`
`Home Address
`
`RICCARDO BETTATI
`
`Department of Computer Science and Engineering
`Texas A&M University
`H.R. Bright Building
`College Station, TX 77843-3112, USA
`phone: +1 (979) 845–5469
`fax : +1 (979) 847–8578
`e-mail: bettati@cse.tamu.edu
`www: http://faculty.cs.tamu.edu/bettati
`
`705 S. Dexter
`College Station, TX 77840, USA
`cell: +1 (979) 574-6988
`e-mail: riccardo.bettati@gmail.com
`
`Education
`University of Illinois at Urbana-Champaign, Urbana, Illinois, USA.
`Ph.D. in Computer Science. May 1994.
`Dissertation on “End-to-End Scheduling to Meet Deadlines in Distributed Systems.”
`Committee: Andrew Chien, C.L. Liu, Jane W.-S. Liu (Chair), Benjamin Wah.
`
`Swiss Federal Institute of Technology (ETH), Z¨urich, Switzerland.
`Diploma in Informatics, April 1988.
`
`Relevant Work Experience
`Texas A&M University, USA, Department of Computer Science.
`
`Full Professor. September 2007 – present
`Associate Professor. September 2001 – August 2007.
`Assistant Professor. July 1995 – August 2001.
`
`Teaching and research in embedded and real-time systems, networks, operating systems, dis-
`tributed computing, and security.
`
`Texas A&M University, USA, Center for Information Assurance and Security.
`
`Director. January 2010 – September 2015
`
`Program management and development, research in information assurance, cyber-security, cyber-
`infrastructure protection, computer security education.
`
`University of California at Berkeley, USA, Department of Electrical Engineering and Computer Sci-
`ence, Electronic Research Laboratory.
`
`Visiting Post-Doctoral Research Engineer. September 1994 – June 1995.
`
`Research in real-time and multimedia networks.
`
`International Computer Science Institute, Berkeley, USA, Networking Group.
`
`Post-Doctoral Research Fellow. September 1993 - August 1994.
`
`Research in real-time communication for high-speed networks.
`
`University of Illinois at Urbana-Champaign, USA, Department of Computer Science, Real-Time Sys-
`tems Laboratory.
`
`(cid:3)(cid:3)
`(cid:1005)
`
`VMWARE 1004
`
`
`
`Graduate Research Assistant. September 1989 – August 1993.
`
`Research in real-time scheduling and schedulability analysis for distributed systems and internet-
`works.
`
`IBM, Thomas J. Watson Research Center, USA, Large Systems Group.
`
`Summer Intern. May 1992 – August 1992.
`
`I developed a prototype for probably the first client-server-based tool for large systems manage-
`ment at IBM Research. Research in checkpointing strategies for hard real-time systems.
`
`Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, Electronics Laboratory.
`
`Research Assistant. March 1988 – May 1988.
`
`Development of compiler for highly-parallel data-flow computer.
`
`Professional Outreach
`
`Technical consulting to automotive (system design) and aerospace (avionics) industries.
`
`I have developed and documented the effect of new design approaches for software tools for
`automotive control. I have also written reports for the FAA that assess the correctness of design
`and engineering approaches for communication and avionics systems for aerospace industries.
`
`Pre-Litigation and Litigation Consulting for patent and other IP-related cases (switch design, net-
`work services, VoIP, smartphones, Web software, operating systems, middleware, industrial control
`software).
`
`I have written reports to support pre-litigation analysis in the area of network switch design. I have
`been retained as expert witness for counter-infringement analysis in the area of network services.
`I have written reports on validity and performed claim-tree analysis in the area of VoIP. I have
`written reports to support claim construction for VoIP. I have also consulted in the area of wireless
`messaging and e-mail services (primarily on prior art).
`I have reverse engineered large software
`systems for infringement analysis.
`I have been retained as expert witness on infringement and
`validity analysis in the area of operating systems. I have given tutorials in the area of middleware,
`software systems, and web technology. I have participated in claim construction and in Markman
`hearings. I have worked with the following firms:
`
` 2019 Winston & Strawn LLP (contact: Louis Campbell)
`
` 2019 Hush Blackwell LLP (contact: Steve Holtshouser or Nathan P. Sportel)
`
` 2015 Haynes Boone (contact: Theo Foster)
`
` 2014 Foley & Lardner (contact: Jeff Costakos or Kevin Malaney)
`
` 2014 Quinn Emanuel Urquhart & Sullivan (contact: Iman Lordgooei or Brian Mack)
`
` 2013 Conley Rose (contact: Stewart Mesher)
`
` 2011 Woodcock Washburn (contact: Aleksander J. Goranin)
`
` 2010 Civins Denco Coburn & Lauff (contact: Scott Denko)
`
` 2009 Wilmer Hale (contact: Peter Dichiara)
`
` 2008 Sidley Austin (contact: William Baumgartner)
`
`R. Bettati
`
`2
`
`November 16, 2020
`
`
`
` 2005 Winstead, later Akin Gump (contact: Daniel Perez)
`
` 2003 Howrey (contact: Brian Jackson)
`
`Honors and Awards
`
`Best-Paper Runner-Up, 10th IEEE International Workshop on Information Forensics and Security,
`Hong Kong, 2018.
`
`Chevron Faculty Fellow, 2008-2009.
`
`Best-Paper Award, 18th European Conference on Real-Time Systems, Dresden, Germany, 2006.
`
`Tenneco Meritorious Teaching Award, 2005.
`
`BP Amoco Faculty Award for Teaching Excellence, 2002.
`
`U.S. Department of Defense “Excellence in Technology Transfer” Award, January 2002.
`
`Call (”Ruf”) to fill Chair in Real-Time Systems at Technical University Darmstadt, Germany, April
`2000.
`
`Research Fellowship, International Computer Science Institute, Berkeley, CA, 1993.
`
`Teaching
`
`Courses Taught
`
`Introduction to Computer Systems (undergraduate)
`
`Operating Systems (undergraduate and graduate)
`
`Introduction to Engineering (undergraduate)
`
`Distributed Processing Systems (graduate)
`
`Real-Time Systems (graduate)
`
`Cryptocurrency Technologies (undergraduate)
`
`Introduction to Computer Networks and Applications (graduate)
`
`Special Topics in Network Security (graduate)
`
`Student Feedback
`
`“Dr. Bettati is a fantastic instructor, possibly the best I have had since I’ve been at Texas
`A&M; Dr. Bettati is really gifted when it comes to explaining material, A++ here; Overall the
`best course at Texas A&M; learned more here than in any other CS course; toughest course I
`have taken at tamu but probably the most practical and interesting; presented all material with
`enthusiasm; made me want to learn the material; very well prepared; explains difficult concepts
`well; inspiring.”
`
`Selected Publications
`
`Journal Publications
`
`R. Bettati
`
`3
`
`November 16, 2020
`
`
`
`Ye Zhu, Nicholas Ruffing, Jonathan Gurary, Yong Guan, and Riccardo Bettati, “Towards Smart-
`phone Operating System Identification.” in IEEE Transactions on Dependable and Secure Com-
`puting. 2019, early access.
`
`T. Nix and R. Bettati, “Neighborhood Failures in Covert Communication Network Topologies,”
`in International Journal of Computational Science and Engineering. Vol. 13, Iss. 2, 2016, pp.
`132-146.
`
`Genshun Wan, Xuehua Song, and R. Bettati, “An Improved EZW Algorithm and Its Application
`in Intelligent Transportation Systems.” Engineering Letters, Vol. 22, Iss. 2, pp. 63-69.
`
`L. Grigoriu and R. Bettati, “Availability for Low-Priority Traffic for a Hybrid Free-Space Optical
`Radio Frequency Wireless Link.” U.P.B. Sci. Bull., Series C, Vol. 75, Iss. 2, 2013, pp. 169-180.
`
`Cifuentes, L., Mercer, R., Alvarez, O., and Bettati, R. “An Architecture for Case-based Learning.”
`TechTrends, Springer Verlag, Vol. 55, No. 6, Nov.-Dec. 2010, pp. 44-50.
`
`W. Yu, Nan Zhang, Xinwen Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat
`Monitors: Modeling and Countermeasures,” IEEE Transactions on Computers, Vol. 59, No. 12,
`December 2010, pp. 1655 – 1668.
`
`S. Wang, Y. Ahn, R. Bettati, “Schedulability analysis in hard real-time systems under thermal
`constraints,” Real-Time Systems, Vol. 46, No. 2, 2010, pp. 160 – 188.
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Toward Statistical QoS Guarantees in a Differen-
`tiated Services Network,” Telecommunication Systems, Springer, Vol. 43, No. 3-4, April 2010,
`pp. 253 – 263.
`
`Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao, “Correlation-Based Traf-
`fic Analysis Attacks on Anonymity Networks,” IEEE Transactions on Parallel and Distributed
`Systems, Vol. 21, No. 7, July 2010, pp 954 – 967.
`
`Ye Zhu and R. Bettati, “Compromise Anonymous Communication Systems Using Blind Source
`Separation,” ACM Transactions on Information and System Security (TISSEC), Vol. 13, No. 1,
`Article 8, October 2009, pp. 8:1 - 8.31.
`
`R. Bettati, “Modern Traffic Analysis and its Capabilities,” The NEXUS, Directorate of the Com-
`bined Arms Center (CAC) at Fort Leavenworth, Kansas, March 2009 Edition. (Invited paper to
`electronic journal)
`
`Ye Zhu and R. Bettati. 2009. Information Leakage as a Model for Quality of Anonymity Networks.
`IEEE Trans. Parallel Distrib. Syst. Vol. 20(4) (Apr. 2009), pp. 540-552.
`
`S. Cho and R. Bettati, “Use of Competition Detection in TCP in Simple Topology Networks,”
`Computer Networks: The International Journal of Computer and Telecommunications Networking,
`Elsevier North-Holland, Inc., Vol. 53(11), July 2009, pp. 1903-1925.
`
`I. Cardei, A. Pavan, R. Bettati,“Quality of Service guarantees and fault-tolerant TCP services in
`mobile wireless optical networks”, Special Issue on“System Aspects of Wireless Networks” of the
`International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 2008, Vol. 3, No.3, pp.
`146 - 158.
`
`S. Wang and R. Bettati, “Reactive Speed Control in Temperature-Constrained Real-Time Sys-
`tems,” Journal of Real-Time Systems, Volume 39, Numbers 1-3, August 2008, pp. 73-95.
`
`Ye Zhu, Xinwen Fu, and R. Bettati, “On the Effectiveness of Continuous-Time Mixes under Flow-
`Correlation Based Anonymity Attacks,” International Journal of Network Security (IJNS) Vol. 7,
`No. 2, 2008, pp. 136-146.
`
`Y. Zhu, X. Fu, R. Bettati, and W. Zhao, “Analysis of Flow-Correlation Attacks in Anonymity
`
`R. Bettati
`
`4
`
`November 16, 2020
`
`
`
`Network,” International Journal of Security and Networks (IJSN), Volume 2 - Issue 1/2 - 2007,
`pp. 137 - 153.
`
`X. Fu, Y. Zhu, B. Graham, R. Bettati and W. Zhao, “On Flow Marking Attacks in Wireless Anony-
`mous Communication Networks”, Journal of Ubiquitous Computing and Intelligence, Volume 1,
`Number 1 (April 2007), pp. 42-53.
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Providing Absolute Differentiated Services for
`Real-Time Applications in Static-Priority Scheduling Networks,” IEEE/ACM Transactions on Net-
`working, Vol. 12, No. 2, pp. 326-339, April 2004.
`
`Y. Guan, X. Fu, R. Bettati, and Wei Zhao, “A Quantitative Analysis of Anonymous Communi-
`cations,” IEEE Transactions on Reliability, Vol 53, Number 1, March 2004, pp 103 – 115.
`
`D. Xuan, S. Wang, Y. Zhu, R. Bettati, and W. Zhao, “A Gateway-Based Defense System for
`Distributed Denial-of-Service Attacks in High Speed Networks,” IEEE Transactions on Systems,
`Man, and Cybernetics, accepted in August 2002, to appear.
`
`W. Yu, D. Xuan, R. Bettati and W. Zhao, “An Integrated Middleware-Based Solution for Support-
`ing Secured Dynamic-Coalition Applications in Heterogeneous Environments,” IEEE Transactions
`on Systems, Man, and Cybernetics, accepted and to appear.
`
`Xinwen Fu, Yong Guan, Riccardo Bettati, and Wei Zhao, “Hiding Role Assignment for Mission
`Critical Collaborative Systems,” in Quality and Reliability Engineering International, Special Issue
`on Computer Network Security, Vol 18, issue 3, 2002, pp 201–216.
`
`Y. Guan, X. Fu, R. Bettati, and W. Zhao, “NetCamo: Camouflaging Network Traffic for QoS
`Guaranteed Mission Critical Applications.” IEEE Transactions on Systems, Man and Cybernetics.
`Special Issue on Information Assurance, Vol. 31, No. 4, July 2001, pp. 253–265.
`
`B.K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, “Utilization-Based Admission Control for Scalable
`Real-Time Communication.” Real-Time Systems, Kluwer, Vol. 24, Is. 2, Mar. 2003, pp. 171-
`202.
`
`A. Sahoo, B. Devalla, Y. Guan, R. Bettati, and Wei Zhao, “Adaptive connection management for
`mission critical applications over ATM Networks.” International Journal of Parallel and Distributed
`Systems and Networks, Special Issue On Network Architectures for End-to-end Quality-of-Service
`Support, Vol 3, No. 2, paper 204-0184, 2000.
`H. Chawla, G. Dillon, and R. Bettati, “HydraNet: Network Support for Scaling of Large-Scale
`Services.” Journal of Network and Computer Applications (1999) 22, 33-50.
`J. W.-S. Liu, C.L. Liu, Z. Deng, T.S. Tia, J.Sun, M.Storch, D. Hull, J.L. Redondo, R. Bettati,
`and A. Silberman, “PERTS: A Prototyping Environment for Real-Time Systems.” International
`Journal of Software and Knowledge Engineering, Vol. 6, No.2 (1996), pp 161–177.
`
`J. W.-S. Liu, W.K. Shih, K.J. Lin, R. Bettati, and J.Y. Chung, “Imprecise Computations.” Invited
`paper, IEEE Proceedings, Vol. 82, No. 1, Jan. 1994, pp 83–84.
`
`Book Chapters and Lecture Notes
`
`Gurary J., Zhu Y., Bettati R., Guan Y. “Operating System Fingerprinting.” In: Wang C., Gerdes
`R., Guan Y., Kasera S. (eds) Digital Fingerprinting. Springer, New York, NY, 2016, pages 115 –
`139.
`
`X. Fu, B. Graham, D. Xuan, R. Bettati, W. Zhao, “Empirical and Theoretical Evaluation of Active
`Probing Attacks and Their Countermeasures,” Lecture Notes in Computer Science Series, Vol.
`3200-2004, Springer-Verlag, Heidelberg, 2004, ISBN 3-540-24207-4.
`
`R. Bettati
`
`5
`
`November 16, 2020
`
`
`
`S. Wang, R. Nathuji, R. Bettati, and W. Zhao, “Real-Time Guarantees in Wireless Networks,”
`accepted (Dec. 2003) and to appear in M. Cardei, I. Cardei, and D.-Z. Du, editors, Resource
`Management in Wireless Networking, Kluwer Academic Press.
`
`R. Oppliger, A. Gupta, M. Moran, and R. Bettati, “A Security Architecture for Tenet Scheme 2.”
`B. Butscher, E. Moeller, H. Push (Eds.), Lecture Notes in Computer Science Series, Vol. 1045,
`Springer-Verlag, Heidelberg, 1996, ISBN 3-540-60938-5.
`
`R. Bettati, D. Ferrari, A. Gupta, W. Heffner, W. Howe, M. Moran, Q. Nguyen, and R. Yavatkar,
`“Connection Establishment for Multi-Party Real-Time Communication.” Lecture Notes in Com-
`puter Science Series, Vol. 1018, Springer Verlag, Heidelberg, 1995, ISBN: 3-540-60647-5.
`
`J. W.-S. Liu, K.-J. Lin, R. Bettati, D. Hull, and A. Yu, “Use of Imprecise Computation to Enhance
`Dependability of Real-Time Systems.” In G. M. Koob and Clifford G. Lau, editors, Foundations
`of Dependable Computing; Paradigms for Dependable Applications, Chapter 3.1, pp 157 – 182.
`Kluwer Academic Publishers, 1994.
`
`R. Bettati, D. Gillies, C. C. Han, K. J. Lin, C. L. Liu, J. W.S. Liu and W. K. Shih, “Recent Results
`in Real-Time Scheduling.” In A. M. Tilborg and G. M. Koob, editors, Foundations of Real-Time
`Computing; Scheduling and Resource Management, Chapter 4, pp 91 – 127. Kluwer Academic
`Publishers, 1991.
`
`Refereed Conference Proceedings (Highly Selective)
`
`Allen Webb, Zhiyuan Zeng, A.L.N. Reddy, Riccardo Bettati, “IoTAegis: A Scalable Framework to
`Secure the Internet of Things.” Proceedings of the 27th International Con- ference on Computer
`Communications and Networks, (ICCCN 2018), Hangzhou, CHINA, Aug. 2018. (Acceptance
`rate: 55/185 = 29
`
`Zhiyuan Zheng, Shan Jin, Riccardo Bettati, Narasimha Reddy, “Securing Cyber-Physical Systems
`with Adaptive Commensurate Response.” Proceedings of the 2017 IEEE Conference on Com-
`munications and Network Security, (CNS-2017), Las Vegas, NV, Oct. 2017. (Acceptance rate
`historically below 30%).
`
`Nicholas Ruffing, Ye Zhe, Rudy Libertini (Cleveland State), Yong Guan (Iowa State), Riccardo Bettati,
`“Smartphone Reconnaissance: Operating System Identification,” Proceedings of the 13th Annual
`IEEE Consumer Communications & Networking Conference, (CCNC-2016), Las Vegas, NV, Jan.
`2016. (Acceptance rate historically at 30%).
`
`T. Nix and R. Bettati, “Subversion Impedance in Covert Communication Networks,” Proceedings
`of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and
`Communications, (TrustCom-2012), pp. 458-465, Liverpool, UK, June 2012. (Acceptance rate:
`100/358.)
`
`Y. Ahn and R. Bettati, “Transient Overclocking for Aperiodic Task Execution in Hard Real-Time
`Systems,” Proceedings of the 2008 EuroMicro Conference on Real-Time Systems, (ECRTS-2008),
`Prague, Czech Republic, July 2008.
`
`Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati and Wei Zhao, “On Localization Attacks
`to Internet Threat Monitors: An Information-Theoretic Framework”, Proceedings of the 38th
`Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008),
`Anchorage, Alaska, June 2008. (Acceptance rate 25%).
`
`Y. Zhu and R. Bettati, “Compromising Confidentiality in Wireless Network using Sensors with
`Limited Information,” Proceedings of the 27th IEEE International Conference on Distributed
`Computing Systems (ICDCS 2007), Toronto, CANADA, June 2007.
`
`R. Bettati
`
`6
`
`November 16, 2020
`
`
`
`S. Wang and R. Bettati, “Delay Analysis in Temperature-Constrained Hard Real-Time Systems
`with General Task Arrivals,” Proceedings of the IEEE Real-Time Systems Symposium, (RTSS-
`2006), Rio de Janeiro, Brazil, Dec. 2006.
`Best Paper Award. S. Wang and R. Bettati, “Reactive Speed Control in Temperature-Constrained
`Real-Time Systems,” Proceedings of the 2006 EuroMicro Conference on Real-Time Systems,
`(ECRTS-2006), Dresden, Germany, July 2006. (acceptance rate 25/105)
`
`Y. Zhu, and R. Bettati, “Anonymity vs. Information Leakage in Anonymity Systems,” Proceedings
`of the IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, June
`2005. (acceptance rate: 14%)
`
`X. Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, “On Flow Marking Attacks in Wireless
`Anonymous Communication Networks,” Proceedings of the IEEE International Conference on
`Distributed Computing Systems (ICDCS 2005), Columbus, Ohio, USA, June 2005. (acceptance
`rate: 14%)
`
`Y. Zhu, and R. Bettati, “Un-Mixing Mix Traffic,” Proceedings of the 5th Workshop on Privacy
`Enhancing Technologies (PET 2005), Cavtat, CROATIA, May 2005. (acceptance rate: 23%)
`
`S. Cho, and R. Bettati, “Aggregated Aggressiveness Control on Groups of TCP Flows,” Proceed-
`ings of the IFIP Networking 2005, Waterloo, Canada, May 2005. (acceptance rate: 24.7%)
`
`W. Wang, R. Bettati, and W. Zhao, “Real-Time Component-based Systems,” Proceedings of the
`2005 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS-2005),
`March 2005. (acceptance rate: 33%)
`
`Ye Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On Flow Correlation Attacks and Counter-
`measures in Mix Networks,” Proceedings of the 4th Privacy Enhancement Technology Workshop
`(PET 2004), May 2004. (acceptance rate: 28%)
`
`X. Fu, B. Graham, D. Xuan, R. Bettati, W. Zhao, “Empirical and Theoretical Evaluation of
`Active Probing Attacks and Their Countermeasures,” Proceedings of the 6th Information Hiding
`Workshop (IH 2004), May 2004.
`
`B.K. Choi, S. Rho, and R. Bettati, “Fast Software Component Migration for Application Surviv-
`ability in Distributed Real-Time Systems,” to appear in Proceedings of the 7th IEEE International
`Symposium on Object-oriented Real-time distributed Computing (ISORC’04), Vienna, Austria,
`May 12-14, 2004.
`
`S. Wang, R. Nathuji, R. Bettati, and W. Zhao, “Providing Statistical delay Guarantees in Wireless
`Networks,” Proceedings of IEEE International Conference on Distributed Computing Systems
`(ICDCS 2004), March 2004. (acceptance rate: 18%)
`
`Xinwen Fu, Bryan Graham, R. Bettati, and Wei Zhao, “On Effectiveness of Link Padding for
`Statistical Traffic Analysis Attacks,” Proceedings of the 23 IEEE International Conference on
`Distributed Computing Systems (ICDCS 2003), Providence, R.I., May 2003. (acceptance rate:
`18%)
`
`Shengquan Wang, Dong Xuan, R. Bettati, and Wei Zhao, “ A Study of Providing Statistical QoS
`in a Differentiated Services Network”, Proceedings of the 2nd IEEE International Symposium on
`Network Computing and Applications (NCA-03), April 16-18, 2003, Cambridge, Massachusetts,
`USA. (acceptance rate: 26%)
`
`Yong Guan, Xinwen Fu, R. Bettati, and Wei Zhao, “An Optimal Strategy for Anonymous Com-
`munication Protocols,” in Proceedings of the 22nd IEEE International Conference on Distributed
`Computing Systems (ICDCS 2002), Vienna, Austria, July 2002. (acceptance rate: 18%)
`
`R. Bettati
`
`7
`
`November 16, 2020
`
`
`
`S. Wang, D. Xuan, R. Bettati and W. Zhao, “Differentiated Services with Statistical Real-Time
`Guarantees in Static-Priority Scheduling Networks”, in Proceedings of the IEEE Real-Time Sys-
`tems Symposium (RTSS’01), London, U.K., December 2001. (acceptance rate: 26%)
`
`S. Wang, D. Xuan, R. Bettati, and W. Zhao, “Providing Absolute Differentiated Services for
`Real-Time Applications in Static Priority Scheduling Networks.” Proceedings of IEEE INFOCOM
`2001, Anchorage, Alaska, April 2001. (acceptance rate: 23%)
`
`G. Shenoy, S.K. Satapati, R. Bettati, “HydraNet-FT: Network Support for Dependable Ser-
`vices.” Proceedings of the 20th IEEE International Conference on Distributed Computing Systems.
`Taipei, April 2000, pp. 699-706. (Acceptance rate: 18%.)
`
`B.-K. Choi, D. Xuan, C. Li, R. Bettati, W. Zhao, “Scalable QoS Guaranteed Communication
`Services for Real-Time Applications.” Proceedings of the 20th IEEE International Conference on
`Distributed Computing Systems (ICDCS-2000). Taipei, April 2000, pp. 180-187. (Accepted as
`regular paper; regular paper acceptance rate: 18%.)
`
`C. Li, R. Bettati, W. Zhao, “Static Priority Scheduling for ATM Networks.” Proceedings of the
`Real-Time Systems Symposium (RTSS-1997), San Francisco, CA, Dec. 1997, pp 264 – 273.
`(Acceptance rate: 30%)
`
`R. Bettati, A. Gupta, “Dynamic Resource Migration for Multiparty Real-Time Communication.”
`Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS-
`1996), Hong Kong, May 1996, pp 646 – 655. (Acceptance rate: 29%)
`
`R. Bettati, D. Ferrari, A. Gupta, W. Heffner, W. Howe, M. Moran, Q. Nguyen, and R. Yavatkar,
`“Connection Establishment for Multi-Party Real-Time Communication,” Proceedings of the 5th
`International Workshop on Network and Operating System Support for Digital Audio and Video
`(NOSSDAV-1995), Durham, NH, April 1995, pp 255 – 265. (Acceptance rate: 23%))
`
`J. W.-S. Liu, J.-L. Redondo, Z. Deng, T.-S. Tia, R. Bettati, A. Silberman, M. Storch, Rhan Ha,
`and W.K. Shih, “PERTS: A Prototyping Environment for Real-Time Systems.” Proceedings of
`the Real-Time Systems Symposium (RTSS-1993), Raleigh-Durham, N.C., Dec. 1993, pp 184 –
`188. (Acceptance rate: 25%)
`
`R. Bettati and J. W.S. Liu, “Algorithms for End-to-End Scheduling to Meet Deadlines.” Pro-
`ceedings of the 12th International Conference on Distributed Computing Systems (ICDCS-1992),
`Yokohama, June 1992. (Acceptance rate: 28%, in Real-Time Issues and Applications: 22%)
`
`Refereed Conferences Proceedings (Selective, with High Visibility)
`
`Best Paper Runner-Up Award. Jin Shan and R. Bettati. “Adaptive Channel Estimation in
`Side Channel Attacks,” in Proceedings of the 10th IEEE International Workshop on Information
`Forensics and Security, (WIFS 2018), Hong Kong, Dec. 2018. (Acceptance rate: 32.8
`
`T. Nix and R. Bettati, “Implementing Covert Communication Networks on Gunther-Hartnell
`Clique Graph Topologies,” in Proceedings, 20th International Command & Control Research
`& Technology Symposium (ICCRTS-15). August 2015.
`
`T. Nix and R. Bettati, “Neighborhood Failures in Random Topology Covert Communication Net-
`works,” Proceedings of the International Workshop on Secure Peer-to-Peer Intelligent Networks
`& Systems, Hasselt, Belgium, June 2014.
`
`O. Alvarez, R. Bettati, L. Cifuentes, and R. Mercer. “A Mixed-Initiative Intelligent Tutoring
`System,” Proceedings of the 3rd International Conference on Computer Supported Education
`(CSEDU 2011), The Netherlands, May 2011, pp. 333-339.
`
`Y. Ahn, I. Yeo (former student at TAMU), and R. Bettati, “Efficient Calibration of Thermal
`
`R. Bettati
`
`8
`
`November 16, 2020
`
`
`
`Models based on Application Behavior”, in Proceedings of the 27th IEEE International Conference
`on Computer Design (ICCD 2009), Lake Tahoe, CA, Oct. 2009. (acceptance rate: 34%, 70/205)
`
`S. Cho and R. Bettati, “Adaptive Aggregated Aggressiveness Control on Parallel TCP Flows
`Using Competition Detection,” in Proceedings of the 15th International Conference on Computer
`Communications and Networks (ICCCN-06), Arlington, VA. (acceptance rate: 32%, 71/221)
`
`S. Cho and R. Bettati, “Use of Competition Detection in TCP for Fair and Effective Utilization
`of Network Bandwidth,” in Proceedings of the IEEE Globecom 2006 - General Conference on
`Emerging Technologies, San Francisco, CA, November 2006.
`
`Y. Zhu, Xinwen Fu, R. Bettati, Wei Zhao, “Anonymity Analysis of Mix Networks against Flow-
`Correlation Attacks,” Proceedings of IEEE Globecom Computer & Network Security, St. Louis,
`MO, November 2005.
`
`Hongyun Xu, Xinwen Fu, Ye Zhu, R. Bettati, J. Chen, and W. Zhao, “SAS: A Scalar Anonymous
`Communication System,” Proceedings of the International Conference on Computer Networks
`and Mobile Computing (ICCNMC), LNCS 3619, China, August 2005. (Acceptance rate below
`30%)
`
`I. Cardei, A. Pavan, and R. Bettati, “Support for Real-Time Communication in Mobile Free-Space
`Optical Networks.” Proceedings of the IEEE International Conference on Wireless and Mobile
`Computing, Networking and Communications (WiMob 2005), Montreal, Canada, August 2005.
`
`Y. Zhu, X. Fu and R. Bettati, “On the Effectiveness of Continuous-Time Mixes under Flow-
`Correlation Based Anonymity Attacks,” in Proceedings of the 4th IEEE International Symposium
`on Network Computing and Applications (NCA), Cambridge, MA, July 2005.
`
`B. W. Graham, Y. Zhu, X. Fu, and R. Bettati, “Using Covert Channels to Evaluate the Effective-
`ness of Flow Confidentiality Measures.” Proceeding of the 11th IEEE International conference on
`Parallel and Distributed Systems (ICPADS 2005), Fukuoka, Japan, June 2005.
`
`S. Cho, and R. Bettati, “Collaborative Congestion Control in Parallel TCP Flows,” Proceedings of
`the IEEE International Conference on Communications (ICC 2005) – General Conference, Seoul,
`Korea, May 2005. (acceptance rate: 35%)
`
`S. Cho and R. Bettati, “Collaborative Congestion Control in Parallel TCP Flows,” Proceedings
`of the 2005 IEEE International Conference on Communication (ICC-2005), General Conference,
`Seoul, Korea, May 2005. (3 reviews, acceptance rate below 35%)
`
`X. Fu, B. Graham, R. Bettati, W. Zhao, and D. Xuan, “Analytical and Empirical Analysis of
`Countermeasures to Traffic Analysis Attacks,” Proceedings of the 2003 International Conference
`on Parallel Processing (ICPP 2003), Kaohsiung, Taiwan, October 2003. (acceptance rate: 36%)
`
`B.-K. Choi, R. Bettati, “Endpoint Admission Control: Network Based Approach.” Proceedings
`of the 21th IEEE International Conference on Distributed Computing Systems (ICDCS 2001), pp.
`227-235, Phoenix, AZ, April 2001. (regular paper, acceptance rate 32%)
`
`D. Xuan, C. Li, R. Bettati, J. Chen, W. Zhao, “Utilization-Based Admission Control for Real-Time
`Applications.” Proceedings of the International Conference on Parallel Processing (ICPP-2000),
`August 2000, pp. 251-260. (Accepted as regular paper; overall acceptance rate: 38%.)
`
`B. Devalla, R. Bettati, W. Zhao, “Fault Tolerant Real-Time Connection Admission Control for
`Mission Critical Applications over ATM-based Networks.” Proceedings of the Sixth IEEE Inter-
`national Conference on Real-Time Computing Systems and Applications. (Accepted as regular
`paper; acceptance rate for regular papers: 50%) Hong Kong, December 1999, pp 340-347.
`
`B.-K. Choi, R. Bettati, “Bandwidth Reservation for Real-Time Traffic in Wireless Mobile En-
`
`R. Bettati
`
`9
`
`November 16, 2020
`
`
`
`vironment.” Proceedings of the Sixth IEEE International Conference on Real-Time Computing
`Systems and Applications. (Accepted as regular paper; acceptance rate for regular papers: 50%)
`Hong Kong, December 1999, pp 388-391.
`
`C. Li, R. Bettati and W. Zhao, “New Delay Analysis in High Speed Networks.” Proceedings of
`the International Conference on Parallel Processing (ICPP-1999). The University of Aiku, Japan,
`September 1999. (Accepted as regular paper; overall acceptance rate: 32%)
`
`R. Bettati, W. Zhao, and D. Teodor, “Real-Time Intrusion Detection and Suppression in ATM
`Networks.” Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Mon-
`itoring, Santa Clara, CA, April 1999, pp 111 – 118.
`H. Chawla, G. Dillon, R. Bettati, “HydraNet: Network Support for Scaling of Large-Scale
`Services.” Proceedings of the ICCCN 1998. Lafayette, LA, October 1998, pp 574–581. (Accepted
`as regular paper. Acceptance rate : 31% for regular papers, 42% including short papers)
`
`C. Li, R. Bettati, W. Zhao, “Response Time Analysis for Distributed Real-Time Systems with
`Bursty Job Arrivals.” Proceedings of the 1998 International Conference on Parallel Processing
`(ICPP-98), Minneapolis, MN, Aug. 1998, pp 432 – 440. (Accepted as regular paper; overall
`acceptance rate: 34%)
`
`S. Sundaresan and R. Bettati, “Distributed Connection Management for Real-Time Communi-
`cation over Wormhole-Routed Networks.” Proceedings of the 17th International Conference on
`Distributed Computing Systems (ICDCS-1997), Baltimore, MD, May 1997, pp 209 – 216. (Ac-
`ceptance rate: 31%)
`
`Refereed Conferences (Other)
`
`T. Nix, R. Bettati, “Topology Construction in Covert Communication Networks,” Proceedings of
`the 12th IEEE International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN
`2012), Dec. 2012, San Marcos, TX, pp. 135-142.
`
`I. Cardei, A. Pavan, R. Bettati, “Communications Quality of Service for Ad-hoc Mobile Opti-
`cal Free-Space Networks”, In IEEE Consumer Communications & Networking Conference (IEEE
`CCNC 2006). Las Vegas, NV, Jan. 2006
`Nominated for Best Paper: S. Cho and R. Bettati, “Improving Quality of Service of TCP Flows
`in Strictly Prioritized Network,” In Proc. of the IASTED International Conference on Advances
`in Computer Science and Technology (ACST’05), Jan 2006, Puerto Vallarta, Mexico.
`
`S. Rho, B. Choi, R. Bettati, “Design Real-Time Java Remote Method Invocation: A Server-
`Centric Approach,” IASTED International Conference on Parallel and Distributed Computing and
`Systems, Nov. 2005, Phoenix, AZ.
`
`S. Wang, S. Rho, Z. Mai, R. Bettati and Wei Zhao, “Towards Real-Time Component-based
`Systems,” IEEE International Real-Time Systems Symposium (RTSS) Work-in-Progress Session,
`Lisbon, Portugal, December 2004. (This WIP session was refereed.)
`
`X. Fu, B. Graham, R. Bettati, and Wei Zhao, “Active Traffic Analysis Attacks and Counter-
`measures,” Proceedings of the 2003 International Conference on Computer Networks and Mobile
`Computing (ICCNMC-03), Shanghai, China October 20-23, 2003.
`
`W. Yu, D. Xuan, S.K. Reddy, R. Bettati, and Wei Zhao, “Distributed Policy Processing in Vir-
`tual Private Operation Environments for Large-Scale Networks,” Proceedings of the 4th IEEE
`Information Assurance Workshop, West Point, NY, June 2003.
`
`X. Fu, B. Graham, R. Bettati, and W. Zhao, “On Countermeasures to Traffic Analysis Attacks.”
`Proceedings of the 4th IEEE Information Assurance Workshop, West Point, NY, June 2003.
`
`R. Bettati
`
`10
`
`November 16, 2020
`
`
`
`B. Choi, S, Rho and R. Bettati, “Dynamic Resource Discovery for Applications Survivability
`in Distributed Real-Time Systems”. Proceedings of the 11th IEEE International Workshop on
`Parallel and Distributed Systems, pp. 122-129, Nice, France, Apr. 22-23, 2003.
`
`X. Fu , Y. Guan, B. Graham, R. Bettati, and W. Zhao, “Using Parasite Flows to Camouflage
`Flow Traffic”, Proceedings of the 3rd IEEE Information Assurance Workshop, West Point, NY,
`June 2002.
`
`D. Xuan, R. Bettati, and W. Zhao, “A Gateway-Based Defense System for Distributed DoS
`Attacks in High Speed Networks”, Proceedings of the 2nd IEEE SMC Information Assurance
`Workshop, West Point, NY, June, 2001.
`
`Y. Meylan, A. Bajpai, R. Bettati, “ProtEx: A Toolkit for the Analysis of Distributed Real-Time
`Systems.” Proceedings of the Seventh IEEE International Conference on Real-Time Computing
`Systems and Applications. (RTCSA-2000) South Korea, December 2000.
`
`B.-K. Choi, R. Bettati, “Efficient Resource Management for Hard Real-Time Communication over
`Differentiated Services Networks.” Proceedings of the Seventh IEEE International Conference on
`Real-Time Computing Systems and Applications (RTCSA-2000), South Korea, December 2000.
`
`Y. Guan, X. Fu, R. Bettati, and W. Zhao, “Routing in Packet Networks to Prevent Traffic
`Analysis.” Proceedings of the IEEE Information Assurance and Security Workshop, West Point,
`NY, June 5-7 2000.
`
`Y. Guan, R. Bettati, and W. Zhao, “Efficient Traffic Camouflaging in Mission-Critical QoS Guar-
`anteed Networks.” Proceedings of the IEEE Information Assurance and Security Workshop, West
`Point, NY, June 5-7, 2000.
`
`C. Beauduy and R. Bettati, “Protocols Aboard Network Interface Cards.” Proceedings of the
`IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS-
`1999), Cambridge, MA, November 1999.
`
`Y. Guan, X. Dong, R. Bettati and W. Zhao, “Preventing Traffic Ana