


Остановите войну!
for scientists:


default search action
George Kesidis
Person information

- affiliation: Pennsylvania State University, University Park, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j78]Hang Wang, David J. Miller, George Kesidis:
Anomaly detection of adversarial examples using class-conditional generative adversarial networks. Comput. Secur. 124: 102956 (2023) - [j77]George Kesidis
, Takis Konstantopoulos, Michael A. Zazanis
:
Age of information using Markov-renewal methods. Queueing Syst. Theory Appl. 103(1-2): 95-130 (2023) - 2022
- [j76]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis
:
In search of the least age of information. Queueing Syst. Theory Appl. 100(3-4): 465-467 (2022) - [j75]Zhen Xiang
, David J. Miller
, George Kesidis:
Detection of Backdoors in Trained Classifiers Without Access to the Training Set. IEEE Trans. Neural Networks Learn. Syst. 33(3): 1177-1191 (2022) - [c151]Myungjun Son, Shruti Mohanty, Jashwant Raj Gunasekaran, Aman Jain, Mahmut Taylan Kandemir, George Kesidis, Bhuvan Urgaonkar:
Splice: An Automated Framework for Cost-and Performance-Aware Blending of Cloud Services. CCGRID 2022: 119-128 - [c150]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks against Point Cloud Classifiers. ICASSP 2022: 3159-3163 - [c149]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. ICASSP 2022: 3333-3337 - [c148]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. ICLR 2022 - [c147]Wonil Choi, Bhuvan Urgaonkar, Mahmut Taylan Kandemir, George Kesidis:
Multi-resource fair allocation for consolidated flash-based caching systems. Middleware 2022: 202-215 - [i64]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. CoRR abs/2201.08474 (2022) - [i63]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Universal Post-Training Backdoor Detection. CoRR abs/2205.06900 (2022) - [i62]Nader Alfares, Ata F. Baarzi, George Kesidis, Aman Jain:
IaaS Procurement by Simulated Annealing. CoRR abs/2207.04594 (2022) - [i61]Aakash Sharma, Vivek M. Bhasi, Sonali Singh, Rishabh Jain, Jashwant Raj Gunasekaran, Subrata Mitra, Mahmut Taylan Kandemir, George Kesidis, Chita R. Das:
Analysis of Distributed Deep Learning in the Cloud. CoRR abs/2208.14344 (2022) - [i60]Hang Wang, S. Karami, O. Dia, H. Ritter, Ehsan Emamjomeh-Zadeh, J. Chen, Zhen Xiang, David J. Miller, George Kesidis:
Training set cleansing of backdoor poisoning by self-supervised representation learning. CoRR abs/2210.10272 (2022) - 2021
- [j74]Zhen Xiang
, David J. Miller, George Kesidis:
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing. Comput. Secur. 106: 102280 (2021) - [j73]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set. Neural Comput. 33(5): 1329-1371 (2021) - [c146]Aakash Sharma, Saravanan Dhakshinamurthy, George Kesidis, Chita R. Das:
CASH: A Credit Aware Scheduling for Public Cloud Platforms. CCGRID 2021: 227-236 - [c145]Ataollah Fatahi Baarzi, George Kesidis:
SHOWAR: Right-Sizing And Efficient Scheduling of Microservices. SoCC 2021: 427-441 - [c144]Ataollah Fatahi Baarzi, George Kesidis, Carlee Joe-Wong, Mohammad Shahrad
:
On Merits and Viability of Multi-Cloud Serverless. SoCC 2021: 600-608 - [c143]Zhen Xiang, David J. Miller, George Kesidis:
L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set. ICASSP 2021: 3745-3749 - [c142]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. ICCV 2021: 7577-7587 - [i59]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. CoRR abs/2104.05808 (2021) - [i58]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of information without service preemption. CoRR abs/2104.08050 (2021) - [i57]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of information distribution under dynamic service preemption. CoRR abs/2104.11393 (2021) - [i56]Hang Wang, David J. Miller, George Kesidis:
Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks. CoRR abs/2105.10101 (2021) - [i55]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A BIC based Mixture Model Defense against Data Poisoning Attacks on Classifiers. CoRR abs/2105.13530 (2021) - [i54]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of Information for Small Buffer Systems. CoRR abs/2106.08473 (2021) - [i53]Xi Li, George Kesidis, David J. Miller, Maxime Bergeron, Ryan Ferguson, Vladimir Lucic:
Robust and Active Learning for Deep Neural Network Regression. CoRR abs/2107.13124 (2021) - [i52]Xi Li, George Kesidis, David J. Miller, Vladimir Lucic:
Backdoor Attack and Defense for Deep Regression. CoRR abs/2109.02381 (2021) - [i51]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks Against Point Cloud Classifiers. CoRR abs/2110.10354 (2021) - [i50]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. CoRR abs/2112.03350 (2021) - 2020
- [j72]Weiqiang Liu, Maximilian John, Andreas Karrenbauer, Adam Allerhand, Fabrizio Lombardi, Michael Shulte, David J. Miller, Zhen Xiang, George Kesidis, Antti Oulasvirta, Niraj Ramesh Dayama, Morteza Shiripour:
Scanning the Issue. Proc. IEEE 108(3): 400-401 (2020) - [j71]David J. Miller
, Zhen Xiang
, George Kesidis:
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks. Proc. IEEE 108(3): 402-433 (2020) - [j70]George Kesidis
, Takis Konstantopoulos, Michael A. Zazanis
:
The distribution of age-of-information performance measures for message processing systems. Queueing Syst. Theory Appl. 95(3): 203-250 (2020) - [j69]George Kesidis, Takis Konstantopoulos:
TB/GI/1 queues with arrival traffic envelopes. SIGMETRICS Perform. Evaluation Rev. 48(2): 27-29 (2020) - [j68]Mohammad Hassan Lotfi
, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? IEEE/ACM Trans. Netw. 28(4): 1435-1448 (2020) - [c141]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers. DDDAS 2020: 262-273 - [c140]Ataollah Fatahi Baarzi, George Kesidis, Dan Fleck, Angelos Stavrou
:
Microservices made attack-resilient using unsupervised service fissioning. EuroSec@EuroSys 2020: 31-36 - [c139]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. ICASSP 2020: 3827-3831 - [c138]Yuquan Shan, George Kesidis, Aman Jain, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Cloud. WOC@Middleware 2020: 7-12 - [c137]Aman Jain, Ata F. Baarzi, George Kesidis, Bhuvan Urgaonkar, Nader Alfares, Mahmut T. Kandemir:
SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS. Middleware 2020: 236-250 - [c136]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. MLSP 2020: 1-6 - [i49]Aakash Sharma, Saravanan Dhakshinamurthy, George Kesidis, Chita R. Das:
CASH: A Credit Aware Scheduling for Public Cloud Platforms. CoRR abs/2009.04561 (2020) - [i48]Zhen Xiang, David J. Miller, George Kesidis:
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing. CoRR abs/2010.07489 (2020) - [i47]Zhen Xiang, David J. Miller, George Kesidis:
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set. CoRR abs/2010.09987 (2020)
2010 – 2019
- 2019
- [j67]Aris Leivadeas
, George Kesidis, Mohamed Ibnkahla, Ioannis Lambadaris:
VNF Placement Optimization at the Edge and Cloud †. Future Internet 11(3): 69 (2019) - [j66]Jalal Khamse-Ashari
, Ioannis Lambadaris
, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao
:
A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers. IEEE Netw. Lett. 1(1): 34-37 (2019) - [j65]David J. Miller, Yujia Wang, George Kesidis:
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Comput. 31(8): 1624-1670 (2019) - [c135]Jashwant Raj Gunasekaran, Prashanth Thinakaran
, Mahmut Taylan Kandemir, Bhuvan Urgaonkar, George Kesidis, Chita R. Das:
Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud. CLOUD 2019: 199-208 - [c134]Aman Jain, Ata F. Baarzi, Nader Alfares, George Kesidis, Bhuvan Urgaonkar, Mahmut T. Kandemir:
SpIitServe: Efficiently Splitting Complex Workloads Across FaaS and IaaS. SoCC 2019: 487 - [c133]Yujia Wang, David J. Miller, George Kesidis:
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers. ICASSP 2019: 8063-8066 - [c132]George Kesidis:
Overbooking Lambda Functions in the Cloud. WOC@Middleware 2019: 1-6 - [c131]Zhen Xiang, David J. Miller, George Kesidis:
A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense. MLSP 2019: 1-6 - [i46]George Kesidis:
Temporal Overbooking of Lambda Functions in the Cloud. CoRR abs/1901.09842 (2019) - [i45]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
The distribution of age-of-information performance measures for message processing systems. CoRR abs/1904.05924 (2019) - [i44]David J. Miller, Zhen Xiang, George Kesidis:
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks. CoRR abs/1904.06292 (2019) - [i43]George Kesidis, Bhuvan Urgaonkar, Mahmut T. Kandemir, Takis Konstantopoulos:
A caching system with object sharing. CoRR abs/1905.07641 (2019) - [i42]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. CoRR abs/1908.10498 (2019) - [i41]George Kesidis, David J. Miller:
Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers. CoRR abs/1910.08032 (2019) - [i40]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. CoRR abs/1911.07970 (2019) - 2018
- [j64]Jalal Khamse-Ashari
, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Constrained max-min fair scheduling of variable-length packet-flows to multiple servers. Ann. des Télécommunications 73(3-4): 219-237 (2018) - [j63]Ying-Dar Lin, Yuan-Cheng Lai, George Kesidis, Athanasios V. Vasilakos
:
Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations. IEEE Syst. J. 12(1): 7-9 (2018) - [j62]Cheng Wang, Bhuvan Urgaonkar, George Kesidis, Aayush Gupta, Lydia Y. Chen, Robert Birke:
Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability. ACM Trans. Auton. Adapt. Syst. 13(1): 2:1-2:25 (2018) - [j61]Jalal Khamse-Ashari
, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao
:
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers. IEEE Trans. Parallel Distributed Syst. 29(12): 2686-2699 (2018) - [c130]Daniel Fleck, Angelos Stavrou
, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. DSC 2018: 1-8 - [c129]Neda Nasiriani, George Kesidis, Di Wang:
Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response. e-Energy 2018: 21-32 - [c128]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers. GLOBECOM 2018: 1-7 - [c127]Neda Nasiriani, George Kesidis:
Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model. ICNC 2018: 58-62 - [c126]George Kesidis:
Stationary Distribution of a Generalized LRU-MRU Content Cache. ICNC 2018: 676-681 - [c125]George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. MALWARE 2018: 61-67 - [c124]George Kesidis, Yuquan Shan, Aman Jain, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Scheduling Distributed Resources in Heterogeneous Private Clouds. MASCOTS 2018: 102-108 - [c123]David J. Miller, George Kesidis, Zhicong Qiu:
Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD). MLSP 2018: 1-6 - [c122]David J. Miller, Yujia Wang, George Kesidis:
Anomaly Detection of Attacks (Ada) on DNN Classifiers at Test Time. MLSP 2018: 1-6 - [c121]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis, Chung-Horng Lung, Mohamed Ibnkahla:
Considerations for a Successful Network Service Chain Deployment. NetSoft 2018: 288-292 - [c120]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, Mohamed Ibnkahla, George Kesidis:
Balancing Delay and Cost in Virtual Network Function Placement and Chaining. NetSoft 2018: 433-440 - [i39]Yuquan Shan, Aman Jain, George Kesidis, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms. CoRR abs/1803.00922 (2018) - [i38]George Kesidis:
Average age of coupon type and related average age of information. CoRR abs/1808.00443 (2018) - [i37]Yuquan Shan, George Kesidis, Bhuvan Urgaonkar, Jörg Schad, Jalal Khamse-Ashari, Ioannis Lambadaris:
Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud. CoRR abs/1810.00988 (2018) - [i36]David J. Miller, Xinyi Hu, Zhen Xiang, George Kesidis:
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters. CoRR abs/1811.00121 (2018) - [i35]Yujia Wang, David J. Miller, George Kesidis:
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers. CoRR abs/1811.02658 (2018) - 2017
- [j60]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Optimal virtualized network function allocation for an SDN enabled cloud. Comput. Stand. Interfaces 54: 266-278 (2017) - [j59]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? Proc. ACM Meas. Anal. Comput. Syst. 1(1): 11:1-11:28 (2017) - [j58]Zhicong Qiu, David J. Miller, George Kesidis:
A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes. IEEE Trans. Neural Networks Learn. Syst. 28(4): 917-933 (2017) - [j57]Aris Leivadeas
, George Kesidis, Matthias Falkner, Ioannis Lambadaris:
A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem. IEEE Trans. Netw. Serv. Manag. 14(4): 890-903 (2017) - [c119]Yuquan Shan, Chiara Lo Prete, George Kesidis, David J. Miller:
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets. ACC 2017: 2705-2712 - [c118]Yuquan Shan, George Kesidis, Daniel Fleck:
Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CCSW@CCS 2017: 1-10 - [c117]Xinyi Hu, George Kesidis, Seung Jun Baek:
Regulating wireless access costs for not vertically integrated content providers. CNSM 2017: 1-8 - [c116]Cheng Wang, Bhuvan Urgaonkar, Aayush Gupta, George Kesidis, Qianlin Liang:
Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. EuroSys 2017: 620-634 - [c115]Zhicong Qiu, David J. Miller, George Kesidis:
Flow based botnet detection through semi-supervised active learning. ICASSP 2017: 2387-2391 - [c114]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous servers. ICC 2017: 1-7 - [c113]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors. INFOCOM Workshops 2017: 48-53 - [c112]George Kesidis, Neda Nasiriani, Yuquan Shan, Bhuvan Urgaonkar, Ioannis Lambadaris:
Multicommodity games in public-cloud markets considering subadditive resource demands. INFOCOM Workshops 2017: 654-658 - [c111]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 - [c110]Neda Nasiriani, George Kesidis, Di Wang:
Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits. MASCOTS 2017: 164-174 - [c109]George Kesidis, Uday V. Shanbhag, Neda Nasiriani, Bhuvan Urgaonkar:
Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response. MASCOTS 2017: 244-254 - [c108]David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis:
Adversarial learning: A critical review and active learning study. MLSP 2017: 1-6 - [c107]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? SIGMETRICS (Abstracts) 2017: 56 - [i34]George Kesidis:
Markovian models of Internet Caches including Closed-Form Stationary Distributions. CoRR abs/1704.04849 (2017) - [i33]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794 (2017) - [i32]George Kesidis, Yuquan Shan, Yujia Wang, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Efficient max-min and proportional fair constrained multiresource scheduling. CoRR abs/1705.06102 (2017) - [i31]David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis:
Adversarial Learning: A Critical Review and Active Learning Study. CoRR abs/1705.09823 (2017) - [i30]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part II. CoRR abs/1711.08961 (2017) - [i29]Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017) - [i28]David J. Miller, Yujia Wang, George Kesidis:
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. CoRR abs/1712.06646 (2017) - [i27]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers. CoRR abs/1712.10114 (2017) - 2016
- [j56]Yuquan Shan, Chiara Lo Prete, George Kesidis, David J. Miller:
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk. SIGMETRICS Perform. Evaluation Rev. 44(3): 30 (2016) - [j55]Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen, Robert Birke:
On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 3:1-3:28 (2016) - [j54]Virag Shah, Gustavo de Veciana, George Kesidis:
A Stable Approach for Routing Queries in Unstructured P2P Networks. IEEE/ACM Trans. Netw. 24(5): 3136-3147 (2016) - [c106]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Dynamic traffic steering of multi-tenant virtualized network functions in SDN enabled data centers. CAMAD 2016: 65-70 - [c105]Matthias Falkner, Aris Leivadeas, Ioannis Lambadaris, George Kesidis:
Performance analysis of virtualized network functions on virtualized systems architectures. CAMAD 2016: 71-76 - [c104]Xinyi Hu, Yuquan Shan, George Kesidis, Saswati Sarkar, Ravi Dhar, Serge Fdida:
Multiperiod subscription pricing for cellular wireless entrants. CISS 2016: 326-330 - [c103]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin. CISS 2016: 390-395 - [c102]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Migration to a non-neutral internet: Economics modeling and analysis of impact. CISS 2016: 511-516 - [c101]Navaneeth Rameshan, Robert Birke, Leandro Navarro
, Vladimir Vlassov
, Bhuvan Urgaonkar, George Kesidis, Martin L. Schmatz, Lydia Y. Chen:
Profiling Memory Vulnerability of Big-Data Applications. DSN Workshops 2016: 258-261 - [c100]Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis:
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. DSN 2016: 359-370 - [c99]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows to Multiple Servers. GLOBECOM 2016: 1-6 - [c98]