His primary areas of investigation include Computer network, Asynchronous Transfer Mode, Computer security, Wireless sensor network and Quality of service. His Computer network research is multidisciplinary, incorporating perspectives in Equilibrium point and Game theory. His work deals with themes such as Resource allocation, Packet switching, Asynchronous communication, Markov chain and Scheduling, which intersect with Asynchronous Transfer Mode.
His studies deal with areas such as Telecommunications, Adversarial machine learning and Denial-of-service attack as well as Computer security. His Denial-of-service attack course of study focuses on Flooding and The Internet. His study in Quality of service is interdisciplinary in nature, drawing from both Access network, Queueing theory, Throughput and Generalized processor sharing.
George Kesidis focuses on Computer network, Distributed computing, Cloud computing, Artificial intelligence and Computer security. His Computer network research includes elements of Wireless ad hoc network and The Internet. His research integrates issues of Link-state routing protocol, Scheduling, Scalability and Dynamic Source Routing in his study of Distributed computing.
His Cloud computing study combines topics in areas such as Virtual machine, Resource allocation, Workload, Service provider and Server. The various areas that he examines in his Artificial intelligence study include Backdoor, Machine learning and Pattern recognition. His Computer security research is multidisciplinary, incorporating elements of Denial-of-service attack and Botnet.
George Kesidis mainly focuses on Cloud computing, Server, Computer network, Artificial intelligence and Distributed computing. His work carried out in the field of Cloud computing brings together such families of science as Virtual machine, Resource allocation, Computer security and Denial-of-service attack, The Internet. When carried out as part of a general The Internet research project, his work on Net neutrality is frequently linked to work in Neutrality, therefore connecting diverse disciplines of study.
George Kesidis interconnects Service provider, End user and Shared memory in the investigation of issues within Computer network. He has included themes like Machine learning, Backdoor and Pattern recognition in his Artificial intelligence study. His research in Distributed computing intersects with topics in Data center, Network topology, Scheduling and Proportionally fair.
His main research concerns Cloud computing, Artificial intelligence, Distributed computing, Classifier and Computer network. His Cloud computing research incorporates elements of Virtual machine, Resource allocation, Game theory and Backup. His biological study spans a wide range of topics, including Exploit, Machine learning and Pattern recognition.
His Distributed computing research integrates issues from Network topology, Latency, Data center and Cost efficacy. His Computer network research is mostly focused on the topic Server. The study incorporates disciplines such as Artificial neural network and Backdoor in addition to Anomaly detection.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Effective bandwidths for multiclass Markov fluids and other ATM sources
George Kesidis;Jean Walrand;Cheng-Shang Chang.
IEEE ACM Transactions on Networking (1993)
Denial-of-service attack-detection techniques
G. Carl;G. Kesidis;R.R. Brooks;Suresh Rai.
IEEE Internet Computing (2006)
Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid
Stephane Caron;George Kesidis.
international conference on smart grid communications (2010)
Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows
David J. Miller;George Kesidis;Jayaram Raghuram.
(2012)
Resource management in wide-area ATM networks using effective bandwidths
G. de Veciana;G. Kesidis;J. Walrand.
IEEE Journal on Selected Areas in Communications (1995)
Real-time packet traceback and associated packet marking strategies
Ihab Hamadeh;George Kesidis.
(2003)
Equilibria of a noncooperative game for heterogeneous users of an ALOHA network
Youngmi Jin;G. Kesidis.
IEEE Communications Letters (2002)
Admission control and routing in ATM networks using inferences from measured buffer occupancy
C. Courcoubetis;G. Kesidis;A. Ridder;A. Ridder;J. Walrand.
IEEE Transactions on Communications (1995)
Feasibility of fluid event-driven simulation for ATM networks
G. Kesidis;A. Singh;D. Cheung;W.W. Kwok.
global communications conference (1996)
Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks
Xiang ji;Hongyuan Zha;J.J. Metzner;G. Kesidis.
international conference on communications (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Pennsylvania State University
Pennsylvania State University
Arizona State University
University of California, Berkeley
University of Pennsylvania
Virginia Tech
Pennsylvania State University
French Institute for Research in Computer Science and Automation - INRIA
University of Toronto
New York University
Brandenburg University of Technology
Zhejiang University
Indian Institute of Science Education and Research, Thiruvananthapuram
Université Catholique de Louvain
Brandeis University
Zhejiang University
Heidelberg University
University of California, Berkeley
Pusan National University
Mayo Clinic
East China Normal University
University of Puerto Rico
Tokyo Medical and Dental University
King's College London
University of Wisconsin–Milwaukee
Northwestern University