Name
Papers
Collaborators
AZER BESTAVROS
151
147
Citations 
PageRank 
Referers 
3791
764.82
6943
Referees 
References 
3013
2196
Search Limit
1001000
Title
Citations
PageRank
Year
A new benchmark harness for systematic and robust evaluation of streaming state stores00.342022
Neuroflight: Next Generation Flight Control Firmware.00.342019
Conclave: secure multi-party computation on big data40.402019
Conclave: Secure Multi-Party Computation On Big Data50.412019
Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.00.342018
S3B: Software-Defined Secure Server Bindings00.342018
Reinforcement Learning for UAV Attitude Control.80.632018
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds.10.352018
A case study of a shared/buy-in computing ecosystem.00.342018
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.00.342017
AngelCast: Cloud-based peer-assisted live streaming using optimized multi-tree construction.20.392017
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments.20.412017
User-centric distributed solutions for privacy-preserving analytics.50.412017
Guideme: Routes Coordination Of Participating Agents In Mobile Crowd Sensing Platforms00.342017
Team Formation for Scheduling Educational Material in Massive Online Classes.10.352017
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization10.352017
Markov Modeling of Moving Target Defense Games.150.752016
Secure MPC for Analytics as a Web Application20.442016
DEMO: Integrating MPC in Big Data Workflows.20.372016
Using Alloy to Formally Model and Reason About an OpenFlow Network Switch.00.342016
PROVIDE: Hiding from Automated Network Scans with Proofs of Identity00.342016
End-To-End Informed Vm Selection In Compute Clouds00.342015
Policies for Assisted Virtual Machine Selection in Cloud Computing Environments00.342015
Rational coordination of crowdsourced resources for geo-temporal request satisfaction00.342015
Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure30.402015
A Verification Platform for SDN-Enabled Applications120.592014
A Divide-and-Conquer Algorithm for Betweenness Centrality.50.442014
Towards accessible integration and deployment of formal tools and techniques10.382013
Preface to special issue: lightweight and practical formal methods in the design and analysis of safety-critical systems.00.342013
Repetition-aware content placement in navigational networks00.342013
Verifiably-safe software-defined networks for CPS160.892013
The filter-placement problem and its application to minimizing information multiplicity50.562012
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity.00.342012
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction90.562012
Message from the Program Chairs.00.342012
A Framework for the Evaluation and Management of Network Centrality.210.822012
Peer-assisted content distribution on a budget100.642012
A Domain-Specific Language for 00.342011
Formal Verification of SLA Transformations10.362011
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management00.342010
Trade & Cap: A Customer-Managed, Market-Based System for Trading Bandwidth Allowances at a Shared Link.00.342010
Trade & Cap: a customer-managed, market-based system for trading bandwidth allowances at a shared link30.832010
Safe compositional network sketches: formal framework70.582010
Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings543.382009
CSR: Constrained Selfish Routing in Ad-Hoc Networks10.362009
A formal type-centric framework for verification and resource allocation in pervasive Sense-and-Respond systems00.342009
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks10.372009
Wireless and physical security via embedded sensor networks10.382008
EGOIST: overlay routing using selfish neighbor selection50.442008
Swarming on Optimized Graphs for n-Way Broadcast.60.512008
  • 1
  • 2