Riccardo Bettati
Riccardo Bettati
Department of Computer Science and Engineering, Texas A&M University
Verified email at
Cited by
Cited by
Imprecise computations
JWS Liu, WK Shih, KJ Lin, R Bettati, JY Chung
Proceedings of the IEEE 82 (1), 83-94, 1994
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005
PERTS: A prototyping environment for real-time systems
JWS Liu, CL Liu, Z Deng, TS Tia, J Sun, M Storch, D Hull, JL Redondo, ...
International Journal of Software Engineering and Knowledge Engineering 6 …, 1996
Providing absolute differentiated services for real-time applications in static-priority scheduling networks
S Wang, D Xuan, R Bettati, W Zhao
IEEE/ACM Transactions on networking 12 (2), 326-339, 2004
Reactive speed control in temperature-constrained real-time systems
S Wang, R Bettati
Real-Time Systems 39, 73-95, 2008
End-to-End Scheduling to Meet Deadlines in Distributed Systems.
R Bettati, JWS Liu
ICDCS, 452-459, 1992
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
End-to-end scheduling to meet deadlines in distributed systems
R Bettati
University of Illinois at Urbana-Champaign, 1994
Delay analysis in temperature-constrained hard real-time systems with general task arrivals
S Wang, R Bettati
2006 27th IEEE International Real-Time Systems Symposium (RTSS'06), 323-334, 2006
On flow marking attacks in wireless anonymous communication networks
X Fu, Y Zhu, B Graham, R Bettati, W Zhao
Journal of Ubiquitous Computing and Intelligence 1 (1), 42-53, 2007
Anonymity vs. information leakage in anonymity systems
Y Zhu, R Bettati
25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005
Correlation-based traffic analysis attacks on anonymity networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
IEEE Transactions on Parallel and Distributed Systems 21 (7), 954-967, 2009
Connection establishment for multi-party real-time communication
R Bettati, D Ferrari, A Gupta, W Heffner, W Howe, M Moran, Q Nguyen, ...
Network and Operating Systems Support for Digital Audio and Video: 5th …, 1995
Static priority scheduling for ATM networks
C Li, R Bettati, W Zhao
Proceedings Real-Time Systems Symposium, 264-273, 1997
RT-ARM: A real-time adaptive resource management system for distributed mission-critical applications
J Huang, R Jha, W Heimerdinger, M Muhammad, S Lauzac, ...
Workshop on Middleware for Distributed Real-Time Systems, RTSS 97, 1997
On effectiveness of link padding for statistical traffic analysis attacks
X Fu, B Graham, R Bettati, W Zhao
23rd International Conference on Distributed Computing Systems, 2003 …, 2003
Analytical and empirical analysis of countermeasures to traffic analysis attacks
X Fu, B Graham, R Bettati, W Zhao, D Xuan
2003 International Conference on Parallel Processing, 2003. Proceedings …, 2003
HydraNet-FT: Network support for dependable services
G Shenoy, SK Satapati, R Bettati
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
Real-time component-based systems
S Wang, S Rho, Z Mai, R Bettati, W Zhao
11th IEEE Real Time and Embedded Technology and Applications Symposium, 428-437, 2005
The system can't perform the operation now. Try again later.
Articles 1–20