throbber
Work Address
`
`Home Address
`
`RICCARDO BETTATI
`
`Department of Computer Science and Engineering
`Texas A&M University
`H.R. Bright Building
`College Station, TX 77843-3112, USA
`phone: +1 (979) 845–5469
`fax : +1 (979) 847–8578
`e-mail: bettati@cse.tamu.edu
`www: http://faculty.cs.tamu.edu/bettati
`
`705 S. Dexter
`College Station, TX 77840, USA
`cell: +1 (979) 574-6988
`e-mail: riccardo.bettati@gmail.com
`
`Education
`University of Illinois at Urbana-Champaign, Urbana, Illinois, USA.
`Ph.D. in Computer Science. May 1994.
`Dissertation on “End-to-End Scheduling to Meet Deadlines in Distributed Systems.”
`Committee: Andrew Chien, C.L. Liu, Jane W.-S. Liu (Chair), Benjamin Wah.
`
`Swiss Federal Institute of Technology (ETH), Z¨urich, Switzerland.
`Diploma in Informatics, April 1988.
`
`Relevant Work Experience
`Texas A&M University, USA, Department of Computer Science.
`
`Full Professor. September 2007 – present
`Associate Professor. September 2001 – August 2007.
`Assistant Professor. July 1995 – August 2001.
`
`Teaching and research in embedded and real-time systems, networks, operating systems, dis-
`tributed computing, and security.
`
`Texas A&M University, USA, Center for Information Assurance and Security.
`
`Director. January 2010 – September 2015
`
`Program management and development, research in information assurance, cyber-security, cyber-
`infrastructure protection, computer security education.
`
`University of California at Berkeley, USA, Department of Electrical Engineering and Computer Sci-
`ence, Electronic Research Laboratory.
`
`Visiting Post-Doctoral Research Engineer. September 1994 – June 1995.
`
`Research in real-time and multimedia networks.
`
`International Computer Science Institute, Berkeley, USA, Networking Group.
`
`Post-Doctoral Research Fellow. September 1993 - August 1994.
`
`Research in real-time communication for high-speed networks.
`
`University of Illinois at Urbana-Champaign, USA, Department of Computer Science, Real-Time Sys-
`tems Laboratory.
`
`(cid:3)(cid:3)
`(cid:1005)
`
`VMWARE 1004
`
`

`

`Graduate Research Assistant. September 1989 – August 1993.
`
`Research in real-time scheduling and schedulability analysis for distributed systems and internet-
`works.
`
`IBM, Thomas J. Watson Research Center, USA, Large Systems Group.
`
`Summer Intern. May 1992 – August 1992.
`
`I developed a prototype for probably the first client-server-based tool for large systems manage-
`ment at IBM Research. Research in checkpointing strategies for hard real-time systems.
`
`Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, Electronics Laboratory.
`
`Research Assistant. March 1988 – May 1988.
`
`Development of compiler for highly-parallel data-flow computer.
`
`Professional Outreach
`
`Technical consulting to automotive (system design) and aerospace (avionics) industries.
`
`I have developed and documented the effect of new design approaches for software tools for
`automotive control. I have also written reports for the FAA that assess the correctness of design
`and engineering approaches for communication and avionics systems for aerospace industries.
`
`Pre-Litigation and Litigation Consulting for patent and other IP-related cases (switch design, net-
`work services, VoIP, smartphones, Web software, operating systems, middleware, industrial control
`software).
`
`I have written reports to support pre-litigation analysis in the area of network switch design. I have
`been retained as expert witness for counter-infringement analysis in the area of network services.
`I have written reports on validity and performed claim-tree analysis in the area of VoIP. I have
`written reports to support claim construction for VoIP. I have also consulted in the area of wireless
`messaging and e-mail services (primarily on prior art).
`I have reverse engineered large software
`systems for infringement analysis.
`I have been retained as expert witness on infringement and
`validity analysis in the area of operating systems. I have given tutorials in the area of middleware,
`software systems, and web technology. I have participated in claim construction and in Markman
`hearings. I have worked with the following firms:
`
`ˆ 2019 Winston & Strawn LLP (contact: Louis Campbell)
`
`ˆ 2019 Hush Blackwell LLP (contact: Steve Holtshouser or Nathan P. Sportel)
`
`ˆ 2015 Haynes Boone (contact: Theo Foster)
`
`ˆ 2014 Foley & Lardner (contact: Jeff Costakos or Kevin Malaney)
`
`ˆ 2014 Quinn Emanuel Urquhart & Sullivan (contact: Iman Lordgooei or Brian Mack)
`
`ˆ 2013 Conley Rose (contact: Stewart Mesher)
`
`ˆ 2011 Woodcock Washburn (contact: Aleksander J. Goranin)
`
`ˆ 2010 Civins Denco Coburn & Lauff (contact: Scott Denko)
`
`ˆ 2009 Wilmer Hale (contact: Peter Dichiara)
`
`ˆ 2008 Sidley Austin (contact: William Baumgartner)
`
`R. Bettati
`
`2
`
`November 16, 2020
`
`

