Khaled Harfoush
Khaled Harfoush
Verified email at
Cited by
Cited by
Binary increase congestion control (BIC) for fast long-distance networks
L Xu, K Harfoush, I Rhee
IEEE INFOCOM 2004 4, 2514-2524, 2004
Robust identification of shared losses using end-to-end unicast probes
K Harfoush, A Bestavros, J Byers
Proceedings 2000 International Conference on Network Protocols, 22-33, 2000
Inference and labeling of metric-induced network topologies
A Bestavros, JW Byers, KA Harfoush
IEEE Transactions on Parallel and Distributed Systems 16 (11), 1053-1065, 2005
Measuring bottleneck bandwidth of targeted path segments
K Harfoush, A Bestavros, J Byers
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
On the design of online scheduling algorithms for advance reservations and QoS in grids
C Castillo, GN Rouskas, K Harfoush
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
Efficient resource management using advance reservations for heterogeneous grids
C Castillo, GN Rouskas, K Harfoush
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-12, 2008
Resource co-allocation for large-scale distributed environments
C Castillo, GN Rouskas, K Harfoush
Proceedings of the 18th ACM international symposium on High performance …, 2009
Measuring Bandwidth Signatures of Network Paths
M Neginhal, K Harfoush, H Perros
International Conference on Research in Networking, 1072-1083, 2007
Online algorithms for advance resource reservations
C Castillo, GN Rouskas, K Harfoush
Journal of Parallel and Distributed Computing 71 (7), 963-973, 2011
Measuring capacity bandwidth of targeted path segments
K Harfoush, A Bestavros, J Byers
IEEE/ACM Transactions on Networking 17 (1), 80-92, 2008
Efficient estimation of more detailed Internet IP maps
S Kim, K Harfoush
2007 IEEE International Conference on Communications, 377-384, 2007
Distribution of the node degree in MANETs
L Guo, K Harfoush, H Xu
2010 Fourth International Conference on Next Generation Mobile Applications …, 2010
Towards realistic physical topology models for Internet backbone networks
X Ma, S Kim, K Harfoush
2009 6th International Symposium on High Capacity Optical Networks and …, 2009
Blockchains for constrained edge devices
A Douglas, R Holloway, J Lohr, E Morgan, K Harfoush
Blockchain: Research and Applications 1 (1-2), 100004, 2020
On the stability-scalability tradeoff of DHT deployment
CC Wang, K Harfoush
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
HAGR: Hole aware greedy routing for geometric ad hoc networks
F Xing, Y Xu, M Zhao, K Harfoush
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
The node degree for wireless ad hoc networks in shadow fading environments
L Guo, H Xu, K Harfoush
2011 6th IEEE Conference on Industrial Electronics and Applications, 815-820, 2011
SDN Security: Information disclosure and flow table overflow attacks
A Patwardhan, D Jayarama, N Limaye, S Vidhale, Z Parekh, K Harfoush
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
Efficient attack plan recognition using automated planning
A Amos-Binks, J Clark, K Weston, M Winters, K Harfoush
2017 IEEE symposium on computers and communications (ISCC), 1001-1006, 2017
On the practicality of elliptic curve cryptography for medical sensor networks
D Baehr, S McKinney, A Quirk, K Harfoush
2014 11th annual high capacity optical networks and emerging/enabling …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20