George Kesidis - Publications

Affiliations: 
Pennsylvania State University, State College, PA, United States 
Area:
Computer Science

95/194 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Miller D, Wang Y, Kesidis G. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Computation. 1-47. PMID 31260390 DOI: 10.1162/Neco_A_01209  0.313
2019 Leivadeas A, Kesidis G, Ibnkahla M, Lambadaris I. VNF Placement Optimization at the Edge and Cloud † Future Internet. 11: 69. DOI: 10.3390/Fi11030069  0.462
2018 Wang C, Urgaonkar B, Kesidis G, Gupta A, Chen LY, Birke R. Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability Acm Transactions On Autonomous and Adaptive Systems. 13: 1-25. DOI: 10.1145/3139291  0.305
2018 Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers Ieee Transactions On Parallel and Distributed Systems. 29: 2686-2699. DOI: 10.1109/Tpds.2018.2841915  0.369
2017 Barom Jeon P, Kesidis G. A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs Journal of Communications Software and Systems. 2: 108. DOI: 10.24138/Jcomss.V2I2.294  0.452
2017 Leivadeas A, Kesidis G, Falkner M, Lambadaris I. A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem Ieee Transactions On Network and Service Management. 14: 890-903. DOI: 10.1109/Tnsm.2017.2732699  0.393
2017 Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Optimal virtualized network function allocation for an SDN enabled cloud Computer Standards & Interfaces. 54: 266-278. DOI: 10.1016/J.Csi.2017.01.001  0.442
2017 Khamse-Ashari J, Kesidis G, Lambadaris I, Urgaonkar B, Zhao Y. Constrained max-min fair scheduling of variable-length packet-flows to multiple servers Annals of Telecommunications. 73: 219-237. DOI: 10.1007/S12243-017-0599-Y  0.405
2016 Shah V, de Veciana G, Kesidis G. A Stable Approach for Routing Queries in Unstructured P2P Networks Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2509967  0.436
2016 Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Dynamic virtualized network function allocation in a multi-cloud environment 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500394  0.316
2015 Kurve A, Miller DJ, Kesidis G. Multicategory crowdsourcing accounting for variable task difficulty, worker skill, and worker intention Ieee Transactions On Knowledge and Data Engineering. 27: 794-809. DOI: 10.1109/Tkde.2014.2327026  0.763
2014 Raghuram J, Miller DJ, Kesidis G. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. Journal of Advanced Research. 5: 423-33. PMID 25685511 DOI: 10.1016/J.Jare.2014.01.001  0.335
2014 Lotfi MH, Kesidis G, Sarkar S. Network non neutrality on the internet: Content provision under a subscription revenue model Performance Evaluation Review. 42: 44. DOI: 10.1145/2695533.2695552  0.34
2014 Jin Y, Kesidis G, Shin J, Kocak F, Yi Y. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2347035  0.572
2014 Daoud AA, Kesidis G, Liebeherr J. Zero-determinant strategies: A game-theoretic approach for sharing licensed spectrum bands Ieee Journal On Selected Areas in Communications. 32: 2297-2308. DOI: 10.1109/Jsac.2014.141126  0.338
2014 Kocak F, Kesidis G, Fdida S. Network Neutrality with Content Caching and Its Effect on Access Pricing Smart Data Pricing. 47-66. DOI: 10.1002/9781118899250.ch3  0.318
2013 Kurve A, Kotobi K, Kesidis G. An agent-based framework for performance modeling of an optimistic parallel discrete event simulator Complex Adaptive Systems Modeling. 1. DOI: 10.1186/2194-3206-1-12  0.78
2013 Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with conditionally altruistic users Eurasip Journal On Wireless Communications and Networking. 2013. DOI: 10.1186/1687-1499-2013-202  0.65
2013 Jin Y, Kesidis G, Jang JW. Diffusion dynamics of network technologies with bounded rational users: Aspiration-based learning Ieee/Acm Transactions On Networking. 21: 28-40. DOI: 10.1109/Tnet.2012.2189891  0.597
2013 He J, Miller DJ, Kesidis G. Latent interest-group discovery and management by peer-to-peer online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 162-167. DOI: 10.1109/SocialCom.2013.31  0.308
2013 Kocak F, Kesidis G, Pham TM, Fdida S. The effect of caching on a model of content and access provider revenues in Information-Centric Networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 45-50. DOI: 10.1109/SocialCom.2013.13  0.344
2013 Kurve A, Griffin C, Miller DJ, Kesidis G. Optimizing cluster formation in super-peer networks via local incentive design Peer-to-Peer Networking and Applications. 8: 1-21. DOI: 10.1007/S12083-013-0206-6  0.804
2013 Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A model of network neutrality with usage-based prices Telecommunication Systems. 52: 601-609. DOI: 10.1007/S11235-011-9504-6  0.424
2013 Kurve A, Miller DJ, Kesidis G. Defeating tyranny of the masses in crowdsourcing: Accounting for low-skilled and adversarial workers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8252: 140-153. DOI: 10.1007/978-3-319-02786-9_9  0.731
2012 Jin Y, Kesidis G, Jang JW. A channel aware MAC protocol in an ALOHA network with selfish users Ieee Journal On Selected Areas in Communications. 30: 128-137. DOI: 10.1109/Jsac.2012.120112  0.58
2012 Shah V, De Veciana G, Kesidis G. Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints Proceedings - Ieee Infocom. 2327-2335. DOI: 10.1109/INFCOM.2012.6195620  0.315
2012 Kesidis G, Kurve A. A study of unsupervised adaptive crowdsourcing Ieee International Conference On Communications. 1438-1442. DOI: 10.1109/ICC.2012.6364014  0.768
2012 Kurve A, Pang G, Kesidis G, De Veciana G. Decentralized capacity reallocation for a loss network 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310748  0.812
2011 Zou G, Kesidis G, Miller DJ. A flow classifier with tamper-resistant features and an evaluation of its portability to new domains Ieee Journal On Selected Areas in Communications. 29: 1449-1460. DOI: 10.1109/Jsac.2011.110810  0.349
2011 Kurve A, Kesidis G. Sybil detection via distributed sparse cut monitoring Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5963402  0.785
2011 Kurve A, Griffin C, Kesidis G. Iterative partitioning scheme for distributed simulation of dynamic networks 2011 Ieee 16th International Workshop On Computer Aided Modeling and Design of Communication Links and Networks, Camad 2011. 92-96. DOI: 10.1109/CAMAD.2011.5941125  0.804
2011 Carl G, Kesidis G. Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra Computer Networks. 55: 2361-2379. DOI: 10.1016/J.Comnet.2011.03.013  0.46
2010 Neishaboori A, Das A, Kesidis G. A relaying enticement mechanism for wireless CDMA mesh networks 33rd Ieee Sarnoff Symposium 2010, Conference Proceedings. DOI: 10.1109/SARNOF.2010.5469707  0.809
2010 Tangpong A, Kesidis G. File-sharing costs and quality-of-service 2010 44th Annual Conference On Information Sciences and Systems, Ciss 2010. DOI: 10.1109/CISS.2010.5464800  0.752
2010 Choi YH, Li L, Liu P, Kesidis G. Worm virulence estimation for the containment of local worm outbreak Computers and Security. 29: 104-123. DOI: 10.1016/J.Cose.2009.07.002  0.384
2009 Kesidis G, Tangpong A, Griffin C. A sybil-proof referral system based on multiplicative reputation chains Ieee Communications Letters. 13: 862-864. DOI: 10.1109/Lcomm.2009.091400  0.776
2009 Tangpong A, Kesidis G, Hsu HY, Hurson A. Robust sybil detection for MANETs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235387  0.806
2009 Tangpong A, Kesidis G. A simple reputation model for BitTorrent-like incentives Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 603-610. DOI: 10.1109/GAMENETS.2009.5137450  0.763
2009 Das A, Neishaboori A, Kesidis G. Wireless mesh networking games Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 565-574. DOI: 10.1109/GAMENETS.2009.5137446  0.793
2009 Kesidis G, Konstantopoulos T, Sousi P. A stochastic epidemiological model and a deterministic limit for bitTorrent-like peer-to-peer file-sharing networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5425: 26-36. DOI: 10.1007/978-3-642-00393-6_4  0.323
2008 Yi S, Deng X, Kesidis G, Das CR. Technique for Estimating the Number of Active Flows in High-Speed Networks Etri Journal. 30: 194-204. DOI: 10.4218/Etrij.08.1107.0001  0.328
2008 Carl G, Kesidis G. Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1371574.1371577  0.409
2008 Kesidis G, Hamadeh I, Jin Y, Jiwasurat S, Vojnovì M. A model of the spread of randomly scanning Internet worms that saturate access links Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1346325.1346327  0.781
2008 Neishaboori A, Kesidis G. SINR-sensitive routing in wireless 802.11 mesh networks 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 623-628. DOI: 10.1109/MAHSS.2008.4660103  0.82
2008 Patankar P, Nam G, Kesidis G, Das CR. Exploring anti-spam models in large scale VoIP systems Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 85-92. DOI: 10.1109/ICDCS.2008.71  0.318
2008 Kesidis G, Das A, De Veciana G. On flat-rate and usage-based pricing for tiered commodity Internet services Ciss 2008, the 42nd Annual Conference On Information Sciences and Systems. 304-308. DOI: 10.1109/CISS.2008.4558540  0.303
2008 Neishaboori A, Kesidis G. Wireless mesh networks based on CDMA Computer Communications. 31: 1513-1528. DOI: 10.1016/J.Comcom.2008.01.020  0.804
2008 Yi S, Deng X, Kesidis G, Das CR. A dynamic quarantine scheme for controlling unresponsive TCP sessions Telecommunication Systems. 37: 169-189. DOI: 10.1007/S11235-008-9104-2  0.339
2008 Sungwon Y, Kappes M, Garg S, Xidong D, Kesidis G, Das CR. Proxy-RED: An AQM scheme for wireless local area networks Wireless Communications and Mobile Computing. 8: 421-434. DOI: 10.1002/wcm.460  0.378
2007 Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs Ieee Journal On Selected Areas in Communications. 25: 1113-1123. DOI: 10.1109/Jsac.2007.070806  0.626
2007 Jeon PB, Kesidis G. GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.43  0.786
2007 Kesidis G, Neishaboori A. Distributed power control in multihop ad hoc CDMA networks Ieee International Conference On Communications. 96-101. DOI: 10.1109/ICC.2007.25  0.786
2007 Kesidis G, Konstantopoulos T, Sousi P. Modeling file-sharing with BitTorrent-like incentives Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: IV1333-IV1336. DOI: 10.1109/ICASSP.2007.367324  0.302
2007 Jhi YC, Liu P, Li L, Gu Q, Jing J, Kesidis G. PWC: A proactive worm containment solution for enterprise networks Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 433-442. DOI: 10.1002/Sec.112  0.782
2006 Hamadeh I, Kesidis G. A taxonomy of internet traceback International Journal of Security and Networks. 1: 54-61. DOI: 10.1504/Ijsn.2006.010823  0.73
2006 Jeon PB, Rao RN, Kesidis G. An overlay framework for QoS management in mobile ad hoc networks 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534721  0.792
2006 Carl G, Kesidis G, Brooks RR, Rai S. Denial-of-service attack-detection techniques Ieee Internet Computing. 10: 82-89. DOI: 10.1109/Mic.2006.5  0.352
2006 Wang J, Miller DJ, Kesidis G. Efficient mining of the multidimensional traffic cluster hierarchy for digesting, visualization, and anomaly identification Ieee Journal On Selected Areas in Communications. 24: 1929-1941. DOI: 10.1109/Jsac.2006.877216  0.308
2006 Jin Y, Kesidis G. Charge sensitive and incentive compatible end-to-end window-based control for selfish users Ieee Journal On Selected Areas in Communications. 24: 952-960. DOI: 10.1109/Jsac.2006.872876  0.576
2006 Mazumdar RR, Courcoubetis CA, Duffield N, Kesidis G, Odlyzko A, Srikant R, Walrand J. Guest Editorial price-based access control and economics of networking Ieee Journal On Selected Areas in Communications. 24: 937-938. DOI: 10.1109/Jsac.2006.872874  0.654
2006 Neishaboori A, Kesidis G. Routing and uplink-downlink scheduling in ad hoc CDMA networks Ieee International Conference On Communications. 2: 926-931. DOI: 10.1109/ICC.2006.254826  0.814
2006 Fayek D, Kesidis G, Vannelli A. Non-linear game models for large-scale network bandwidth management Optimization and Engineering. 7: 421-444. DOI: 10.1007/S11081-006-0348-Y  0.436
2006 Hamadeh I, Kesidis G. Toward a framework for forensic analysis of scanning worms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3995: 282-297. DOI: 10.1007/11766155_20  0.724
2005 Jeon PB, Kesidis G. Pheromone-aided robust multipath and multipriority routing in wireless MANETs Pe-Wasun'05 - Proceedings of the Second Acm International Workshop On Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. 106-113. DOI: 10.1145/1089803.1089974  0.789
2005 Jin Y, Kesidis G. Dynamics of usage-priced communication networks: The case of a single bottleneck resource Ieee/Acm Transactions On Networking. 13: 1041-1053. DOI: 10.1109/Tnet.2005.857120  0.658
2005 Hamadeh I, Hart J, Kesidis G, Pothamsetty V. A preliminary simulation of the effect of scanning worm activity on multicast Proceedings - Workshop On Principles of Advanced and Distributed Simulation, Pads. 191-198. DOI: 10.1109/PADS.2005.2  0.765
2005 Jiwasurat S, Kesidis G, Miller DJ. Hierarchical shaped deficit round-robin scheduling Globecom - Ieee Global Telecommunications Conference. 2: 688-693. DOI: 10.1109/GLOCOM.2005.1577729  0.798
2005 Jeon PB, Kesidis G. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing 43rd Annual Allerton Conference On Communication, Control and Computing 2005. 3: 1656-1665.  0.802
2005 Kesidis G, Hamadeh I, Jiwasurat S. Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms Lecture Notes in Computer Science. 3375: 101-109.  0.768
2004 Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646  0.32
2004 Rao R, Kesidis G. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks Ieee Transactions On Mobile Computing. 3: 225-232. DOI: 10.1109/Tmc.2004.26  0.369
2004 Jiwasurat S, Kesidis G. A class of shaped deficit round-robin (SDRR) schedulers Telecommunication Systems. 25: 173-191. DOI: 10.1023/B:Tels.0000014780.33289.Ad  0.779
2004 Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks Computer Communications. 27: 828-839. DOI: 10.1016/J.Comcom.2004.01.027  0.348
2004 Weaver N, Hamadeh I, Kesidis G, Paxson V. Preliminary results using scale-down to explore worm dynamics Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 65-72.  0.687
2004 Deng X, Yi S, Kesidis G, Das CR. RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 369-374.  0.368
2003 Hamadeh I, Kesidis G. Performance of IP address fragmentation strategies for DDoS traceback Proceedings of the 3rd Ieee Workshop On Ip Operations and Management, Ipom 2003. 1-7. DOI: 10.1109/IPOM.2003.1251217  0.712
2003 Deng X, Yi S, Kesidis G, Das CR. Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance* Teletraffic Science and Engineering. 5: 1281-1290. DOI: 10.1016/S1388-3437(03)80277-9  0.333
2003 Rao R, Kesidis G. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited Globecom - Ieee Global Telecommunications Conference. 5: 2957-2961.  0.36
2003 Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks Proceedings - Ieee Infocom. 2: 1242-1249.  0.334
2003 Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem Proceedings - Ieee Military Communications Conference Milcom. 2: 735-740.  0.305
2002 Jin Y, Kesidis G. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network Ieee Communications Letters. 6: 282-284. DOI: 10.1109/Lcomm.2002.801326  0.574
2000 Kesidis G, Chakraborty K, Tassiulas L. Traffic shaping for a loss system Ieee Communications Letters. 4: 417-419. DOI: 10.1109/4234.898726  0.321
2000 Kesidis G, Konstantopoulos T. Worst-case performance of a buffer with independent shaped arrival processes Ieee Communications Letters. 4: 26-28. DOI: 10.1109/4234.823539  0.392
2000 Kesidis G, Konstantopoulos T. Extremal shape-controlled traffic patterns in high-speed networks Ieee Transactions On Communications. 48: 813-819. DOI: 10.1109/26.843194  0.4
1999 Kesidis G. Bandwidth adjustments using online packet-level measurements Proceedings of Spie. 3841: 230-238. DOI: 10.1117/12.360374  0.46
1998 Hung A, Montpetit MJ, Kesidis G. ATM via satellite: A framework and implementation Wireless Networks. 4: 141-153. DOI: 10.1023/A:1019191619926  0.463
1996 Hung A, Kesidis G. Bandwidth scheduling for wide-area ATM networks using virtual finishing times Ieee/Acm Transactions On Networking. 4: 49-54. DOI: 10.1109/90.503761  0.419
1996 De Veciana G, Kesidis G. Bandwidth allocation for multiple qualities of service using generalized processor sharing Ieee Transactions On Information Theory. 42: 268-272. DOI: 10.1109/18.481801  0.408
1996 de Veciana G, Kesidis G. Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections Ieee International Conference On Communications. 2: 632-636.  0.381
1995 Kesidis G. Analog Optimization with Wong's Stochastic Neural Network Ieee Transactions On Neural Networks. 6: 258-260. DOI: 10.1109/72.363429  0.358
1995 de Veciana G, Kesidis G, Walrand J. Resource Management in Wide-Area ATM Networks Using Effective Bandwidths Ieee Journal On Selected Areas in Communications. 13: 1081-1090. DOI: 10.1109/49.400663  0.699
1995 Courcoubetis C, Kesidis G, Ridder A, Walrand J, Weber R. Admission Control and Routing in ATM Networks using Inferences from Measured Buffer Occupancy Ieee Transactions On Communications. 43: 1778-1784. DOI: 10.1109/26.380228  0.644
1994 Kesidis G, Walrand J. Conservation Relations for Fully Shared Atm Buffers Probability in the Engineering and Informational Sciences. 8: 147-151. DOI: 10.1017/S0269964800003272  0.647
1993 Kesidis G, Walrand J, Chang CS. Effective Bandwidths for Multiclass Markov Fluids and Other ATM Sources Ieee/Acm Transactions On Networking. 1: 424-428. DOI: 10.1109/90.251894  0.626
1993 Kesidis G, Walrand J. Relative entropy between Markov transition rate matrices Ieee Transactions On Information Theory. 39: 1056-1057. DOI: 10.1109/18.256516  0.567
Low-probability matches (unlikely to be authored by this person)
2010 Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A study of non-neutral networks with usage-based prices Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6236: 76-84. DOI: 10.1007/978-3-642-15485-0_8  0.298
2015 Alizadeh M, Scaglione A, Applebaum A, Kesidis G, Levitt K. Reduced-Order Load Models for Large Populations of Flexible Appliances Ieee Transactions On Power Systems. 30: 1758-1774. DOI: 10.1109/Tpwrs.2014.2354345  0.297
2015 Nasiriani N, Wang C, Kesidis G, Urgaonkar B, Chen LY, Birke R. On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 51-60. DOI: 10.1145/2970815  0.297
2007 Kesidis G. An Introduction to Communication Network Analysis An Introduction to Communication Network Analysis. 1-232. DOI: 10.1002/9780470168684  0.294
2004 Jin Y, Kesidis G. TCP window control in a priced network Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 596-600.  0.294
2020 Lotfi MH, Sarkar S, Kesidis G. Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? Ieee Acm Transactions On Networking. 28: 1435-1448. DOI: 10.1109/Tnet.2020.2981259  0.293
2002 Ninan BM, Kesidis G, Devetikiotis M. A simulation study of non-cooperative pricing strategies for circuit-switched optical networks Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2002: 257-263. DOI: 10.1109/MASCOT.2002.1167085  0.287
