of-Service Attack-Detection Techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2006, v:10, n:1, pp:82-89 [Journal]
  21. Gustavo de Veciana, George Kesidis, Jean C. Walrand
    Resource Management in Wide-Area ATM Networks Using Effective Bandwiths. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1995, v:13, n:6, pp:1081-1090 [Journal]
  22. Soranun Jiwasurat, George Kesidis
    A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2004, v:25, n:3-4, pp:173-191 [Journal]
  23. George Kesidis, Jean C. Walrand
    Relative entropy between Markov transition rate matrices. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1056-0 [Journal]
  24. Gustavo de Veciana, George Kesidis
    Bandwidth allocation for multiple qualities of service using generalized processor sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:268-272 [Journal]
  25. Jean C. Walrand, George Kesidis
    Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:5, pp:1493-0 [Journal]
  26. Rajesh N. Rao, George Kesidis
    Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2004, v:3, n:3, pp:225-232 [Journal]
  27. George Kesidis, Jean C. Walrand
    Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Model. Comput. Simul., 1993, v:3, n:3, pp:269-276 [Journal]
  28. Anthony Hung, George Kesidis
    Bandwidth scheduling for wide-area ATM networks using virtual finishing times. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1996, v:4, n:1, pp:49-54 [Journal]
  29. George Kesidis, Jean C. Walrand, Cheng-Shang Chang
    Effective bandwidths for multiclass Markov fluids and other ATM sources. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1993, v:1, n:4, pp:424-428 [Journal]
  30. Youngmi Jin, George Kesidis
    Dynamics of usage-priced communication networks: the case of a single bottleneck resource. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:5, pp:1041-1053 [Journal]
  31. Anthony Hung, Marie-José Montpetit, George Kesidis
    ATM via satellite: A framework and implementation. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1998, v:4, n:2, pp:141-153 [Journal]
  32. G. Kesidis, Y. Jin, B. Mortazavi, T. Konstopoulos
    An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  33. Rajesh N. Rao, George Kesidis
    On the Relation Between Capacity and Number of Sinks in an Sensor Network. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  34. Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. [Citation Graph (, )][DBLP]


  35. Distributed Power Control in Multihop Ad Hoc CDMA Networks. [Citation Graph (, )][DBLP]


  36. Exploring Anti-Spam Models in Large Scale VoIP Systems. [Citation Graph (, )][DBLP]


  37. Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. [Citation Graph (, )][DBLP]


  38. On flat-rate and usage-based pricing for tiered commodity internet services. [Citation Graph (, )][DBLP]


  39. Threshold Smart Walk for the Containment of Local Worm Outbreak. [Citation Graph (, )][DBLP]


  40. A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks. [Citation Graph (, )][DBLP]


  41. Congestion control alternatives for residential broadband access. [Citation Graph (, )][DBLP]


  42. A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification. [Citation Graph (, )][DBLP]


  43. A Study of Non-neutral Networks with Usage-Based Prices. [Citation Graph (, )][DBLP]


  44. Wireless mesh networks based on CDMA. [Citation Graph (, )][DBLP]


  45. Worm virulence estimation for the containment of local worm outbreak. [Citation Graph (, )][DBLP]


  46. A quantum computer network [Citation Graph (, )][DBLP]


  47. Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior [Citation Graph (, )][DBLP]


  48. A Study of Non-Neutral Networks with Usage-based Prices [Citation Graph (, )][DBLP]


  49. Application Neutrality and a Paradox of Side Payments [Citation Graph (, )][DBLP]


Search in 0.040secs, Finished in 0.042secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002