D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 6,760 333 World Ranking 7520 National Ranking 3537

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Statistics

His primary areas of investigation include Computer network, Asynchronous Transfer Mode, Computer security, Wireless sensor network and Quality of service. His Computer network research is multidisciplinary, incorporating perspectives in Equilibrium point and Game theory. His work deals with themes such as Resource allocation, Packet switching, Asynchronous communication, Markov chain and Scheduling, which intersect with Asynchronous Transfer Mode.

His studies deal with areas such as Telecommunications, Adversarial machine learning and Denial-of-service attack as well as Computer security. His Denial-of-service attack course of study focuses on Flooding and The Internet. His study in Quality of service is interdisciplinary in nature, drawing from both Access network, Queueing theory, Throughput and Generalized processor sharing.

His most cited work include:

  • Effective bandwidths for multiclass Markov fluids and other ATM sources (510 citations)
  • Denial-of-service attack-detection techniques (306 citations)
  • Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid (255 citations)

What are the main themes of his work throughout his whole career to date?

George Kesidis focuses on Computer network, Distributed computing, Cloud computing, Artificial intelligence and Computer security. His Computer network research includes elements of Wireless ad hoc network and The Internet. His research integrates issues of Link-state routing protocol, Scheduling, Scalability and Dynamic Source Routing in his study of Distributed computing.

His Cloud computing study combines topics in areas such as Virtual machine, Resource allocation, Workload, Service provider and Server. The various areas that he examines in his Artificial intelligence study include Backdoor, Machine learning and Pattern recognition. His Computer security research is multidisciplinary, incorporating elements of Denial-of-service attack and Botnet.

He most often published in these fields:

  • Computer network (39.28%)
  • Distributed computing (18.94%)
  • Cloud computing (13.93%)

What were the highlights of his more recent work (between 2015-2021)?

  • Cloud computing (13.93%)
  • Server (8.91%)
  • Computer network (39.28%)

In recent papers he was focusing on the following fields of study:

George Kesidis mainly focuses on Cloud computing, Server, Computer network, Artificial intelligence and Distributed computing. His work carried out in the field of Cloud computing brings together such families of science as Virtual machine, Resource allocation, Computer security and Denial-of-service attack, The Internet. When carried out as part of a general The Internet research project, his work on Net neutrality is frequently linked to work in Neutrality, therefore connecting diverse disciplines of study.

George Kesidis interconnects Service provider, End user and Shared memory in the investigation of issues within Computer network. He has included themes like Machine learning, Backdoor and Pattern recognition in his Artificial intelligence study. His research in Distributed computing intersects with topics in Data center, Network topology, Scheduling and Proportionally fair.

Between 2015 and 2021, his most popular works were:

  • Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks (34 citations)
  • Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud (29 citations)
  • PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing (25 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Statistics

His main research concerns Cloud computing, Artificial intelligence, Distributed computing, Classifier and Computer network. His Cloud computing research incorporates elements of Virtual machine, Resource allocation, Game theory and Backup. His biological study spans a wide range of topics, including Exploit, Machine learning and Pattern recognition.

His Distributed computing research integrates issues from Network topology, Latency, Data center and Cost efficacy. His Computer network research is mostly focused on the topic Server. The study incorporates disciplines such as Artificial neural network and Backdoor in addition to Anomaly detection.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Effective bandwidths for multiclass Markov fluids and other ATM sources

George Kesidis;Jean Walrand;Cheng-Shang Chang.
IEEE ACM Transactions on Networking (1993)

866 Citations

Denial-of-service attack-detection techniques

G. Carl;G. Kesidis;R.R. Brooks;Suresh Rai.
IEEE Internet Computing (2006)

530 Citations

Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid

Stephane Caron;George Kesidis.
international conference on smart grid communications (2010)

343 Citations

Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows

David J. Miller;George Kesidis;Jayaram Raghuram.
(2012)

261 Citations

Resource management in wide-area ATM networks using effective bandwidths

G. de Veciana;G. Kesidis;J. Walrand.
IEEE Journal on Selected Areas in Communications (1995)

223 Citations

Real-time packet traceback and associated packet marking strategies

Ihab Hamadeh;George Kesidis.
(2003)

183 Citations

Equilibria of a noncooperative game for heterogeneous users of an ALOHA network

Youngmi Jin;G. Kesidis.
IEEE Communications Letters (2002)

178 Citations

Admission control and routing in ATM networks using inferences from measured buffer occupancy

C. Courcoubetis;G. Kesidis;A. Ridder;A. Ridder;J. Walrand.
IEEE Transactions on Communications (1995)

165 Citations

Feasibility of fluid event-driven simulation for ATM networks

G. Kesidis;A. Singh;D. Cheung;W.W. Kwok.
global communications conference (1996)

148 Citations

Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks

Xiang ji;Hongyuan Zha;J.J. Metzner;G. Kesidis.
international conference on communications (2004)

143 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing George Kesidis

Massoud Pedram

Massoud Pedram

University of Southern California

Publications: 21

Don Towsley

Don Towsley

University of Massachusetts Amherst

Publications: 19

Yang Xiao

Yang Xiao

University of Alabama

Publications: 19

Cheng-Shang Chang

Cheng-Shang Chang

National Tsing Hua University

Publications: 19

Yanzhi Wang

Yanzhi Wang

Northeastern University

Publications: 18

Saswati Sarkar

Saswati Sarkar

University of Pennsylvania

Publications: 16

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 15

Danny H. K. Tsang

Danny H. K. Tsang

Hong Kong University of Science and Technology

Publications: 14

Christos G. Panayiotou

Christos G. Panayiotou

University of Cyprus

Publications: 14

Nick Duffield

Nick Duffield

Texas A&M University

Publications: 14

Christos G. Cassandras

Christos G. Cassandras

Boston University

Publications: 13

Kai Hwang

Kai Hwang

Chinese University of Hong Kong, Shenzhen

Publications: 13

Mung Chiang

Mung Chiang

Purdue University West Lafayette

Publications: 13

Zhu Han

Zhu Han

University of Houston

Publications: 12

Jean Walrand

Jean Walrand

University of California, Berkeley

Publications: 12

Wanlei Zhou

Wanlei Zhou

City University of Macau

Publications: 12

Trending Scientists

Gerd Wagner

Gerd Wagner

Brandenburg University of Technology

Yuanqiang Cai

Yuanqiang Cai

Zhejiang University

Narendra Kurra

Narendra Kurra

Indian Institute of Science Education and Research, Thiruvananthapuram

Philippe Lefèvre

Philippe Lefèvre

Université Catholique de Louvain

Irving R. Epstein

Irving R. Epstein

Brandeis University

Qilong Ren

Qilong Ren

Zhejiang University

Jana Zaumseil

Jana Zaumseil

Heidelberg University

Phillip L. Geissler

Phillip L. Geissler

University of California, Berkeley

Young-Il Jeong

Young-Il Jeong

Pusan National University

Derek C. Radisky

Derek C. Radisky

Mayo Clinic

Zhongyuan Chen

Zhongyuan Chen

East China Normal University

Gregory J. Quirk

Gregory J. Quirk

University of Puerto Rico

Hajime Karasuyama

Hajime Karasuyama

Tokyo Medical and Dental University

David Demeritt

David Demeritt

King's College London

Laura A. Peracchio

Laura A. Peracchio

University of Wisconsin–Milwaukee

Lisa M. Kuhns

Lisa M. Kuhns

Northwestern University

Something went wrong. Please try again later.