default search action
Neda Nasiriani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c13]Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. AIKE 2019: 187-194 - 2018
- [c12]Daniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. DSC 2018: 1-8 - [c11]Neda Nasiriani, George Kesidis, Di Wang:
Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response. e-Energy 2018: 21-32 - [c10]Neda Nasiriani, George Kesidis:
Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model. ICNC 2018: 58-62 - 2017
- [j4]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? Proc. ACM Meas. Anal. Comput. Syst. 1(1): 11:1-11:28 (2017) - [c9]George Kesidis, Neda Nasiriani, Yuquan Shan, Bhuvan Urgaonkar, Ioannis Lambadaris:
Multicommodity games in public-cloud markets considering subadditive resource demands. INFOCOM Workshops 2017: 654-658 - [c8]Neda Nasiriani, George Kesidis, Di Wang:
Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits. MASCOTS 2017: 164-174 - [c7]George Kesidis, Uday V. Shanbhag, Neda Nasiriani, Bhuvan Urgaonkar:
Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response. MASCOTS 2017: 244-254 - [c6]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? SIGMETRICS (Abstracts) 2017: 56 - [i2]Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017) - 2016
- [j3]Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen, Robert Birke:
On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 3:1-3:28 (2016) - [j2]Yaser P. Fallah, Neda Nasiriani, Hariharan Krishnan:
Stable and Fair Power Control in Vehicle Safety Networks. IEEE Trans. Veh. Technol. 65(3): 1662-1675 (2016) - [c5]George Kesidis, Bhuvan Urgaonkar, Neda Nasiriani, Cheng Wang:
Neutrality in Future Public Clouds: Implications and Challenges. HotCloud 2016 - 2015
- [c4]Cheng Wang, Neda Nasiriani, George Kesidis, Bhuvan Urgaonkar, Qian Wang, Lydia Y. Chen, Aayush Gupta, Robert Birke:
Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design. e-Energy 2015: 141-150 - [c3]Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen, Robert Birke:
On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants. MASCOTS 2015: 51-60 - 2014
- [j1]Ehsan Moradi-Pari, Neda Nasiriani, Yaser P. Fallah, Parviz Famouri, Steve Bossart, Keith Dodrill:
Design, Modeling, and Simulation of On-Demand Communication Mechanisms for Cyber-Physical Energy Systems. IEEE Trans. Ind. Informatics 10(4): 2330-2339 (2014) - 2013
- [c2]Neda Nasiriani, Yaser P. Fallah, Hariharan Krishnan:
Stability analysis of congestion control schemes in vehicular ad-hoc networks. CCNC 2013: 358-363 - 2012
- [c1]Neda Nasiriani, Yaser P. Fallah:
Performance and fairness analysis of range control algorithms in cooperative vehicle safety networks at intersections. LCN Workshops 2012: 848-855 - [i1]Neda Nasiriani, Yaser P. Fallah, Hariharan Krishnan:
Fairness and Stability Analysis of Congestion Control Schemes in Vehicular Ad-hoc Networks. CoRR abs/1206.0323 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint