Author image not provided
 Azer B Bestavros

Authors:
Add personal information
ACM Senior Member badge
  Affiliation history
Bibliometrics: publication history
Average citations per article13.70
Citation Count2,411
Publication count176
Publication years1991-2017
Available for download38
Average downloads per article474.03
Downloads (cumulative)18,013
Downloads (12 Months)894
Downloads (6 Weeks)233
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


179 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 179
Result page: 1 2 3 4 5 6 7 8 9

Sort by:

1 published by ACM
March 2019 EuroSys '19: Proceedings of the Fourteenth EuroSys Conference 2019
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 51,   Downloads (12 Months): 57,   Downloads (Overall): 57

Full text available: PDFPDF
Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint computations without revealing private data. Current MPC algorithms scale poorly with data size, which makes MPC on "big data" prohibitively slow and inhibits its practical use. Many relational analytics queries can maintain MPC's end-to-end security guarantee without using cryptographic ...

2 published by ACM
February 2019 ACM Transactions on Cyber-Physical Systems: Volume 3 Issue 2, March 2019
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 67,   Downloads (12 Months): 79,   Downloads (Overall): 79

Full text available: HtmlHtml  PDFPDF
Autopilot systems are typically composed of an “inner loop” providing stability and control, whereas an “outer loop” is responsible for mission-level objectives, such as way-point navigation. Autopilot systems for unmanned aerial vehicles are predominately implemented using Proportional-Integral-Derivative (PID) control systems, which have demonstrated exceptional performance in stable environments. However, more sophisticated ...
Keywords: Attitude control, PID, UAV, adaptive control, autopilot, intelligent control, machine learning, quadcopter, reinforcement learning

3
September 2018 Cluster Computing: Volume 21 Issue 3, September 2018
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Many research institutions are deploying computing clusters based on a shared/buy-in paradigm. Such clusters combine shared computers, which are free to be used by all users, and buy-in computers, which are computers purchased by users for semi-exclusive use. The purpose of this paper is to characterize the typical behavior and ...
Keywords: Cluster computing, Grid computing, Shared/buy-in architecture, Workload characterization

4 published by ACM
June 2018 COMPASS '18: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 127,   Downloads (Overall): 127

Full text available: PDFPDF
An essential component of initiatives that aim to address pervasive inequalities of any kind is the ability to collect empirical evidence of both the status quo baseline and of any improvement that can be attributed to prescribed and deployed interventions. Unfortunately, two substantial barriers can arise preventing the collection and ...
Keywords: secure multi-party computation, usability, web applications

5
July 2017 Future Generation Computer Systems: Volume 72 Issue C, July 2017
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Providing resource allocation with performance predictability guarantees is increasingly important in cloud platforms, especially for data-intensive applications, for which performance depends greatly on the available rates of data transfer between the various computing/storage hosts underlying the virtualized resources assigned to the application. With the increased prevalence of brokerage services in ...
Keywords: Network-aware, Brokerage environment, Bin packing, Resource allocation

6 published by ACM
January 2017 Communications of the ACM: Volume 60 Issue 2, February 2017
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 22,   Downloads (12 Months): 110,   Downloads (Overall): 656

Full text available: HtmlHtml  PDFPDF
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?

7 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 59,   Downloads (Overall): 203

Full text available: PDFPDF
Secure multi-party computation (MPC) allows multiple parties to perform a joint computation without disclosing their private inputs. Many real-world joint computation use cases, however, involve data analyses on very large data sets, and are implemented by software engineers who lack MPC knowledge. Moreover, the collaborating parties -- e.g., several companies ...
Keywords: MPC, distributed systems, hadoop, mapreduce, multi-party computation

8 published by ACM
October 2016 MTD '16: Proceedings of the 2016 ACM Workshop on Moving Target Defense
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 34,   Downloads (12 Months): 182,   Downloads (Overall): 480

Full text available: PDFPDF
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows ...
Keywords: IP hopping, markov models, moving target defense, security capacity, single/multiple-target hiding

9
November 2015 HOTWEB '15: Proceedings of the 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

We describe and present a prototype of a distributed computational infrastructure and associated high-level programming language that allow multiple parties to leverage their own computational resources capable of supporting MapReduce [1] operations in combination with multi-party computation (MPC). Our architecture allows a programmer to author and compile a protocol using ...

10
May 2015 SBRC '15: Proceedings of the 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we propose an end-to-end approach to the VM allocation problem using policies based uniquely on round-trip time measurements between VMs. We propose and implement end-to-end algorithms for VM selection that cover desirable profiles of communications between VMs in distributed applications in a cloud setting. The use of ...
Keywords: Latency-aware, Allocation, VMs, Cloud Computing

11
June 2014 IEEE/ACM Transactions on Networking (TON): Volume 22 Issue 3, June 2014
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6,   Downloads (12 Months): 11,   Downloads (Overall): 130

Full text available: PDFPDF
The effectiveness of service provisioning in large-scale networks is highly dependent on the number and location of service facilities deployed at various hosts. The classical, centralized approach to determining the latter would amount to formulating and solving the uncapacitated k -median (UKM) problem (if the requested number of facilities is ...
Keywords: server migration, content delivery, facility location, service deployment

12
March 2014 IC2E '14: Proceedings of the 2014 IEEE International Conference on Cloud Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Recent work on integration of SDNs with application-layer systems like Hadoop has created a class of system, SDN-Enabled Applications, which implement application-specific functionality on the network layer by exposing network monitoring and control semantics to application developers. This requires domain-specific knowledge to correctly reason about network behavior and properties, as ...
Keywords: software-defined networking, formal verification

13
January 2014 IEEE Internet Computing: Volume 18 Issue 1, January 2014
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 7

Cloud computing's transition from a subject of research and innovation to a critical infrastructure is proceeding incredibly quickly. One potentially dangerous consequence of this speedy transition is the premature adoption and ossification of the models, technologies, and standards underlying this critical infrastructure. Further exacerbating this issue, innovative research on production-scale ...
Keywords: cloud computing, open source cloud platforms, IaaS marketplace

14 published by ACM
August 2013 KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 247

Full text available: PDFPDF
Arguably, the most effective technique to ensure wide adoption of a concept (or product) is by repeatedly exposing individuals to messages that reinforce the concept (or promote the product). Recognizing the role of repeated exposure to a message, in this paper we propose a novel framework for the effective placement ...
Keywords: markov chains, navigational networks, optimization

15 published by ACM
April 2013 HiCoNS '13: Proceedings of the 2nd ACM international conference on High confidence networked systems
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 0,   Downloads (12 Months): 18,   Downloads (Overall): 400

Full text available: PDFPDF
Next generation cyber-physical systems (CPS) are expected to be deployed in domains which require scalability as well as performance under dynamic conditions. This scale and dynamicity will require that CPS communication networks be programmatic (i.e., not requiring manual intervention at any stage), but still maintain iron-clad safety guarantees. Software-defined networking ...
Keywords: software-defined networks, openflow, formal verification

16
December 2012 Middleware '12: Proceedings of the 13th International Middleware Conference
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 109

Full text available: PDFPDF
Infrastructure as a Service pricing models for resources are meant to reflect the operational costs and profit margins for providers to deliver virtualized resources to customers subject to an underlying Service Level Agreements (SLAs). While the operational costs incurred by providers are dynamic -- they vary over time depending on ...
Keywords: scheduling, cloud computing, resource provisioning

17
May 2012 CCGRID '12: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 1,   Downloads (Overall): 101

Full text available: PDFPDF
In hosting environments such as IaaS clouds, desirable application performance is usually guaranteed through the use of Service Level Agreements (SLAs), which specify minimal fractions of resource capacities that must be allocated for unencumbered use for proper operation. Arbitrary colocation of applications with different SLAs on a single host may ...
Keywords: Cloud Computing, Multi-tenancy, Resource Management and Scheduling, Service Level Agreements

18
May 2012 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 56 Issue 7, May, 2012
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 3

In this paper, we propose a general framework and present a prototype implementation of peer-assisted content delivery application. Our system - called Cyclops - dynamically adjusts the bandwidth consumed by content servers (which represents the bulk of content delivery costs) to feed a set of swarming clients, based on a ...
Keywords: Peer-to-peer, Internet content distribution, Peer-assisted content distribution

19 published by ACM
February 2012 MMSys '12: Proceedings of the 3rd Multimedia Systems Conference
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 295

Full text available: PDFPDF
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peer-to-peer (P2P) stream distribution architecture. The use of P2P protocols promises significant scalability and cost savings by leveraging the local resources of clients -- specifically, uplink capacity. A major limitation of P2P live streaming is that ...

20
January 2012 Proceedings of the VLDB Endowment: Volume 5 Issue 5, January 2012
Publisher: VLDB Endowment
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 114

Full text available: PDFPDF
In many information networks, data items -- such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route updates in ad-hoc networks -- propagate in an uncoordinated manner: nodes often relay information they receive to neighbors, independent of whether or not these ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us