Year |
Citation |
Score |
2019 |
Miller D, Wang Y, Kesidis G. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Computation. 1-47. PMID 31260390 DOI: 10.1162/Neco_A_01209 |
0.313 |
|
2019 |
Leivadeas A, Kesidis G, Ibnkahla M, Lambadaris I. VNF Placement Optimization at the Edge and Cloud † Future Internet. 11: 69. DOI: 10.3390/Fi11030069 |
0.462 |
|
2018 |
Wang C, Urgaonkar B, Kesidis G, Gupta A, Chen LY, Birke R. Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability Acm Transactions On Autonomous and Adaptive Systems. 13: 1-25. DOI: 10.1145/3139291 |
0.305 |
|
2018 |
Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers Ieee Transactions On Parallel and Distributed Systems. 29: 2686-2699. DOI: 10.1109/Tpds.2018.2841915 |
0.369 |
|
2017 |
Barom Jeon P, Kesidis G. A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs Journal of Communications Software and Systems. 2: 108. DOI: 10.24138/Jcomss.V2I2.294 |
0.452 |
|
2017 |
Leivadeas A, Kesidis G, Falkner M, Lambadaris I. A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem Ieee Transactions On Network and Service Management. 14: 890-903. DOI: 10.1109/Tnsm.2017.2732699 |
0.393 |
|
2017 |
Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Optimal virtualized network function allocation for an SDN enabled cloud Computer Standards & Interfaces. 54: 266-278. DOI: 10.1016/J.Csi.2017.01.001 |
0.442 |
|
2017 |
Khamse-Ashari J, Kesidis G, Lambadaris I, Urgaonkar B, Zhao Y. Constrained max-min fair scheduling of variable-length packet-flows to multiple servers Annals of Telecommunications. 73: 219-237. DOI: 10.1007/S12243-017-0599-Y |
0.405 |
|
2016 |
Shah V, de Veciana G, Kesidis G. A Stable Approach for Routing Queries in Unstructured P2P Networks Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2509967 |
0.436 |
|
2016 |
Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Dynamic virtualized network function allocation in a multi-cloud environment 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500394 |
0.316 |
|
2015 |
Kurve A, Miller DJ, Kesidis G. Multicategory crowdsourcing accounting for variable task difficulty, worker skill, and worker intention Ieee Transactions On Knowledge and Data Engineering. 27: 794-809. DOI: 10.1109/Tkde.2014.2327026 |
0.763 |
|
2014 |
Raghuram J, Miller DJ, Kesidis G. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. Journal of Advanced Research. 5: 423-33. PMID 25685511 DOI: 10.1016/J.Jare.2014.01.001 |
0.335 |
|
2014 |
Lotfi MH, Kesidis G, Sarkar S. Network non neutrality on the internet: Content provision under a subscription revenue model Performance Evaluation Review. 42: 44. DOI: 10.1145/2695533.2695552 |
0.34 |
|
2014 |
Jin Y, Kesidis G, Shin J, Kocak F, Yi Y. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2347035 |
0.572 |
|
2014 |
Daoud AA, Kesidis G, Liebeherr J. Zero-determinant strategies: A game-theoretic approach for sharing licensed spectrum bands Ieee Journal On Selected Areas in Communications. 32: 2297-2308. DOI: 10.1109/Jsac.2014.141126 |
0.338 |
|
2014 |
Kocak F, Kesidis G, Fdida S. Network Neutrality with Content Caching and Its Effect on Access Pricing Smart Data Pricing. 47-66. DOI: 10.1002/9781118899250.ch3 |
0.318 |
|
2013 |
Kurve A, Kotobi K, Kesidis G. An agent-based framework for performance modeling of an optimistic parallel discrete event simulator Complex Adaptive Systems Modeling. 1. DOI: 10.1186/2194-3206-1-12 |
0.78 |
|
2013 |
Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with conditionally altruistic users Eurasip Journal On Wireless Communications and Networking. 2013. DOI: 10.1186/1687-1499-2013-202 |
0.65 |
|
2013 |
Jin Y, Kesidis G, Jang JW. Diffusion dynamics of network technologies with bounded rational users: Aspiration-based learning Ieee/Acm Transactions On Networking. 21: 28-40. DOI: 10.1109/Tnet.2012.2189891 |
0.597 |
|
2013 |
He J, Miller DJ, Kesidis G. Latent interest-group discovery and management by peer-to-peer online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 162-167. DOI: 10.1109/SocialCom.2013.31 |
0.308 |
|
2013 |
Kocak F, Kesidis G, Pham TM, Fdida S. The effect of caching on a model of content and access provider revenues in Information-Centric Networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 45-50. DOI: 10.1109/SocialCom.2013.13 |
0.344 |
|
2013 |
Kurve A, Griffin C, Miller DJ, Kesidis G. Optimizing cluster formation in super-peer networks via local incentive design Peer-to-Peer Networking and Applications. 8: 1-21. DOI: 10.1007/S12083-013-0206-6 |
0.804 |
|
2013 |
Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A model of network neutrality with usage-based prices Telecommunication Systems. 52: 601-609. DOI: 10.1007/S11235-011-9504-6 |
0.424 |
|
2013 |
Kurve A, Miller DJ, Kesidis G. Defeating tyranny of the masses in crowdsourcing: Accounting for low-skilled and adversarial workers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8252: 140-153. DOI: 10.1007/978-3-319-02786-9_9 |
0.731 |
|
2012 |
Jin Y, Kesidis G, Jang JW. A channel aware MAC protocol in an ALOHA network with selfish users Ieee Journal On Selected Areas in Communications. 30: 128-137. DOI: 10.1109/Jsac.2012.120112 |
0.58 |
|
2012 |
Shah V, De Veciana G, Kesidis G. Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints Proceedings - Ieee Infocom. 2327-2335. DOI: 10.1109/INFCOM.2012.6195620 |
0.315 |
|
2012 |
Kesidis G, Kurve A. A study of unsupervised adaptive crowdsourcing Ieee International Conference On Communications. 1438-1442. DOI: 10.1109/ICC.2012.6364014 |
0.768 |
|
2012 |
Kurve A, Pang G, Kesidis G, De Veciana G. Decentralized capacity reallocation for a loss network 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310748 |
0.812 |
|
2011 |
Zou G, Kesidis G, Miller DJ. A flow classifier with tamper-resistant features and an evaluation of its portability to new domains Ieee Journal On Selected Areas in Communications. 29: 1449-1460. DOI: 10.1109/Jsac.2011.110810 |
0.349 |
|
2011 |
Kurve A, Kesidis G. Sybil detection via distributed sparse cut monitoring Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5963402 |
0.785 |
|
2011 |
Kurve A, Griffin C, Kesidis G. Iterative partitioning scheme for distributed simulation of dynamic networks 2011 Ieee 16th International Workshop On Computer Aided Modeling and Design of Communication Links and Networks, Camad 2011. 92-96. DOI: 10.1109/CAMAD.2011.5941125 |
0.804 |
|
2011 |
Carl G, Kesidis G. Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra Computer Networks. 55: 2361-2379. DOI: 10.1016/J.Comnet.2011.03.013 |
0.46 |
|
2010 |
Neishaboori A, Das A, Kesidis G. A relaying enticement mechanism for wireless CDMA mesh networks 33rd Ieee Sarnoff Symposium 2010, Conference Proceedings. DOI: 10.1109/SARNOF.2010.5469707 |
0.809 |
|
2010 |
Tangpong A, Kesidis G. File-sharing costs and quality-of-service 2010 44th Annual Conference On Information Sciences and Systems, Ciss 2010. DOI: 10.1109/CISS.2010.5464800 |
0.752 |
|
2010 |
Choi YH, Li L, Liu P, Kesidis G. Worm virulence estimation for the containment of local worm outbreak Computers and Security. 29: 104-123. DOI: 10.1016/J.Cose.2009.07.002 |
0.384 |
|
2009 |
Kesidis G, Tangpong A, Griffin C. A sybil-proof referral system based on multiplicative reputation chains Ieee Communications Letters. 13: 862-864. DOI: 10.1109/Lcomm.2009.091400 |
0.776 |
|
2009 |
Tangpong A, Kesidis G, Hsu HY, Hurson A. Robust sybil detection for MANETs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235387 |
0.806 |
|
2009 |
Tangpong A, Kesidis G. A simple reputation model for BitTorrent-like incentives Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 603-610. DOI: 10.1109/GAMENETS.2009.5137450 |
0.763 |
|
2009 |
Das A, Neishaboori A, Kesidis G. Wireless mesh networking games Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 565-574. DOI: 10.1109/GAMENETS.2009.5137446 |
0.793 |
|
2009 |
Kesidis G, Konstantopoulos T, Sousi P. A stochastic epidemiological model and a deterministic limit for bitTorrent-like peer-to-peer file-sharing networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5425: 26-36. DOI: 10.1007/978-3-642-00393-6_4 |
0.323 |
|
2008 |
Yi S, Deng X, Kesidis G, Das CR. Technique for Estimating the Number of Active Flows in High-Speed Networks Etri Journal. 30: 194-204. DOI: 10.4218/Etrij.08.1107.0001 |
0.328 |
|
2008 |
Carl G, Kesidis G. Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1371574.1371577 |
0.409 |
|
2008 |
Kesidis G, Hamadeh I, Jin Y, Jiwasurat S, Vojnovì M. A model of the spread of randomly scanning Internet worms that saturate access links Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1346325.1346327 |
0.781 |
|
2008 |
Neishaboori A, Kesidis G. SINR-sensitive routing in wireless 802.11 mesh networks 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 623-628. DOI: 10.1109/MAHSS.2008.4660103 |
0.82 |
|
2008 |
Patankar P, Nam G, Kesidis G, Das CR. Exploring anti-spam models in large scale VoIP systems Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 85-92. DOI: 10.1109/ICDCS.2008.71 |
0.318 |
|
2008 |
Kesidis G, Das A, De Veciana G. On flat-rate and usage-based pricing for tiered commodity Internet services Ciss 2008, the 42nd Annual Conference On Information Sciences and Systems. 304-308. DOI: 10.1109/CISS.2008.4558540 |
0.303 |
|
2008 |
Neishaboori A, Kesidis G. Wireless mesh networks based on CDMA Computer Communications. 31: 1513-1528. DOI: 10.1016/J.Comcom.2008.01.020 |
0.804 |
|
2008 |
Yi S, Deng X, Kesidis G, Das CR. A dynamic quarantine scheme for controlling unresponsive TCP sessions Telecommunication Systems. 37: 169-189. DOI: 10.1007/S11235-008-9104-2 |
0.339 |
|
2008 |
Sungwon Y, Kappes M, Garg S, Xidong D, Kesidis G, Das CR. Proxy-RED: An AQM scheme for wireless local area networks Wireless Communications and Mobile Computing. 8: 421-434. DOI: 10.1002/wcm.460 |
0.378 |
|
2007 |
Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs Ieee Journal On Selected Areas in Communications. 25: 1113-1123. DOI: 10.1109/Jsac.2007.070806 |
0.626 |
|
2007 |
Jeon PB, Kesidis G. GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.43 |
0.786 |
|
2007 |
Kesidis G, Neishaboori A. Distributed power control in multihop ad hoc CDMA networks Ieee International Conference On Communications. 96-101. DOI: 10.1109/ICC.2007.25 |
0.786 |
|
2007 |
Kesidis G, Konstantopoulos T, Sousi P. Modeling file-sharing with BitTorrent-like incentives Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: IV1333-IV1336. DOI: 10.1109/ICASSP.2007.367324 |
0.302 |
|
2007 |
Jhi YC, Liu P, Li L, Gu Q, Jing J, Kesidis G. PWC: A proactive worm containment solution for enterprise networks Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 433-442. DOI: 10.1002/Sec.112 |
0.782 |
|
2006 |
Hamadeh I, Kesidis G. A taxonomy of internet traceback International Journal of Security and Networks. 1: 54-61. DOI: 10.1504/Ijsn.2006.010823 |
0.73 |
|
2006 |
Jeon PB, Rao RN, Kesidis G. An overlay framework for QoS management in mobile ad hoc networks 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534721 |
0.792 |
|
2006 |
Carl G, Kesidis G, Brooks RR, Rai S. Denial-of-service attack-detection techniques Ieee Internet Computing. 10: 82-89. DOI: 10.1109/Mic.2006.5 |
0.352 |
|
2006 |
Wang J, Miller DJ, Kesidis G. Efficient mining of the multidimensional traffic cluster hierarchy for digesting, visualization, and anomaly identification Ieee Journal On Selected Areas in Communications. 24: 1929-1941. DOI: 10.1109/Jsac.2006.877216 |
0.308 |
|
2006 |
Jin Y, Kesidis G. Charge sensitive and incentive compatible end-to-end window-based control for selfish users Ieee Journal On Selected Areas in Communications. 24: 952-960. DOI: 10.1109/Jsac.2006.872876 |
0.576 |
|
2006 |
Mazumdar RR, Courcoubetis CA, Duffield N, Kesidis G, Odlyzko A, Srikant R, Walrand J. Guest Editorial price-based access control and economics of networking Ieee Journal On Selected Areas in Communications. 24: 937-938. DOI: 10.1109/Jsac.2006.872874 |
0.654 |
|
2006 |
Neishaboori A, Kesidis G. Routing and uplink-downlink scheduling in ad hoc CDMA networks Ieee International Conference On Communications. 2: 926-931. DOI: 10.1109/ICC.2006.254826 |
0.814 |
|
2006 |
Fayek D, Kesidis G, Vannelli A. Non-linear game models for large-scale network bandwidth management Optimization and Engineering. 7: 421-444. DOI: 10.1007/S11081-006-0348-Y |
0.436 |
|
2006 |
Hamadeh I, Kesidis G. Toward a framework for forensic analysis of scanning worms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3995: 282-297. DOI: 10.1007/11766155_20 |
0.724 |
|
2005 |
Jeon PB, Kesidis G. Pheromone-aided robust multipath and multipriority routing in wireless MANETs Pe-Wasun'05 - Proceedings of the Second Acm International Workshop On Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. 106-113. DOI: 10.1145/1089803.1089974 |
0.789 |
|
2005 |
Jin Y, Kesidis G. Dynamics of usage-priced communication networks: The case of a single bottleneck resource Ieee/Acm Transactions On Networking. 13: 1041-1053. DOI: 10.1109/Tnet.2005.857120 |
0.658 |
|
2005 |
Hamadeh I, Hart J, Kesidis G, Pothamsetty V. A preliminary simulation of the effect of scanning worm activity on multicast Proceedings - Workshop On Principles of Advanced and Distributed Simulation, Pads. 191-198. DOI: 10.1109/PADS.2005.2 |
0.765 |
|
2005 |
Jiwasurat S, Kesidis G, Miller DJ. Hierarchical shaped deficit round-robin scheduling Globecom - Ieee Global Telecommunications Conference. 2: 688-693. DOI: 10.1109/GLOCOM.2005.1577729 |
0.798 |
|
2005 |
Jeon PB, Kesidis G. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing 43rd Annual Allerton Conference On Communication, Control and Computing 2005. 3: 1656-1665. |
0.802 |
|
2005 |
Kesidis G, Hamadeh I, Jiwasurat S. Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms Lecture Notes in Computer Science. 3375: 101-109. |
0.768 |
|
2004 |
Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646 |
0.32 |
|
2004 |
Rao R, Kesidis G. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks Ieee Transactions On Mobile Computing. 3: 225-232. DOI: 10.1109/Tmc.2004.26 |
0.369 |
|
2004 |
Jiwasurat S, Kesidis G. A class of shaped deficit round-robin (SDRR) schedulers Telecommunication Systems. 25: 173-191. DOI: 10.1023/B:Tels.0000014780.33289.Ad |
0.779 |
|
2004 |
Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks Computer Communications. 27: 828-839. DOI: 10.1016/J.Comcom.2004.01.027 |
0.348 |
|
2004 |
Weaver N, Hamadeh I, Kesidis G, Paxson V. Preliminary results using scale-down to explore worm dynamics Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 65-72. |
0.687 |
|
2004 |
Deng X, Yi S, Kesidis G, Das CR. RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 369-374. |
0.368 |
|
2003 |
Hamadeh I, Kesidis G. Performance of IP address fragmentation strategies for DDoS traceback Proceedings of the 3rd Ieee Workshop On Ip Operations and Management, Ipom 2003. 1-7. DOI: 10.1109/IPOM.2003.1251217 |
0.712 |
|
2003 |
Deng X, Yi S, Kesidis G, Das CR. Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance* Teletraffic Science and Engineering. 5: 1281-1290. DOI: 10.1016/S1388-3437(03)80277-9 |
0.333 |
|
2003 |
Rao R, Kesidis G. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited Globecom - Ieee Global Telecommunications Conference. 5: 2957-2961. |
0.36 |
|
2003 |
Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks Proceedings - Ieee Infocom. 2: 1242-1249. |
0.334 |
|
2003 |
Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem Proceedings - Ieee Military Communications Conference Milcom. 2: 735-740. |
0.305 |
|
2002 |
Jin Y, Kesidis G. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network Ieee Communications Letters. 6: 282-284. DOI: 10.1109/Lcomm.2002.801326 |
0.574 |
|
2000 |
Kesidis G, Chakraborty K, Tassiulas L. Traffic shaping for a loss system Ieee Communications Letters. 4: 417-419. DOI: 10.1109/4234.898726 |
0.321 |
|
2000 |
Kesidis G, Konstantopoulos T. Worst-case performance of a buffer with independent shaped arrival processes Ieee Communications Letters. 4: 26-28. DOI: 10.1109/4234.823539 |
0.392 |
|
2000 |
Kesidis G, Konstantopoulos T. Extremal shape-controlled traffic patterns in high-speed networks Ieee Transactions On Communications. 48: 813-819. DOI: 10.1109/26.843194 |
0.4 |
|
1999 |
Kesidis G. Bandwidth adjustments using online packet-level measurements Proceedings of Spie. 3841: 230-238. DOI: 10.1117/12.360374 |
0.46 |
|
1998 |
Hung A, Montpetit MJ, Kesidis G. ATM via satellite: A framework and implementation Wireless Networks. 4: 141-153. DOI: 10.1023/A:1019191619926 |
0.463 |
|
1996 |
Hung A, Kesidis G. Bandwidth scheduling for wide-area ATM networks using virtual finishing times Ieee/Acm Transactions On Networking. 4: 49-54. DOI: 10.1109/90.503761 |
0.419 |
|
1996 |
De Veciana G, Kesidis G. Bandwidth allocation for multiple qualities of service using generalized processor sharing Ieee Transactions On Information Theory. 42: 268-272. DOI: 10.1109/18.481801 |
0.408 |
|
1996 |
de Veciana G, Kesidis G. Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections Ieee International Conference On Communications. 2: 632-636. |
0.381 |
|
1995 |
Kesidis G. Analog Optimization with Wong's Stochastic Neural Network Ieee Transactions On Neural Networks. 6: 258-260. DOI: 10.1109/72.363429 |
0.358 |
|
1995 |
de Veciana G, Kesidis G, Walrand J. Resource Management in Wide-Area ATM Networks Using Effective Bandwidths Ieee Journal On Selected Areas in Communications. 13: 1081-1090. DOI: 10.1109/49.400663 |
0.699 |
|
1995 |
Courcoubetis C, Kesidis G, Ridder A, Walrand J, Weber R. Admission Control and Routing in ATM Networks using Inferences from Measured Buffer Occupancy Ieee Transactions On Communications. 43: 1778-1784. DOI: 10.1109/26.380228 |
0.644 |
|
1994 |
Kesidis G, Walrand J. Conservation Relations for Fully Shared Atm Buffers Probability in the Engineering and Informational Sciences. 8: 147-151. DOI: 10.1017/S0269964800003272 |
0.647 |
|
1993 |
Kesidis G, Walrand J, Chang CS. Effective Bandwidths for Multiclass Markov Fluids and Other ATM Sources Ieee/Acm Transactions On Networking. 1: 424-428. DOI: 10.1109/90.251894 |
0.626 |
|
1993 |
Kesidis G, Walrand J. Relative entropy between Markov transition rate matrices Ieee Transactions On Information Theory. 39: 1056-1057. DOI: 10.1109/18.256516 |
0.567 |
|
Low-probability matches (unlikely to be authored by this person) |
2010 |
Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A study of non-neutral networks with usage-based prices Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6236: 76-84. DOI: 10.1007/978-3-642-15485-0_8 |
0.298 |
|
2015 |
Alizadeh M, Scaglione A, Applebaum A, Kesidis G, Levitt K. Reduced-Order Load Models for Large Populations of Flexible Appliances Ieee Transactions On Power Systems. 30: 1758-1774. DOI: 10.1109/Tpwrs.2014.2354345 |
0.297 |
|
2015 |
Nasiriani N, Wang C, Kesidis G, Urgaonkar B, Chen LY, Birke R. On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 51-60. DOI: 10.1145/2970815 |
0.297 |
|
2007 |
Kesidis G. An Introduction to Communication Network Analysis An Introduction to Communication Network Analysis. 1-232. DOI: 10.1002/9780470168684 |
0.294 |
|
2004 |
Jin Y, Kesidis G. TCP window control in a priced network Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 596-600. |
0.294 |
|
2020 |
Lotfi MH, Sarkar S, Kesidis G. Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? Ieee Acm Transactions On Networking. 28: 1435-1448. DOI: 10.1109/Tnet.2020.2981259 |
0.293 |
|
2002 |
Ninan BM, Kesidis G, Devetikiotis M. A simulation study of non-cooperative pricing strategies for circuit-switched optical networks Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2002: 257-263. DOI: 10.1109/MASCOT.2002.1167085 |
0.287 |
|
2008 |
LLi, PLiu, Kesidis G. Threshold smart walk for the containment of local worm outbreak Globecom - Ieee Global Telecommunications Conference. 2124-2128. DOI: 10.1109/GLOCOM.2008.ECP.409 |