2008 LLi, PLiu, Kesidis G. Threshold smart walk for the containment of local worm outbreak Globecom - Ieee Global Telecommunications Conference. 2124-2128. DOI: 10.1109/GLOCOM.2008.ECP.409  0.285
1995 Hung A, Kesidis G. Buffer design for wide-area ATM networks using virtual finishing times Ieee International Conference On Communications. 3: 1901-1905.  0.282
2015 Shan Y, Raghuram J, Kesidis G, Miller DJ, Scaglione A, Rowe J, Levitt K. Generation bidding game with potentially false attestation of flexible demand Eurasip Journal On Advances in Signal Processing. 2015. DOI: 10.1186/S13634-015-0212-3  0.28
2012 Miller DJ, Raghuram J, Kesidis G, Collins CM. Improved generative semisupervised learning based on finely grained component-conditional class labeling Neural Computation. 24: 1926-1966. DOI: 10.1162/Neco_A_00284  0.278
1990 Kesidis G, Wong E. Optimal acceptance probability for simulated annealing Stochastics and Stochastic Reports. 29: 221-226. DOI: 10.1080/17442509008833615  0.277
2010 Kesidis G. An introduction to models of online peer-to-peer social networking Synthesis Lectures On Communication Networks. 8: 1-125. DOI: 10.2200/S00313ED1V01Y201011CNT008  0.27
1993 Kesidis G, Walrand J. Quick Simulation of ATM Buffers with on-off Multiclass Markov Fluid Sources Acm Transactions On Modeling and Computer Simulation (Tomacs). 3: 269-276. DOI: 10.1145/174153.174162  0.267
2002 Yi S, Deng X, Kesidis G, Das CR. Providing fairness in diffserv architecture Conference Record / Ieee Global Telecommunications Conference. 2: 1435-1439.  0.265
2014 Raghuram J, Miller DJ, Kesidis G. Instance-level constraint-based semisupervised learning with imposed space-partitioning. Ieee Transactions On Neural Networks and Learning Systems. 25: 1520-37. PMID 25050949 DOI: 10.1109/Tnnls.2013.2294459  0.263
2008 Miller DJ, Zhang Y, Kesidis G. Decision aggregation in distributed classification by a transductive extension of maximum entropy/improved iterative scaling Eurasip Journal On Advances in Signal Processing. 2008. DOI: 10.1155/2008/674974  0.263
2009 Patankar P, Nam G, Kesidis G, Konstantopoulos T, Das CR. Peer-to-peer unstructured anycasting using correlated swarms 21st International Teletraffic Congress, Itc 21: Traffic and Performance Issues in Networks of the Future - Final Programme 0.26
2015 Kesidis G, Shan Y, Urgaonkar B, Liebeherr J. Network calculus for parallel processing Performance Evaluation Review. 43: 48-50. DOI: 10.1145/2825236.2825256  0.258
2014 Kesidis G. A simple two-sided market model with side-payments and ISP service classes Proceedings - Ieee Infocom. 595-597. DOI: 10.1109/INFCOMW.2014.6849298  0.253
2018 Lin Y, Lai Y, Kesidis G, Vasilakos AV. Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations Ieee Systems Journal. 12: 7-9. DOI: 10.1109/Jsyst.2017.2783458  0.252
2001 Milidrag N, Kesidis G, Devetsikiotis M. An overview of fluid-based quick simulation techniques for large packet-switched communication networks Proceedings of Spie - the International Society For Optical Engineering. 4526: 271-277. DOI: 10.1117/12.434403  0.246
2012 Kesidis G. Side-payment profitability under convex demand-response modeling congestion-sensitive applications Ieee International Conference On Communications. 2785-2789. DOI: 10.1109/ICC.2012.6364113  0.245
2016 Qiu Z, Miller DJ, Kesidis G. A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes. Ieee Transactions On Neural Networks and Learning Systems. PMID 26829808 DOI: 10.1109/Tnnls.2016.2514401  0.241
2006 Li L, Liu P, Kesidis G. Visual toolkit for network security experiment specification and data analysis Proceedings of the 3rd International Workshop On Visualization For Computer Security, Vizsec'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 7-14. DOI: 10.1145/1179576.1179579  0.241
2010 Aksu Y, Miller DJ, Kesidis G, Yang QX. Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 21: 701-17. PMID 20194055 DOI: 10.1109/Tnn.2010.2041069  0.24
2002 Deng X, Yi S, Kesidis G, Das CR. Stabilized Virtual Buffer (SVB) - An active queue management scheme for Internet quality-of-service Conference Record / Ieee Global Telecommunications Conference. 2: 1628-1632.  0.239
2020 Kesidis G, Konstantopoulos T, Zazanis MA. The distribution of age-of-information performance measures for message processing systems Queueing Systems. 95: 203-250. DOI: 10.1007/S11134-020-09655-X  0.236
2007 Yi S, Kim BK, Oh J, Jang J, Kesidis G, Das CR. Memory-efficient content filtering hardware for high-speed intrusion detection systems Proceedings of the Acm Symposium On Applied Computing. 264-269. DOI: 10.1145/1244002.1244068  0.235
1996 Kesidis G, Singh A, Cheung D, Kwok WW. Feasibility of fluid event-driven simulation for ATM networks Conference Record / Ieee Global Telecommunications Conference. 3: 2013-2017.  0.234
