Sites

  My Home Page
  TAMU Home Page
  TAMU CS Home Page

 Research

  Experience
  Interests

 Professional

  Activities

 Projects

  VTech
  TAMU-NetEx
  RT-ARM
  NetCamo
  HydraNet
  Panic

 Publications

  Selected Papers
  Technical Reports

 Courses

   SpTp Cryptocurrencies (S17)
   Intro Comp Systems (F17)
   UG Operating Systems (S17)
   G Operating Systems (S13)
   Distributed Systems (S07)
   Real-TimeSystems(F16)
   Graduate Seminar

 Misc

   Note to Prospective Students


Riccardo Bettati -- Selected Papers

I have been working in the following areas:


ANONYMITY, CAMOUFLAGING, TRAFFIC ANALYSIS, AND SOME OTHER SECURITY

back to top

W. Yu, Nan Zhang, Xinwen Fu, R. Bettati, and W. Zhao, ``Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures'', IEEE Transactions on Computers, Vol. 59, No. 12, December 2010, pp. 1655 -- 1668.

Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, ``Correlation-Based Traffic Analysis Attacks on Anonymity Networks'', IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 7, July 2010, pp 954 -- 967.

Ye Zhu and R. Bettati, ``Compromising Anonymous Communication Systems Using Blind Source Separation'', ACM Transactions on Information and System Security (TISSEC), Vol. 13, No. 1, Article 8, October 2009, pp. 8:1 - 8.31.

R. Bettati, ``Modern Traffic Analysis and its Capabilities'', The NEXUS, Directorate of the Combined Arms Center (CAC) at Fort Leavenworth, Kansas, March 2009 Edition.

Y. Zhu and R. Bettati, ``Information Leakage as a Model for Quality of Anonymity Networks'', IEEE Transactions on Parallel and Distributed Systems, issue 4, April 2009 Page(s):540 - 552.

W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, ``On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework'', Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN 2008), June 2008, pp. 356-365.

Ye Zhu, Xinwen Fu and R. Bettati, ``On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks'', International Journal of Network Security (IJNS), Vol. 7, No. 2, 2008, pp. 136-146.

T. Leila and R. Bettati, ``Privacy of encrypted Voice-over-IP'', Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Oct. 2007, pp. 3063-3068.

Y. Zhu and R. Bettati, ``Compromising Confidentiality in Wireless Network using Sensors with Limited Information'', Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 2007, Toronto, CA.

Y. Zhu, Xinwen Fu, R. Bettati, Wei Zhao, ``Anonymity Analysis of Mix Networks against Flow-Correlation Attacks'', Proceedings of IEEE Globecom Computer and Network Security, St. Louis, MO, November 2005.

Hongyun Xu, Xinwen Fu, Ye Zhu, R. Bettati, J. Chen, and W. Zhao, ``SAS: A Scalar Anonymous Communication System'', Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC) , China, August 2005.

Y. Zhu, X. Fu, and R. Bettati, ``On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks'', Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, July 2005, pp. 215-218.

B. W. Graham, Y. Zhu, X. Fu, and R. Bettati, ``Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.'', Proceeding of the 11th IEEE International conference on Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, June 2005.

Y. Zhu, and R. Bettati, ``Anonymity vs. Information Leakage in Anonymity Systems'', Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, June 2005, pp 514-524.

X. Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, ``On Flow Marking Attacks in Wireless Anonymous Communication Networks'', Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, USA, June 2005, pp. 493-503.

Y. Zhu, and R. Bettati, ``On Flow Correlation Attacks and Countermeasures in Mix Networks'', Proceedings of the 4th Privacy Enhancement Technology Workshop (PET 2004), Toronto, Ontario, Canada, May 2004.

X. Fu, B. Graham, D. Xuan, R. Bettati, and Wei Zhao, ``Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures'', Proceedings of the 6th Information Hiding Workshop (IH2004), Toronto, Ontario, Canada, 23-25 May 2004.

Y. Guan, X. Fu, R. Bettati, and Wei Zhao, ``A Quantitative Analysis of Anonymous Communications'', IEEE Transactions on Reliability, Vol 53, Number 1, March 2004, pp 103 -- 115.

X. Fu, B. Graham, D. Xuan, R. Bettati, and W. Zhao ``Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.'' Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), Kaohsiung, Taiwan, October 2003. ( pdf, html )

X. Fu, B. Graham, R. Bettati, and Wei Zhao, ``Active Traffic Analysis Attacks and Countermeasures'', Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC-03), Shanghai, China October 20-23, 2003.

X. Fu, B. Graham, R. Bettati, and W. Zhao, "On Countermeasures to Traffic Analysis Attacks." Proceedings of the 4rd IEEE Information Assurance Workshop, West Point, NY, June 2003.

Xinwen Fu, Bryan Graham, Riccardo Bettati, and We Zhao, "On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks." Proceedings of the 23th IEEE International Conference on Distributed Computing Systems (ICDCS 2003), Providence, R.I., May 2003, pp. 340 - 347. ( pdf )

N. Reddy, R. Bettati, M. Vannucci, and S. Darbha, ''Network Elements Based on Partial State.'' Texas Workshop on Security of Information Systems, College Station, TX, April 3, 2003.

X. Fu, B. Graham, R. Bettati, and W. Zhao, ``NetCamo: Camouflaging Network Traffic for Real-Time Applications.'' Texas Workshop on Security of Information Systems, College Station, TX, April 3, 2003.

R. Bettati, N. Reddy, M. Vannucci, S. Darbha, "Timing Analysis and System Security." Texas Workshop on Security of Information Systems, College Station, TX, April 3, 2003.

Xinwen Fu, Yong Guan, Riccardo Bettati, and Wei Zhao, ``Hiding Role Assignment for Mission Critical Collaborative Systems'', in Quality and Reliability Engineering International, Special Issue on Computer Network Security, Vol 18, issue 3, 2002, pp 201--216.

X. Fu , Y. Guan, B. Graham, R. Bettati, and W. Zhao, "Using Parasite Flows to Camouflage Flow Traffic", Proceedings of the 3rd IEEE Information Assurance Workshop, West Point, NY, June 2002.

Y. Guan, X. Fu, R. Bettati, and W. Zhao, "An Optimal Strategy for Anonymous Communication Protocols." Proceedings of the 22th International Conference on Distributed Computing Systems (ICDCS 2002), Vienna, Austria, July 2002. ( pdf, html )

Y. Guan, X. Fu, R. Bettati, and W. Zhao, ``NetCamo: Camouflaging Network Traffic for QoS Guaranteed Mission Critical Applications.'' IEEE Transactions on Systems, Man and Cybernetics. Special Issue on Information Assurance, Vol. 31, No. 4, July 2001, pp. 253--265.

Y. Guan, X. Fu, R. Bettati, and W. Zhao, "Routing in Packet Networks to Prevent Traffic Analysis." IEEE Transactions on Systems, Man, and Cybernetics, Vol 31, No. 4, July 2001, pp. 253 - 265.

Y. Guan, R. Bettati, and W. Zhao, "Efficient Traffic Camouflaging in Mission-Critical QoS Guaranteed Networks." Proceedings of the IEEE Information Assurance and Security Workshop. West Point, NY, June 5-7, 2000.

D. Xuan, R. Bettati, and W. Zhao, "A Gateway-Based Defense System for Distributed DoS Attacks in High Speed Networks", Proceedings of the 2nd IEEE SMC Information Assurance Workshop, West Point, NY, June, 2001.

Y. Guan, C. Li, D. Xuan, R. Bettati, W. Zhao, "Preventing Traffic Analysis for Real-Time Communication Networks." Proceedings of the IEEE MILCOM, Atlantic City, NY, Nov. 1999 ( pdf )

R. Bettati, W. Zhao, and D. Teodor, "Real-Time Intrusion Detection and Suppression in ATM Networks." Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999.
( postscript, pdf, html )


REAL-TIME COMMUNICATION

back to top

S. Wang, D. Xuan, R. Bettati, and W. Zhao, ``Toward Statistical QoS Guarantees in a Differentiated Services Network.'' Telecommunication Systems, Springer, Vol. 43, No. 3-4, April 2010, pp. 253 -- 263.

I. Cardei, A. Pavan, and R. Bettati, ``Quality of Service guarantees and fault-tolerant TCP services in mobile wireless optical networks'', Special Issue on``System Aspects of Wireless Networks'' of the International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 2008, Vol. 3, No.3, pp. 146 - 158.

I. Cardei, A. Pavan, R. Bettati, "Communications Quality of Service for Ad-hoc Mobile Optical Free-Space Networks", Proceedings of the Third IEEE Consumer Communications \& Networking Conference (IEEE CCNC 2006), Las Vegas, NV, Jan. 2006. (pdf)

I. Cardei, A. Pavan, R. Bettati, "Architecture for Delay-Sensitive Communication in Mobile Optical Free-Space Networks," Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2005), Washington, DC, November 2005. ( pdf )

S. Wang, D. Xuan, R. Bettati, and W. Zhao, "Providing Absolute Differentiated Services for Real-Time Applications in Static-Priority Scheduling Networks." IEEE/ACM Transactions on Networking, Vol. 12, No. 2, pp. 326-339, April 2004.

S. Wang, R. Nathuji, R. Bettati and W. Zhao, Real-Time Guarantees in Wireless Networks, "Resource Management in Wireless Networking" (edited by Mihaela Cardei, Ionut Cardei and Ding-Zhu Du), Kluwer, 2004.

S. Wang, R. Nathuji, R. Bettati and W. Zhao, "Providing Statistical delay Guarantees in Wireless Networks." Proceedings of 24th IEEE International Conference on Distributed Computing Systems (ICDCS 2004), Tokyo, JAPAN, March 2004, pp. 48 - 55. ( pdf )

Shengquan Wang, Dong Xuan, Riccardo Bettati, and Wei Zhao, "A Study of Providing Statistical QoS in a Differentiated Services Network", Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA-03), April 16-18, 2003, Cambridge, Massachusetts, USA. ( pdf, html )

B.K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, ``Utilization-Based Admission Control for Scalable Real-Time Communication.'' Real-Time Systems, Kluwer, Vol. 24, Is. 2, Mar. 2003, pp. 171-202.

S. Wang, D. Xuan, R. Bettati, and W. Zhao. "Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks." Proceedings of IEEE Real-Time Systems Symposium, London,U.K., December 2001. ( pdf, html )

S. Wang, D. Xuan, R. Bettati, and W. Zhao, "Providing Absolute Differentiated Services for Real-Time Applications in Static Priority Scheduling Networks." Proceedings of the IEEE INFOCOM 2001, Anchorage, Alaska, April 2001. ( pdf, html)

B.-K. Choi, R. Bettati, "Endpoint Admission Control: Network-Based Approach." Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS 2001), Phoenix, AZ, April 2001, pp. 227 - 235. ( pdf, html )

A. Sahoo, B. Devalla, Y. Guan, R. Bettati, and W. Zhao, "Adaptive connection management for mission critical applications over ATM Networks." International Journal of Parallel and Distributed Systems and Networks, Vol. 3, No. 2, 2000, pp. 51 - 63.

B.-K. Choi, R. Bettati, "Efficient Resource Management for Hard Real-Time Communication over Differentiated Services Networks." Proceedings of the Seventh IEEE International Conference on Real-Time Computing Systems and Applications (RTCSA 2000), South Korea, December 2000, pp. 119 - 126.

B.-K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, "Scalable QoS Guaranteed Communication Services for Real-Time Applications." Proceedings of the 20th IEEE International Conference on Distributed Computing Systems (ICDCS 2000). Taipei, April 2000, pp. 180 - 187.

B. Devalla, R. Bettati, W. Zhao, "Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-based Networks." Proceedings of the Sixth IEEE International Conference on Real-Time Computing Systems and Applications. Hong Kong, December 1999, pp 340-347.
( postscript, pdf, html )

B.-K. Choi, R. Bettati, "Bandwidth Reservation for Real-Time Traffic in Wireless Mobile Environment." Proceedings of the Sixth IEEE International Conference on Real-Time Computing Systems and Applications. Hong Kong, December 1999, pp 388-391.

C. Li, R. Bettati, W. Zhao, "New Delay Analysis in High Speed Networks." International Conference on Parallel Processing, The University of Aiku, Japan, September 1999.
( postscript, pdf, html )

A. Sahoo, B. Devalla, Y. Guan, R. Bettati, and W. Zhao, "Adaptive Connection Management for Mission Critical Applications over ATM Networks." Best Student Paper at NAECON'98.
( postscript, pdf )

B. Devalla, Y. Guan, R. Bettati and W. Zhao , "Delay Guaranteed Communication Services Over ATM Networks." Proc. of The 3rd Annual Multimedia Technology and Applications Conference (MTAC), Sept. 1998.

B. Devalla, A. Sahoo, Y. Guan, C. Li, R. Bettati, W. Zhao, "Adaptive Connection Admission Control for Mission Critical Real-Time Communication Networks." MilCom-98.
( postscript, pdf )

C. Li, R. Bettati, W. Zhao, "Static Priority Scheduling for ATM Networks." Proceedings of the Real-Time Systems Symposium, San Francisco, CA, Dec. 1997.
( postscript, pdf )

S. Sundaresan, R. Bettati, "Distributed Connection Management for Real-Time Communication over Wormhole-Routed Networks." Proceedings of the 17th International Conference on Distributed Computing Systems, Baltimore, MD, May 1997.
( postscript, html )

R. Bettati} and W. Zhao, ``Distributed Connection Establishment Schemes for Hard Real-Time Communication over Degraded Wormhole Networks'', Proceedings of the IEEE Int. Workshop on Embedded Fault-Tolerant System, Dallas, Sept 1996 (abstract only).

R. Bettati, A. Gupta, ``Dynamic Resource Migration for Multiparty Real-Time Communication.'' Proceedings of the 16th International Conference on Distributed Computing Systems, Hong Kong, May 1996.
( postscript, html )
Also appeared as ICSI Technical Report TR-95-060 , Berkeley, CA, October 1995.
( postscript, )

R. Oppliger, A. Gupta, M. Moran and R. Bettati, ``A Security Architecture for Tenet Scheme~2.'' Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Serviced (IDMS'96), Berlin, March 1996.
Also appeared as ICSI Technical Report TR-95-051, Berkeley, CA, August 1995.
( postscript, )

R. Bettati and A. Nica, ``Real-Time Networking over HiPPI.'' Proceedings of the Fourth Workshop on Parallel and Distributed Real-Time Systems, Santa Barbara, California, April 24-26, 1995.
( postscript )

R. Bettati, D. Ferrari, A. Gupta, W. Heffner, W. Howe, M. Moran, Q. Nguyen and R. Yavatkar, ``Connection Establishment for Multi-Party Real-Time Communication.'' Proc. 5th Intl. Workshop on Network and Operating System Support for Digital Audio and Video, Durham, New Hampshire, April 18-21, 1995, pp. 255-266.
( postscript )


DISTRIBUTED REAL-TIME SYSTEMS

back to top

W. Wang, R. Bettati, and W. Zhao, ``Real-Time Component-based Systems'', Proceedings of the 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS-2005), March 2005, pp 428 - 437.

B. Choi, S. Rho, and R. Bettati, "Fast Software Component Migration for Application Survivability in Distributed Real-Time Systems," Proceedings of the 7th IEEE International Symposium on Object-oriented Real-time distributed Computing (ISORC'04), Vienna, Austria, May 12-14, 2004.

B. Choi, S, Rho, and R. Bettati, "Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems." Proceedings of the 11th IEEE International Workshop on Parallel and Distributed Systems, pp. 122-129, Nice, France, Apr. 22-23, 2003.

R. Bettati and W. Zhao, "Ensuring Schedulability in Large-Scale Distributed Real-Time Systems.", Proceedings of the IEEE Workshop on Large Scale Real-Time and Embedded Systems, Austin, TX, December 3, 2002.

Y. Meylan, A. Bajpai, R. Bettati, "ProtEx: A Toolkit for the Analysis of Distributed Real-Time Systems." Proceedings of the Seventh IEEE International Conference on Real-Time Computing Systems and Applications, South Korea, December 2000, pp. 183 - 188. ( postscript, pdf, html )

S. Wang, D. Xuan, R. Bettati, J. Chen, and W. Zhao, "Utilization-based Admission Control for Real-Time Applications." Proceedings of the IEEE 2000 International Conference on Parallel Processing (ICPP 2000), Toronto, Canada, August 2000, pp 251 - 260.

C. Li, R. Bettati, W. Zhao, "Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals." International Conference on Parallel Processing, Minneapolis, MN, August 1998.
( postscript, pdf )

J. Huang, R. Jha, W. Heimerdinger, M. Muhammad, S. Lauzac, B. Kannikeswaran, K. Schwan, W. Zhao, R. Bettati "RT-ARM: A Real-Time Adaptive Resource Management System for Distributed Mission-Critical Applications.", Proceedings of the IEEE Workshop on Middleware for Distributed Real-Time Systems and Services, San Francisco, CA, Dec, 1997.

J.W.S. Liu, C.L. Liu, Z. Deng, T.S. Tia, J. Sun, M. Storch, D. Hull, J.R. Redondo, R. Bettati, A. Silberman, "PERTS: A Prototyping Environment for Real-Time Systems." International Journal of Software Engineering and Knowledge Engineering, Vol. 6 No. 2 (1996), pp 161-177.

J. W.-S. Liu, K.-J. Lin, R. Bettati, D. Hull, and A. Yu, ``Use of Imprecise Computation to Enhance Dependability of Real-Time Systems.'' In G. M. Koob and Clifford G. Lau, editors, Foundations of Dependable Computing; Paradigms for Dependable Applications, Chapter 3.1. Kluwer Academic Publishers, 1994.
( postscript )

J. Sun, R. Bettati and J. W.-S. Liu, ``Using End-to-End Scheduling Approach to Schedule Tasks with Shared Resources in Multiprocessor Systems.'' Proceedings of the Eleventh IEEE Workshop on Real-Time Operating Systems and Software, May 1994. ( pdf )

R. Bettati, ``End-to-End Scheduling to Meet Deadlines in Distributed Systems.'' Ph.D. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, March 1994. ( pdf)

J. W.-S. Liu, J.-L. Redondo, Z. Deng, T.-S. Tia, R. Bettati, A. Silberman, M. Storch, Rhan Ha and W.K. Shih, ``PERTS: A Prototyping Environment for Real-Time Systems.'' Proceedings of the Real-Time Systems Symposium, Raleigh-Durham, N.C., Dec. 1993. Also appeared as Technical Report UIUCDCS-R-93-1802.
( postscript )

R. Bettati and J. W.S. Liu, ``Algorithms for End-to-End Scheduling to Meet Deadlines.'' Proceedings of the 12th International Conference on Distributed Computing Systems, Yokohama, June 1992.
( pdf )

R. Bettati, D. Gillies, C. C. Han, K. J. Lin, C. L. Liu, J. W.S. Liu and W. K. Shih, ``Recent Results in Real-Time Scheduling.'' In A. M. Tilborg and G. M. Koob, editors, Foundations of Real-Time Computing; Scheduling and Resource Management, Chapter 4. Kluwer Academic Publishers, 1991.

R. Bettati and J. W.S. Liu, ``Algorithms for End-to-End Scheduling to Meet Deadlines.'' Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, Dec. 1990.


THERMALLY-CONSTRAINED REAL-TIME SYSTEMS

back to top

S. Wang, Y. Ahn, and R. Bettati, ``Schedulability analysis in hard real-time systems under thermal constraints'', Real-Time Systems, Vol. 46, No. 2, 2010, pp. 160 -- 188.

Y. Ahn, I. Yeo, and R. Bettati, ``Efficient Calibration of Thermal Models based on Application Behavior'', in Proceedings of the 27th IEEE International Conference on Computer Design (ICCD 2009), Lake Tahoe, CA, Oct. 2009.

S. Wang and R. Bettati, ``Reactive Speed Control in Temperature-Constrained Real-Time Systems'', in Real-Time Systems Journal (RTSJ), Vol. 39, No. 1-3, pp. 73-95, August 2008.

Y. Ahn and R. Bettati, ``Transient Overclocking for Aperiodic Task Execution in Hard Real-Time Systems'', Proceedings of the 2008 Euromicro Conference on Real-Time Systems (ECRTS '08), pp. 102 - 111.

S. Wang and R. Bettati, ``Reactive Speed Control in Temperature- Constrained Real-Time Systems'', Proceedings of the 2006 EuroMicro Conference on Real- Time Systems, (ECRTS-2006), Dresden, Germany, July 2006. (Best Paper)

S. Wang and R. Bettati, `` Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals'', Proceedings of the 2006 Real-Time Systems Symposium (RTSS-2006), Rio de Janeiro, Brazil, December 2006.


NETWORK PROTOCOLS AND SUPPORT FOR SERVICES

back to top

S. Cho and R. Bettati, ``Use of Competition Detection in TCP in Simple Topology Networks'', Computer Networks: The International Journal of Computer and Telecommunications Networking, Elsevier North-Holland, Inc., Vol. 53(11), July 2009, pp. 1903-1925.

S. Cho and R. Bettati, ``Use of Competition Detection in TCP for Fair and Effective Utilization of Network Bandwidth'', Proceedings of the 2006 IEEE Global Telecommunications Conference (GLOBECOM '06), Nov. 2006. pp 1-6.

S. Cho and R. Bettati, ``Adaptive Aggregated Aggressiveness Control on Parallel TCP Flows Using Competition Detection'', Proceedings of the 15th International Conference on Computer Communications and Networks (ICCCN 2006), Oct. 2006, pp. 237 - 244.

S. Cho and R. Bettati, ``Collaborative Congestion Control in Parallel TCP Flows'', Proceedings of the IEEE International Conference on Communications (ICC 2005) -- General Conference, Seoul, Korea, May 2005.

S. Cho and R. Bettati, ``Aggregated Aggressiveness Control on Groups of TCP Flows'', Proceedings of the IFIP Networking 2005, Waterloo, Canada, May 2005.

W. Yu, D. Xuan, S.K. Reddy, R. Bettati, and Wei Zhao, ``Distributed Policy Processing in Virtual Private Operation Environments for Large-Scale Networks'', Proceedings of the 4th IEEE Information Assurance Workshop, West Point, NY, June 2003.

G. Shenoy, S.K. Satapati, R. Bettati, "HydraNet-FT: Network Support for Dependable Services." Proceedings of the 20th IEEE International Conference on Distributed Computing Systems. Taipei, April 2000.
( postscript, pdf, html )

C. Beauduy and R. Bettati, "Protocols Aboard Network Interface Cards." Proceedigns of the IASTED International Conference on Parallel and Distributed Computing and Systems. Cambridge, MA,November 1999.
( postscript, pdf, html )

H. Chawla, G. Dillon, and R. Bettati, "HydraNet: Network Support for Scaling of Large-Scale Services." Journal of Network and Computer Applications (1999) 22, 33-50.

H. Chawla, G. Dillon, R. Bettati, "HydraNet: Network Support for Scaling of Large-Scale Services." Proceedings of the ICCCN 1998. Lafayette, LA, October 1998.
( postscript, pdf, html )


IMPRECISE COMPUTATION

back to top

J. W.-S. Liu, W.K. Shih, K.J. Lin, R. Bettati and J.Y. Chung, ``Imprecise Computations.'' Invited paper, IEEE Proceedings, Jan. 1994.

R. Bettati, J. Y. Chung and N. S. Bowen, ``On-Line Algorithms for Checkpointing Imprecise Computation.'' Proceedings of the 5th Euromicro Workshop on Real-Time Systems, Oulu, Finland, June 1993.
( pdf )

R. Bettati, J. Y. Chung and N. S. Bowen, ``Checkpointing Imprecise Computation.'' Proceedings of the IEEE Workshop on Imprecise and Approximate Computation, Phoenix, Dec. 1992.
( pdf )


COMPUTER-SUPPORTED EDUCATION

back to top

L. Cifuentes, R. Mercer, O. Alvarez, O., and R. Bettati, ``An Architecture for Case-based Learning.'' TechTrends, Springer Verlag, Vol. 55, No. 6, Nov.-Dec. 2010, pp. 44-50.

R. Bettati, L. Cifuentes, W. Marti, R. Mercer, Y. Ahn, G. Yadav, O. Alvarez, ``Cyber-Defense Training in the Real: Principles and Architecture of the VNEL Cyber-Training Platform'', Proceedings of the 2nd International Conference on Computer Supported Education (CSEDU 2010), April 2010, Valencia, SPAIN.

L. Cifuentes, R. Mercer, O. Alvarez, and R. Bettati, ``A system for developing case-based learning environments.'' Proceedings of the International Association for Educational Communications and Technology annual conference, 2009, Louisville, KY.

L. Cifuentes, R. Bettati, W. Marti, O. Alvarez, and R. Mercer, ``Systematic design of a case-based learning environment. Proceedings of the EdMedia Annual Conference, 2009, Honolulu, HA.