default search action
Geoffrey G. Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Daniel Lukaszewski, Geoffrey G. Xie:
Software Defined Layer 4.5 Customization for Agile Network Operation. IEEE Trans. Netw. Serv. Manag. 21(1): 35-50 (2024) - 2023
- [c53]Eric Bergen, Daniel Lukaszewski, Geoffrey G. Xie:
Data Exfiltration via Flow Hijacking at the Socket Layer. HICSS 2023: 6623-6632 - 2022
- [c52]Daniel Lukaszewski, Geoffrey G. Xie:
Demo: Towards Software Defined Layer 4.5 Customization. NetSoft 2022: 240-242 - [c51]Daniel Lukaszewski, Geoffrey G. Xie:
Towards Software Defined Layer 4.5 Customization. NetSoft 2022: 330-338 - 2021
- [c50]Kenneth Pittner, Daniel Lukaszewski, Geoffrey G. Xie:
An Empirical Study of Application-Aware Traffic Compression for Shipboard SATCOM Links. MILCOM 2021: 213-218 - [c49]Michael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie:
Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. NetSoft 2021: 321-329 - 2020
- [i2]Alexis Peppas, Geoffrey G. Xie, Charles Prince:
ferify: A Virtual Machine File Protection System against Zero-Day Attacks. CoRR abs/2004.08992 (2020) - [i1]Michael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie:
Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. CoRR abs/2010.11870 (2020)
2010 – 2019
- 2019
- [j20]Albert G. Greenberg, David A. Maltz, Jennifer Rexford, Geoffrey G. Xie, Jibin Zhan, Hui Zhang:
Reflections on a clean slate 4D approach to network control and management. Comput. Commun. Rev. 49(5): 90-91 (2019) - [j19]Johnu George, Chien-An Chen, Radu Stoleru, Geoffrey G. Xie:
Hadoop MapReduce for Mobile Clouds. IEEE Trans. Cloud Comput. 7(1): 224-236 (2019) - [c48]Brent E. Logan, Geoffrey G. Xie:
Automating Distributed Firewalls: A Case for Software Defined Tactical Networks. MILCOM 2019: 1-6 - 2017
- [j18]Ying Feng, Radu Stoleru, Chien-An Chen, Geoffrey G. Xie:
A Routing-Protocol-Independent Caching Framework for Mobile Clouds. IEEE Trans. Emerg. Top. Comput. 5(3): 353-366 (2017) - [j17]Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:
Safe Update of Hybrid SDN Networks. IEEE/ACM Trans. Netw. 25(3): 1649-1662 (2017) - [c47]Scott Fortner, Geoffrey G. Xie:
DSSR: Balancing semantics and speed requirements in packet trace replay. ICC 2017: 1-6 - [c46]Chien-An Chen, Radu Stoleru, Geoffrey G. Xie:
Energy-Efficient Load-Balanced Heterogeneous Mobile Cloud. ICCCN 2017: 1-9 - [c45]Daniel Lukaszewski, Geoffrey G. Xie:
Multipath Transport for Virtual Private Networks. CSET @ USENIX Security Symposium 2017 - 2016
- [j16]Xin Sun, Geoffrey G. Xie:
An Integrated Systematic Approach to Designing Enterprise Access Control. IEEE/ACM Trans. Netw. 24(6): 3508-3522 (2016) - [c44]Chien-An Chen, Radu Stoleru, Geoffrey G. Xie:
Energy-Efficient and Fault-Tolerant Mobile Cloud Storage. CloudNet 2016: 51-57 - [c43]Chris X. Cai, Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom, Roy H. Campbell:
CRONets: Cloud-Routed Overlay Networks. ICDCS 2016: 67-77 - [c42]Alan Bairley, Geoffrey G. Xie:
Orchestrating network control functions via comprehensive trade-off exploration. NFV-SDN 2016: 114-120 - 2015
- [j15]Chien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie:
Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud. IEEE Trans. Cloud Comput. 3(1): 28-41 (2015) - [c41]Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever:
On the co-existence of distributed and centralized routing control-planes. INFOCOM 2015: 469-477 - 2014
- [j14]Amin Hassanzadeh, Radu Stoleru, Michalis Polychronakis, Geoffrey G. Xie:
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks. Comput. Secur. 46: 1-17 (2014) - [c40]Umit Tellioglu, Geoffrey G. Xie, Justin P. Rohrer, Charles Prince:
Whale of a crowd: Quantifying the effectiveness of crowd-sourced serious games. CGAMES 2014: 1-7 - [c39]Johnu George, Chien-An Chen, Radu Stoleru, Geoffrey G. Xie, Tamim Sookoor, David Bruno:
Hadoop MapReduce for Tactical Clouds. CloudNet 2014: 320-326 - [c38]Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:
Safe routing reconfigurations with route redistribution. INFOCOM 2014: 199-207 - [c37]Lance Alt, Justin P. Rohrer, Geoffrey G. Xie:
Demo: application-transparent deployment of DTN via SmartNet. CHANTS@MobiCom 2014: 93-96 - [c36]Guillermo Baltra, Robert Beverly, Geoffrey G. Xie:
Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping. PAM 2014: 56-66 - [c35]Dennis M. Volpano, Xin Sun, Geoffrey G. Xie:
Towards systematic detection and resolution of network control conflicts. HotSDN 2014: 67-72 - 2013
- [c34]Xin Sun, Geoffrey G. Xie:
Minimizing network complexity through integrated top-down design. CoNEXT 2013: 259-270 - [c33]Mike Ohleger, Geoffrey G. Xie, John H. Gibson:
Extending UAV Video Dissemination via Seamless Handover: A Proof of Concept Evaluation of the IEEE 802.21 Standard. HICSS 2013: 5106-5114 - [c32]Chien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie:
Resource Allocation for Energy Efficient k-out-of-n System in Mobile Ad Hoc Networks. ICCCN 2013: 1-9 - [c31]Justin P. Rohrer, Geoffrey G. Xie:
DTN hybrid networks for vehicular communications. ICCVE 2013: 114-120 - [c30]Chien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie:
Energy-efficient fault-tolerant data storage & processing in dynamic networks. MobiHoc 2013: 281-286 - [e2]Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie:
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]. Springer 2013, ISBN 978-3-319-01432-6 [contents] - 2012
- [j13]Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. Xie, Ding-Zhu Du, Athanasios V. Vasilakos:
Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks. IEEE Trans. Mob. Comput. 11(10): 1538-1554 (2012) - [c29]Xin Sun, Sanjay G. Rao, Geoffrey G. Xie:
Modeling complexity of enterprise routing design. CoNEXT 2012: 85-96 - [c28]Florence McAtee, Sathya Narayanan, Geoffrey G. Xie:
Performance analysis of message prioritization in delay tolerant networks. MILCOM 2012: 1-6 - [c27]Sathya Narayanan, Eric McDonald, Geoffrey G. Xie:
A Framework for Simulation Analysis of Delay Tolerant Routing Protocols. VTC Fall 2012: 1-5 - [c26]Douglas Horner, Geoffrey G. Xie:
Undersea acoustic communication maps for collaborative navigation. WUWNet 2012: 48 - 2011
- [j12]Yang Xiao, Yanping Zhang, John H. Gibson, Geoffrey G. Xie, Hui Chen:
Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks. Clust. Comput. 14(1): 65-80 (2011) - [j11]Yu-Wei Eric Sung, Xin Sun, Sanjay G. Rao, Geoffrey G. Xie, David A. Maltz:
Towards systematic design of enterprise networks. IEEE/ACM Trans. Netw. 19(3): 695-708 (2011) - [c25]Franck Le, Geoffrey G. Xie, Hui Zhang:
On route aggregation. CoNEXT 2011: 6 - [c24]Scott Huchton, Geoffrey G. Xie, Robert Beverly:
Building and evaluating a k-resilient mobile distributed file system resistant to device compromise. MILCOM 2011: 1315-1320 - [c23]Narseo Vallina-Rodriguez, Christos Efstratiou, Geoffrey G. Xie, Jon Crowcroft:
Enabling opportunistic resources sharing on mobile operating systems: benefits and challenges. S3@MobiCom 2011: 29-32 - [c22]Xin Sun, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie:
A software toolkit for visualizing enterprise routing design. SafeConfig 2011 - 2010
- [c21]Robert Beverly, Arthur W. Berger, Geoffrey G. Xie:
Primitives for active internet topology mapping: toward high-frequency characterization. Internet Measurement Conference 2010: 165-171 - [c20]Franck Le, Geoffrey G. Xie, Hui Zhang:
Theory and new primitives for safely connecting routing protocol instances. SIGCOMM 2010: 219-230 - [e1]Geoffrey G. Xie, Robert Beverly, Robert Tappan Morris, Bruce Davie:
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20 - 21, 2010. ACM 2010, ISBN 978-1-4503-0409-2 [contents]
2000 – 2009
- 2009
- [j10]Ehab Al-Shaer, Albert G. Greenberg, Charles R. Kalmanek, David A. Maltz, T. S. Eugene Ng, Geoffrey G. Xie:
New frontiers in internet network management. Comput. Commun. Rev. 39(5): 37-39 (2009) - [j9]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - [j8]David A. Maltz, Jibin Zhan, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford, Geoffrey G. Xie, Hui Zhang:
Structure preserving anonymization of router configuration data. IEEE J. Sel. Areas Commun. 27(3): 349-358 (2009) - [c19]Songqing Yue, Yang Xiao, Geoffrey G. Xie:
Experiments on an Election Algorithm for Decision Element Failures in 4D Future Internet Architecture. FGIT-FGCN 2009: 250-258 - [c18]Yang Xiao, Yanping Zhang, John H. Gibson, Geoffrey G. Xie:
Performance Analysis of p-Persistent Aloha for Multi-hop Underwater Acoustic Sensor Networks. ICESS 2009: 305-311 - [c17]Yang Xiao, Miao Peng, John H. Gibson, Geoffrey G. Xie, Ding-Zhu Du:
Performance Limits of Fair-Access in Underwater Sensor Networks. ICPP 2009: 285-292 - 2008
- [c16]Franck Le, Geoffrey G. Xie, Hui Zhang:
Instability free routing: beyond one protocol instance. CoNEXT 2008: 9 - [c15]Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, David A. Maltz:
Towards systematic design of enterprise networks. CoNEXT 2008: 22 - [c14]Franck Le, Geoffrey G. Xie, Dan Pei, Jia Wang, Hui Zhang:
Shedding light on the glue logic of the internet routing architecture. SIGCOMM 2008: 39-50 - 2007
- [c13]John H. Gibson, Geoffrey G. Xie, Yang Xiao:
Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies. GLOBECOM 2007: 688-693 - [c12]Franck Le, Geoffrey G. Xie, Hui Zhang:
Understanding Route Redistribution. ICNP 2007: 81-92 - [c11]Franck Le, Geoffrey G. Xie:
On guidelines for safe route redistributions. INM@SIGCOMM 2007: 274-279 - 2005
- [j7]Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey G. Xie, Hong Yan, Jibin Zhan, Hui Zhang:
A clean slate 4D approach to network control and management. Comput. Commun. Rev. 35(5): 41-54 (2005) - [c10]Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford:
On static reachability analysis of IP networks. INFOCOM 2005: 2170-2183 - 2004
- [c9]David A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford:
Structure preserving anonymization of router configuration data. Internet Measurement Conference 2004: 239-244 - [c8]Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson:
Routing design in operational networks: a look from the inside. SIGCOMM 2004: 27-40 - 2002
- [c7]Geoffrey G. Xie, Cynthia E. Irvine, Timothy E. Levin:
Quantifying Effect of Network Latency and Clock Drift on Time-Driven Key Sequencing. ICDCS Workshops 2002: 35-42 - 2001
- [j6]Gary N. Stone, Bert Lundy, Geoffrey G. Xie:
Network policy languages: a survey and a new approach. IEEE Netw. 15(1): 10-21 (2001)
1990 – 1999
- 1998
- [j5]Geoffrey G. Xie, Simon S. Lam:
Real-time block transfer under a link-sharing hierarchy. IEEE/ACM Trans. Netw. 6(1): 30-41 (1998) - 1997
- [j4]Geoffrey G. Xie, Simon S. Lam:
An efficient network architecture motivated by application-level QoS. J. High Speed Networks 6(3): 163-179 (1997) - [j3]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks. Perform. Evaluation 31(1-2): 133-157 (1997) - [j2]Simon S. Lam, Geoffrey G. Xie:
Group priority scheduling. IEEE/ACM Trans. Netw. 5(2): 205-218 (1997) - [c6]Geoffrey G. Xie, Simon S. Lam:
Admission Control and Loss Management for an Application-Level Statistical Service. ICNP 1997: 142-151 - [c5]Geoffrey G. Xie, Simon S. Lam:
Real-Time Block Transfer under a Link Sharing Hierarchy. INFOCOM 1997: 388-397 - 1996
- [c4]Geoffrey G. Xie, Simon S. Lam:
An Efficient Adaptive Search Algorithm for Scheduling Real-Time Traffic. ICNP 1996: 14-22 - [c3]Simon S. Lam, Geoffrey G. Xie:
Group Priority Scheduling. INFOCOM 1996: 1346-1356 - 1995
- [j1]Geoffrey G. Xie, Simon S. Lam:
Delay guarantee of virtual clock server. IEEE/ACM Trans. Netw. 3(6): 683-689 (1995) - [c2]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling: Architecture and Algorithm for Switching Packet Video. INFOCOM 1995: 940-950 - [c1]Simon S. Lam, Geoffrey G. Xie:
Burst Scheduling Networks: Flow Specification and Performance Guarantees. NOSSDAV 1995: 289-292
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint