George Kesidis - Publications

Affiliations: 
Pennsylvania State University, State College, PA, United States 
Area:
Computer Science

165 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Keltner JR, Connolly CG, Vaida F, Jenkinson M, Fennema-Notestine C, Archibald S, Akkari C, Schlein A, Lee J, Wang D, Kim S, Li H, Rennels A, Miller DJ, Kesidis G, et al. HIV Distal Neuropathic Pain Is Associated with Smaller Ventral Posterior Cingulate Cortex. Pain Medicine (Malden, Mass.). PMID 27497320 DOI: 10.1093/pm/pnw180  0.48
2016 Qiu Z, Miller DJ, Kesidis G. A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes. Ieee Transactions On Neural Networks and Learning Systems. PMID 26829808 DOI: 10.1109/TNNLS.2016.2514401  1
2016 Shah V, de Veciana G, Kesidis G. A Stable Approach for Routing Queries in Unstructured P2P Networks Ieee/Acm Transactions On Networking. DOI: 10.1109/TNET.2015.2509967  1
2016 Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Dynamic virtualized network function allocation in a multi-cloud environment 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500394  1
2016 Shan Y, Kesidis G. Optimal power flow with random wind resources Proceedings of the Annual Hawaii International Conference On System Sciences. 2016: 2426-2434. DOI: 10.1109/HICSS.2016.303  1
2016 Copos B, Levitt K, Rowe J, Kianmajd P, Chuah CN, Kesidis G. Security and privacy for emerging smart community infrastructures Iotbd 2016 - Proceedings of the International Conference On Internet of Things and Big Data. 148-155.  1
2015 Shan Y, Raghuram J, Kesidis G, Miller DJ, Scaglione A, Rowe J, Levitt K. Generation bidding game with potentially false attestation of flexible demand Eurasip Journal On Advances in Signal Processing. 2015. DOI: 10.1186/s13634-015-0212-3  1
2015 Kesidis G, Shan Y, Urgaonkar B, Liebeherr J. Network calculus for parallel processing Performance Evaluation Review. 43: 48-50. DOI: 10.1145/2825236.2825256  1
2015 Wang C, Nasiriani N, Kesidis G, Urgaonkar B, Wang Q, Chen LY, Gupta A, Birke R. Recouping energy costs from cloud tenants: Tenant demand response aware pricing design E-Energy 2015 - Proceedings of the 2015 Acm 6th International Conference On Future Energy Systems. 141-150. DOI: 10.1145/2768510.2768541  1
2015 Alizadeh M, Scaglione A, Applebaum A, Kesidis G, Levitt K. Reduced-Order Load Models for Large Populations of Flexible Appliances Ieee Transactions On Power Systems. 30: 1758-1774. DOI: 10.1109/TPWRS.2014.2354345  1
2015 Kurve A, Miller DJ, Kesidis G. Multicategory crowdsourcing accounting for variable task difficulty, worker skill, and worker intention Ieee Transactions On Knowledge and Data Engineering. 27: 794-809. DOI: 10.1109/TKDE.2014.2327026  1
2015 Qiu Z, Miller DJ, Kesidis G. Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. 2015. DOI: 10.1109/MLSP.2015.7324326  1
2015 Nasiriani N, Wang C, Kesidis G, Urgaonkar B, Chen LY, Birke R. On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 51-60. DOI: 10.1109/MASCOTS.2015.23  1
2015 Wang C, Urgaonkar B, Wang Q, Kesidis G. A hierarchical demand response framework for data center power cost optimization under real-world electricity pricing Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2015: 305-314. DOI: 10.1109/MASCOTS.2014.45  1
2015 He J, Liu B, Bao X, Jin H, Kesidis G. On Privacy Preserving Partial Image Sharing Proceedings - International Conference On Distributed Computing Systems. 2015: 758-759. DOI: 10.1109/ICDCS.2015.95  1
2015 Alizadeh M, Scaglione A, Goldsmith A, Kesidis G. Capturing aggregate flexibility in Demand Response Proceedings of the Ieee Conference On Decision and Control. 2015: 6439-6445. DOI: 10.1109/CDC.2014.7040399  1
2014 Raghuram J, Miller DJ, Kesidis G. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. Journal of Advanced Research. 5: 423-33. PMID 25685511 DOI: 10.1016/j.jare.2014.01.001  1
2014 Raghuram J, Miller DJ, Kesidis G. Instance-level constraint-based semisupervised learning with imposed space-partitioning. Ieee Transactions On Neural Networks and Learning Systems. 25: 1520-37. PMID 25050949 DOI: 10.1109/TNNLS.2013.2294459  1
2014 Keltner JR, Fennema-Notestine C, Vaida F, Wang D, Franklin DR, Dworkin RH, Sanders C, McCutchan JA, Archibald SL, Miller DJ, Kesidis G, Cushman C, Kim SM, Abramson I, Taylor MJ, et al. HIV-associated distal neuropathic pain is associated with smaller total cerebral cortical gray matter. Journal of Neurovirology. 20: 209-18. PMID 24549970 DOI: 10.1007/s13365-014-0236-8  1
2014 Lotfi MH, Kesidis G, Sarkar S. Network non neutrality on the internet: Content provision under a subscription revenue model Performance Evaluation Review. 42: 44. DOI: 10.1145/2695533.2695552  1
2014 Al-Daoud A, Kesidis G, Liebeherr J. A game of uncoordinated sharing of private spectrum commons Performance Evaluation Review. 42: 42. DOI: 10.1145/2695533.2695550  1
2014 Urgaonkar B, Kesidis G, Shanbhag UV, Wang C. Pricing of service in clouds: Optimal response and strategic interactions Performance Evaluation Review. 41: 28-30. DOI: 10.1145/2567529.2567538  1
2014 Jin Y, Kesidis G, Shin J, Kocak F, Yi Y. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/TNET.2014.2347035  1
2014 Daoud AA, Kesidis G, Liebeherr J. Zero-determinant strategies: A game-theoretic approach for sharing licensed spectrum bands Ieee Journal On Selected Areas in Communications. 32: 2297-2308. DOI: 10.1109/JSAC.2014.141126  1
2014 Lotfi MH, Kesidis G, Sarkar S. Market-based power allocation for a differentially priced FDMA system Ieee International Symposium On Information Theory - Proceedings. 1011-1015. DOI: 10.1109/ISIT.2014.6874985  1
2014 Kesidis G. A simple two-sided market model with side-payments and ISP service classes Proceedings - Ieee Infocom. 595-597. DOI: 10.1109/INFCOMW.2014.6849298  1
2014 Kocak F, Miller DJ, Kesidis G. Detecting anomalous latent classes in a batch of network traffic flows 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814181  1
2014 Griffin C, Kesidis G. Behavior in a shared resource game with cooperative, greedy, and vigilante players 2014 48th Annual Conference On Information Sciences and Systems, Ciss 2014. DOI: 10.1109/CISS.2014.6814129  1
2014 Kocak F, Kesidis G, Fdida S. Network Neutrality with Content Caching and Its Effect on Access Pricing Smart Data Pricing. 47-66. DOI: 10.1002/9781118899250.ch3  1
2013 Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with conditionally altruistic users Eurasip Journal On Wireless Communications and Networking. 2013. DOI: 10.1186/1687-1499-2013-202  1
2013 Wang C, Urgaonkar B, Wang Q, Kesidis G, Sivasubramaniam A. Data Center power cost optimization via workload modulation Proceedings - 2013 Ieee/Acm 6th International Conference On Utility and Cloud Computing, Ucc 2013. 260-263. DOI: 10.1109/UCC.2013.52  1
2013 Jin Y, Kesidis G, Jang JW. Diffusion dynamics of network technologies with bounded rational users: Aspiration-based learning Ieee/Acm Transactions On Networking. 21: 28-40. DOI: 10.1109/TNET.2012.2189891  1
2013 He J, Miller DJ, Kesidis G. Latent interest-group discovery and management by peer-to-peer online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 162-167. DOI: 10.1109/SocialCom.2013.31  1
2013 Kocak F, Kesidis G, Pham TM, Fdida S. The effect of caching on a model of content and access provider revenues in Information-Centric Networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 45-50. DOI: 10.1109/SocialCom.2013.13  1
2013 Alizadeh M, Scaglione A, Kesidis G. Scalable model predictive control of demand for ancillary services 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 684-689. DOI: 10.1109/SmartGridComm.2013.6688038  1
2013 Lu H, Pang G, Kesidis G. Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 235-240. DOI: 10.1109/SmartGridComm.2013.6687963  1
2013 Jin Y, Yi Y, Kesidis G, Kocak F, Shin J. Hybrid client-server and peer-to-peer caching systems with selfish peers Proceedings - Ieee Infocom. 1744-1752. DOI: 10.1109/INFCOM.2013.6566972  1
2013 Alizadeh M, Kesidis G, Scaglione A. Clustering consumption in queues: A scalable model for electric vehicle scheduling Conference Record - Asilomar Conference On Signals, Systems and Computers. 374-378. DOI: 10.1109/ACSSC.2013.6810299  1
2013 Kurve A, Griffin C, Miller DJ, Kesidis G. Optimizing cluster formation in super-peer networks via local incentive design Peer-to-Peer Networking and Applications. 8: 1-21. DOI: 10.1007/s12083-013-0206-6  1
2013 Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A model of network neutrality with usage-based prices Telecommunication Systems. 52: 601-609. DOI: 10.1007/s11235-011-9504-6  1
2013 Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with dynamic altruism Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 111: 29-42. DOI: 10.1007/978-3-642-36958-2_3  1
2013 Kurve A, Miller DJ, Kesidis G. Defeating tyranny of the masses in crowdsourcing: Accounting for low-skilled and adversarial workers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8252: 140-153. DOI: 10.1007/978-3-319-02786-9_9  1
2012 Miller DJ, Raghuram J, Kesidis G, Collins CM. Improved generative semisupervised learning based on finely grained component-conditional class labeling Neural Computation. 24: 1926-1966. DOI: 10.1162/NECO_a_00284  1
2012 Miller DJ, Kocak F, Kesidis G. Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection Ieee International Workshop On Machine Learning For Signal Processing, Mlsp. DOI: 10.1109/MLSP.2012.6349793  1
2012 Jin Y, Kesidis G, Jang JW. A channel aware MAC protocol in an ALOHA network with selfish users Ieee Journal On Selected Areas in Communications. 30: 128-137. DOI: 10.1109/JSAC.2012.120112  1
2012 Shah V, De Veciana G, Kesidis G. Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints Proceedings - Ieee Infocom. 2327-2335. DOI: 10.1109/INFCOM.2012.6195620  1
2012 Kesidis G. Side-payment profitability under convex demand-response modeling congestion-sensitive applications Ieee International Conference On Communications. 2785-2789. DOI: 10.1109/ICC.2012.6364113  1
2012 Kesidis G, Kurve A. A study of unsupervised adaptive crowdsourcing Ieee International Conference On Communications. 1438-1442. DOI: 10.1109/ICC.2012.6364014  1
2012 Pang G, Kesidis G, Konstantopoulos T. Avoiding overages by deferred aggregate demand for PEV charging on the smart grid Ieee International Conference On Communications. 3322-3327. DOI: 10.1109/ICC.2012.6363650  1
2012 Kurve A, Pang G, Kesidis G, De Veciana G. Decentralized capacity reallocation for a loss network 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310748  1
2012 Raghuram J, Miller DJ, Kesidis G. Semisupervised domain adaptation for mixture model based classifiers 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310708  1
2012 Kesidis G, Jin Y. Stochastic loss aversion for random medium access Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 105: 236-247. DOI: 10.1007/978-3-642-35582-0_18  1
2011 Aksu Y, Miller DJ, Kesidis G, Bigler DC, Yang QX. An MRI-derived definition of MCI-to-AD conversion for long-term, automatic prognosis of MCI patients. Plos One. 6: e25074. PMID 22022375 DOI: 10.1371/journal.pone.0025074  1
2011 Zou G, Kesidis G, Miller DJ. A flow classifier with tamper-resistant features and an evaluation of its portability to new domains Ieee Journal On Selected Areas in Communications. 29: 1449-1460. DOI: 10.1109/JSAC.2011.110810  1
2011 Kurve A, Kesidis G. Sybil detection via distributed sparse cut monitoring Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5963402  1
2011 Griffin C, Kesidis G, Antoniadis P, Fdida S. An epidemic model of bit torrent with control Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5962823  1
2011 Kurve A, Griffin C, Kesidis G. Iterative partitioning scheme for distributed simulation of dynamic networks 2011 Ieee 16th International Workshop On Computer Aided Modeling and Design of Communication Links and Networks, Camad 2011. 92-96. DOI: 10.1109/CAMAD.2011.5941125  1
2011 Carl G, Kesidis G. Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra Computer Networks. 55: 2361-2379. DOI: 10.1016/j.comnet.2011.03.013  1
2010 Aksu Y, Miller DJ, Kesidis G, Yang QX. Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 21: 701-17. PMID 20194055 DOI: 10.1109/TNN.2010.2041069  1
2010 Kesidis G. An introduction to models of online peer-to-peer social networking Synthesis Lectures On Communication Networks. 8: 1-125. DOI: 10.2200/S00313ED1V01Y201011CNT008  1
2010 Caron S, Kesidis G, Altman E. Application neutrality and a paradox of side payments Proceedings of the Re-Architecting the Internet (Rearch) Workshop, Held in Conjunction With Conext 2010. DOI: 10.1145/1921233.1921245  1
2010 Neishaboori A, Das A, Kesidis G. A relaying enticement mechanism for wireless CDMA mesh networks 33rd Ieee Sarnoff Symposium 2010, Conference Proceedings. DOI: 10.1109/SARNOF.2010.5469707  1
2010 Miller DJ, Lin CF, Kesidis G, Collins CM. Improved fine-grained component-conditional class labeling with active learning Proceedings - 9th International Conference On Machine Learning and Applications, Icmla 2010. 3-8. DOI: 10.1109/ICMLA.2010.8  1
2010 Tangpong A, Kesidis G. File-sharing costs and quality-of-service 2010 44th Annual Conference On Information Sciences and Systems, Ciss 2010. DOI: 10.1109/CISS.2010.5464800  1
2010 Kesidis G, Jin Y, Azad AP, Altman E. Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior Proceedings of the Ieee Conference On Decision and Control. 1071-1075. DOI: 10.1109/CDC.2010.5717121  1
2010 Choi YH, Li L, Liu P, Kesidis G. Worm virulence estimation for the containment of local worm outbreak Computers and Security. 29: 104-123. DOI: 10.1016/j.cose.2009.07.002  1
2010 Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A study of non-neutral networks with usage-based prices Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6236: 76-84. DOI: 10.1007/978-3-642-15485-0_8  1
2009 Miller DJ, Lin CF, Kesidis G, Collins CM. Semisupervised mixture modeling with fine-grained component-conditional class labeling and transductive inference Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306229  1
2009 Zhang Y, Miller DJ, Kesidis G. Hierarchical maximum entropy modeling for regression Machine Learning For Signal Processing Xix - Proceedings of the 2009 Ieee Signal Processing Society Workshop, Mlsp 2009. DOI: 10.1109/MLSP.2009.5306225  1
2009 Kesidis G, Tangpong A, Griffin C. A sybil-proof referral system based on multiplicative reputation chains Ieee Communications Letters. 13: 862-864. DOI: 10.1109/LCOMM.2009.091400  1
2009 Gunwoo N, Pushkar P, Lim SH, Bikash S, Kesidis G, Das CR. Clock-like flow replacement schemes for resilient flow monitoring Proceedings - International Conference On Distributed Computing Systems. 129-136. DOI: 10.1109/ICDCS.2009.53  1
2009 Nam G, Patankar P, Kesidis G, Das CR, Seren C. Mass purging of stale TCP flows in per-flow monitoring systems Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235390  1
2009 Tangpong A, Kesidis G, Hsu HY, Hurson A. Robust sybil detection for MANETs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235387  1
2009 Tangpong A, Kesidis G. A simple reputation model for BitTorrent-like incentives Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 603-610. DOI: 10.1109/GAMENETS.2009.5137450  1
2009 Das A, Neishaboori A, Kesidis G. Wireless mesh networking games Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 565-574. DOI: 10.1109/GAMENETS.2009.5137446  1
2009 Kesidis G, Konstantopoulos T, Sousi P. A stochastic epidemiological model and a deterministic limit for bitTorrent-like peer-to-peer file-sharing networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5425: 26-36. DOI: 10.1007/978-3-642-00393-6_4  1
2009 Patankar P, Nam G, Kesidis G, Konstantopoulos T, Das CR. Peer-to-peer unstructured anycasting using correlated swarms 21st International Teletraffic Congress, Itc 21: Traffic and Performance Issues in Networks of the Future - Final Programme 1
2008 Miller DJ, Wang Y, Kesidis G. Emergent unsupervised clustering paradigms with potential application to bioinformatics. Frontiers in Bioscience : a Journal and Virtual Library. 13: 677-90. PMID 17981579 DOI: 10.2741/2711  1
