George Kesidis

    • Source: Scopus
    • Calculated based on no. of publications stored in Pure and citations from Scopus
    1993 …2020

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Conference contribution

    Search results

    • 1994

      Modeling to obtain the effective bandwidth of a traffic source in an ATM network

      Kesidis, G., Jan 1 1994, Proceedings of the IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. Madisetti, V., Gelenbe, E. & Walrand, J. (eds.). Publ by IEEE, p. 318-322 5 p. (Proceedings of the IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • 1996

      Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections

      de Veciana, G. & Kesidis, G., 1996, IEEE International Conference on Communications. IEEE, Vol. 2. p. 632-636 5 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 1998

      ATM input-buffered switches with the guaranteed-rate property

      Hung, A., Kesidis, G. & McKeown, N., Jan 1 1998, Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998. Institute of Electrical and Electronics Engineers Inc., p. 331-335 5 p. 702542. (Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      47 Scopus citations
    • 1999

      Extremal behaviour and bounds for a network buffer fed by deterministically shaped random processes

      Konstantopoulos, T. & Kesidis, G., 1999, Proceedings - 1999 IEEE International Symposium on Information Theory, ITW 1999. Institute of Electrical and Electronics Engineers Inc., p. 44 1 p. 814354. (IEEE International Symposium on Information Theory - Proceedings; vol. 1999-June).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2001

      General connection blocking bounds and an implication of billing for provisioned label-switched routes in an MPLS internet cloud

      Kesidis, G. & Tassiulas, L., 2001, Networking - ICN 2001 - 1st International Conference on Networking, Proceedings. Lorenz, P. (ed.). Springer Verlag, p. 339-347 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2094).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2002

      A simulation study of non-cooperative pricing strategies for circuit-switched optical networks

      Ninan, B. M., Kesidis, G. & Devetikiotis, M., Jan 1 2002, Proceedings - 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS 2002. Boukerche, A., Majumdar, S. & Das, S. K. (eds.). IEEE Computer Society, p. 257-263 7 p. 1167085. (Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS; vol. 2002-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • 2003

      Performance of IP address fragmentation strategies for DDoS traceback

      Hamadeh, I. & Kesidis, G., 2003, Proceedings of the 3rd IEEE Workshop on IP Operations and Management, IPOM 2003. Medhi, D. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. 1251217. (Proceedings of the 3rd IEEE Workshop on IP Operations and Management, IPOM 2003).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • 2004

      Preliminary results using scale-down to explore worm dynamics

      Weaver, N., Hamadeh, I., Kesidis, G. & Paxson, V., 2004, WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode. Association for Computing Machinery, p. 65-72 8 p. (WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      41 Scopus citations
    • RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks

      Deng, X., Yi, S., Kesidis, G. & Das, C. R., Dec 1 2004, Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology. Hamza, M. H. (ed.). p. 369-374 6 p. 433-023. (Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • TCP window control in a priced network

      Jin, Y. & Kesidis, G., Dec 1 2004, Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology. Hamza, M. H. (ed.). p. 596-600 5 p. 433-041. (Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • 2005

      Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing

      Jeon, P. B. & Kesidis, G., Jan 1 2005, 43rd Annual Allerton Conference on Communication, Control and Computing 2005. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1656-1665 10 p. (43rd Annual Allerton Conference on Communication, Control and Computing 2005; vol. 3).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • Hierarchical shaped deficit round-robin scheduling

      Jiwasurat, S., Kesidis, G. & Miller, D. J., Dec 1 2005, GLOBECOM'05: IEEE Global Telecommunications Conference, 2005. p. 688-693 6 p. 1577729. (GLOBECOM - IEEE Global Telecommunications Conference; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • Pheromone-aided robust multipath and multipriority routing in wireless MANETs

      Jeon, P. B. & Kesidis, G., Dec 1 2005, PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. Ould-Khaoua, M. & Takai, M. (eds.). p. 106-113 8 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      15 Scopus citations
    • 2006

      An epidemiological model for file-sharing with BitTorrent-like incentives: The case of a fixed peer population

      Kesidis, G., Jin, Y., Mortazavi, B. & Konstantopoulos, T., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151060. (GLOBECOM - IEEE Global Telecommunications Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • An overlay framework for QoS management in mobile ad hoc networks

      Jeon, P. B., Rao, R. N. & Kesidis, G., Dec 1 2006, 2006 IEEE Sarnoff Symposium. 4534721. (2006 IEEE Sarnoff Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Cumulative reputation systems for peer-to-peer content distribution

      Mortazavi, B. & Kesidis, G., Jan 1 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1546-1552 7 p. 4068051. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • On the relation between capacity and number of sinks in an sensor network

      Rao, R. N. & Kesidis, G., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151140. (GLOBECOM - IEEE Global Telecommunications Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Path preserving scale down for validation of internet inter-domain routing protocols

      Carl, G., Phoha, S., Kesidis, G. & Madan, B., 2006, Proceedings of the 2006 Winter Simulation Conference, WSC. p. 2210-2218 9 p. 4117871. (Proceedings - Winter Simulation Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • Polymorphic worm detection and defense: System design, experimental methodology, and data resources

      Wang, J., Hamadeh, L., Kesidis, G. & Miller, D. J., Dec 1 2006, Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06. p. 169-176 8 p. (Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, LSAD'06; vol. 2006).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      12 Scopus citations
    • Routing and uplink-downlink scheduling in ad hoc CDMA networks

      Neishaboori, A. & Kesidis, G., 2006, 2006 IEEE International Conference on Communications, ICC 2006. p. 926-931 6 p. 4024247. (IEEE International Conference on Communications; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Toward a framework for forensic analysis of scanning worms

      Hamadeh, I. & Kesidis, G., Jan 1 2006, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings. Springer Verlag, p. 282-297 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3995 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Visual toolkit for network security experiment specification and data analysis

      Li, L., Liu, P. & Kesidis, G., 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 7-14 8 p. 1179579. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2007

      Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution

      Das, A., Kesidis, G. & Pothamsetty, V., Dec 1 2007, Proceedings of the 4th International Conference on Broadband Communications, Networks, Systems, BroadNets. p. 444-448 5 p. 4550467. (Proceedings of the 4th International Conference on Broadband Communications, Networks, Systems, BroadNets).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Distributed power control in multihop ad hoc CDMA networks

      Kesidis, G. & Neishaboori, A., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 96-101 6 p. 4288696. (IEEE International Conference on Communications).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks

      Jeon, P. B. & Kesidis, G., 2007, Proceedings of the Sixth International Conference on Networking, ICN'07. IEEE Computer Society, p. 10-15 6 p. 4196203. (Proceedings of the Sixth International Conference on Networking, ICN'07).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Memory-efficient content filtering hardware for high-speed intrusion detection systems

      Yi, S., Kim, B. K., Oh, J., Jang, J., Kesidis, G. & Das, C. R., Jan 1 2007, Proceedings of the 2007 ACM Symposium on Applied Computing. Association for Computing Machinery, p. 264-269 6 p. (Proceedings of the ACM Symposium on Applied Computing).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      15 Scopus citations
    • Modeling file-sharing with BitTorrent-like incentives

      Kesidis, G., Konstantopoulos, T. & Sousi, P., Aug 6 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07. p. IV1333-IV1336 4218355. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 4).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • New directions in covert malware modeling which exploit white-listing

      Wang, J., Kesidis, G. & Miller, D. J., Dec 1 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567340. (2007 IEEE Sarnoff Symposium, SARNOFF).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • PWC: A proactive worm containment solution for enterprise networks

      Jhi, Y. C., Liu, P., Li, L., Gu, Q., Jing, J. & Kesidis, G., Dec 1 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 433-442 10 p. 4550364. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Scalable, efficient, stepwise-optimal feature elimination in support vector machines

      Aksu, Y., Kesidis, G. & Miller, D. J., Dec 1 2007, Machine Learning for Signal Processing 17 - Proceedings of the 2007 IEEE Signal Processing Society Workshop, MLSP. p. 75-80 6 p. 4414285. (Machine Learning for Signal Processing 17 - Proceedings of the 2007 IEEE Signal Processing Society Workshop, MLSP).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2008

      A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification

      Miller, D. J., Zhang, Y. & Kesidis, G., Sep 16 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP. p. 1865-1868 4 p. 4517997

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Exploring anti-spam models in large scale VoIP systems

      Patankar, P., Nam, G., Kesidis, G. & Das, C. R., 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 85-92 8 p. 4595872. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      16 Scopus citations
    • On flat-rate and usage-based pricing for tiered commodity Internet services

      Kesidis, G., Das, A. & De Veciana, G., Sep 22 2008, CISS 2008, The 42nd Annual Conference on Information Sciences and Systems. p. 304-308 5 p. 4558540. (CISS 2008, The 42nd Annual Conference on Information Sciences and Systems).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      40 Scopus citations
    • SINR-sensitive routing in wireless 802.11 mesh networks

      Neishaboori, A. & Kesidis, G., 2008, 2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008. p. 623-628 6 p. 4660103. (2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • SVM margin-based feature elimination applied to high-dimensional microarray gene expression data

      Zhang, Y., Aksu, Y., Kesidis, G., Miller, D. J. & Wang, Y., Dec 1 2008, Proceedings of the 2008 IEEE Workshop on Machine Learning for Signal Processing, MLSP 2008. p. 97-102 6 p. 4685462. (Proceedings of the 2008 IEEE Workshop on Machine Learning for Signal Processing, MLSP 2008).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Threshold smart walk for the containment of local worm outbreak

      LLi, PLiu & Kesidis, G., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 2124-2128 5 p. 4698184. (GLOBECOM - IEEE Global Telecommunications Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2009

      A simple reputation model for BitTorrent-like incentives

      Tangpong, A. & Kesidis, G., Oct 20 2009, Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09. p. 603-610 8 p. 5137450. (Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • Clock-like flow replacement schemes for resilient flow monitoring

      Gunwoo, N., Pushkar, P., Lim, S. H., Bikash, S., Kesidis, G. & Das, C. R., 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS, 09. p. 129-136 8 p. 5158417. (Proceedings - International Conference on Distributed Computing Systems).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • Hierarchical maximum entropy modeling for regression

      Zhang, Y., Miller, D. J. & Kesidis, G., Dec 1 2009, Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009. 5306225. (Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Mass purging of stale TCP flows in per-flow monitoring systems

      Nam, G., Patankar, P., Kesidis, G., Das, C. R. & Seren, C., 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, ICCCN 2009. 5235390. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • Peer-to-peer unstructured anycasting using correlated swarms

      Patankar, P., Nam, G., Kesidis, G., Konstantopoulos, T. & Das, C. R., Dec 2 2009, 21st International Teletraffic Congress, ITC 21: Traffic and Performance Issues in Networks of the Future - Final Programme. 5300270. (21st International Teletraffic Congress, ITC 21: Traffic and Performance Issues in Networks of the Future - Final Programme).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Robust sybil detection for MANETs

      Tangpong, A., Kesidis, G., Hsu, H. Y. & Hurson, A., Nov 12 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, ICCCN 2009. 5235387. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      22 Scopus citations
    • Semisupervised mixture modeling with fine-grained component-conditional class labeling and transductive inference

      Miller, D. J., Lin, C. F., Kesidis, G. & Collins, C. M., Dec 1 2009, Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009. 5306229. (Machine Learning for Signal Processing XIX - Proceedings of the 2009 IEEE Signal Processing Society Workshop, MLSP 2009).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Wireless mesh networking games

      Das, A., Neishaboori, A. & Kesidis, G., 2009, Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09. p. 565-574 10 p. 5137446. (Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • 2010

      Application neutrality and a paradox of side payments

      Caron, S., Kesidis, G. & Altman, E., Dec 1 2010, Proceedings of the Re-Architecting the Internet (ReArch) Workshop, Held in Conjunction with CoNEXT 2010. 9. (Proceedings of the Re-Architecting the Internet (ReArch) Workshop, Held in Conjunction with CoNEXT 2010).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      17 Scopus citations
    • A relaying enticement mechanism for wireless CDMA mesh networks

      Neishaboori, A., Das, A. & Kesidis, G., 2010, 33rd IEEE Sarnoff Symposium 2010, Conference Proceedings. 5469707. (33rd IEEE Sarnoff Symposium 2010, Conference Proceedings).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • A study of non-neutral networks with usage-based prices

      Altman, E., Bernhard, P., Caron, S., Kesidis, G., Rojas-Mora, J. & Wong, S., Nov 8 2010, Incentives, Overlays, and Economic Traffic Control - Third International Workshop, ETM 2010, Proceedings. p. 76-84 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6236 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • File-sharing costs and quality-of-service

      Tangpong, A. & Kesidis, G., Jun 24 2010, 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 5464800. (2010 44th Annual Conference on Information Sciences and Systems, CISS 2010).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Improved fine-grained component-conditional class labeling with active learning

      Miller, D. J., Lin, C. F., Kesidis, G. & Collins, C. M., Dec 1 2010, Proceedings - 9th International Conference on Machine Learning and Applications, ICMLA 2010. p. 3-8 6 p. 5708805. (Proceedings - 9th International Conference on Machine Learning and Applications, ICMLA 2010).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior

      Kesidis, G., Jin, Y., Azad, A. P. & Altman, E., Dec 1 2010, 2010 49th IEEE Conference on Decision and Control, CDC 2010. p. 1071-1075 5 p. 5717121. (Proceedings of the IEEE Conference on Decision and Control).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations