The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Riccardo Bettati: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:188-195 [Conf]
  2. Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
    Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:84-91 [Conf]
  3. Hamesh Chawla, Geoff Dillon, Riccardo Bettati
    HYDRANET : Network Support for Scaling of Large-Scale Services. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:574-583 [Conf]
  4. Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao
    SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:452-461 [Conf]
  5. Riccardo Bettati, Amit Gupta
    Dynamic Resource Allocation Migration for Multiparty Real-Time Communications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:646-656 [Conf]
  6. Riccardo Bettati, Jane W.-S. Liu
    End-to-End Scheduling to Meet Deadlines in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:452-459 [Conf]
  7. Byung-Kyu Choi, Riccardo Bettati
    Endpoint Admission Control: Network Based Approach. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:227-235 [Conf]
  8. Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
    Scalable QoS Guaranteed Communication Services for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:180-187 [Conf]
  9. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:340-0 [Conf]
  10. Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Marking Attacks in Wireless Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:493-503 [Conf]
  11. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:257-0 [Conf]
  12. Gurudatt Shenoy, Suresh K. Satapati, Riccardo Bettati
    HYDRANET-FT: Network Support for Dependable Services. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:699-706 [Conf]
  13. Sharad Sundaresan, Riccardo Bettati
    Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  14. Shengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao
    Providing Statistical Delay Guarantees in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:48-55 [Conf]
  15. Ye Zhu, Riccardo Bettati
    Anonymity vs. Information Leakage in Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2005, pp:514-524 [Conf]
  16. Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati
    Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:57-63 [Conf]
  17. Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
    Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ICPP, 2003, pp:483-492 [Conf]
  18. Chengzhi Li, Riccardo Bettati, Wei Zhao
    Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. [Citation Graph (0, 0)][DBLP]
    ICPP, 1998, pp:432-440 [Conf]
  19. Chengzhi Li, Riccardo Bettati, Wei Zhao
    New Delay Analysis in High Speed Networks. [Citation Graph (0, 0)][DBLP]
    ICPP, 1999, pp:454-461 [Conf]
  20. Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
    Utilization-Based Admission Control for Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    ICPP, 2000, pp:251-0 [Conf]
  21. Riccardo Bettati, Wei Zhao, D. Teodor
    Real-time Intrusion Detection and Suppression in ATM Networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:111-118 [Conf]
  22. Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati
    A Security Architecture for Tenet Scheme 2. [Citation Graph (0, 0)][DBLP]
    IDMS, 1996, pp:163-174 [Conf]
  23. Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
    Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:266-281 [Conf]
  24. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:669-678 [Conf]
  25. Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
    Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:122- [Conf]
  26. Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
    Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ISORC, 2004, pp:269-276 [Conf]
  27. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    A Study of Providing Statistical QoS in a Differentiated Sevices Network. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:297-304 [Conf]
  28. Ye Zhu, Xinwen Fu, Riccardo Bettati
    On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:215-218 [Conf]
  29. SooHyun Cho, Riccardo Bettati
    Aggregated Aggressiveness Control on Groups of TCP Flows. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:586-597 [Conf]
  30. Riccardo Bettati, Domenico Ferrari, Amit Gupta, W. Heffner, Wingwai Howe, Mark Moran, Quyen Nguyen, Rajendra Yavatkar
    Connection Establishment for Multi-Party Real-Time Communication. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 1995, pp:240-250 [Conf]
  31. Sangig Rho, Byung-Kyu Choi, Riccardo Bettati
    Design Real-Time Java Remote Method Invocation: A Server-Centric Approach. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:269-276 [Conf]
  32. Ye Zhu, Riccardo Bettati
    Unmixing Mix Traffic. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:110-127 [Conf]
  33. Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
    On Flow Correlation Attacks and Countermeasures in Mix Networks. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:207-225 [Conf]
  34. Shengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao
    Real-Time Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time and Embedded Technology and Applications Symposium, 2005, pp:428-437 [Conf]
  35. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real Time Technology and Applications Symposium, 2001, pp:127-129 [Conf]
  36. Byung-Kyu Choi, Riccardo Bettati
    Efficient resource management for hard real-time communication over differentiated services architectures. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2000, pp:119-126 [Conf]
  37. Byung-Kyu Choi, Riccardo Bettati
    Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment. [Citation Graph (0, 0)][DBLP]
    RTCSA, 1999, pp:388-0 [Conf]
  38. B. Devalla, Riccardo Bettati, Wei Zhao
    Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . [Citation Graph (0, 0)][DBLP]
    RTCSA, 1999, pp:340-347 [Conf]
  39. Yves Meylan, Aneema Bajpai, Riccardo Bettati
    ProtEx: a toolkit for the analysis of distributed real-time systems. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2000, pp:183-0 [Conf]
  40. Chengzhi Li, Riccardo Bettati, Wei Zhao
    Static priority scheduling for ATM networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 1997, pp:264-273 [Conf]
  41. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time Systems Symposium, 2001, pp:289-298 [Conf]
  42. Shengquan Wang, Riccardo Bettati
    Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals. [Citation Graph (0, 0)][DBLP]
    RTSS, 2006, pp:323-334 [Conf]
  43. Riccardo Bettati, Jane W.-S. Liu
    Algorithms for end-to-end scheduling to meet deadlines. [Citation Graph (0, 0)][DBLP]
    SPDP, 1990, pp:62-67 [Conf]
  44. SooHyun Cho, Riccardo Bettati
    Improving quality of service of TCP flows in strictly prioritized network. [Citation Graph (0, 0)][DBLP]
    ACST, 2006, pp:240-245 [Conf]
  45. Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li
    Utilization-Based Admission Control for Scalable Real-Time Communication. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2003, v:24, n:2, pp:171-202 [Journal]
  46. Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
    Providing absolute differentiated services for real-time applications in static-priority scheduling networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:326-339 [Journal]
  47. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  48. Ye Zhu, Riccardo Bettati
    Compromising Location Privacy inWireless Networks Using Sensors with Limited Information. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:24- [Conf]
  49. SooHyun Cho, Riccardo Bettati
    Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  50. Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
    A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal]

  51. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]


  52. Reactive Speed Control in Temperature-Constrained Real-Time Systems. [Citation Graph (, )][DBLP]


  53. Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems. [Citation Graph (, )][DBLP]


  54. Privacy of encrypted voice-over-IP. [Citation Graph (, )][DBLP]


  55. Use of competition detection in TCP for simple topology networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.454secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002