|
Search the dblp DataBase
Riccardo Bettati:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
On Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:188-195 [Conf]
- Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:84-91 [Conf]
- Hamesh Chawla, Geoff Dillon, Riccardo Bettati
HYDRANET : Network Support for Scaling of Large-Scale Services. [Citation Graph (0, 0)][DBLP] ICCCN, 1998, pp:574-583 [Conf]
- Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao
SAS: A Scalar Anonymous Communication System. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:452-461 [Conf]
- Riccardo Bettati, Amit Gupta
Dynamic Resource Allocation Migration for Multiparty Real-Time Communications. [Citation Graph (0, 0)][DBLP] ICDCS, 1996, pp:646-656 [Conf]
- Riccardo Bettati, Jane W.-S. Liu
End-to-End Scheduling to Meet Deadlines in Distributed Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 1992, pp:452-459 [Conf]
- Byung-Kyu Choi, Riccardo Bettati
Endpoint Admission Control: Network Based Approach. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:227-235 [Conf]
- Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao
Scalable QoS Guaranteed Communication Services for Real-Time Applications. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:180-187 [Conf]
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP] ICDCS, 2003, pp:340-0 [Conf]
- Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao
On Flow Marking Attacks in Wireless Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:493-503 [Conf]
- Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
An Optimal Strategy for Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP] ICDCS, 2002, pp:257-0 [Conf]
- Gurudatt Shenoy, Suresh K. Satapati, Riccardo Bettati
HYDRANET-FT: Network Support for Dependable Services. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:699-706 [Conf]
- Sharad Sundaresan, Riccardo Bettati
Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 1997, pp:0-0 [Conf]
- Shengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao
Providing Statistical Delay Guarantees in Wireless Networks. [Citation Graph (0, 0)][DBLP] ICDCS, 2004, pp:48-55 [Conf]
- Ye Zhu, Riccardo Bettati
Anonymity vs. Information Leakage in Anonymity Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:514-524 [Conf]
- Bryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. [Citation Graph (0, 0)][DBLP] ICPADS (1), 2005, pp:57-63 [Conf]
- Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. [Citation Graph (0, 0)][DBLP] ICPP, 2003, pp:483-492 [Conf]
- Chengzhi Li, Riccardo Bettati, Wei Zhao
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. [Citation Graph (0, 0)][DBLP] ICPP, 1998, pp:432-440 [Conf]
- Chengzhi Li, Riccardo Bettati, Wei Zhao
New Delay Analysis in High Speed Networks. [Citation Graph (0, 0)][DBLP] ICPP, 1999, pp:454-461 [Conf]
- Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao
Utilization-Based Admission Control for Real-Time Applications. [Citation Graph (0, 0)][DBLP] ICPP, 2000, pp:251-0 [Conf]
- Riccardo Bettati, Wei Zhao, D. Teodor
Real-time Intrusion Detection and Suppression in ATM Networks. [Citation Graph (0, 0)][DBLP] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:111-118 [Conf]
- Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati
A Security Architecture for Tenet Scheme 2. [Citation Graph (0, 0)][DBLP] IDMS, 1996, pp:163-174 [Conf]
- Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:266-281 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2001, pp:669-678 [Conf]
- Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP] IPDPS, 2003, pp:122- [Conf]
- Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP] ISORC, 2004, pp:269-276 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
A Study of Providing Statistical QoS in a Differentiated Sevices Network. [Citation Graph (0, 0)][DBLP] NCA, 2003, pp:297-304 [Conf]
- Ye Zhu, Xinwen Fu, Riccardo Bettati
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:215-218 [Conf]
- SooHyun Cho, Riccardo Bettati
Aggregated Aggressiveness Control on Groups of TCP Flows. [Citation Graph (0, 0)][DBLP] NETWORKING, 2005, pp:586-597 [Conf]
- Riccardo Bettati, Domenico Ferrari, Amit Gupta, W. Heffner, Wingwai Howe, Mark Moran, Quyen Nguyen, Rajendra Yavatkar
Connection Establishment for Multi-Party Real-Time Communication. [Citation Graph (0, 0)][DBLP] NOSSDAV, 1995, pp:240-250 [Conf]
- Sangig Rho, Byung-Kyu Choi, Riccardo Bettati
Design Real-Time Java Remote Method Invocation: A Server-Centric Approach. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2005, pp:269-276 [Conf]
- Ye Zhu, Riccardo Bettati
Unmixing Mix Traffic. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2005, pp:110-127 [Conf]
- Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
On Flow Correlation Attacks and Countermeasures in Mix Networks. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2004, pp:207-225 [Conf]
- Shengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao
Real-Time Component-Based Systems. [Citation Graph (0, 0)][DBLP] IEEE Real-Time and Embedded Technology and Applications Symposium, 2005, pp:428-437 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] IEEE Real Time Technology and Applications Symposium, 2001, pp:127-129 [Conf]
- Byung-Kyu Choi, Riccardo Bettati
Efficient resource management for hard real-time communication over differentiated services architectures. [Citation Graph (0, 0)][DBLP] RTCSA, 2000, pp:119-126 [Conf]
- Byung-Kyu Choi, Riccardo Bettati
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment. [Citation Graph (0, 0)][DBLP] RTCSA, 1999, pp:388-0 [Conf]
- B. Devalla, Riccardo Bettati, Wei Zhao
Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . [Citation Graph (0, 0)][DBLP] RTCSA, 1999, pp:340-347 [Conf]
- Yves Meylan, Aneema Bajpai, Riccardo Bettati
ProtEx: a toolkit for the analysis of distributed real-time systems. [Citation Graph (0, 0)][DBLP] RTCSA, 2000, pp:183-0 [Conf]
- Chengzhi Li, Riccardo Bettati, Wei Zhao
Static priority scheduling for ATM networks. [Citation Graph (0, 0)][DBLP] IEEE Real-Time Systems Symposium, 1997, pp:264-273 [Conf]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. [Citation Graph (0, 0)][DBLP] IEEE Real-Time Systems Symposium, 2001, pp:289-298 [Conf]
- Shengquan Wang, Riccardo Bettati
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals. [Citation Graph (0, 0)][DBLP] RTSS, 2006, pp:323-334 [Conf]
- Riccardo Bettati, Jane W.-S. Liu
Algorithms for end-to-end scheduling to meet deadlines. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:62-67 [Conf]
- SooHyun Cho, Riccardo Bettati
Improving quality of service of TCP flows in strictly prioritized network. [Citation Graph (0, 0)][DBLP] ACST, 2006, pp:240-245 [Conf]
- Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li
Utilization-Based Admission Control for Scalable Real-Time Communication. [Citation Graph (0, 0)][DBLP] Real-Time Systems, 2003, v:24, n:2, pp:171-202 [Journal]
- Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
Providing absolute differentiated services for real-time applications in static-priority scheduling networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2004, v:12, n:2, pp:326-339 [Journal]
- Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
- Ye Zhu, Riccardo Bettati
Compromising Location Privacy inWireless Networks Using Sensors with Limited Information. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:24- [Conf]
- SooHyun Cho, Riccardo Bettati
Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
- Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao
A quantitative analysis of anonymous communications. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Reliability, 2004, v:53, n:1, pp:103-115 [Journal]
On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]
Reactive Speed Control in Temperature-Constrained Real-Time Systems. [Citation Graph (, )][DBLP]
Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems. [Citation Graph (, )][DBLP]
Privacy of encrypted voice-over-IP. [Citation Graph (, )][DBLP]
Use of competition detection in TCP for simple topology networks. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.027secs
|