`

`ˆ 2005 Winstead, later Akin Gump (contact: Daniel Perez)
`
`ˆ 2003 Howrey (contact: Brian Jackson)
`
`Honors and Awards
`
`Best-Paper Runner-Up, 10th IEEE International Workshop on Information Forensics and Security,
`Hong Kong, 2018.
`
`Chevron Faculty Fellow, 2008-2009.
`
`Best-Paper Award, 18th European Conference on Real-Time Systems, Dresden, Germany, 2006.
`
`Tenneco Meritorious Teaching Award, 2005.
`
`BP Amoco Faculty Award for Teaching Excellence, 2002.
`
`U.S. Department of Defense “Excellence in Technology Transfer” Award, January 2002.
`
`Call (”Ruf”) to fill Chair in Real-Time Systems at Technical University Darmstadt, Germany, April
`2000.
`
`Research Fellowship, International Computer Science Institute, Berkeley, CA, 1993.
`
`Teaching
`
`Courses Taught
`
`Introduction to Computer Systems (undergraduate)
`
`Operating Systems (undergraduate and graduate)
`
`Introduction to Engineering (undergraduate)
`
`Distributed Processing Systems (graduate)
`
`Real-Time Systems (graduate)
`
`Cryptocurrency Technologies (undergraduate)
`
`Introduction to Computer Networks and Applications (graduate)
`
`Special Topics in Network Security (graduate)
`
`Student Feedback
`
`“Dr. Bettati is a fantastic instructor, possibly the best I have had since I’ve been at Texas
`A&M; Dr. Bettati is really gifted when it comes to explaining material, A++ here; Overall the
`best course at Texas A&M; learned more here than in any other CS course; toughest course I
`have taken at tamu but probably the most practical and interesting; presented all material with
`enthusiasm; made me want to learn the material; very well prepared; explains difficult concepts
`well; inspiring.”
`
`Selected Publications
`
`Journal Publications
`
`R. Bettati
`
`3
`
`November 16, 2020
`
`

`

`Ye Zhu, Nicholas Ruffing, Jonathan Gurary, Yong Guan, and Riccardo Bettati, “Towards Smart-
`phone Operating System Identification.” in IEEE Transactions on Dependable and Secure Com-
`puting. 2019, early access.
`
`T. Nix and R. Bettati, “Neighborhood Failures in Covert Communication Network Topologies,”
`in International Journal of Computational Science and Engineering. Vol. 13, Iss. 2, 2016, pp.
`132-146.
`
`Genshun Wan, Xuehua Song, and R. Bettati, “An Improved EZW Algorithm and Its Application
`in Intelligent Transportation Systems.” Engineering Letters, Vol. 22, Iss. 2, pp. 63-69.
`
`L. Grigoriu and R. Bettati, “Availability for Low-Priority Traffic for a Hybrid Free-Space Optical
`Radio Frequency Wireless Link.” U.P.B. Sci. Bull., Series C, Vol. 75, Iss. 2, 2013, pp. 169-180.
`
`Cifuentes, L., Mercer, R., Alvarez, O., and Bettati, R. “An Architecture for Case-based Learning.”
`TechTrends, Springer Verlag, Vol. 55, No. 6, Nov.-Dec. 2010, pp. 44-50.
`
`W. Yu, Nan Zhang, Xinwen Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat
`Monitors: Modeling and Countermeasures,” IEEE Transactions on Computers, Vol. 59, No. 12,
`December 2010, pp. 1655 – 1668.
`
`S. Wang, Y. Ahn, R. Bettati, “Schedulability analysis in hard real-time systems under thermal
`constraints,” Real-Time Systems, Vol. 46, No. 2, 2010, pp. 160 – 188.
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Toward Statistical QoS Guarantees in a Differen-
`tiated Services Network,” Telecommunication Systems, Springer, Vol. 43, No. 3-4, April 2010,
`pp. 253 – 263.
`
`Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao, “Correlation-Based Traf-
`fic Analysis Attacks on Anonymity Networks,” IEEE Transactions on Parallel and Distributed
`Systems, Vol. 21, No. 7, July 2010, pp 954 – 967.
`
`Ye Zhu and R. Bettati, “Compromise Anonymous Communication Systems Using Blind Source
`Separation,” ACM Transactions on Information and System Security (TISSEC), Vol. 13, No. 1,
`Article 8, October 2009, pp. 8:1 - 8.31.
`
`R. Bettati, “Modern Traffic Analysis and its Capabilities,” The NEXUS, Directorate of the Com-
`bined Arms Center (CAC) at Fort Leavenworth, Kansas, March 2009 Edition. (Invited paper to
`electronic journal)
`
`Ye Zhu and R. Bettati. 2009. Information Leakage as a Model for Quality of Anonymity Networks.
`IEEE Trans. Parallel Distrib. Syst. Vol. 20(4) (Apr. 2009), pp. 540-552.
`
`S. Cho and R. Bettati, “Use of Competition Detection in TCP in Simple Topology Networks,”
`Computer Networks: The International Journal of Computer and Telecommunications Networking,
`Elsevier North-Holland, Inc., Vol. 53(11), July 2009, pp. 1903-1925.
`
`I. Cardei, A. Pavan, R. Bettati,“Quality of Service guarantees and fault-tolerant TCP services in
`mobile wireless optical networks”, Special Issue on“System Aspects of Wireless Networks” of the
`International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 2008, Vol. 3, No.3, pp.
`146 - 158.
`
`S. Wang and R. Bettati, “Reactive Speed Control in Temperature-Constrained Real-Time Sys-
`tems,” Journal of Real-Time Systems, Volume 39, Numbers 1-3, August 2008, pp. 73-95.
`
`Ye Zhu, Xinwen Fu, and R. Bettati, “On the Effectiveness of Continuous-Time Mixes under Flow-
`Correlation Based Anonymity Attacks,” International Journal of Network Security (IJNS) Vol. 7,
`No. 2, 2008, pp. 136-146.
`
`Y. Zhu, X. Fu, R. Bettati, and W. Zhao, “Analysis of Flow-Correlation Attacks in Anonymity
`
`R. Bettati
`
`4
`
`November 16, 2020
`
`