2008 Miller DJ, Zhang Y, Kesidis G. Decision aggregation in distributed classification by a transductive extension of maximum entropy/improved iterative scaling Eurasip Journal On Advances in Signal Processing. 2008. DOI: 10.1155/2008/674974  1
2008 Carl G, Kesidis G. Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1371574.1371577  1
2008 Kesidis G, Hamadeh I, Jin Y, Jiwasurat S, Vojnovì M. A model of the spread of randomly scanning Internet worms that saturate access links Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1346325.1346327  1
2008 Zhang Y, Aksu Y, Kesidis G, Miller DJ, Wang Y. SVM margin-based feature elimination applied to high-dimensional microarray gene expression data Proceedings of the 2008 Ieee Workshop On Machine Learning For Signal Processing, Mlsp 2008. 97-102. DOI: 10.1109/MLSP.2008.4685462  1
2008 Neishaboori A, Kesidis G. SINR-sensitive routing in wireless 802.11 mesh networks 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 623-628. DOI: 10.1109/MAHSS.2008.4660103  1
2008 Patankar P, Nam G, Kesidis G, Das CR. Exploring anti-spam models in large scale VoIP systems Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 85-92. DOI: 10.1109/ICDCS.2008.71  1
2008 Miller DJ, Zhang Y, Kesidis G. A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 1865-1868. DOI: 10.1109/ICASSP.2008.4517997  1
2008 LLi, PLiu, Kesidis G. Threshold smart walk for the containment of local worm outbreak Globecom - Ieee Global Telecommunications Conference. 2124-2128. DOI: 10.1109/GLOCOM.2008.ECP.409  1
2008 Kesidis G, Das A, De Veciana G. On flat-rate and usage-based pricing for tiered commodity Internet services Ciss 2008, the 42nd Annual Conference On Information Sciences and Systems. 304-308. DOI: 10.1109/CISS.2008.4558540  1
2008 Neishaboori A, Kesidis G. Wireless mesh networks based on CDMA Computer Communications. 31: 1513-1528. DOI: 10.1016/j.comcom.2008.01.020  1
2008 Yi S, Deng X, Kesidis G, Das CR. A dynamic quarantine scheme for controlling unresponsive TCP sessions Telecommunication Systems. 37: 169-189. DOI: 10.1007/s11235-008-9104-2  1
2008 Sungwon Y, Kappes M, Garg S, Xidong D, Kesidis G, Das CR. Proxy-RED: An AQM scheme for wireless local area networks Wireless Communications and Mobile Computing. 8: 421-434. DOI: 10.1002/wcm.460  1
2008 Yi S, Deng X, Kesidis G, Das CR. Technique for estimating the number of active flows in high-speed nerworks Etri Journal. 30: 194-204.  1
2007 Yi S, Kim BK, Oh J, Jang J, Kesidis G, Das CR. Memory-efficient content filtering hardware for high-speed intrusion detection systems Proceedings of the Acm Symposium On Applied Computing. 264-269. DOI: 10.1145/1244002.1244068  1
2007 Jhi YC, Liu P, Li L, Gu Q, Jing J, Kesidis G. PWC: A proactive worm containment solution for enterprise networks Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 433-442. DOI: 10.1109/SECCOM.2007.4550364  1
2007 Wang J, Kesidis G, Miller DJ. New directions in covert malware modeling which exploit white-listing 2007 Ieee Sarnoff Symposium, Sarnoff. DOI: 10.1109/SARNOF.2007.4567340  1
2007 Aksu Y, Kesidis G, Miller DJ. Scalable, efficient, stepwise-optimal feature elimination in support vector machines Machine Learning For Signal Processing 17 - Proceedings of the 2007 Ieee Signal Processing Society Workshop, Mlsp. 75-80. DOI: 10.1109/MLSP.2007.4414285  1
2007 Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs Ieee Journal On Selected Areas in Communications. 25: 1113-1123. DOI: 10.1109/JSAC.2007.070806  1
2007 Kesidis G, Modiano K, Srikant K. Message from the technical program committee co-chairs Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2007.3  1
2007 Jeon PB, Kesidis G. GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.43  1
2007 Kesidis G, Neishaboori A. Distributed power control in multihop ad hoc CDMA networks Ieee International Conference On Communications. 96-101. DOI: 10.1109/ICC.2007.25  1
2007 Kesidis G, Konstantopoulos T, Sousi P. Modeling file-sharing with BitTorrent-like incentives Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: IV1333-IV1336. DOI: 10.1109/ICASSP.2007.367324  1
