2009 | ||
---|---|---|
81 | John S. Baras, Vahid Tabatabaee, Punyaslok Purkayastha, Kiran Somasundaram: Component Based Performance Modelling of Wireless Routing Protocols. ICC 2009: 1-6 | |
80 | Ayan Roy Chowdhury, John S. Baras: Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks. ICC 2009: 1-6 | |
79 | Maria Striki, Kyriakos Manousakis, John S. Baras: New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks. ICN 2009: 236-244 | |
78 | Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras: Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments. IEEE/ACM Trans. Netw. 17(2): 605-617 (2009) | |
2008 | ||
77 | John S. Baras, Pedram Hovareshti: Effects of topology in networked systems: Stochastic methods and small worlds. CDC 2008: 2973-2978 | |
76 | Ion Matei, Nuno C. Martins, John S. Baras: Almost sure convergence to consensus in Markovian random graphs. CDC 2008: 3535-3540 | |
75 | Pedram Hovareshti, John S. Baras, Vijay Gupta: Average consensus over small world networks: A probabilistic framework. CDC 2008: 375-380 | |
74 | Ayan Roy Chowdhury, John S. Baras: A Lightweight Certificate-Based Source Authentication Protocol for Group Communications in Hybrid Wireless/Satellite Networks. GLOBECOM 2008: 1897-1902 | |
73 | Tao Jiang, John S. Baras: Trust Credential Distribution in Autonomic Networks. GLOBECOM 2008: 1974-1978 | |
72 | John S. Baras, Vahid Tabatabaee, George Papageorgiou, Nicolas Rentz: Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks. GLOBECOM 2008: 4884-4888 | |
71 | Senni Perumal, John S. Baras: Aerial Platform Placement Algorithm to Satisfy Connectivity and Capacity Constraints in Wireless Ad-Hoc Networks. GLOBECOM 2008: 518-522 | |
70 | Maria Striki, John S. Baras, Kyriakos Manousakis: Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications. ICN 2008: 223-231 | |
69 | John S. Baras: Multi-hop mobile wireless network design: implicit cross-layer loss models and performance sensitivities. MOBICOM 2008: 1 | |
68 | Behnam Neekzad, Kamran Sayrafian-Pour, John S. Baras: Clustering Characteristics of Millimeter Wave Indoor Channels. WCNC 2008: 1217-1222 | |
67 | John S. Baras, Senni Perumal, Vahid Tabatabaee, Kiran Somasundaram, Punyaslok Purkayastha: Loss network models and multiple metric performance sensitivity analysis for mobile wireless multi-hop networks. WICON 2008: 60 | |
66 | Paul L. Yu, John S. Baras, Brian M. Sadler: Multicarrier authentication at the physical layer. WOWMOM 2008: 1-6 | |
65 | Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos: An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008) | |
64 | George Theodorakopoulos, John S. Baras: Game Theoretic Modeling of Malicious Users in Collaborative Networks. IEEE Journal on Selected Areas in Communications 26(7): 1317-1327 (2008) | |
63 | Paul L. Yu, John S. Baras, Brian M. Sadler: Physical-Layer Authentication. IEEE Transactions on Information Forensics and Security 3(1): 38-51 (2008) | |
2007 | ||
62 | Alvaro A. Cárdenas, George V. Moustakides, John S. Baras: Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models. CISS 2007: 911-916 | |
61 | Do J. Byun, John S. Baras: A New Rate-based Active Queue Management: Adaptive Virtual Queue RED. CNSR 2007: 389-396 | |
60 | Alvaro A. Cárdenas, George V. Moustakides, John S. Baras: On Optimal Watermarking Schemes in Uncertain Gaussian Channels. ICIP (4) 2007: 449-452 | |
59 | Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras: Performance Comparison of Detection Schemes for MAC Layer Misbehavior. INFOCOM 2007: 1496-1504 | |
58 | George Theodorakopoulos, John S. Baras: Malicious Users in Unstructured Networks. INFOCOM 2007: 884-891 | |
57 | Svetlana Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides: Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. Journal of Computer Security 15(1): 103-128 (2007) | |
2006 | ||
56 | Alvaro A. Cárdenas, John S. Baras: B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets. AAAI 2006 | |
55 | George Theodorakopoulos, John S. Baras: A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users. GLOBECOM 2006 | |
54 | Hui Zeng, Michael H. Hadjitheodosiou, John S. Baras: Two-Level Dynamic Bandwidth Allocation for a Space-to-Ground Relay Network. GLOBECOM 2006 | |
53 | Alvaro A. Cárdenas, John S. Baras, Karl Seamon: A Framework for the Evaluation of Intrusion Detection Systems. IEEE Symposium on Security and Privacy 2006: 63-77 | |
52 | Tao Jiang, John S. Baras: Trust Evaluation in Anarchy: A Case Study on Autonomous Networks. INFOCOM 2006 | |
51 | Giovanni Di Crescenzo, Maria Striki, John S. Baras: Modeling key agreement in multi-hop ad hoc networks. IWCMC 2006: 39-44 | |
50 | Dionysus Blazakis, Manish Karir, John S. Baras: BGP-Inspect - Extracting Information from Raw BGP Data. NOMS 2006: 174-185 | |
49 | Svetlana Radosavac, John S. Baras, George V. Moustakides: Impact of optimal MAC layer attacks on the network layer. SASN 2006: 135-146 | |
48 | Wei Xi, Xiaobo Tan, John S. Baras: Gibbs sampler-based coordination of autonomous swarms. Automatica 42(7): 1107-1119 (2006) | |
47 | George Theodorakopoulos, John S. Baras: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2): 318-328 (2006) | |
2005 | ||
46 | Svetlana Radosavac, John S. Baras, Iordanis Koutsopoulos: A framework for MAC protocol misbehavior detection in wireless networks. Workshop on Wireless Security 2005: 33-42 | |
2004 | ||
45 | Tao Jiang, John S. Baras: Ant-Based Adaptive Trust Evidence Distribution in MANET. ICDCS Workshops 2004: 588-593 | |
44 | Aniruddha Bhalekar, John S. Baras: Cumulative Caching for Reduced User-Perceived Latency for WWW Transfers on Networks with Satellite Links. SAPIR 2004: 179-186 | |
43 | Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras: Detection and prevention of MAC layer misbehavior in ad hoc networks. SASN 2004: 17-22 | |
42 | Ayan Roy Chowdhury, John S. Baras: Key Management for Secure Multicast in Hybrid Satellite Networks. SEC 2004: 533-548 | |
41 | Jonathan McGee, Manish Karir, John S. Baras: Implementing Ad Hoc to Terrestrial Network Gateways. WWIC 2004: 132-142 | |
40 | Roshni Srinivasan, John S. Baras: Analyzing the Performance of Data Users in Packet Switched Wireless Systems with Prioritized Voice Traffic. WWIC 2004: 236-247 | |
39 | George Theodorakopoulos, John S. Baras: Trust evaluation in ad-hoc networks. Workshop on Wireless Security 2004: 1-10 | |
38 | Xiaobo Tan, John S. Baras: Modeling and control of hysteresis in magnetostrictive actuators. Automatica 40(9): 1469-1480 (2004) | |
37 | Alex T. Nguyen, Michael H. Hadjitheodosiou, John S. Baras: Broadband communication support for earth observation from the International Space Station. Computer Networks 46(3): 375-388 (2004) | |
36 | Mingyan Liu, John S. Baras: Fixed point approximation for multirate multihop loss networks with state-dependent routing. IEEE/ACM Trans. Netw. 12(2): 361-374 (2004) | |
2003 | ||
35 | Vijay G. Bharadwaj, John S. Baras: A Framework for Automated Negotiation of Access Control Policies. DISCEX (2) 2003: 216-221 | |
34 | Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bobba, Radostina K. Koleva, Anuja Sonalker, Emilian Dinu, Virgil D. Gligor, John S. Baras: Integrated Security Services for Dynamic Coalitions. DISCEX (2) 2003: 38-40 | |
33 | Nelson Liu, John S. Baras: Statistical Modeling and Performance Analysis of Multi-Scaling Traffic. INFOCOM 2003 | |
32 | Vijay G. Bharadwaj, John S. Baras: Towards Automated Negotiation of Access Control Policies. POLICY 2003: 111-119 | |
31 | Shahan Yang, John S. Baras: Modeling vulnerabilities of ad hoc routing protocols. SASN 2003: 12-20 | |
30 | John S. Baras: Simulation of large networks: modeling and simulation of telecommunication networks for control and management. Winter Simulation Conference 2003: 431-440 | |
29 | Feng-Wen Sun, Yimin Jiang, John S. Baras: On the convergence of the inverses of Toeplitz matrices and its applications. IEEE Transactions on Information Theory 49(1): 180-190 (2003) | |
28 | Yimin Jiang, Feng-Wen Sun, John S. Baras: On the performance limits of data-aided synchronization. IEEE Transactions on Information Theory 49(1): 191-203 (2003) | |
2002 | ||
27 | Xiaobo Tan, John S. Baras: Optimal Control of Hysteresis in Smart Actuators: A Viscosity Solutions Approach. HSCC 2002: 451-464 | |
26 | Dinesh Dharmaraju, Ayan Roy Chowdhury, Pedram Hovareshti, John S. Baras: INORA - A Unified Signaling and Routing Mechanism for QoS Support in Mobile Ad hoc Networks. ICPP Workshops 2002: 86-93 | |
25 | S. Varma, John S. Baras: Tool Wear Estimation from Acoustic Emissions: A Model Incorporating Wear-Rate. ICPR (1) 2002: 492-495 | |
24 | John S. Baras, Maben Rabi: Intrusion Detection with Support Vector Machines and Generative Models. ISC 2002: 32-47 | |
23 | Laurent Eschenauer, Virgil D. Gligor, John S. Baras: On Trust Establishment in Mobile Ad-Hoc Networks. Security Protocols Workshop 2002: 47-66 | |
22 | Archan Misra, Teunis J. Ott, John S. Baras: Predicting bottleneck bandwidth sharing by generalized TCP flows. Computer Networks 40(4): 557-576 (2002) | |
2001 | ||
21 | Hongjun Li, John S. Baras: A Framework for Supporting Intelligent Fault and Performance Management for Communication Networks. MMNS 2001: 227-240 | |
20 | Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras: On the Negotiation of Access Control Policies. Security Protocols Workshop 2001: 188-201 | |
19 | Radha Poovendran, John S. Baras: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 47(7): 2824-2834 (2001) | |
2000 | ||
18 | Yimin Jiang, Feng-Wen Sun, John S. Baras: On the True Cramer-Rao Lower Bound for the DA Joint Estimation of Carrier Phase and Timing Offsets. ICC (1) 2000: 331-335 | |
17 | Radha Poovendran, Peter J. Keleher, John S. Baras: A Decision-Process Analysis of Implicit Coscheduling. IPDPS 2000: 115-120 | |
16 | Dana S. Nau, Michael O. Ball, John S. Baras, Abdur Chowdhury, Edward Lin, Jeff Meyer, Ravi Rajamani, John Splain, Vinai Trichur: Integrated Product and Process Design of Microwave Modules using AI Planning and Integer Programming. Knowledge Intensive CAD 2000: 147-158 | |
15 | Dana S. Nau, Michael O. Ball, John S. Baras, Abdur Chowdhury, Edward Lin, Jeff Meyer, Ravi Rajamani, John Splain, Vinai Trichur: Generating and evaluating designs and plans for microwave modules. AI EDAM 14(4): 289-304 (2000) | |
1999 | ||
14 | Radha Poovendran, John S. Baras: An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. CRYPTO 1999: 624-638 | |
13 | Mingyan Liu, Manish Karir, John S. Baras: Caching and Multicasting in DBS Systems. ICPP Workshops 1999: 56- | |
12 | John S. Baras, Subhrakanti Dey: Combined compression and classification with learning vector quantization. IEEE Transactions on Information Theory 45(6): 1911-1920 (1999) | |
1997 | ||
11 | Konstantinos Stathatos, Nick Roussopoulos, John S. Baras: Adaptive Data Broadcast in Hybrid Networks. VLDB 1997: 326-335 | |
1996 | ||
10 | Konstantinos Stathatos, Stephen Kelley, Nick Roussopoulos, John S. Baras: Consistency and Performance of Concurrent Interactive Database Applications. ICDE 1996: 602-609 | |
9 | Nikolaos Sidiropoulos, John S. Baras, Carlos Alberto Berenstein: Further results on MAP optimality and strong consistency of certain classes of morphological filters. IEEE Transactions on Image Processing 5(5): 762-764 (1996) | |
1995 | ||
8 | Nikolaos Sidiropoulos, John S. Baras, Carlos Alberto Berenstein: On morphological openings and closings of signals in shaped noise. ICIP 1995: 518-521 | |
1994 | ||
7 | Nicholas D. Sidiropoulos, John S. Baras, Carlos Alberto Berenstein: Optimal filtering of digital binary images corrupted by union/intersection noise. IEEE Transactions on Image Processing 3(4): 382-403 (1994) | |
6 | Nikos D. Sidiropoulos, John S. Baras, Carlos Alberto Berenstein: Algebraic analysis of the generating functional for discrete random sets and statistical inference for intensity in the discrete Boolean random-set model. Journal of Mathematical Imaging and Vision 4(3): 273-290 (1994) | |
1993 | ||
5 | Jayant R. Haritsa, Michael O. Ball, Nick Roussopoulos, John S. Baras, Anindya Datta: Design f the MANDATE MIB. Integrated Network Management 1993: 85-96 | |
4 | Jayant R. Haritsa, Michael O. Ball, Nick Roussopoulos, Anindya Datta, John S. Baras: MANDATE: MAnaging Networks Using DAtabase TEchnology. IEEE Journal on Selected Areas in Communications 11(9): 1360-1372 (1993) | |
1990 | ||
3 | John S. Baras, Anthony LaVigna: Convergence of a Neural Network Classifier. NIPS 1990: 839-845 | |
1983 | ||
2 | John S. Baras, Arthur J. Dorsey: Adaptive Control of two Competing Queues. INFOCOM 1983: 427-435 | |
1979 | ||
1 | John S. Baras, Demetrios G. Lainiotis: Chandrasekhar algorithms for linear time varying distributed systems. Inf. Sci. 17(2): 153-167 (1979) |