1997 Kesidis G, McKeown N. Output-buffer ATM packet switching for integrated-services communication networks Ieee International Conference On Communications. 3: 1684-1688.  0.233
2001 Kesidis G, Tassiulas L. General connection blocking bounds and an implication of billing for provisioned label-switched routes in an MPLS internet cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2094: 339-347.  0.233
2011 Aksu Y, Miller DJ, Kesidis G, Bigler DC, Yang QX. An MRI-derived definition of MCI-to-AD conversion for long-term, automatic prognosis of MCI patients. Plos One. 6: e25074. PMID 22022375 DOI: 10.1371/Journal.Pone.0025074  0.232
1994 Kesidis G. Modeling to obtain the effective bandwidth of a traffic source in an ATM network Proceedings of the Ieee International Workshop On Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. 318-322.  0.228
2008 Miller DJ, Wang Y, Kesidis G. Emergent unsupervised clustering paradigms with potential application to bioinformatics. Frontiers in Bioscience : a Journal and Virtual Library. 13: 677-90. PMID 17981579 DOI: 10.2741/2711  0.221
2004 Ji X, Zha H, Metzner JJ, Kesidis G. Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks Ieee International Conference On Communications. 7: 3807-3811.  0.216
2015 Qiu Z, Miller DJ, Kesidis G. Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. 2015. DOI: 10.1109/MLSP.2015.7324326  0.215
2003 Deng X, Yi S, Kesidis G, Das CR. A Control Theoretic Approach for Designing Adaptive AQM Schemes Globecom - Ieee Global Telecommunications Conference. 5: 2947-2951.  0.214
2013 Jin Y, Yi Y, Kesidis G, Kocak F, Shin J. Hybrid client-server and peer-to-peer caching systems with selfish peers Proceedings - Ieee Infocom. 1744-1752. DOI: 10.1109/INFCOM.2013.6566972  0.207
2014 Griffin C, Kesidis G. Behavior in a shared resource game with cooperative, greedy, and vigilante players 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814129  0.205
2006 Rao RN, Kesidis G. On the relation between capacity and number of sinks in an sensor network Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.510  0.199
2002 Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for Bluetooth Ieee International Conference On Communications. 1: 303-307.  0.197
2014 Keltner JR, Fennema-Notestine C, Vaida F, Wang D, Franklin DR, Dworkin RH, Sanders C, McCutchan JA, Archibald SL, Miller DJ, Kesidis G, Cushman C, Kim SM, Abramson I, Taylor MJ, et al. HIV-associated distal neuropathic pain is associated with smaller total cerebral cortical gray matter. Journal of Neurovirology. 20: 209-18. PMID 24549970 DOI: 10.1007/S13365-014-0236-8  0.19
2014 Lotfi MH, Kesidis G, Sarkar S. Market-based power allocation for a differentially priced FDMA system Ieee International Symposium On Information Theory - Proceedings. 1011-1015. DOI: 10.1109/ISIT.2014.6874985  0.183
2015 Wang C, Urgaonkar B, Wang Q, Kesidis G. A hierarchical demand response framework for data center power cost optimization under real-world electricity pricing Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 305-314. DOI: 10.1109/MASCOTS.2014.45  0.183
2003 Rao RN, Kesidis G. Detecting Malicious Packet Dropping Using Traffic Patterns in MANET Journal of Communication and Information Systems. 18: 165-170. DOI: 10.14209/jcis.2003.26  0.182
2012 Miller DJ, Kocak F, Kesidis G. Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. DOI: 10.1109/MLSP.2012.6349793  0.181
2020 Miller DJ, Xiang Z, Kesidis G. Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks Proceedings of the Ieee. 108: 402-433. DOI: 10.1109/JPROC.2020.2970615  0.18
2016 Keltner JR, Connolly CG, Vaida F, Jenkinson M, Fennema-Notestine C, Archibald S, Akkari C, Schlein A, Lee J, Wang D, Kim S, Li H, Rennels A, Miller DJ, Kesidis G, et al. HIV Distal Neuropathic Pain Is Associated with Smaller Ventral Posterior Cingulate Cortex. Pain Medicine (Malden, Mass.). PMID 27497320 DOI: 10.1093/Pm/Pnw180  0.178
2009 Zhang Y, Miller DJ, Kesidis G. Hierarchical maximum entropy modeling for regression Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306225  0.177
2008 Yi S, Deng X, Kesidis G, Das CR. Technique for estimating the number of active flows in high-speed nerworks Etri Journal. 30: 194-204.  0.175
2007 Das A, Kesidis G, Pothamsetty V. Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution Proceedings of the 4th International Conference On Broadband Communications, Networks, Systems, Broadnets. 444-448. DOI: 10.1109/BROADNETS.2007.4550467  0.174
2003 Kesidis G, Konstantopoulos T, Phoha S. Surveillance coverage of sensor networks under a random mobility strategy Proceedings of Ieee Sensors. 2: 961-965.  0.167
2012 Kesidis G, Jin Y. Stochastic loss aversion for random medium access Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 105: 236-247. DOI: 10.1007/978-3-642-35582-0_18  0.164
