Year |
Citation |
Score |
2019 |
Miller D, Wang Y, Kesidis G. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Computation. 1-47. PMID 31260390 DOI: 10.1162/Neco_A_01209 |
0.313 |
|
2019 |
Leivadeas A, Kesidis G, Ibnkahla M, Lambadaris I. VNF Placement Optimization at the Edge and Cloud † Future Internet. 11: 69. DOI: 10.3390/Fi11030069 |
0.462 |
|
2018 |
Wang C, Urgaonkar B, Kesidis G, Gupta A, Chen LY, Birke R. Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability Acm Transactions On Autonomous and Adaptive Systems. 13: 1-25. DOI: 10.1145/3139291 |
0.305 |
|
2018 |
Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers Ieee Transactions On Parallel and Distributed Systems. 29: 2686-2699. DOI: 10.1109/Tpds.2018.2841915 |
0.369 |
|
2017 |
Barom Jeon P, Kesidis G. A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs Journal of Communications Software and Systems. 2: 108. DOI: 10.24138/Jcomss.V2I2.294 |
0.452 |
|
2017 |
Leivadeas A, Kesidis G, Falkner M, Lambadaris I. A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem Ieee Transactions On Network and Service Management. 14: 890-903. DOI: 10.1109/Tnsm.2017.2732699 |
0.393 |
|
2017 |
Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Optimal virtualized network function allocation for an SDN enabled cloud Computer Standards & Interfaces. 54: 266-278. DOI: 10.1016/J.Csi.2017.01.001 |
0.442 |
|
2017 |
Khamse-Ashari J, Kesidis G, Lambadaris I, Urgaonkar B, Zhao Y. Constrained max-min fair scheduling of variable-length packet-flows to multiple servers Annals of Telecommunications. 73: 219-237. DOI: 10.1007/S12243-017-0599-Y |
0.405 |
|
2016 |
Shah V, de Veciana G, Kesidis G. A Stable Approach for Routing Queries in Unstructured P2P Networks Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2509967 |
0.436 |
|
2016 |
Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Dynamic virtualized network function allocation in a multi-cloud environment 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500394 |
0.316 |
|
2015 |
Kurve A, Miller DJ, Kesidis G. Multicategory crowdsourcing accounting for variable task difficulty, worker skill, and worker intention Ieee Transactions On Knowledge and Data Engineering. 27: 794-809. DOI: 10.1109/Tkde.2014.2327026 |
0.763 |
|
2014 |
Raghuram J, Miller DJ, Kesidis G. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. Journal of Advanced Research. 5: 423-33. PMID 25685511 DOI: 10.1016/J.Jare.2014.01.001 |
0.335 |
|
2014 |
Lotfi MH, Kesidis G, Sarkar S. Network non neutrality on the internet: Content provision under a subscription revenue model Performance Evaluation Review. 42: 44. DOI: 10.1145/2695533.2695552 |
0.34 |
|
2014 |
Jin Y, Kesidis G, Shin J, Kocak F, Yi Y. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2347035 |
0.572 |
|
2014 |
Daoud AA, Kesidis G, Liebeherr J. Zero-determinant strategies: A game-theoretic approach for sharing licensed spectrum bands Ieee Journal On Selected Areas in Communications. 32: 2297-2308. DOI: 10.1109/Jsac.2014.141126 |
0.338 |
|
2014 |
Kocak F, Kesidis G, Fdida S. Network Neutrality with Content Caching and Its Effect on Access Pricing Smart Data Pricing. 47-66. DOI: 10.1002/9781118899250.ch3 |
0.318 |
|
2013 |
Kurve A, Kotobi K, Kesidis G. An agent-based framework for performance modeling of an optimistic parallel discrete event simulator Complex Adaptive Systems Modeling. 1. DOI: 10.1186/2194-3206-1-12 |
0.78 |
|
2013 |
Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with conditionally altruistic users Eurasip Journal On Wireless Communications and Networking. 2013. DOI: 10.1186/1687-1499-2013-202 |
0.65 |
|
2013 |
Jin Y, Kesidis G, Jang JW. Diffusion dynamics of network technologies with bounded rational users: Aspiration-based learning Ieee/Acm Transactions On Networking. 21: 28-40. DOI: 10.1109/Tnet.2012.2189891 |
0.597 |
|
2013 |
He J, Miller DJ, Kesidis G. Latent interest-group discovery and management by peer-to-peer online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 162-167. DOI: 10.1109/SocialCom.2013.31 |
0.308 |
|
2013 |
Kocak F, Kesidis G, Pham TM, Fdida S. The effect of caching on a model of content and access provider revenues in Information-Centric Networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 45-50. DOI: 10.1109/SocialCom.2013.13 |
0.344 |
|
2013 |
Kurve A, Griffin C, Miller DJ, Kesidis G. Optimizing cluster formation in super-peer networks via local incentive design Peer-to-Peer Networking and Applications. 8: 1-21. DOI: 10.1007/S12083-013-0206-6 |
0.804 |
|
2013 |
Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A model of network neutrality with usage-based prices Telecommunication Systems. 52: 601-609. DOI: 10.1007/S11235-011-9504-6 |
0.424 |
|
2013 |
Kurve A, Miller DJ, Kesidis G. Defeating tyranny of the masses in crowdsourcing: Accounting for low-skilled and adversarial workers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8252: 140-153. DOI: 10.1007/978-3-319-02786-9_9 |
0.731 |
|
2012 |
Jin Y, Kesidis G, Jang JW. A channel aware MAC protocol in an ALOHA network with selfish users Ieee Journal On Selected Areas in Communications. 30: 128-137. DOI: 10.1109/Jsac.2012.120112 |
0.58 |
|
2012 |
Shah V, De Veciana G, Kesidis G. Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints Proceedings - Ieee Infocom. 2327-2335. DOI: 10.1109/INFCOM.2012.6195620 |
0.315 |
|
2012 |
Kesidis G, Kurve A. A study of unsupervised adaptive crowdsourcing Ieee International Conference On Communications. 1438-1442. DOI: 10.1109/ICC.2012.6364014 |
0.768 |
|
2012 |
Kurve A, Pang G, Kesidis G, De Veciana G. Decentralized capacity reallocation for a loss network 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310748 |
0.812 |
|
2011 |
Zou G, Kesidis G, Miller DJ. A flow classifier with tamper-resistant features and an evaluation of its portability to new domains Ieee Journal On Selected Areas in Communications. 29: 1449-1460. DOI: 10.1109/Jsac.2011.110810 |
0.349 |
|
2011 |
Kurve A, Kesidis G. Sybil detection via distributed sparse cut monitoring Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5963402 |
0.785 |
|
2011 |
Kurve A, Griffin C, Kesidis G. Iterative partitioning scheme for distributed simulation of dynamic networks 2011 Ieee 16th International Workshop On Computer Aided Modeling and Design of Communication Links and Networks, Camad 2011. 92-96. DOI: 10.1109/CAMAD.2011.5941125 |
0.804 |
|
2011 |
Carl G, Kesidis G. Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra Computer Networks. 55: 2361-2379. DOI: 10.1016/J.Comnet.2011.03.013 |
0.46 |
|
2010 |
Neishaboori A, Das A, Kesidis G. A relaying enticement mechanism for wireless CDMA mesh networks 33rd Ieee Sarnoff Symposium 2010, Conference Proceedings. DOI: 10.1109/SARNOF.2010.5469707 |
0.809 |
|
2010 |
Tangpong A, Kesidis G. File-sharing costs and quality-of-service 2010 44th Annual Conference On Information Sciences and Systems, Ciss 2010. DOI: 10.1109/CISS.2010.5464800 |
0.752 |
|
2010 |
Choi YH, Li L, Liu P, Kesidis G. Worm virulence estimation for the containment of local worm outbreak Computers and Security. 29: 104-123. DOI: 10.1016/J.Cose.2009.07.002 |
0.384 |
|
2009 |
Kesidis G, Tangpong A, Griffin C. A sybil-proof referral system based on multiplicative reputation chains Ieee Communications Letters. 13: 862-864. DOI: 10.1109/Lcomm.2009.091400 |
0.776 |
|
2009 |
Tangpong A, Kesidis G, Hsu HY, Hurson A. Robust sybil detection for MANETs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235387 |
0.806 |
|
2009 |
Tangpong A, Kesidis G. A simple reputation model for BitTorrent-like incentives Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 603-610. DOI: 10.1109/GAMENETS.2009.5137450 |
0.763 |
|
2009 |
Das A, Neishaboori A, Kesidis G. Wireless mesh networking games Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 565-574. DOI: 10.1109/GAMENETS.2009.5137446 |
0.793 |
|
2009 |
Kesidis G, Konstantopoulos T, Sousi P. A stochastic epidemiological model and a deterministic limit for bitTorrent-like peer-to-peer file-sharing networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5425: 26-36. DOI: 10.1007/978-3-642-00393-6_4 |
0.323 |
|
2008 |
Yi S, Deng X, Kesidis G, Das CR. Technique for Estimating the Number of Active Flows in High-Speed Networks Etri Journal. 30: 194-204. DOI: 10.4218/Etrij.08.1107.0001 |
0.328 |
|
2008 |
Carl G, Kesidis G. Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1371574.1371577 |
0.409 |
|
2008 |
Kesidis G, Hamadeh I, Jin Y, Jiwasurat S, Vojnovì M. A model of the spread of randomly scanning Internet worms that saturate access links Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1346325.1346327 |
0.781 |
|
2008 |
Neishaboori A, Kesidis G. SINR-sensitive routing in wireless 802.11 mesh networks 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 623-628. DOI: 10.1109/MAHSS.2008.4660103 |
0.82 |
|
2008 |
Patankar P, Nam G, Kesidis G, Das CR. Exploring anti-spam models in large scale VoIP systems Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 85-92. DOI: 10.1109/ICDCS.2008.71 |
0.318 |
|
2008 |
Kesidis G, Das A, De Veciana G. On flat-rate and usage-based pricing for tiered commodity Internet services Ciss 2008, the 42nd Annual Conference On Information Sciences and Systems. 304-308. DOI: 10.1109/CISS.2008.4558540 |
0.303 |
|
2008 |
Neishaboori A, Kesidis G. Wireless mesh networks based on CDMA Computer Communications. 31: 1513-1528. DOI: 10.1016/J.Comcom.2008.01.020 |
0.804 |
|
2008 |
Yi S, Deng X, Kesidis G, Das CR. A dynamic quarantine scheme for controlling unresponsive TCP sessions Telecommunication Systems. 37: 169-189. DOI: 10.1007/S11235-008-9104-2 |
0.339 |
|
2008 |
Sungwon Y, Kappes M, Garg S, Xidong D, Kesidis G, Das CR. Proxy-RED: An AQM scheme for wireless local area networks Wireless Communications and Mobile Computing. 8: 421-434. DOI: 10.1002/wcm.460 |
0.378 |
|
2007 |
Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs Ieee Journal On Selected Areas in Communications. 25: 1113-1123. DOI: 10.1109/Jsac.2007.070806 |
0.626 |
|
2007 |
Jeon PB, Kesidis G. GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.43 |
0.786 |
|
2007 |
Kesidis G, Neishaboori A. Distributed power control in multihop ad hoc CDMA networks Ieee International Conference On Communications. 96-101. DOI: 10.1109/ICC.2007.25 |
0.786 |
|
2007 |
Kesidis G, Konstantopoulos T, Sousi P. Modeling file-sharing with BitTorrent-like incentives Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: IV1333-IV1336. DOI: 10.1109/ICASSP.2007.367324 |
0.302 |
|
2007 |
Jhi YC, Liu P, Li L, Gu Q, Jing J, Kesidis G. PWC: A proactive worm containment solution for enterprise networks Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 433-442. DOI: 10.1002/Sec.112 |
0.782 |
|
2006 |
Hamadeh I, Kesidis G. A taxonomy of internet traceback International Journal of Security and Networks. 1: 54-61. DOI: 10.1504/Ijsn.2006.010823 |
0.73 |
|
2006 |
Jeon PB, Rao RN, Kesidis G. An overlay framework for QoS management in mobile ad hoc networks 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534721 |
0.792 |
|
2006 |
Carl G, Kesidis G, Brooks RR, Rai S. Denial-of-service attack-detection techniques Ieee Internet Computing. 10: 82-89. DOI: 10.1109/Mic.2006.5 |
0.352 |
|
2006 |
Wang J, Miller DJ, Kesidis G. Efficient mining of the multidimensional traffic cluster hierarchy for digesting, visualization, and anomaly identification Ieee Journal On Selected Areas in Communications. 24: 1929-1941. DOI: 10.1109/Jsac.2006.877216 |
0.308 |
|
2006 |
Jin Y, Kesidis G. Charge sensitive and incentive compatible end-to-end window-based control for selfish users Ieee Journal On Selected Areas in Communications. 24: 952-960. DOI: 10.1109/Jsac.2006.872876 |
0.576 |
|
2006 |
Mazumdar RR, Courcoubetis CA, Duffield N, Kesidis G, Odlyzko A, Srikant R, Walrand J. Guest Editorial price-based access control and economics of networking Ieee Journal On Selected Areas in Communications. 24: 937-938. DOI: 10.1109/Jsac.2006.872874 |
0.654 |
|
2006 |
Neishaboori A, Kesidis G. Routing and uplink-downlink scheduling in ad hoc CDMA networks Ieee International Conference On Communications. 2: 926-931. DOI: 10.1109/ICC.2006.254826 |
0.814 |
|
2006 |
Fayek D, Kesidis G, Vannelli A. Non-linear game models for large-scale network bandwidth management Optimization and Engineering. 7: 421-444. DOI: 10.1007/S11081-006-0348-Y |
0.436 |
|
2006 |
Hamadeh I, Kesidis G. Toward a framework for forensic analysis of scanning worms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3995: 282-297. DOI: 10.1007/11766155_20 |
0.724 |
|
2005 |
Jeon PB, Kesidis G. Pheromone-aided robust multipath and multipriority routing in wireless MANETs Pe-Wasun'05 - Proceedings of the Second Acm International Workshop On Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. 106-113. DOI: 10.1145/1089803.1089974 |
0.789 |
|
2005 |
Jin Y, Kesidis G. Dynamics of usage-priced communication networks: The case of a single bottleneck resource Ieee/Acm Transactions On Networking. 13: 1041-1053. DOI: 10.1109/Tnet.2005.857120 |
0.658 |
|
2005 |
Hamadeh I, Hart J, Kesidis G, Pothamsetty V. A preliminary simulation of the effect of scanning worm activity on multicast Proceedings - Workshop On Principles of Advanced and Distributed Simulation, Pads. 191-198. DOI: 10.1109/PADS.2005.2 |
0.765 |
|
2005 |
Jiwasurat S, Kesidis G, Miller DJ. Hierarchical shaped deficit round-robin scheduling Globecom - Ieee Global Telecommunications Conference. 2: 688-693. DOI: 10.1109/GLOCOM.2005.1577729 |
0.798 |
|
2005 |
Kesidis G, Hamadeh I, Jiwasurat S. Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms Lecture Notes in Computer Science. 3375: 101-109. |
0.768 |
|
2005 |
Jeon PB, Kesidis G. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing 43rd Annual Allerton Conference On Communication, Control and Computing 2005. 3: 1656-1665. |
0.802 |
|
2004 |
Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646 |
0.32 |
|
2004 |
Rao R, Kesidis G. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks Ieee Transactions On Mobile Computing. 3: 225-232. DOI: 10.1109/Tmc.2004.26 |
0.369 |
|
2004 |
Jiwasurat S, Kesidis G. A class of shaped deficit round-robin (SDRR) schedulers Telecommunication Systems. 25: 173-191. DOI: 10.1023/B:Tels.0000014780.33289.Ad |
0.779 |
|
2004 |
Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks Computer Communications. 27: 828-839. DOI: 10.1016/J.Comcom.2004.01.027 |
0.348 |
|
2004 |
Weaver N, Hamadeh I, Kesidis G, Paxson V. Preliminary results using scale-down to explore worm dynamics Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 65-72. |
0.687 |
|
2004 |
Deng X, Yi S, Kesidis G, Das CR. RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 369-374. |