0.285 |
|
1995 |
Hung A, Kesidis G. Buffer design for wide-area ATM networks using virtual finishing times Ieee International Conference On Communications. 3: 1901-1905. |
0.282 |
|
2015 |
Shan Y, Raghuram J, Kesidis G, Miller DJ, Scaglione A, Rowe J, Levitt K. Generation bidding game with potentially false attestation of flexible demand Eurasip Journal On Advances in Signal Processing. 2015. DOI: 10.1186/S13634-015-0212-3 |
0.28 |
|
2012 |
Miller DJ, Raghuram J, Kesidis G, Collins CM. Improved generative semisupervised learning based on finely grained component-conditional class labeling Neural Computation. 24: 1926-1966. DOI: 10.1162/Neco_A_00284 |
0.278 |
|
1990 |
Kesidis G, Wong E. Optimal acceptance probability for simulated annealing Stochastics and Stochastic Reports. 29: 221-226. DOI: 10.1080/17442509008833615 |
0.277 |
|
2010 |
Kesidis G. An introduction to models of online peer-to-peer social networking Synthesis Lectures On Communication Networks. 8: 1-125. DOI: 10.2200/S00313ED1V01Y201011CNT008 |
0.27 |
|
1993 |
Kesidis G, Walrand J. Quick Simulation of ATM Buffers with on-off Multiclass Markov Fluid Sources Acm Transactions On Modeling and Computer Simulation (Tomacs). 3: 269-276. DOI: 10.1145/174153.174162 |
0.267 |
|
2002 |
Yi S, Deng X, Kesidis G, Das CR. Providing fairness in diffserv architecture Conference Record / Ieee Global Telecommunications Conference. 2: 1435-1439. |
0.265 |
|
2014 |
Raghuram J, Miller DJ, Kesidis G. Instance-level constraint-based semisupervised learning with imposed space-partitioning. Ieee Transactions On Neural Networks and Learning Systems. 25: 1520-37. PMID 25050949 DOI: 10.1109/Tnnls.2013.2294459 |
0.263 |
|
2008 |
Miller DJ, Zhang Y, Kesidis G. Decision aggregation in distributed classification by a transductive extension of maximum entropy/improved iterative scaling Eurasip Journal On Advances in Signal Processing. 2008. DOI: 10.1155/2008/674974 |
0.263 |
|
2009 |
Patankar P, Nam G, Kesidis G, Konstantopoulos T, Das CR. Peer-to-peer unstructured anycasting using correlated swarms 21st International Teletraffic Congress, Itc 21: Traffic and Performance Issues in Networks of the Future - Final Programme. |
0.26 |
|
2015 |
Kesidis G, Shan Y, Urgaonkar B, Liebeherr J. Network calculus for parallel processing Performance Evaluation Review. 43: 48-50. DOI: 10.1145/2825236.2825256 |
0.258 |
|
2014 |
Kesidis G. A simple two-sided market model with side-payments and ISP service classes Proceedings - Ieee Infocom. 595-597. DOI: 10.1109/INFCOMW.2014.6849298 |
0.253 |
|
2018 |
Lin Y, Lai Y, Kesidis G, Vasilakos AV. Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations Ieee Systems Journal. 12: 7-9. DOI: 10.1109/Jsyst.2017.2783458 |
0.252 |
|
2001 |
Milidrag N, Kesidis G, Devetsikiotis M. An overview of fluid-based quick simulation techniques for large packet-switched communication networks Proceedings of Spie - the International Society For Optical Engineering. 4526: 271-277. DOI: 10.1117/12.434403 |
0.246 |
|
2012 |
Kesidis G. Side-payment profitability under convex demand-response modeling congestion-sensitive applications Ieee International Conference On Communications. 2785-2789. DOI: 10.1109/ICC.2012.6364113 |
0.245 |
|
2016 |
Qiu Z, Miller DJ, Kesidis G. A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes. Ieee Transactions On Neural Networks and Learning Systems. PMID 26829808 DOI: 10.1109/Tnnls.2016.2514401 |
0.241 |
|
2006 |
Li L, Liu P, Kesidis G. Visual toolkit for network security experiment specification and data analysis Proceedings of the 3rd International Workshop On Visualization For Computer Security, Vizsec'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 7-14. DOI: 10.1145/1179576.1179579 |
0.241 |
|
2010 |
Aksu Y, Miller DJ, Kesidis G, Yang QX. Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 21: 701-17. PMID 20194055 DOI: 10.1109/Tnn.2010.2041069 |
0.24 |
|
2002 |
Deng X, Yi S, Kesidis G, Das CR. Stabilized Virtual Buffer (SVB) - An active queue management scheme for Internet quality-of-service Conference Record / Ieee Global Telecommunications Conference. 2: 1628-1632. |
0.239 |
|
2020 |
Kesidis G, Konstantopoulos T, Zazanis MA. The distribution of age-of-information performance measures for message processing systems Queueing Systems. 95: 203-250. DOI: 10.1007/S11134-020-09655-X |
0.236 |
|
2007 |
Yi S, Kim BK, Oh J, Jang J, Kesidis G, Das CR. Memory-efficient content filtering hardware for high-speed intrusion detection systems Proceedings of the Acm Symposium On Applied Computing. 264-269. DOI: 10.1145/1244002.1244068 |
0.235 |
|
1996 |
Kesidis G, Singh A, Cheung D, Kwok WW. Feasibility of fluid event-driven simulation for ATM networks Conference Record / Ieee Global Telecommunications Conference. 3: 2013-2017. |
0.234 |
|
1997 |
Kesidis G, McKeown N. Output-buffer ATM packet switching for integrated-services communication networks Ieee International Conference On Communications. 3: 1684-1688. |
0.233 |
|
2001 |
Kesidis G, Tassiulas L. General connection blocking bounds and an implication of billing for provisioned label-switched routes in an MPLS internet cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2094: 339-347. |
0.233 |
|
2011 |
Aksu Y, Miller DJ, Kesidis G, Bigler DC, Yang QX. An MRI-derived definition of MCI-to-AD conversion for long-term, automatic prognosis of MCI patients. Plos One. 6: e25074. PMID 22022375 DOI: 10.1371/Journal.Pone.0025074 |
0.232 |
|
1994 |
Kesidis G. Modeling to obtain the effective bandwidth of a traffic source in an ATM network Proceedings of the Ieee International Workshop On Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. 318-322. |
0.228 |
|
2008 |
Miller DJ, Wang Y, Kesidis G. Emergent unsupervised clustering paradigms with potential application to bioinformatics. Frontiers in Bioscience : a Journal and Virtual Library. 13: 677-90. PMID 17981579 DOI: 10.2741/2711 |
0.221 |
|
2004 |
Ji X, Zha H, Metzner JJ, Kesidis G. Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks Ieee International Conference On Communications. 7: 3807-3811. |
0.216 |
|
2015 |
Qiu Z, Miller DJ, Kesidis G. Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. 2015. DOI: 10.1109/MLSP.2015.7324326 |
0.215 |
|
2003 |
Deng X, Yi S, Kesidis G, Das CR. A Control Theoretic Approach for Designing Adaptive AQM Schemes Globecom - Ieee Global Telecommunications Conference. 5: 2947-2951. |
0.214 |
|
2013 |
Jin Y, Yi Y, Kesidis G, Kocak F, Shin J. Hybrid client-server and peer-to-peer caching systems with selfish peers Proceedings - Ieee Infocom. 1744-1752. DOI: 10.1109/INFCOM.2013.6566972 |
0.207 |
|
2014 |
Griffin C, Kesidis G. Behavior in a shared resource game with cooperative, greedy, and vigilante players 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814129 |
0.205 |
|
2006 |
Rao RN, Kesidis G. On the relation between capacity and number of sinks in an sensor network Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.510 |
0.199 |
|
2002 |
Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for Bluetooth Ieee International Conference On Communications. 1: 303-307. |
0.197 |
|
2014 |
Keltner JR, Fennema-Notestine C, Vaida F, Wang D, Franklin DR, Dworkin RH, Sanders C, McCutchan JA, Archibald SL, Miller DJ, Kesidis G, Cushman C, Kim SM, Abramson I, Taylor MJ, et al. HIV-associated distal neuropathic pain is associated with smaller total cerebral cortical gray matter. Journal of Neurovirology. 20: 209-18. PMID 24549970 DOI: 10.1007/S13365-014-0236-8 |
0.19 |
|
2014 |
Lotfi MH, Kesidis G, Sarkar S. Market-based power allocation for a differentially priced FDMA system Ieee International Symposium On Information Theory - Proceedings. 1011-1015. DOI: 10.1109/ISIT.2014.6874985 |
0.183 |
|
2015 |
Wang C, Urgaonkar B, Wang Q, Kesidis G. A hierarchical demand response framework for data center power cost optimization under real-world electricity pricing Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 305-314. DOI: 10.1109/MASCOTS.2014.45 |
0.183 |
|
2003 |
Rao RN, Kesidis G. Detecting Malicious Packet Dropping Using Traffic Patterns in MANET Journal of Communication and Information Systems. 18: 165-170. DOI: 10.14209/jcis.2003.26 |
0.182 |
|
2012 |
Miller DJ, Kocak F, Kesidis G. Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. DOI: 10.1109/MLSP.2012.6349793 |
0.181 |
|
2020 |
Miller DJ, Xiang Z, Kesidis G. Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks Proceedings of the Ieee. 108: 402-433. DOI: 10.1109/JPROC.2020.2970615 |
0.18 |
|
2016 |
Keltner JR, Connolly CG, Vaida F, Jenkinson M, Fennema-Notestine C, Archibald S, Akkari C, Schlein A, Lee J, Wang D, Kim S, Li H, Rennels A, Miller DJ, Kesidis G, et al. HIV Distal Neuropathic Pain Is Associated with Smaller Ventral Posterior Cingulate Cortex. Pain Medicine (Malden, Mass.). PMID 27497320 DOI: 10.1093/Pm/Pnw180 |
0.178 |
|
2009 |
Zhang Y, Miller DJ, Kesidis G. Hierarchical maximum entropy modeling for regression Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306225 |
0.177 |
|
2008 |
Yi S, Deng X, Kesidis G, Das CR. Technique for estimating the number of active flows in high-speed nerworks Etri Journal. 30: 194-204. |
0.175 |
|
2007 |
Das A, Kesidis G, Pothamsetty V. Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution Proceedings of the 4th International Conference On Broadband Communications, Networks, Systems, Broadnets. 444-448. DOI: 10.1109/BROADNETS.2007.4550467 |
0.174 |
|
2003 |
Kesidis G, Konstantopoulos T, Phoha S. Surveillance coverage of sensor networks under a random mobility strategy Proceedings of Ieee Sensors. 2: 961-965. |
0.167 |
|
2012 |
Kesidis G, Jin Y. Stochastic loss aversion for random medium access Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 105: 236-247. DOI: 10.1007/978-3-642-35582-0_18 |
0.164 |
|
2003 |
Yi S, Deng X, Kesidis G, Das CR. HaTCh: A Two-level Caching Scheme for Estimating the Number of Active Flows Proceedings of the Ieee Conference On Decision and Control. 3: 2829-2834. |
0.161 |
|
2015 |
He J, Liu B, Bao X, Jin H, Kesidis G. On Privacy Preserving Partial Image Sharing Proceedings - International Conference On Distributed Computing Systems. 2015: 758-759. DOI: 10.1109/ICDCS.2015.95 |
0.16 |
|
2013 |
Wang C, Urgaonkar B, Wang Q, Kesidis G, Sivasubramaniam A. Data Center power cost optimization via workload modulation Proceedings - 2013 Ieee/Acm 6th International Conference On Utility and Cloud Computing, Ucc 2013. 260-263. DOI: 10.1109/UCC.2013.52 |
0.157 |
|
2006 |
Carl G, Phoha S, Kesidis G, Madan B. Path preserving scale down for validation of internet inter-domain routing protocols Proceedings - Winter Simulation Conference. 2210-2218. DOI: 10.1109/WSC.2006.323023 |
0.148 |
|
2014 |
Kocak F, Miller DJ, Kesidis G. Detecting anomalous latent classes in a batch of network traffic flows 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814181 |
0.145 |
|
2019 |
Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers Ieee Networking Letters. 1: 34-37. DOI: 10.1109/LNET.2019.2893532 |
0.142 |
|
2016 |
Copos B, Levitt K, Rowe J, Kianmajd P, Chuah CN, Kesidis G. Security and privacy for emerging smart community infrastructures Iotbd 2016 - Proceedings of the International Conference On Internet of Things and Big Data. 148-155. |
0.141 |
|
2013 |
Alizadeh M, Scaglione A, Kesidis G. Scalable model predictive control of demand for ancillary services 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 684-689. DOI: 10.1109/SmartGridComm.2013.6688038 |
0.14 |
|
2015 |
Wang C, Nasiriani N, Kesidis G, Urgaonkar B, Wang Q, Chen LY, Gupta A, Birke R. Recouping energy costs from cloud tenants: Tenant demand response aware pricing design E-Energy 2015 - Proceedings of the 2015 Acm 6th International Conference On Future Energy Systems. 141-150. DOI: 10.1145/2768510.2768541 |
0.133 |
|
2013 |
Lu H, Pang G, Kesidis G. Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 235-240. DOI: 10.1109/SmartGridComm.2013.6687963 |
0.131 |
|
2020 |
Xiang Z, Miller DJ, Kesidis G. Detection of Backdoors in Trained Classifiers Without Access to the Training Set. Ieee Transactions On Neural Networks and Learning Systems. PMID 33326384 DOI: 10.1109/TNNLS.2020.3041202 |
0.129 |
|
2012 |
Pang G, Kesidis G, Konstantopoulos T. Avoiding overages by deferred aggregate demand for PEV charging on the smart grid Ieee International Conference On Communications. 3322-3327. DOI: 10.1109/ICC.2012.6363650 |
0.126 |
|
2006 |
Kesidis G, Jin Y, Mortazavi B, Konstantopoulos T. An epidemiological model for file-sharing with BitTorrent-like incentives: The case of a fixed peer population Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.430 |
0.125 |
|
2013 |
Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with dynamic altruism Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 111: 29-42. DOI: 10.1007/978-3-642-36958-2_3 |
0.118 |
|
2011 |
Griffin C, Kesidis G, Antoniadis P, Fdida S. An epidemic model of bit torrent with control Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5962823 |
0.118 |
|
2007 |
Wang J, Kesidis G, Miller DJ. New directions in covert malware modeling which exploit white-listing 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567340 |
0.107 |
|
2008 |
Miller DJ, Zhang Y, Kesidis G. A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 1865-1868. DOI: 10.1109/ICASSP.2008.4517997 |
0.106 |
|
2014 |
Al-Daoud A, Kesidis G, Liebeherr J. A game of uncoordinated sharing of private spectrum commons Performance Evaluation Review. 42: 42. DOI: 10.1145/2695533.2695550 |
0.105 |
|
2013 |
Alizadeh M, Kesidis G, Scaglione A. Clustering consumption in queues: A scalable model for electric vehicle scheduling Conference Record - Asilomar Conference On Signals, Systems and Computers. 374-378. DOI: 10.1109/ACSSC.2013.6810299 |
0.105 |
|
2014 |
Urgaonkar B, Kesidis G, Shanbhag UV, Wang C. Pricing of service in clouds: Optimal response and strategic interactions Performance Evaluation Review. 41: 28-30. DOI: 10.1145/2567529.2567538 |
0.1 |
|
2001 |
Kesidis G. Scalable resources management using shaped weighted round-robin scheduling Proceedings of Spie - the International Society For Optical Engineering. 4526: 278-286. DOI: 10.1117/12.434404 |
0.097 |
|
2012 |
Raghuram J, Miller DJ, Kesidis G. Semisupervised domain adaptation for mixture model based classifiers 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310708 |
0.096 |
|
2007 |
Mortazavi B, Kesidis G. Cumulative reputation systems for peer-to-peer content distribution 2006 Ieee Conference On Information Sciences and Systems, Ciss 2006 - Proceedings. 1546-1552. DOI: 10.1109/CISS.2006.286385 |
0.094 |
|
2009 |
Gunwoo N, Pushkar P, Lim SH, Bikash S, Kesidis G, Das CR. Clock-like flow replacement schemes for resilient flow monitoring Proceedings - International Conference On Distributed Computing Systems. 129-136. DOI: 10.1109/ICDCS.2009.53 |
