default search action
Dimitrios E. Pendarakis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Xing Gao, Benjamin Steenkamer, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 174-191 (2021)
2010 – 2019
- 2019
- [c27]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. DSN 2019: 336-348 - [c26]Enriquillo Valdez, Dimitrios Pendarakis, Hani Jamjoom:
How to Discover IoT Devices When Network Traffic Is Encrypted. ICIOT 2019: 17-24 - 2018
- [c25]Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger:
Security Namespace: Making Linux Security Frameworks Available to Containers. USENIX Security Symposium 2018: 1423-1439 - [i4]Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, Ian M. Molloy:
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs/1807.00969 (2018) - [i3]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. CoRR abs/1812.03230 (2018) - 2017
- [c24]Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. DSN 2017: 237-248 - 2016
- [j16]Josyula R. Rao, Suresh Chari, Dimitrios E. Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi:
Security 360°: Enterprise security for the cognitive era. IBM J. Res. Dev. 60(4): 1 (2016) - [j15]Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios E. Pendarakis, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin:
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. IBM J. Res. Dev. 60(4): 10 (2016) - [j14]Stefan Berger, Shelly Garion, Yosef Moatti, Dalit Naor, Dimitrios E. Pendarakis, Alexandra Shulman-Peleg, Josyula R. Rao, Enriquillo Valdez, Yaron Weinsberg:
Security intelligence for cloud management infrastructures. IBM J. Res. Dev. 60(4): 11 (2016) - 2015
- [j13]Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:
Scalable Attestation: A Step toward Secure and Trusted Clouds. IEEE Cloud Comput. 2(5): 10-18 (2015) - [c23]Stefan Berger, Kenneth A. Goldman, Dimitrios E. Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar:
Scalable Attestation: A Step Toward Secure and Trusted Clouds. IC2E 2015: 185-194 - [c22]Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang, Stefan Berger, Dimitrios E. Pendarakis:
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. RAID 2015: 588-614 - 2014
- [c21]K. R. Jayaram, David Safford, Upendra Sharma, Vijay K. Naik, Dimitrios E. Pendarakis, Shu Tao:
Trustworthy geographically fenced hybrid clouds. Middleware 2014: 37-48 - 2012
- [j12]Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios E. Pendarakis, Hao Yang:
Association control algorithms for handoff frequency minimization in mobile wireless networks. Wirel. Networks 18(5): 535-550 (2012) - 2010
- [c20]Kenneth A. Goldman, Reiner Sailer, Dimitrios E. Pendarakis, Deepa Srinivasan:
Scalable integrity monitoring in virtualized environments. STC@CCS 2010: 73-78 - [c19]Sören Bleikertz, Matthias Schunter, Christian W. Probst, Dimitrios Pendarakis, Konrad Eriksson:
Security audits of multi-tier virtual infrastructures in public infrastructure clouds. CCSW 2010: 93-102 - [c18]Xiaoqiao Meng, Canturk Isci, Jeffrey O. Kephart, Li Zhang, Eric Bouillet, Dimitrios E. Pendarakis:
Efficient resource provisioning in compute clouds via VM multiplexing. ICAC 2010: 11-20 - [c17]Kyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M. Da Silva, Jim Doran, Frank Franco, Alexei A. Karve, Herb Lee, James A. Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios E. Pendarakis, Darrell Reimer, Mariusz Sabath:
RC2 - A Living Lab for Cloud Computing. LISA 2010 - [c16]Kyriakos Karenos, Dimitrios E. Pendarakis, Vana Kalogeraki, Hao Yang, Zhen Liu:
Overlay Routing under Geographically Correlated Failures in Distributed Event-Based Systems. OTM Conferences (2) 2010: 764-784
2000 – 2009
- 2009
- [j11]Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Dimitrios E. Pendarakis, Ronald Perez, Josyula R. Rao, Eran Rom, Reiner Sailer, Wayne Schildhauer, Deepa Srinivasan, Sivan Tal, Enriquillo Valdez:
Security for the cloud infrastructure: Trusted virtual data center implementation. IBM J. Res. Dev. 53(4): 6 (2009) - 2008
- [j10]Parijat Dube, Nagui Halim, Kyriakos Karenos, Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios E. Pendarakis, Hao Yang:
Harmony: Holistic messaging middleware for event-driven systems. IBM Syst. J. 47(2): 281-287 (2008) - [j9]Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan:
TVDc: managing security in the trusted virtual datacenter. ACM SIGOPS Oper. Syst. Rev. 42(1): 40-47 (2008) - [c15]Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios E. Pendarakis, Hao Yang:
Association Control in Mobile Wireless Networks. INFOCOM 2008: 1256-1264 - [c14]Eric Bouillet, Parijat Dube, David George, Zhen Liu, Dimitrios E. Pendarakis, Li Zhang:
Distributed multi-layered workload synthesis for testing stream processing systems. WSC 2008: 1003-1011 - 2007
- [c13]Dimitrios E. Pendarakis, Nisheeth Shrivastava, Zhen Liu, Ron F. Ambrosio:
Information Aggregation and Optimized Actuation in Sensor Networks: Enabling Smart Electrical Grids. INFOCOM 2007: 2386-2390 - 2006
- [c12]Jinliang Fan, Tianying Chang, Dimitrios E. Pendarakis, Zhen Liu:
Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures. DSN 2006: 536-548 - [c11]Dimitrios E. Pendarakis, Jeremy Silber, Laura Wynter:
Autonomic Management of Stream Processing Applications via Adaptive Bandwidth Control. ICDCS 2006: 7 - [c10]Kay S. Anderson, Joseph P. Bigus, Eric Bouillet, Parijat Dube, Nagui Halim, Zhen Liu, Dimitrios E. Pendarakis:
SWORD: scalable and flexible workload generator for distributed data processing systems. WSC 2006: 2109-2116 - 2004
- [j8]Hang Liu, Eric Bouillet, Dimitrios E. Pendarakis, Nooshin Komaee, Jean-François P. Labourdette, Sid Chaudhuri:
Distributed route computation and provisioning in shared mesh optical networks. IEEE J. Sel. Areas Commun. 22(9): 1626-1639 (2004) - [j7]Stephen French, Dimitrios Pendarakis:
Optical Virtual Private Networks: Applications, Functionality and Implementation. Photonic Netw. Commun. 7(3): 227-238 (2004) - [c9]Hang Liu, Eric Bouillet, Dimitrios E. Pendarakis, Nooshin Komaee, Jean-François P. Labourdette, Sid Chaudhuri:
On the tradeoffs between path computation efficiency and information abstraction in optical mesh networks. ICC 2004: 1684-1688 - [c8]Hang Liu, Eric Bouillet, Dimitrios E. Pendarakis, Nooshin Komaee, Jean-François P. Labourdette, Sid Chaudhuri:
Extending OSPF routing protocol for shared mesh restoration. LANMAN 2004: 97-101 - 2003
- [i2]Zhi-Wei Lin, Dimitrios Pendarakis:
Documentation of IANA assignments for Generalized MultiProtocol Label Switching (GMPLS) Resource Reservation Protocol - Traffic Engineering (RSVP-TE) Usage and Extensions for Automatically Switched Optical Network (ASON). RFC 3474: 1-25 (2003) - 2001
- [c7]Dimitrios E. Pendarakis, Sherlia Shi, Dinesh C. Verma, Marcel Waldvogel:
ALMI: An Application Level Multicast Infrastructure. USITS 2001: 49-60 - 2000
- [j6]Bala Rajagopalan, Dimitrios Pendarakis, Debanjan Saha, Ramu S. Ramamoorthy, Krishna Bala:
IP over optical networks: architectural aspects. IEEE Commun. Mag. 38(9): 94-102 (2000) - [c6]Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000 - [i1]Raj Yavatkar, Dimitrios E. Pendarakis, Roch Guérin:
A Framework for Policy-based Admission Control. RFC 2753: 1-20 (2000)
1990 – 1999
- 1999
- [j5]Erol Basturk, Alexander Birman, G. Delp, Roch Guérin, R. Haas, Sanjay Kamat, Dilip D. Kandlur, P. Pan, Dimitrios E. Pendarakis, Vinod G. J. Peris, Raju Rajan, Debanjan Saha, Doug Williams:
Design and Implementation of a QoS Capable Switch-Router. Comput. Networks 31(1-2): 19-32 (1999) - [c5]Isabella Chang, Robert Engel, Dilip D. Kandlur, Dimitrios E. Pendarakis, Debanjan Saha:
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques. INFOCOM 1999: 689-698 - 1998
- [j4]Benjamin Melamed, Dimitrios E. Pendarakis:
Modeling full-length VBR video using Markov-renewal-modulated TES models. IEEE J. Sel. Areas Commun. 16(5): 600-611 (1998) - 1997
- [j3]Aurel A. Lazar, Ariel Orda, Dimitrios E. Pendarakis:
Virtual path bandwidth allocation in multiuser networks. IEEE/ACM Trans. Netw. 5(6): 861-871 (1997) - [c4]Erol Basturk, Alexander Birman, G. Delp, Roch Guérin, R. Haas, Sanjay Kamat, Dilip D. Kandlur, P. Pan, Dimitrios E. Pendarakis, Vinod G. J. Peris, Raju Rajan, Debanjan Saha, Doug Williams:
Design and implementation of a QoS capable switch-router. ICCCN 1997: 276-284 - 1996
- [c3]Ariel Orda, Giovanni Pacifici, Dimitrios E. Pendarakis:
An Adaptive Virtual Path Allocation Policy for Broadband Networks. INFOCOM 1996: 329-336 - 1995
- [j2]Nikos G. Aneroussis, Aurel A. Lazar, Dimitrios E. Pendarakis:
Taming Xunet III. Comput. Commun. Rev. 25(3): 44-65 (1995) - [c2]Aurel A. Lazar, Ariel Orda, Dimitrios E. Pendarakis:
Virtual Path Bandwidth Allocation in Multi-User Networks. INFOCOM 1995: 312-320 - 1994
- [j1]Aurel A. Lazar, Giovanni Pacifici, Dimitrios E. Pendarakis:
Modeling Video Sources for Real-Time Scheduling. Multim. Syst. 1(6): 253-266 (1994) - [c1]Dimitrios E. Pendarakis:
A markov-renewal-modulated tes model for jpeg-like compressed "star wars" video. CAMAD 1994
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint