dblp.uni-trier.dewww.uni-trier.de

Riccardo Bettati Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
60EESooHyun Cho, Riccardo Bettati: Use of competition detection in TCP for simple topology networks. Computer Networks 53(11): 1903-1925 (2009)
59EEYe Zhu, Riccardo Bettati: Information Leakage as a Model for Quality of Anonymity Networks. IEEE Trans. Parallel Distrib. Syst. 20(4): 540-552 (2009)
2008
58EEWei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao: On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365
57EEYoungwoo Ahn, Riccardo Bettati: Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems. ECRTS 2008: 102-111
56EEIonut Cardei, Allalaghatta Pavan, Riccardo Bettati: Quality of Service guarantees and fault-tolerant TCP services in mobile wireless optical networks. IJAHUC 3(3): 146-158 (2008)
55EEShengquan Wang, Riccardo Bettati: Reactive speed control in temperature-constrained real-time systems. Real-Time Systems 39(1-3): 73-95 (2008)
2007
54EEYe Zhu, Riccardo Bettati: Compromising Location Privacy inWireless Networks Using Sensors with Limited Information. ICDCS 2007: 24
53EETuneesh Leila, Riccardo Bettati: Privacy of encrypted voice-over-IP. SMC 2007: 3063-3068
52EEYe Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao: Analysis of flow-correlation attacks in anonymity network. IJSN 2(1/2): 137-153 (2007)
2006
51 SooHyun Cho, Riccardo Bettati: Improving quality of service of TCP flows in strictly prioritized network. ACST 2006: 240-245
50EEShengquan Wang, Riccardo Bettati: Reactive Speed Control in Temperature-Constrained Real-Time Systems. ECRTS 2006: 161-170
49EESooHyun Cho, Riccardo Bettati: Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth. GLOBECOM 2006
48EEShengquan Wang, Riccardo Bettati: Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals. RTSS 2006: 323-334
2005
47 Sangig Rho, Byung-Kyu Choi, Riccardo Bettati: Design Real-Time Java Remote Method Invocation: A Server-Centric Approach. IASTED PDCS 2005: 269-276
46EEHongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao: SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461
45EEXinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503
44EEYe Zhu, Riccardo Bettati: Anonymity vs. Information Leakage in Anonymity Systems. ICDCS 2005: 514-524
43EEBryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati: Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures. ICPADS (1) 2005: 57-63
42EEShengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao: Real-Time Component-Based Systems. IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 428-437
41EEYe Zhu, Xinwen Fu, Riccardo Bettati: On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. NCA 2005: 215-218
40EESooHyun Cho, Riccardo Bettati: Aggregated Aggressiveness Control on Groups of TCP Flows. NETWORKING 2005: 586-597
39EEYe Zhu, Riccardo Bettati: Unmixing Mix Traffic. Privacy Enhancing Technologies 2005: 110-127
2004
38EEShengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao: Providing Statistical Delay Guarantees in Wireless Networks. ICDCS 2004: 48-55
37EEByung-Kyu Choi, Sangig Rho, Riccardo Bettati: Fast Software Component Migration for Applications Survivability in Distributed Real-Time Systems. ISORC 2004: 269-276
36EEXinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao: Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281
35EEYe Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225
34EEYong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao: A quantitative analysis of anonymous communications. IEEE Transactions on Reliability 53(1): 103-115 (2004)
33EEShengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao: Providing absolute differentiated services for real-time applications in static-priority scheduling networks. IEEE/ACM Trans. Netw. 12(2): 326-339 (2004)
2003
32 Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195
31 Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao: Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91
30EEXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao: On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. ICDCS 2003: 340-
29EEXinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan: Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492
28EEByung-Kyu Choi, Sangig Rho, Riccardo Bettati: Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems. IPDPS 2003: 122
27EEShengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao: A Study of Providing Statistical QoS in a Differentiated Sevices Network. NCA 2003: 297-304
26 Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li: Utilization-Based Admission Control for Scalable Real-Time Communication. Real-Time Systems 24(2): 171-202 (2003)
2002
25EEYong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao: An Optimal Strategy for Anonymous Communication Protocols. ICDCS 2002: 257-
2001
24EEByung-Kyu Choi, Riccardo Bettati: Endpoint Admission Control: Network Based Approach. ICDCS 2001: 227-235
23EEShengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao: Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. IEEE Real Time Technology and Applications Symposium 2001: 127-129
22EEShengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao: Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. IEEE Real-Time Systems Symposium 2001: 289-298
21EEShengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao: Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. INFOCOM 2001: 669-678
20 Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao: NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Transactions on Systems, Man, and Cybernetics, Part A 31(4): 253-265 (2001)
2000
19EEByung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao: Scalable QoS Guaranteed Communication Services for Real-Time Applications. ICDCS 2000: 180-187
18EEGurudatt Shenoy, Suresh K. Satapati, Riccardo Bettati: HYDRANET-FT: Network Support for Dependable Services. ICDCS 2000: 699-706
17EEDong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao: Utilization-Based Admission Control for Real-Time Applications. ICPP 2000: 251-
16EEByung-Kyu Choi, Riccardo Bettati: Efficient resource management for hard real-time communication over differentiated services architectures. RTCSA 2000: 119-126
15EEYves Meylan, Aneema Bajpai, Riccardo Bettati: ProtEx: a toolkit for the analysis of distributed real-time systems. RTCSA 2000: 183-
1999
14EEChengzhi Li, Riccardo Bettati, Wei Zhao: New Delay Analysis in High Speed Networks. ICPP 1999: 454-461
13EEB. Devalla, Riccardo Bettati, Wei Zhao: Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . RTCSA 1999: 340-347
12EEByung-Kyu Choi, Riccardo Bettati: Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment. RTCSA 1999: 388-
11EERiccardo Bettati, Wei Zhao, D. Teodor: Real-time Intrusion Detection and Suppression in ATM Networks. Workshop on Intrusion Detection and Network Monitoring 1999: 111-118
1998
10 Hamesh Chawla, Geoff Dillon, Riccardo Bettati: HYDRANET : Network Support for Scaling of Large-Scale Services. ICCCN 1998: 574-583
9EEChengzhi Li, Riccardo Bettati, Wei Zhao: Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. ICPP 1998: 432-440
1997
8 Sharad Sundaresan, Riccardo Bettati: Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks. ICDCS 1997: 0-
7EEChengzhi Li, Riccardo Bettati, Wei Zhao: Static priority scheduling for ATM networks. IEEE Real-Time Systems Symposium 1997: 264-273
1996
6 Riccardo Bettati, Amit Gupta: Dynamic Resource Allocation Migration for Multiparty Real-Time Communications. ICDCS 1996: 646-656
5 Rolf Oppliger, Amit Gupta, Mark Moran, Riccardo Bettati: A Security Architecture for Tenet Scheme 2. IDMS 1996: 163-174
4EEJane W.-S. Liu, Chung Laung Liu, Zhong Deng, Too-Seng Tia, Jun Sun, Matthew F. Storch, David Hull, J. L. Redondo, Riccardo Bettati, A. Silberman: Perts: a Prototyping Environment for Real-Time Systems. International Journal of Software Engineering and Knowledge Engineering 6(2): 161-177 (1996)
1995
3 Riccardo Bettati, Domenico Ferrari, Amit Gupta, W. Heffner, Wingwai Howe, Mark Moran, Quyen Nguyen, Rajendra Yavatkar: Connection Establishment for Multi-Party Real-Time Communication. NOSSDAV 1995: 240-250
1992
2 Riccardo Bettati, Jane W.-S. Liu: End-to-End Scheduling to Meet Deadlines in Distributed Systems. ICDCS 1992: 452-459
1990
1EERiccardo Bettati, Jane W.-S. Liu: Algorithms for end-to-end scheduling to meet deadlines. SPDP 1990: 62-67

Coauthor Index

1Youngwoo Ahn [57]
2Aneema Bajpai [15]
3Ionut Cardei [56]
4Hamesh Chawla [10]
5Jianer Chen [17] [46]
6SooHyun Cho [40] [49] [51] [60]
7Byung Kyu Choi (Byung-Kyu Choi) [12] [16] [19] [24] [26] [28] [37] [47]
8Zhong Deng [4]
9B. Devalla [13]
10Geoff Dillon [10]
11Domenico Ferrari [3]
12Xinwen Fu [20] [25] [29] [30] [32] [34] [35] [36] [41] [43] [45] [46] [52] [58]
13Bryan Graham [29] [30] [32] [35] [36] [43] [45]
14Yong Guan [20] [25] [34]
15Amit Gupta [3] [5] [6]
16W. Heffner [3]
17Wingwai Howe [3]
18David Hull [4]
19Tuneesh Leila [53]
20Chengzhi Li [7] [9] [14] [17] [19] [26]
21Chung Laung Liu [4]
22Jane W.-S. Liu [1] [2] [4]
23Zhibin Mai [42]
24Yves Meylan [15]
25Mark Moran [3] [5]
26Ripal Nathuji [38]
27Quyen Nguyen [3]
28Rolf Oppliger [5]
29Allalaghatta Pavan [56]
30Sandeep K. Reddy [31]
31J. L. Redondo [4]
32Sangig Rho [28] [37] [42] [47]
33Suresh K. Satapati [18]
34Gurudatt Shenoy [18]
35P. U. Shenoy [20]
36A. Silberman [4]
37Matthew F. Storch [4]
38Jun Sun [4]
39Sharad Sundaresan [8]
40D. Teodor [11]
41Too-Seng Tia [4]
42Shengquan Wang [21] [22] [23] [27] [33] [38] [42] [48] [50] [55]
43Hongyun Xu [46]
44Dong Xuan [17] [19] [20] [21] [22] [23] [26] [27] [29] [31] [33] [36]
45Rajendra Yavatkar [3]
46Wei Yu [31] [58]
47Nan Zhang [58]
48Wei Zhao [7] [9] [11] [13] [14] [17] [19] [20] [21] [22] [23] [25] [26] [27] [29] [30] [31] [32] [33] [34] [35] [36] [38] [42] [45] [46] [52] [58]
49Ye Zhu [35] [39] [41] [43] [44] [45] [46] [52] [54] [59]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)