`

`Network,” International Journal of Security and Networks (IJSN), Volume 2 - Issue 1/2 - 2007,
`pp. 137 - 153.
`
`X. Fu, Y. Zhu, B. Graham, R. Bettati and W. Zhao, “On Flow Marking Attacks in Wireless Anony-
`mous Communication Networks”, Journal of Ubiquitous Computing and Intelligence, Volume 1,
`Number 1 (April 2007), pp. 42-53.
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Providing Absolute Differentiated Services for
`Real-Time Applications in Static-Priority Scheduling Networks,” IEEE/ACM Transactions on Net-
`working, Vol. 12, No. 2, pp. 326-339, April 2004.
`
`Y. Guan, X. Fu, R. Bettati, and Wei Zhao, “A Quantitative Analysis of Anonymous Communi-
`cations,” IEEE Transactions on Reliability, Vol 53, Number 1, March 2004, pp 103 – 115.
`
`D. Xuan, S. Wang, Y. Zhu, R. Bettati, and W. Zhao, “A Gateway-Based Defense System for
`Distributed Denial-of-Service Attacks in High Speed Networks,” IEEE Transactions on Systems,
`Man, and Cybernetics, accepted in August 2002, to appear.
`
`W. Yu, D. Xuan, R. Bettati and W. Zhao, “An Integrated Middleware-Based Solution for Support-
`ing Secured Dynamic-Coalition Applications in Heterogeneous Environments,” IEEE Transactions
`on Systems, Man, and Cybernetics, accepted and to appear.
`
`Xinwen Fu, Yong Guan, Riccardo Bettati, and Wei Zhao, “Hiding Role Assignment for Mission
`Critical Collaborative Systems,” in Quality and Reliability Engineering International, Special Issue
`on Computer Network Security, Vol 18, issue 3, 2002, pp 201–216.
`
`Y. Guan, X. Fu, R. Bettati, and W. Zhao, “NetCamo: Camouflaging Network Traffic for QoS
`Guaranteed Mission Critical Applications.” IEEE Transactions on Systems, Man and Cybernetics.
`Special Issue on Information Assurance, Vol. 31, No. 4, July 2001, pp. 253–265.
`
`B.K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, “Utilization-Based Admission Control for Scalable
`Real-Time Communication.” Real-Time Systems, Kluwer, Vol. 24, Is. 2, Mar. 2003, pp. 171-
`202.
`
`A. Sahoo, B. Devalla, Y. Guan, R. Bettati, and Wei Zhao, “Adaptive connection management for
`mission critical applications over ATM Networks.” International Journal of Parallel and Distributed
`Systems and Networks, Special Issue On Network Architectures for End-to-end Quality-of-Service
`Support, Vol 3, No. 2, paper 204-0184, 2000.
`H. Chawla, G. Dillon, and R. Bettati, “HydraNet: Network Support for Scaling of Large-Scale
`Services.” Journal of Network and Computer Applications (1999) 22, 33-50.
`J. W.-S. Liu, C.L. Liu, Z. Deng, T.S. Tia, J.Sun, M.Storch, D. Hull, J.L. Redondo, R. Bettati,
`and A. Silberman, “PERTS: A Prototyping Environment for Real-Time Systems.” International
`Journal of Software and Knowledge Engineering, Vol. 6, No.2 (1996), pp 161–177.
`
`J. W.-S. Liu, W.K. Shih, K.J. Lin, R. Bettati, and J.Y. Chung, “Imprecise Computations.” Invited
`paper, IEEE Proceedings, Vol. 82, No. 1, Jan. 1994, pp 83–84.
`
`Book Chapters and Lecture Notes
`
`Gurary J., Zhu Y., Bettati R., Guan Y. “Operating System Fingerprinting.” In: Wang C., Gerdes
`R., Guan Y., Kasera S. (eds) Digital Fingerprinting. Springer, New York, NY, 2016, pages 115 –
`139.
`
`X. Fu, B. Graham, D. Xuan, R. Bettati, W. Zhao, “Empirical and Theoretical Evaluation of Active
`Probing Attacks and Their Countermeasures,” Lecture Notes in Computer Science Series, Vol.
`3200-2004, Springer-Verlag, Heidelberg, 2004, ISBN 3-540-24207-4.
`
`R. Bettati
`
`5
`
`November 16, 2020
`
`

`

`S. Wang, R. Nathuji, R. Bettati, and W. Zhao, “Real-Time Guarantees in Wireless Networks,”
`accepted (Dec. 2003) and to appear in M. Cardei, I. Cardei, and D.-Z. Du, editors, Resource
`Management in Wireless Networking, Kluwer Academic Press.
`
`R. Oppliger, A. Gupta, M. Moran, and R. Bettati, “A Security Architecture for Tenet Scheme 2.”
`B. Butscher, E. Moeller, H. Push (Eds.), Lecture Notes in Computer Science Series, Vol. 1045,
`Springer-Verlag, Heidelberg, 1996, ISBN 3-540-60938-5.
`
`R. Bettati, D. Ferrari, A. Gupta, W. Heffner, W. Howe, M. Moran, Q. Nguyen, and R. Yavatkar,
`“Connection Establishment for Multi-Party Real-Time Communication.” Lecture Notes in Com-
`puter Science Series, Vol. 1018, Springer Verlag, Heidelberg, 1995, ISBN: 3-540-60647-5.
`
`J. W.-S. Liu, K.-J. Lin, R. Bettati, D. Hull, and A. Yu, “Use of Imprecise Computation to Enhance
`Dependability of Real-Time Systems.” In G. M. Koob and Clifford G. Lau, editors, Foundations
`of Dependable Computing; Paradigms for Dependable Applications, Chapter 3.1, pp 157 – 182.
`Kluwer Academic Publishers, 1994.
`
`R. Bettati, D. Gillies, C. C. Han, K. J. Lin, C. L. Liu, J. W.S. Liu and W. K. Shih, “Recent Results
`in Real-Time Scheduling.” In A. M. Tilborg and G. M. Koob, editors, Foundations of Real-Time
`Computing; Scheduling and Resource Management, Chapter 4, pp 91 – 127. Kluwer Academic
`Publishers, 1991.
`
`Refereed Conference Proceedings (Highly Selective)
`
`Allen Webb, Zhiyuan Zeng, A.L.N. Reddy, Riccardo Bettati, “IoTAegis: A Scalable Framework to
`Secure the Internet of Things.” Proceedings of the 27th International Con- ference on Computer
`Communications and Networks, (ICCCN 2018), Hangzhou, CHINA, Aug. 2018. (Acceptance
`rate: 55/185 = 29
`
`Zhiyuan Zheng, Shan Jin, Riccardo Bettati, Narasimha Reddy, “Securing Cyber-Physical Systems
`with Adaptive Commensurate Response.” Proceedings of the 2017 IEEE Conference on Com-
`munications and Network Security, (CNS-2017), Las Vegas, NV, Oct. 2017. (Acceptance rate
`historically below 30%).
`
`Nicholas Ruffing, Ye Zhe, Rudy Libertini (Cleveland State), Yong Guan (Iowa State), Riccardo Bettati,
`“Smartphone Reconnaissance: Operating System Identification,” Proceedings of the 13th Annual
`IEEE Consumer Communications & Networking Conference, (CCNC-2016), Las Vegas, NV, Jan.
`2016. (Acceptance rate historically at 30%).
`
`T. Nix and R. Bettati, “Subversion Impedance in Covert Communication Networks,” Proceedings
`of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and
`Communications, (TrustCom-2012), pp. 458-465, Liverpool, UK, June 2012. (Acceptance rate:
`100/358.)
`
`Y. Ahn and R. Bettati, “Transient Overclocking for Aperiodic Task Execution in Hard Real-Time
`Systems,” Proceedings of the 2008 EuroMicro Conference on Real-Time Systems, (ECRTS-2008),
`Prague, Czech Republic, July 2008.
`
`Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati and Wei Zhao, “On Localization Attacks
`to Internet Threat Monitors: An Information-Theoretic Framework”, Proceedings of the 38th
`Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008),
`Anchorage, Alaska, June 2008. (Acceptance rate 25%).
`
`Y. Zhu and R. Bettati, “Compromising Confidentiality in Wireless Network using Sensors with
`Limited Information,” Proceedings of the 27th IEEE International Conference on Distributed
`Computing Systems (ICDCS 2007), Toronto, CANADA, June 2007.
`
`R. Bettati
`
`6
`
`November 16, 2020
`
`

