关注
Riccardo Bettati
Riccardo Bettati
Department of Computer Science and Engineering, Texas A&M University
在 tamu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Imprecise computations
JWS Liu, WK Shih, KJ Lin, R Bettati, JY Chung
Proceedings of the IEEE 82 (1), 83-94, 1994
4901994
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005
2412005
PERTS: A prototyping environment for real-time systems
JWS Liu, CL Liu, Z Deng, TS Tia, J Sun, M Storch, D Hull, JL Redondo, ...
International Journal of Software Engineering and Knowledge Engineering 6 …, 1996
1661996
Providing absolute differentiated services for real-time applications in static-priority scheduling networks
S Wang, D Xuan, R Bettati, W Zhao
IEEE/ACM Transactions on networking 12 (2), 326-339, 2004
1522004
Reactive speed control in temperature-constrained real-time systems
S Wang, R Bettati
Real-Time Systems 39, 73-95, 2008
1452008
End-to-End Scheduling to Meet Deadlines in Distributed Systems.
R Bettati, JWS Liu
ICDCS, 452-459, 1992
1381992
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
1312001
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
1022002
End-to-end scheduling to meet deadlines in distributed systems
R Bettati
University of Illinois at Urbana-Champaign, 1994
961994
Delay analysis in temperature-constrained hard real-time systems with general task arrivals
S Wang, R Bettati
2006 27th IEEE International Real-Time Systems Symposium (RTSS'06), 323-334, 2006
942006
On flow marking attacks in wireless anonymous communication networks
X Fu, Y Zhu, B Graham, R Bettati, W Zhao
Journal of Ubiquitous Computing and Intelligence 1 (1), 42-53, 2007
912007
Anonymity vs. information leakage in anonymity systems
Y Zhu, R Bettati
25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005
902005
Correlation-based traffic analysis attacks on anonymity networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
IEEE Transactions on Parallel and Distributed Systems 21 (7), 954-967, 2009
822009
Connection establishment for multi-party real-time communication
R Bettati, D Ferrari, A Gupta, W Heffner, W Howe, M Moran, Q Nguyen, ...
Network and Operating Systems Support for Digital Audio and Video: 5th …, 1995
761995
On effectiveness of link padding for statistical traffic analysis attacks
X Fu, B Graham, R Bettati, W Zhao
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
682003
Static priority scheduling for ATM networks
C Li, R Bettati, W Zhao
Proceedings Real-Time Systems Symposium, 264-273, 1997
681997
RT-ARM: A real-time adaptive resource management system for distributed mission-critical applications
J Huang, R Jha, W Heimerdinger, M Muhammad, S Lauzac, ...
Workshop on Middleware for Distributed Real-Time Systems, RTSS 97, 1997
681997
Analytical and empirical analysis of countermeasures to traffic analysis attacks
X Fu, B Graham, R Bettati, W Zhao, D Xuan
2003 International Conference on Parallel Processing, 2003. Proceedings …, 2003
632003
HydraNet-FT: Network support for dependable services
G Shenoy, SK Satapati, R Bettati
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
612000
Active traffic analysis attacks and countermeasures
X Fu, B Graham, R Bettati, W Zhao
2003 International Conference on Computer Networks and Mobile Computing …, 2003
552003
系统目前无法执行此操作,请稍后再试。
文章 1–20