2007 Mortazavi B, Kesidis G. Cumulative reputation systems for peer-to-peer content distribution 2006 Ieee Conference On Information Sciences and Systems, Ciss 2006 - Proceedings. 1546-1552. DOI: 10.1109/CISS.2006.286385  1
2007 Das A, Kesidis G, Pothamsetty V. Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution Proceedings of the 4th International Conference On Broadband Communications, Networks, Systems, Broadnets. 444-448. DOI: 10.1109/BROADNETS.2007.4550467  1
2007 Kesidis G. An Introduction to Communication Network Analysis An Introduction to Communication Network Analysis. 1-232. DOI: 10.1002/9780470168684  1
2006 Li L, Liu P, Kesidis G. Visual toolkit for network security experiment specification and data analysis Proceedings of the 3rd International Workshop On Visualization For Computer Security, Vizsec'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 7-14. DOI: 10.1145/1179576.1179579  1
2006 Wang J, Hamadeh L, Kesidis G, Miller DJ. Polymorphic worm detection and defense: System design, experimental methodology, and data resources Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 169-176. DOI: 10.1145/1162666.1162676  1
2006 Carl G, Phoha S, Kesidis G, Madan B. Path preserving scale down for validation of internet inter-domain routing protocols Proceedings - Winter Simulation Conference. 2210-2218. DOI: 10.1109/WSC.2006.323023  1
2006 Jeon PB, Rao RN, Kesidis G. An overlay framework for QoS management in mobile ad hoc networks 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534721  1
2006 Carl G, Kesidis G, Brooks RR, Rai S. Denial-of-service attack-detection techniques Ieee Internet Computing. 10: 82-89. DOI: 10.1109/MIC.2006.5  1
2006 Wang J, Miller DJ, Kesidis G. Efficient mining of the multidimensional traffic cluster hierarchy for digesting, visualization, and anomaly identification Ieee Journal On Selected Areas in Communications. 24: 1929-1941. DOI: 10.1109/JSAC.2006.877216  1
2006 Jin Y, Kesidis G. Charge sensitive and incentive compatible end-to-end window-based control for selfish users Ieee Journal On Selected Areas in Communications. 24: 952-960. DOI: 10.1109/JSAC.2006.872876  1
2006 Mazumdar RR, Courcoubetis CA, Duffield N, Kesidis G, Odlyzko A, Srikant R, Walrand J. Guest Editorial price-based access control and economics of networking Ieee Journal On Selected Areas in Communications. 24: 937-938. DOI: 10.1109/JSAC.2006.872874  1
2006 Neishaboori A, Kesidis G. Routing and uplink-downlink scheduling in ad hoc CDMA networks Ieee International Conference On Communications. 2: 926-931. DOI: 10.1109/ICC.2006.254826  1
2006 Rao RN, Kesidis G. On the relation between capacity and number of sinks in an sensor network Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.510  1
2006 Kesidis G, Jin Y, Mortazavi B, Konstantopoulos T. An epidemiological model for file-sharing with BitTorrent-like incentives: The case of a fixed peer population Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2006.430  1
2006 Fayek D, Kesidis G, Vannelli A. Non-linear game models for large-scale network bandwidth management Optimization and Engineering. 7: 421-444. DOI: 10.1007/s11081-006-0348-y  1
2006 Hamadeh I, Kesidis G. Toward a framework for forensic analysis of scanning worms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3995: 282-297. DOI: 10.1007/11766155_20  1
2006 Hamadeh I, Kesidis G. A taxonomy of internet traceback International Journal of Security and Networks. 1: 54-61.  1
2005 Jeon PB, Kesidis G. Pheromone-aided robust multipath and multipriority routing in wireless MANETs Pe-Wasun'05 - Proceedings of the Second Acm International Workshop On Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. 106-113. DOI: 10.1145/1089803.1089974  1
2005 Jin Y, Kesidis G. Dynamics of usage-priced communication networks: The case of a single bottleneck resource Ieee/Acm Transactions On Networking. 13: 1041-1053. DOI: 10.1109/TNET.2005.857120  1
2005 Hamadeh I, Hart J, Kesidis G, Pothamsetty V. A preliminary simulation of the effect of scanning worm activity on multicast Proceedings - Workshop On Principles of Advanced and Distributed Simulation, Pads. 191-198. DOI: 10.1109/PADS.2005.2  1
2005 Fahmy S, Kesidis G, Weaver N. Message from the general chair and program chairs 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005. DOI: 10.1109/NPSEC.2005.1532043  1
2005 Jiwasurat S, Kesidis G, Miller DJ. Hierarchical shaped deficit round-robin scheduling Globecom - Ieee Global Telecommunications Conference. 2: 688-693. DOI: 10.1109/GLOCOM.2005.1577729  1
2005 Tirta Y, Lau B, Malhotra N, Bagchi S, Li Z, Lu YH, Cao G, Kesidis G, LaPorta T, Yao B, Roy S, Saberi A, Herlugson K, Lian J, Naik K, et al. Purposeful Mobility and Navigation Sensor Network Operations. 91-183. DOI: 10.1002/9780471784173.ch3  1
2005 Jeon PB, Kesidis G. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing 43rd Annual Allerton Conference On Communication, Control and Computing 2005. 3: 1656-1665.  1
2005 Kesidis G, Hamadeh I, Jiwasurat S. Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms Lecture Notes in Computer Science. 3375: 101-109.  1
2004 Rao R, Kesidis G. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks Ieee Transactions On Mobile Computing. 3: 225-232. DOI: 10.1109/TMC.2004.26  1
2004 Jiwasurat S, Kesidis G. A class of shaped deficit round-robin (SDRR) schedulers Telecommunication Systems. 25: 173-191. DOI: 10.1023/B:TELS.0000014780.33289.ad  1
2004 Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks Computer Communications. 27: 828-839. DOI: 10.1016/j.comcom.2004.01.027  1
2004 Jin Y, Kesidis G. TCP window control in a priced network Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 596-600.  1
2004 Weaver N, Hamadeh I, Kesidis G, Paxson V. Preliminary results using scale-down to explore worm dynamics Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 65-72.  1
2004 Ji X, Zha H, Metzner JJ, Kesidis G. Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks Ieee International Conference On Communications. 7: 3807-3811.  1
2004 Deng X, Yi S, Kesidis G, Das CR. RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 369-374.  1
2003 Hamadeh I, Kesidis G. Performance of IP address fragmentation strategies for DDoS traceback Proceedings of the 3rd Ieee Workshop On Ip Operations and Management, Ipom 2003. 1-7. DOI: 10.1109/IPOM.2003.1251217  1
2003 Rao R, Kesidis G. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited Globecom - Ieee Global Telecommunications Conference. 5: 2957-2961.  1
2003 Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks Proceedings - Ieee Infocom. 2: 1242-1249.  1
2003 Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem Proceedings - Ieee Military Communications Conference Milcom. 2: 735-740.  1
2003 Kesidis G, Konstantopoulos T, Phoha S. Surveillance coverage of sensor networks under a random mobility strategy Proceedings of Ieee Sensors. 2: 961-965.  1
2003 Yi S, Deng X, Kesidis G, Das CR. HaTCh: A Two-level Caching Scheme for Estimating the Number of Active Flows Proceedings of the Ieee Conference On Decision and Control. 3: 2829-2834.  1
2003 Deng X, Yi S, Kesidis G, Das CR. A Control Theoretic Approach for Designing Adaptive AQM Schemes Globecom - Ieee Global Telecommunications Conference. 5: 2947-2951.  1
2002 Ninan BM, Kesidis G, Devetikiotis M. A simulation study of non-cooperative pricing strategies for circuit-switched optical networks Proceedings - Ieee Computer Society's Annual International Symposium On Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Mascots. 2002: 257-263. DOI: 10.1109/MASCOT.2002.1167085  1
2002 Jin Y, Kesidis G. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network Ieee Communications Letters. 6: 282-284. DOI: 10.1109/LCOMM.2002.801326  1
2002 Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for Bluetooth Ieee International Conference On Communications. 1: 303-307.  1
2002 Yi S, Deng X, Kesidis G, Das CR. Providing fairness in diffserv architecture Conference Record / Ieee Global Telecommunications Conference. 2: 1435-1439.  1
2002 Deng X, Yi S, Kesidis G, Das CR. Stabilized Virtual Buffer (SVB) - An active queue management scheme for Internet quality-of-service Conference Record / Ieee Global Telecommunications Conference. 2: 1628-1632.  1
2001 Kesidis G. Scalable resources management using shaped weighted round-robin scheduling Proceedings of Spie - the International Society For Optical Engineering. 4526: 278-286. DOI: 10.1117/12.434404  1
2001 Milidrag N, Kesidis G, Devetsikiotis M. An overview of fluid-based quick simulation techniques for large packet-switched communication networks Proceedings of Spie - the International Society For Optical Engineering. 4526: 271-277. DOI: 10.1117/12.434403  1
2001 Kesidis G, Tassiulas L. General connection blocking bounds and an implication of billing for provisioned label-switched routes in an MPLS internet cloud Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2094: 339-347.  1
2000 Kesidis G, Chakraborty K, Tassiulas L. Traffic shaping for a loss system Ieee Communications Letters. 4: 417-419. DOI: 10.1109/4234.898726  1
2000 Kesidis G, Konstantopoulos T. Worst-case performance of a buffer with independent shaped arrival processes Ieee Communications Letters. 4: 26-28. DOI: 10.1109/4234.823539  1
2000 Kesidis G, Konstantopoulos T. Extremal shape-controlled traffic patterns in high-speed networks Ieee Transactions On Communications. 48: 813-819. DOI: 10.1109/26.843194  1
1998 Hung A, Montpetit MJ, Kesidis G. ATM via satellite: A framework and implementation Wireless Networks. 4: 141-153.  1
1997 Kesidis G, McKeown N. Output-buffer ATM packet switching for integrated-services communication networks Ieee International Conference On Communications. 3: 1684-1688.  1
1996 Hung A, Kesidis G. Bandwidth scheduling for wide-area ATM networks using virtual finishing times Ieee/Acm Transactions On Networking. 4: 49-54. DOI: 10.1109/90.503761  1
1996 De Veciana G, Kesidis G. Bandwidth allocation for multiple qualities of service using generalized processor sharing Ieee Transactions On Information Theory. 42: 268-272. DOI: 10.1109/18.481801  1
1996 de Veciana G, Kesidis G. Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections Ieee International Conference On Communications. 2: 632-636.  1
1996 Kesidis G, Singh A, Cheung D, Kwok WW. Feasibility of fluid event-driven simulation for ATM networks Conference Record / Ieee Global Telecommunications Conference. 3: 2013-2017.  1
1995 Kesidis G. Analog Optimization with Wong's Stochastic Neural Network Ieee Transactions On Neural Networks. 6: 258-260. DOI: 10.1109/72.363429  1
1995 de Veciana G, Kesidis G, Walrand J. Resource Management in Wide-Area ATM Networks Using Effective Bandwidths Ieee Journal On Selected Areas in Communications. 13: 1081-1090. DOI: 10.1109/49.400663  1
1995 Courcoubetis C, Kesidis G, Ridder A, Walrand J, Weber R. Admission Control and Routing in ATM Networks using Inferences from Measured Buffer Occupancy Ieee Transactions On Communications. 43: 1778-1784. DOI: 10.1109/26.380228  1
1995 Hung A, Kesidis G. Buffer design for wide-area ATM networks using virtual finishing times Ieee International Conference On Communications. 3: 1901-1905.  1
1994 Kesidis G, Walrand J. Conservation Relations for Fully Shared Atm Buffers Probability in the Engineering and Informational Sciences. 8: 147-151. DOI: 10.1017/S0269964800003272  1
1994 Kesidis G. Modeling to obtain the effective bandwidth of a traffic source in an ATM network Proceedings of the Ieee International Workshop On Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. 318-322.  1
1993 Kesidis G, Walrand J. Quick Simulation of ATM Buffers with on-off Multiclass Markov Fluid Sources Acm Transactions On Modeling and Computer Simulation (Tomacs). 3: 269-276. DOI: 10.1145/174153.174162  1
1993 Kesidis G, Walrand J, Chang CS. Effective Bandwidths for Multiclass Markov Fluids and Other ATM Sources Ieee/Acm Transactions On Networking. 1: 424-428. DOI: 10.1109/90.251894  1
1993 Kesidis G, Walrand J. Relative entropy between Markov transition rate matrices Ieee Transactions On Information Theory. 39: 1056-1057. DOI: 10.1109/18.256516  1
Show low-probability matches.