0.094 |
|
2016 |
Shan Y, Kesidis G. Optimal power flow with random wind resources Proceedings of the Annual Hawaii International Conference On System Sciences. 2016: 2426-2434. DOI: 10.1109/HICSS.2016.303 |
0.09 |
|
2010 |
Kesidis G, Jin Y, Azad AP, Altman E. Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior Proceedings of the Ieee Conference On Decision and Control. 1071-1075. DOI: 10.1109/CDC.2010.5717121 |
0.09 |
|
2005 |
Tirta Y, Lau B, Malhotra N, Bagchi S, Li Z, Lu YH, Cao G, Kesidis G, LaPorta T, Yao B, Roy S, Saberi A, Herlugson K, Lian J, Naik K, et al. Purposeful Mobility and Navigation Sensor Network Operations. 91-183. DOI: 10.1002/9780471784173.ch3 |
0.086 |
|
2006 |
Wang J, Hamadeh L, Kesidis G, Miller DJ. Polymorphic worm detection and defense: System design, experimental methodology, and data resources Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 169-176. DOI: 10.1145/1162666.1162676 |
0.078 |
|
2009 |
Miller DJ, Lin CF, Kesidis G, Collins CM. Semisupervised mixture modeling with fine-grained component-conditional class labeling and transductive inference Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306229 |
0.078 |
|
2008 |
Zhang Y, Aksu Y, Kesidis G, Miller DJ, Wang Y. SVM margin-based feature elimination applied to high-dimensional microarray gene expression data Proceedings of the 2008 Ieee Workshop On Machine Learning For Signal Processing, Mlsp 2008. 97-102. DOI: 10.1109/MLSP.2008.4685462 |
0.077 |
|
2015 |
Alizadeh M, Scaglione A, Goldsmith A, Kesidis G. Capturing aggregate flexibility in Demand Response Proceedings of the Ieee Conference On Decision and Control. 2015: 6439-6445. DOI: 10.1109/CDC.2014.7040399 |
0.069 |
|
2021 |
Xiang Z, Miller DJ, Wang H, Kesidis G. Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs without Access to the Training Set. Neural Computation. 1-43. PMID 33617746 DOI: 10.1162/neco_a_01376 |
0.068 |
|
2009 |
Nam G, Patankar P, Kesidis G, Das CR, Seren C. Mass purging of stale TCP flows in per-flow monitoring systems Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235390 |
0.066 |
|
2007 |
Aksu Y, Kesidis G, Miller DJ. Scalable, efficient, stepwise-optimal feature elimination in support vector machines Machine Learning For Signal Processing 17 - Proceedings of the 2007 Ieee Signal Processing Society Workshop, Mlsp. 75-80. DOI: 10.1109/MLSP.2007.4414285 |
0.063 |
|
2020 |
Liu W, John M, Karrenbauer A, Allerhand A, Lombardi F, Shulte M, Miller DJ, Xiang Z, Kesidis G, Oulasvirta A, Dayama NR, Shiripour M. Scanning the Issue Proceedings of the Ieee. 108: 400-401. DOI: 10.1109/jproc.2020.2975522 |
0.06 |
|
2017 |
Shan Y, Lo Prete C, Kesidis G, Miller DJ. A simulation framework for uneconomic virtual bidding in day-ahead electricity markets Acm Sigmetrics Performance Evaluation Review. 44: 30-30. DOI: 10.1145/3040230.3040238 |
0.058 |
|
2010 |
Caron S, Kesidis G, Altman E. Application neutrality and a paradox of side payments Proceedings of the Re-Architecting the Internet (Rearch) Workshop, Held in Conjunction With Conext 2010. DOI: 10.1145/1921233.1921245 |
0.05 |
|
2005 |
Fahmy S, Kesidis G, Weaver N. Message from the general chair and program chairs 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005. DOI: 10.1109/NPSEC.2005.1532043 |
0.041 |
|
2010 |
Miller DJ, Lin CF, Kesidis G, Collins CM. Improved fine-grained component-conditional class labeling with active learning Proceedings - 9th International Conference On Machine Learning and Applications, Icmla 2010. 3-8. DOI: 10.1109/ICMLA.2010.8 |
0.04 |
|
2017 |
Wang C, Urgaonkar B, Nasiriani N, Kesidis G. Using Burstable Instances in the Public Cloud Acm Sigmetrics Performance Evaluation Review. 45: 56-56. DOI: 10.1145/3143314.3078591 |
0.038 |
|
2017 |
Wang C, Urgaonkar B, Nasiriani N, Kesidis G. Using Burstable Instances in the Public Cloud Proceedings of the Acm On Measurement and Analysis of Computing Systems. 1: 1-28. DOI: 10.1145/3084448 |
0.038 |
|
1997 |
Montpetit M, Kesidis G. Broadband Via Satellite Ieee Communications Magazine. 35: 28-28. DOI: 10.1109/MCOM.1997.601739 |
0.034 |
|
2007 |
Kesidis G, Modiano K, Srikant K. Message from the technical program committee co-chairs Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2007.3 |
0.03 |
|
2007 |
Papazisis G, Katsigiannopoulos K, Nikolaou K, Theodorides N, Kazantzidou E, Kefalas A, Papadopoulou V, Kesidis G, Danana E, Dyntsikou D, Rongotis C. Minorities in a detoxififcation unit in Greece: I. Socio-demographic characteristics European Psychiatry. 22: S195-S196. DOI: 10.1016/j.eurpsy.2007.01.647 |
0.014 |
|
2007 |
Nikolaou K, Papazisis G, Katsigiannopoulos K, Kazantzidou E, Kefalas A, Papadopoulou V, Kesidis G, Alektoridis P, Theodorides N, Dyntsikou D, Rongotis C. Minorities in a detoxification unit in Greece: II. Clinical characteristics European Psychiatry. 22: S196. DOI: 10.1016/j.eurpsy.2007.01.648 |
0.01 |
|
Hide low-probability matches. |