2003 Yi S, Deng X, Kesidis G, Das CR. HaTCh: A Two-level Caching Scheme for Estimating the Number of Active Flows Proceedings of the Ieee Conference On Decision and Control. 3: 2829-2834.  0.161
2015 He J, Liu B, Bao X, Jin H, Kesidis G. On Privacy Preserving Partial Image Sharing Proceedings - International Conference On Distributed Computing Systems. 2015: 758-759. DOI: 10.1109/ICDCS.2015.95  0.16
2013 Wang C, Urgaonkar B, Wang Q, Kesidis G, Sivasubramaniam A. Data Center power cost optimization via workload modulation Proceedings - 2013 Ieee/Acm 6th International Conference On Utility and Cloud Computing, Ucc 2013. 260-263. DOI: 10.1109/UCC.2013.52  0.157
2006 Carl G, Phoha S, Kesidis G, Madan B. Path preserving scale down for validation of internet inter-domain routing protocols Proceedings - Winter Simulation Conference. 2210-2218. DOI: 10.1109/WSC.2006.323023  0.148
2014 Kocak F, Miller DJ, Kesidis G. Detecting anomalous latent classes in a batch of network traffic flows 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814181  0.145
2019 Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers Ieee Networking Letters. 1: 34-37. DOI: 10.1109/LNET.2019.2893532  0.142
2016 Copos B, Levitt K, Rowe J, Kianmajd P, Chuah CN, Kesidis G. Security and privacy for emerging smart community infrastructures Iotbd 2016 - Proceedings of the International Conference On Internet of Things and Big Data. 148-155.  0.141
2013 Alizadeh M, Scaglione A, Kesidis G. Scalable model predictive control of demand for ancillary services 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 684-689. DOI: 10.1109/SmartGridComm.2013.6688038  0.14
2015 Wang C, Nasiriani N, Kesidis G, Urgaonkar B, Wang Q, Chen LY, Gupta A, Birke R. Recouping energy costs from cloud tenants: Tenant demand response aware pricing design E-Energy 2015 - Proceedings of the 2015 Acm 6th International Conference On Future Energy Systems. 141-150. DOI: 10.1145/2768510.2768541  0.133
2013 Lu H, Pang G, Kesidis G. Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 235-240. DOI: 10.1109/SmartGridComm.2013.6687963  0.131
2020 Xiang Z, Miller DJ, Kesidis G. Detection of Backdoors in Trained Classifiers Without Access to the Training Set. Ieee Transactions On Neural Networks and Learning Systems. PMID 33326384 DOI: 10.1109/TNNLS.2020.3041202  0.129
2012 Pang G, Kesidis G, Konstantopoulos T. Avoiding overages by deferred aggregate demand for PEV charging on the smart grid Ieee International Conference On Communications. 3322-3327. DOI: 10.1109/ICC.2012.6363650  0.126
2006 Kesidis G, Jin Y, Mortazavi B, Konstantopoulos T. An epidemiological model for file-sharing with BitTorrent-like incentives: The case of a fixed peer population Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.430  0.125
2013 Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with dynamic altruism Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 111: 29-42. DOI: 10.1007/978-3-642-36958-2_3  0.118
2011 Griffin C, Kesidis G, Antoniadis P, Fdida S. An epidemic model of bit torrent with control Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5962823  0.118
2007 Wang J, Kesidis G, Miller DJ. New directions in covert malware modeling which exploit white-listing 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567340  0.107
2008 Miller DJ, Zhang Y, Kesidis G. A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 1865-1868. DOI: 10.1109/ICASSP.2008.4517997  0.106
2014 Al-Daoud A, Kesidis G, Liebeherr J. A game of uncoordinated sharing of private spectrum commons Performance Evaluation Review. 42: 42. DOI: 10.1145/2695533.2695550  0.105
2013 Alizadeh M, Kesidis G, Scaglione A. Clustering consumption in queues: A scalable model for electric vehicle scheduling Conference Record - Asilomar Conference On Signals, Systems and Computers. 374-378. DOI: 10.1109/ACSSC.2013.6810299  0.105
2014 Urgaonkar B, Kesidis G, Shanbhag UV, Wang C. Pricing of service in clouds: Optimal response and strategic interactions Performance Evaluation Review. 41: 28-30. DOI: 10.1145/2567529.2567538  0.1
2001 Kesidis G. Scalable resources management using shaped weighted round-robin scheduling Proceedings of Spie - the International Society For Optical Engineering. 4526: 278-286. DOI: 10.1117/12.434404  0.097
2012 Raghuram J, Miller DJ, Kesidis G. Semisupervised domain adaptation for mixture model based classifiers 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310708  0.096
2007 Mortazavi B, Kesidis G. Cumulative reputation systems for peer-to-peer content distribution 2006 Ieee Conference On Information Sciences and Systems, Ciss 2006 - Proceedings. 1546-1552. DOI: 10.1109/CISS.2006.286385  0.094
2009 Gunwoo N, Pushkar P, Lim SH, Bikash S, Kesidis G, Das CR. Clock-like flow replacement schemes for resilient flow monitoring Proceedings - International Conference On Distributed Computing Systems. 129-136. DOI: 10.1109/ICDCS.2009.53  0.094
2016 Shan Y, Kesidis G. Optimal power flow with random wind resources Proceedings of the Annual Hawaii International Conference On System Sciences. 2016: 2426-2434. DOI: 10.1109/HICSS.2016.303  0.09
2010 Kesidis G, Jin Y, Azad AP, Altman E. Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior Proceedings of the Ieee Conference On Decision and Control. 1071-1075. DOI: 10.1109/CDC.2010.5717121  0.09
2005 Tirta Y, Lau B, Malhotra N, Bagchi S, Li Z, Lu YH, Cao G, Kesidis G, LaPorta T, Yao B, Roy S, Saberi A, Herlugson K, Lian J, Naik K, et al. Purposeful Mobility and Navigation Sensor Network Operations. 91-183. DOI: 10.1002/9780471784173.ch3  0.086
2006 Wang J, Hamadeh L, Kesidis G, Miller DJ. Polymorphic worm detection and defense: System design, experimental methodology, and data resources Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 169-176. DOI: 10.1145/1162666.1162676  0.078
2009 Miller DJ, Lin CF, Kesidis G, Collins CM. Semisupervised mixture modeling with fine-grained component-conditional class labeling and transductive inference Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306229  0.078
2008 Zhang Y, Aksu Y, Kesidis G, Miller DJ, Wang Y. SVM margin-based feature elimination applied to high-dimensional microarray gene expression data Proceedings of the 2008 Ieee Workshop On Machine Learning For Signal Processing, Mlsp 2008. 97-102. DOI: 10.1109/MLSP.2008.4685462  0.077
2015 Alizadeh M, Scaglione A, Goldsmith A, Kesidis G. Capturing aggregate flexibility in Demand Response Proceedings of the Ieee Conference On Decision and Control. 2015: 6439-6445. DOI: 10.1109/CDC.2014.7040399  0.069
2021 Xiang Z, Miller DJ, Wang H, Kesidis G. Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs without Access to the Training Set. Neural Computation. 1-43. PMID 33617746 DOI: 10.1162/neco_a_01376  0.068
2009 Nam G, Patankar P, Kesidis G, Das CR, Seren C. Mass purging of stale TCP flows in per-flow monitoring systems Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235390  0.066
2007 Aksu Y, Kesidis G, Miller DJ. Scalable, efficient, stepwise-optimal feature elimination in support vector machines Machine Learning For Signal Processing 17 - Proceedings of the 2007 Ieee Signal Processing Society Workshop, Mlsp. 75-80. DOI: 10.1109/MLSP.2007.4414285  0.063
2020 Liu W, John M, Karrenbauer A, Allerhand A, Lombardi F, Shulte M, Miller DJ, Xiang Z, Kesidis G, Oulasvirta A, Dayama NR, Shiripour M. Scanning the Issue Proceedings of the Ieee. 108: 400-401. DOI: 10.1109/jproc.2020.2975522  0.06
2017 Shan Y, Lo Prete C, Kesidis G, Miller DJ. A simulation framework for uneconomic virtual bidding in day-ahead electricity markets Acm Sigmetrics Performance Evaluation Review. 44: 30-30. DOI: 10.1145/3040230.3040238  0.058
2010 Caron S, Kesidis G, Altman E. Application neutrality and a paradox of side payments Proceedings of the Re-Architecting the Internet (Rearch) Workshop, Held in Conjunction With Conext 2010. DOI: 10.1145/1921233.1921245  0.05
2005 Fahmy S, Kesidis G, Weaver N. Message from the general chair and program chairs 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005. DOI: 10.1109/NPSEC.2005.1532043  0.041
2010 Miller DJ, Lin CF, Kesidis G, Collins CM. Improved fine-grained component-conditional class labeling with active learning Proceedings - 9th International Conference On Machine Learning and Applications, Icmla 2010. 3-8. DOI: 10.1109/ICMLA.2010.8  0.04
2017 Wang C, Urgaonkar B, Nasiriani N, Kesidis G. Using Burstable Instances in the Public Cloud Acm Sigmetrics Performance Evaluation Review. 45: 56-56. DOI: 10.1145/3143314.3078591  0.038
2017 Wang C, Urgaonkar B, Nasiriani N, Kesidis G. Using Burstable Instances in the Public Cloud Proceedings of the Acm On Measurement and Analysis of Computing Systems. 1: 1-28. DOI: 10.1145/3084448  0.038
1997 Montpetit M, Kesidis G. Broadband Via Satellite Ieee Communications Magazine. 35: 28-28. DOI: 10.1109/MCOM.1997.601739  0.034
2007 Kesidis G, Modiano K, Srikant K. Message from the technical program committee co-chairs Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2007.3  0.03
2007 Papazisis G, Katsigiannopoulos K, Nikolaou K, Theodorides N, Kazantzidou E, Kefalas A, Papadopoulou V, Kesidis G, Danana E, Dyntsikou D, Rongotis C. Minorities in a detoxififcation unit in Greece: I. Socio-demographic characteristics European Psychiatry. 22: S195-S196. DOI: 10.1016/j.eurpsy.2007.01.647  0.014
2007 Nikolaou K, Papazisis G, Katsigiannopoulos K, Kazantzidou E, Kefalas A, Papadopoulou V, Kesidis G, Alektoridis P, Theodorides N, Dyntsikou D, Rongotis C. Minorities in a detoxification unit in Greece: II. Clinical characteristics European Psychiatry. 22: S196. DOI: 10.1016/j.eurpsy.2007.01.648  0.01
Hide low-probability matches.