0.368 |
|
2003 |
Hamadeh I, Kesidis G. Performance of IP address fragmentation strategies for DDoS traceback Proceedings of the 3rd Ieee Workshop On Ip Operations and Management, Ipom 2003. 1-7. DOI: 10.1109/IPOM.2003.1251217 |
0.712 |
|
2003 |
Deng X, Yi S, Kesidis G, Das CR. Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance* Teletraffic Science and Engineering. 5: 1281-1290. DOI: 10.1016/S1388-3437(03)80277-9 |
0.333 |
|
2003 |
Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem Proceedings - Ieee Military Communications Conference Milcom. 2: 735-740. |
0.305 |
|
2003 |
Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks Proceedings - Ieee Infocom. 2: 1242-1249. |
0.334 |
|
2003 |
Rao R, Kesidis G. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited Globecom - Ieee Global Telecommunications Conference. 5: 2957-2961. |
0.36 |
|
2002 |
Jin Y, Kesidis G. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network Ieee Communications Letters. 6: 282-284. DOI: 10.1109/Lcomm.2002.801326 |
0.574 |
|
2000 |
Kesidis G, Chakraborty K, Tassiulas L. Traffic shaping for a loss system Ieee Communications Letters. 4: 417-419. DOI: 10.1109/4234.898726 |
0.321 |
|
2000 |
Kesidis G, Konstantopoulos T. Worst-case performance of a buffer with independent shaped arrival processes Ieee Communications Letters. 4: 26-28. DOI: 10.1109/4234.823539 |
0.392 |
|
2000 |
Kesidis G, Konstantopoulos T. Extremal shape-controlled traffic patterns in high-speed networks Ieee Transactions On Communications. 48: 813-819. DOI: 10.1109/26.843194 |
0.4 |
|
1999 |
Kesidis G. Bandwidth adjustments using online packet-level measurements Proceedings of Spie. 3841: 230-238. DOI: 10.1117/12.360374 |
0.46 |
|
1998 |
Hung A, Montpetit MJ, Kesidis G. ATM via satellite: A framework and implementation Wireless Networks. 4: 141-153. DOI: 10.1023/A:1019191619926 |
0.463 |
|
1996 |
Hung A, Kesidis G. Bandwidth scheduling for wide-area ATM networks using virtual finishing times Ieee/Acm Transactions On Networking. 4: 49-54. DOI: 10.1109/90.503761 |
0.419 |
|
1996 |
De Veciana G, Kesidis G. Bandwidth allocation for multiple qualities of service using generalized processor sharing Ieee Transactions On Information Theory. 42: 268-272. DOI: 10.1109/18.481801 |
0.408 |
|
1996 |
de Veciana G, Kesidis G. Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections Ieee International Conference On Communications. 2: 632-636. |
0.381 |
|
1995 |
Kesidis G. Analog Optimization with Wong's Stochastic Neural Network Ieee Transactions On Neural Networks. 6: 258-260. DOI: 10.1109/72.363429 |
0.358 |
|
1995 |
de Veciana G, Kesidis G, Walrand J. Resource Management in Wide-Area ATM Networks Using Effective Bandwidths Ieee Journal On Selected Areas in Communications. 13: 1081-1090. DOI: 10.1109/49.400663 |
0.699 |
|
1995 |
Courcoubetis C, Kesidis G, Ridder A, Walrand J, Weber R. Admission Control and Routing in ATM Networks using Inferences from Measured Buffer Occupancy Ieee Transactions On Communications. 43: 1778-1784. DOI: 10.1109/26.380228 |
0.644 |
|
1994 |
Kesidis G, Walrand J. Conservation Relations for Fully Shared Atm Buffers Probability in the Engineering and Informational Sciences. 8: 147-151. DOI: 10.1017/S0269964800003272 |
0.647 |
|
1993 |
Kesidis G, Walrand J, Chang CS. Effective Bandwidths for Multiclass Markov Fluids and Other ATM Sources Ieee/Acm Transactions On Networking. 1: 424-428. DOI: 10.1109/90.251894 |
0.626 |
|
1993 |
Kesidis G, Walrand J. Relative entropy between Markov transition rate matrices Ieee Transactions On Information Theory. 39: 1056-1057. DOI: 10.1109/18.256516 |
0.567 |
|
Show low-probability matches. |