Imprecise computations JWS Liu, WK Shih, KJ Lin, R Bettati, JY Chung Proceedings of the IEEE 82 (1), 83-94, 1994 | 493 | 1994 |
On flow correlation attacks and countermeasures in mix networks Y Zhu, X Fu, B Graham, R Bettati, W Zhao Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005 | 245 | 2005 |
PERTS: A prototyping environment for real-time systems JWS Liu, CL Liu, Z Deng, TS Tia, J Sun, M Storch, D Hull, JL Redondo, ... International Journal of Software Engineering and Knowledge Engineering 6 …, 1996 | 166 | 1996 |
Providing absolute differentiated services for real-time applications in static-priority scheduling networks S Wang, D Xuan, R Bettati, W Zhao IEEE/ACM Transactions on networking 12 (2), 326-339, 2004 | 152 | 2004 |
Reactive speed control in temperature-constrained real-time systems S Wang, R Bettati Real-Time Systems 39, 73-95, 2008 | 145 | 2008 |
End-to-End Scheduling to Meet Deadlines in Distributed Systems. R Bettati, JWS Liu ICDCS, 452-459, 1992 | 138 | 1992 |
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001 | 132 | 2001 |
An optimal strategy for anonymous communication protocols Y Guan, X Fu, R Bettati, W Zhao Proceedings 22nd International Conference on Distributed Computing Systems …, 2002 | 101 | 2002 |
End-to-end scheduling to meet deadlines in distributed systems R Bettati University of Illinois at Urbana-Champaign, 1994 | 97 | 1994 |
Delay analysis in temperature-constrained hard real-time systems with general task arrivals S Wang, R Bettati 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06), 323-334, 2006 | 94 | 2006 |
On flow marking attacks in wireless anonymous communication networks X Fu, Y Zhu, B Graham, R Bettati, W Zhao Journal of Ubiquitous Computing and Intelligence 1 (1), 42-53, 2007 | 92 | 2007 |
Anonymity vs. information leakage in anonymity systems Y Zhu, R Bettati 25th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2005 | 92 | 2005 |
Correlation-based traffic analysis attacks on anonymity networks Y Zhu, X Fu, B Graham, R Bettati, W Zhao IEEE Transactions on Parallel and Distributed Systems 21 (7), 954-967, 2009 | 88 | 2009 |
Connection establishment for multi-party real-time communication R Bettati, D Ferrari, A Gupta, W Heffner, W Howe, M Moran, Q Nguyen, ... Network and Operating Systems Support for Digital Audio and Video: 5th …, 1995 | 76 | 1995 |
On effectiveness of link padding for statistical traffic analysis attacks X Fu, B Graham, R Bettati, W Zhao 23rd International Conference on Distributed Computing Systems, 2003 …, 2003 | 69 | 2003 |
Static priority scheduling for ATM networks C Li, R Bettati, W Zhao Proceedings Real-Time Systems Symposium, 264-273, 1997 | 68 | 1997 |
RT-ARM: A real-time adaptive resource management system for distributed mission-critical applications J Huang, R Jha, W Heimerdinger, M Muhammad, S Lauzac, ... Workshop on Middleware for Distributed Real-Time Systems, RTSS 97, 1997 | 68 | 1997 |
Analytical and empirical analysis of countermeasures to traffic analysis attacks X Fu, B Graham, R Bettati, W Zhao, D Xuan 2003 International Conference on Parallel Processing, 2003. Proceedings …, 2003 | 63 | 2003 |
HydraNet-FT: Network support for dependable services G Shenoy, SK Satapati, R Bettati Proceedings 20th IEEE International Conference on Distributed Computing …, 2000 | 61 | 2000 |
Active traffic analysis attacks and countermeasures X Fu, B Graham, R Bettati, W Zhao 2003 International Conference on Computer Networks and Mobile Computing …, 2003 | 58 | 2003 |