`

`S. Wang and R. Bettati, “Delay Analysis in Temperature-Constrained Hard Real-Time Systems
`with General Task Arrivals,” Proceedings of the IEEE Real-Time Systems Symposium, (RTSS-
`2006), Rio de Janeiro, Brazil, Dec. 2006.
`Best Paper Award. S. Wang and R. Bettati, “Reactive Speed Control in Temperature-Constrained
`Real-Time Systems,” Proceedings of the 2006 EuroMicro Conference on Real-Time Systems,
`(ECRTS-2006), Dresden, Germany, July 2006. (acceptance rate 25/105)
`
`Y. Zhu, and R. Bettati, “Anonymity vs. Information Leakage in Anonymity Systems,” Proceedings
`of the IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, June
`2005. (acceptance rate: 14%)
`
`X. Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, “On Flow Marking Attacks in Wireless
`Anonymous Communication Networks,” Proceedings of the IEEE International Conference on
`Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, USA, June 2005. (acceptance
`rate: 14%)
`
`Y. Zhu, and R. Bettati, “Un-Mixing Mix Traffic,” Proceedings of the 5th Workshop on Privacy
`Enhancing Technologies (PET 2005), Cavtat, CROATIA, May 2005. (acceptance rate: 23%)
`
`S. Cho, and R. Bettati, “Aggregated Aggressiveness Control on Groups of TCP Flows,” Proceed-
`ings of the IFIP Networking 2005, Waterloo, Canada, May 2005. (acceptance rate: 24.7%)
`
`W. Wang, R. Bettati, and W. Zhao, “Real-Time Component-based Systems,” Proceedings of the
`2005 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS-2005),
`March 2005. (acceptance rate: 33%)
`
`Ye Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On Flow Correlation Attacks and Counter-
`measures in Mix Networks,” Proceedings of the 4th Privacy Enhancement Technology Workshop
`(PET 2004), May 2004. (acceptance rate: 28%)
`
`X. Fu, B. Graham, D. Xuan, R. Bettati, W. Zhao, “Empirical and Theoretical Evaluation of
`Active Probing Attacks and Their Countermeasures,” Proceedings of the 6th Information Hiding
`Workshop (IH 2004), May 2004.
`
`B.K. Choi, S. Rho, and R. Bettati, “Fast Software Component Migration for Application Surviv-
`ability in Distributed Real-Time Systems,” to appear in Proceedings of the 7th IEEE International
`Symposium on Object-oriented Real-time distributed Computing (ISORC’04), Vienna, Austria,
`May 12-14, 2004.
`
`S. Wang, R. Nathuji, R. Bettati, and W. Zhao, “Providing Statistical delay Guarantees in Wireless
`Networks,” Proceedings of IEEE International Conference on Distributed Computing Systems
`(ICDCS 2004), March 2004. (acceptance rate: 18%)
`
`Xinwen Fu, Bryan Graham, R. Bettati, and Wei Zhao, “On Effectiveness of Link Padding for
`Statistical Traffic Analysis Attacks,” Proceedings of the 23 IEEE International Conference on
`Distributed Computing Systems (ICDCS 2003), Providence, R.I., May 2003. (acceptance rate:
`18%)
`
`Shengquan Wang, Dong Xuan, R. Bettati, and Wei Zhao, “ A Study of Providing Statistical QoS
`in a Differentiated Services Network”, Proceedings of the 2nd IEEE International Symposium on
`Network Computing and Applications (NCA-03), April 16-18, 2003, Cambridge, Massachusetts,
`USA. (acceptance rate: 26%)
`
`Yong Guan, Xinwen Fu, R. Bettati, and Wei Zhao, “An Optimal Strategy for Anonymous Com-
`munication Protocols,” in Proceedings of the 22nd IEEE International Conference on Distributed
`Computing Systems (ICDCS 2002), Vienna, Austria, July 2002. (acceptance rate: 18%)
`
`R. Bettati
`
`7
`
`November 16, 2020
`
`

`

`S. Wang, D. Xuan, R. Bettati and W. Zhao, “Differentiated Services with Statistical Real-Time
`Guarantees in Static-Priority Scheduling Networks”, in Proceedings of the IEEE Real-Time Sys-
`tems Symposium (RTSS’01), London, U.K., December 2001. (acceptance rate: 26%)
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Providing Absolute Differentiated Services for
`Real-Time Applications in Static Priority Scheduling Networks.” Proceedings of IEEE INFOCOM
`2001, Anchorage, Alaska, April 2001. (acceptance rate: 23%)
`
`G. Shenoy, S.K. Satapati, R. Bettati, “HydraNet-FT: Network Support for Dependable Ser-
`vices.” Proceedings of the 20th IEEE International Conference on Distributed Computing Systems.
`Taipei, April 2000, pp. 699-706. (Acceptance rate: 18%.)
`
`B.-K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, “Scalable QoS Guaranteed Communication
`Services for Real-Time Applications.” Proceedings of the 20th IEEE International Conference on
`Distributed Computing Systems (ICDCS-2000). Taipei, April 2000, pp. 180-187. (Accepted as
`regular paper; regular paper acceptance rate: 18%.)
`
`C. Li, R. Bettati, W. Zhao, “Static Priority Scheduling for ATM Networks.” Proceedings of the
`Real-Time Systems Symposium (RTSS-1997), San Francisco, CA, Dec. 1997, pp 264 – 273.
`(Acceptance rate: 30%)
`
`R. Bettati, A. Gupta, “Dynamic Resource Migration for Multiparty Real-Time Communication.”
`Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS-
`1996), Hong Kong, May 1996, pp 646 – 655. (Acceptance rate: 29%)
`
`R. Bettati, D. Ferrari, A. Gupta, W. Heffner, W. Howe, M. Moran, Q. Nguyen, and R. Yavatkar,
`“Connection Establishment for Multi-Party Real-Time Communication,” Proceedings of the 5th
`International Workshop on Network and Operating System Support for Digital Audio and Video
`(NOSSDAV-1995), Durham, NH, April 1995, pp 255 – 265. (Acceptance rate: 23%))
`
`J. W.-S. Liu, J.-L. Redondo, Z. Deng, T.-S. Tia, R. Bettati, A. Silberman, M. Storch, Rhan Ha,
`and W.K. Shih, “PERTS: A Prototyping Environment for Real-Time Systems.” Proceedings of
`the Real-Time Systems Symposium (RTSS-1993), Raleigh-Durham, N.C., Dec. 1993, pp 184 –
`188. (Acceptance rate: 25%)
`
`R. Bettati and J. W.S. Liu, “Algorithms for End-to-End Scheduling to Meet Deadlines.” Pro-
`ceedings of the 12th International Conference on Distributed Computing Systems (ICDCS-1992),
`Yokohama, June 1992. (Acceptance rate: 28%, in Real-Time Issues and Applications: 22%)
`
`Refereed Conferences Proceedings (Selective, with High Visibility)
`
`Best Paper Runner-Up Award. Jin Shan and R. Bettati. “Adaptive Channel Estimation in
`Side Channel Attacks,” in Proceedings of the 10th IEEE International Workshop on Information
`Forensics and Security, (WIFS 2018), Hong Kong, Dec. 2018. (Acceptance rate: 32.8
`
`T. Nix and R. Bettati, “Implementing Covert Communication Networks on Gunther-Hartnell
`Clique Graph Topologies,” in Proceedings, 20th International Command & Control Research
`& Technology Symposium (ICCRTS-15). August 2015.
`
`T. Nix and R. Bettati, “Neighborhood Failures in Random Topology Covert Communication Net-
`works,” Proceedings of the International Workshop on Secure Peer-to-Peer Intelligent Networks
`& Systems, Hasselt, Belgium, June 2014.
`
`O. Alvarez, R. Bettati, L. Cifuentes, and R. Mercer. “A Mixed-Initiative Intelligent Tutoring
`System,” Proceedings of the 3rd International Conference on Computer Supported Education
`(CSEDU 2011), The Netherlands, May 2011, pp. 333-339.
`
`Y. Ahn, I. Yeo (former student at TAMU), and R. Bettati, “Efficient Calibration of Thermal
`
`R. Bettati
`
`8
`
`November 16, 2020
`
`

`

`Models based on Application Behavior”, in Proceedings of the 27th IEEE International Conference
`on Computer Design (ICCD 2009), Lake Tahoe, CA, Oct. 2009. (acceptance rate: 34%, 70/205)
`
`S. Cho and R. Bettati, “Adaptive Aggregated Aggressiveness Control on Parallel TCP Flows
`Using Competition Detection,” in Proceedings of the 15th International Conference on Computer
`Communications and Networks (ICCCN-06), Arlington, VA. (acceptance rate: 32%, 71/221)
`
`S. Cho and R. Bettati, “Use of Competition Detection in TCP for Fair and Effective Utilization
`of Network Bandwidth,” in Proceedings of the IEEE Globecom 2006 - General Conference on
`Emerging Technologies, San Francisco, CA, November 2006.
`
`Y. Zhu, Xinwen Fu, R. Bettati, Wei Zhao, “Anonymity Analysis of Mix Networks against Flow-
`Correlation Attacks,” Proceedings of IEEE Globecom Computer & Network Security, St. Louis,
`MO, November 2005.
`
`Hongyun Xu, Xinwen Fu, Ye Zhu, R. Bettati, J. Chen, and W. Zhao, “SAS: A Scalar Anonymous
`Communication System,” Proceedings of the International Conference on Computer Networks
`and Mobile Computing (ICCNMC), LNCS 3619, China, August 2005. (Acceptance rate below
`30%)
`
`I. Cardei, A. Pavan, and R. Bettati, “Support for Real-Time Communication in Mobile Free-Space
`Optical Networks.” Proceedings of the IEEE International Conference on Wireless and Mobile
`Computing, Networking and Communications (WiMob 2005), Montreal, Canada, August 2005.
`
`Y. Zhu, X. Fu and R. Bettati, “On the Effectiveness of Continuous-Time Mixes under Flow-
`Correlation Based Anonymity Attacks,” in Proceedings of the 4th IEEE International Symposium
`on Network Computing and Applications (NCA), Cambridge, MA, July 2005.
`
`B. W. Graham, Y. Zhu, X. Fu, and R. Bettati, “Using Covert Channels to Evaluate the Effective-
`ness of Flow Confidentiality Measures.” Proceeding of the 11th IEEE International conference on
`Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, June 2005.
`
`S. Cho, and R. Bettati, “Collaborative Congestion Control in Parallel TCP Flows,” Proceedings of
`the IEEE International Conference on Communications (ICC 2005) – General Conference, Seoul,
`Korea, May 2005. (acceptance rate: 35%)
`
`S. Cho and R. Bettati, “Collaborative Congestion Control in Parallel TCP Flows,” Proceedings
`of the 2005 IEEE International Conference on Communication (ICC-2005), General Conference,
`Seoul, Korea, May 2005. (3 reviews, acceptance rate below 35%)
`
`X. Fu, B. Graham, R. Bettati, W. Zhao, and D. Xuan, “Analytical and Empirical Analysis of
`Countermeasures to Traffic Analysis Attacks,” Proceedings of the 2003 International Conference
`on Parallel Processing (ICPP 2003), Kaohsiung, Taiwan, October 2003. (acceptance rate: 36%)
`
`B.-K. Choi, R. Bettati, “Endpoint Admission Control: Network Based Approach.” Proceedings
`of the 21th IEEE International Conference on Distributed Computing Systems (ICDCS 2001), pp.
`227-235, Phoenix, AZ, April 2001. (regular paper, acceptance rate 32%)
`
`D. Xuan, C. Li, R. Bettati, J. Chen, W. Zhao, “Utilization-Based Admission Control for Real-Time
`Applications.” Proceedings of the International Conference on Parallel Processing (ICPP-2000),
`August 2000, pp. 251-260. (Accepted as regular paper; overall acceptance rate: 38%.)
`
`B. Devalla, R. Bettati, W. Zhao, “Fault Tolerant Real-Time Connection Admission Control for
`Mission Critical Applications over ATM-based Networks.” Proceedings of the Sixth IEEE Inter-
`national Conference on Real-Time Computing Systems and Applications. (Accepted as regular
`paper; acceptance rate for regular papers: 50%) Hong Kong, December 1999, pp 340-347.
`
`B.-K. Choi, R. Bettati, “Bandwidth Reservation for Real-Time Traffic in Wireless Mobile En-
`
`R. Bettati
`
`9
`
`November 16, 2020
`
`

`

`vironment.” Proceedings of the Sixth IEEE International Conference on Real-Time Computing
`Systems and Applications. (Accepted as regular paper; acceptance rate for regular papers: 50%)
`Hong Kong, December 1999, pp 388-391.
`
`C. Li, R. Bettati and W. Zhao, “New Delay Analysis in High Speed Networks.” Proceedings of
`the International Conference on Parallel Processing (ICPP-1999). The University of Aiku, Japan,
`September 1999. (Accepted as regular paper; overall acceptance rate: 32%)
`
`R. Bettati, W. Zhao, and D. Teodor, “Real-Time Intrusion Detection and Suppression in ATM
`Networks.” Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Mon-
`itoring, Santa Clara, CA, April 1999, pp 111 – 118.
`H. Chawla, G. Dillon, R. Bettati, “HydraNet: Network Support for Scaling of Large-Scale
`Services.” Proceedings of the ICCCN 1998. Lafayette, LA, October 1998, pp 574–581. (Accepted
`as regular paper. Acceptance rate : 31% for regular papers, 42% including short papers)
`
`C. Li, R. Bettati, W. Zhao, “Response Time Analysis for Distributed Real-Time Systems with
`Bursty Job Arrivals.” Proceedings of the 1998 International Conference on Parallel Processing
`(ICPP-98), Minneapolis, MN, Aug. 1998, pp 432 – 440. (Accepted as regular paper; overall
`acceptance rate: 34%)
`
`S. Sundaresan and R. Bettati, “Distributed Connection Management for Real-Time Communi-
`cation over Wormhole-Routed Networks.” Proceedings of the 17th International Conference on
`Distributed Computing Systems (ICDCS-1997), Baltimore, MD, May 1997, pp 209 – 216. (Ac-
`ceptance rate: 31%)
`
`Refereed Conferences (Other)
`
`T. Nix, R. Bettati, “Topology Construction in Covert Communication Networks,” Proceedings of
`the 12th IEEE International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN
`2012), Dec. 2012, San Marcos, TX, pp. 135-142.
`
`I. Cardei, A. Pavan, R. Bettati, “Communications Quality of Service for Ad-hoc Mobile Opti-
`cal Free-Space Networks”, In IEEE Consumer Communications & Networking Conference (IEEE
`CCNC 2006). Las Vegas, NV, Jan. 2006
`Nominated for Best Paper: S. Cho and R. Bettati, “Improving Quality of Service of TCP Flows
`in Strictly Prioritized Network,” In Proc. of the IASTED International Conference on Advances
`in Computer Science and Technology (ACST’05), Jan 2006, Puerto Vallarta, Mexico.
`
`S. Rho, B. Choi, R. Bettati, “Design Real-Time Java Remote Method Invocation: A Server-
`Centric Approach,” IASTED International Conference on Parallel and Distributed Computing and
`Systems, Nov. 2005, Phoenix, AZ.
`
`S. Wang, S. Rho, Z. Mai, R. Bettati and Wei Zhao, “Towards Real-Time Component-based
`Systems,” IEEE International Real-Time Systems Symposium (RTSS) Work-in-Progress Session,
`Lisbon, Portugal, December 2004. (This WIP session was refereed.)
`
`X. Fu, B. Graham, R. Bettati, and Wei Zhao, “Active Traffic Analysis Attacks and Counter-
`measures,” Proceedings of the 2003 International Conference on Computer Networks and Mobile
`Computing (ICCNMC-03), Shanghai, China October 20-23, 2003.
`
`W. Yu, D. Xuan, S.K. Reddy, R. Bettati, and Wei Zhao, “Distributed Policy Processing in Vir-
`tual Private Operation Environments for Large-Scale Networks,” Proceedings of the 4th IEEE
`Information Assurance Workshop, West Point, NY, June 2003.
`
`X. Fu, B. Graham, R. Bettati, and W. Zhao, “On Countermeasures to Traffic Analysis Attacks.”
`Proceedings of the 4th IEEE Information Assurance Workshop, West Point, NY, June 2003.
`
`R. Bettati
`
`10
`
`November 16, 2020
`
`

`

`B. Choi, S, Rho and R. Bettati, “Dynamic Resource Discovery for Applications Survivability
`in Distributed Real-Time Systems”. Proceedings of the 11th IEEE International Workshop on
`Parallel and Distributed Systems, pp. 122-129, Nice, France, Apr. 22-23, 2003.
`
`X. Fu , Y. Guan, B. Graham, R. Bettati, and W. Zhao, “Using Parasite Flows to Camouflage
`Flow Traffic”, Proceedings of the 3rd IEEE Information Assurance Workshop, West Point, NY,
`June 2002.
`
`D. Xuan, R. Bettati, and W. Zhao, “A Gateway-Based Defense System for Distributed DoS
`Attacks in High Speed Networks”, Proceedings of the 2nd IEEE SMC Information Assurance
`Workshop, West Point, NY, June, 2001.
`
`Y. Meylan, A. Bajpai, R. Bettati, “ProtEx: A Toolkit for the Analysis of Distributed Real-Time
`Systems.” Proceedings of the Seventh IEEE International Conference on Real-Time Computing
`Systems and Applications. (RTCSA-2000) South Korea, December 2000.
`
`B.-K. Choi, R. Bettati, “Efficient Resource Management for Hard Real-Time Communication over
`Differentiated Services Networks.” Proceedings of the Seventh IEEE International Conference on
`Real-Time Computing Systems and Applications (RTCSA-2000), South Korea, December 2000.
`
`Y. Guan, X. Fu, R. Bettati, and W. Zhao, “Routing in Packet Networks to Prevent Traffic
`Analysis.” Proceedings of the IEEE Information Assurance and Security Workshop, West Point,
`NY, June 5-7 2000.
`
`Y. Guan, R. Bettati, and W. Zhao, “Efficient Traffic Camouflaging in Mission-Critical QoS Guar-
`anteed Networks.” Proceedings of the IEEE Information Assurance and Security Workshop, West
`Point, NY, June 5-7, 2000.
`
`C. Beauduy and R. Bettati, “Protocols Aboard Network Interface Cards.” Proceedings of the
`IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS-
`1999), Cambridge, MA, November 1999.
`
`Y. Guan, X. Dong, R. Bettati and W. Zhao, “Preventing Traffic Ana

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket