Keith W. Ross
Computer scientist
Keith W. Ross's AcademicInfluence.com Rankings
Download Badge
Computer Science
Keith W. Ross's Degrees
- PhD Computer and Information Science University of Pennsylvania
- Masters Computer and Information Science University of Pennsylvania
- Bachelors Electrical Engineering Cornell University
Why Is Keith W. Ross Influential?
(Suggest an Edit or Addition)According to Wikipedia, Keith W. Ross is an American scholar of computer science whose research has focused on Markov decision processes, queuing theory, computer networks, peer-to-peer networks, Internet privacy, social networks, and deep reinforcement learning. He is the Dean of Engineering and Computer Science at NYU Shanghai and a computer science professor at the New York University Tandon School of Engineering.
Keith W. Ross's Published Works
Published Works
- Computer networking - a top-down approach featuring the internet (1999) (1955)
- A Measurement Study of a Large-Scale P2P IPTV System (2007) (1149)
- Computer Networking: A Top-Down Approach (2016) (972)
- Multiservice Loss Models for Broadband Telecommunication Networks (1997) (814)
- Can internet video-on-demand be profitable? (2007) (508)
- Object replication strategies in content distribution networks (2002) (485)
- Computer Networking: A Top-Down Approach (6th Edition) (2007) (404)
- Stochastic Fluid Theory for P2P Streaming Systems (2007) (388)
- Pollution in P2P file sharing systems (2005) (358)
- The stochastic knapsack problem (1988) (292)
- Hierarchical Peer-To-Peer Systems (2003) (281)
- Optimal policies for controlled markov chains with a constraint (1985) (230)
- The Index Poisoning Attack in P2P File Sharing Systems (2006) (221)
- Inferring Network-Wide Quality in P2P Live Streaming Systems (2007) (206)
- IPTV over P2P streaming networks: the mesh-pull approach (2008) (188)
- Computing approximate blocking probabilities for large loss networks with state-dependent routing (1993) (185)
- Reduced load approximations for multirate loss networks (1993) (178)
- Understanding hybrid CDN-P2P: why limelight needs its own Red Swoosh (2008) (172)
- Cache Array Routing Protocol v1.1 (1998) (168)
- Hash routing for collections of shared Web caches (1997) (165)
- The FastTrack overlay: A measurement study (2006) (162)
- Randomized and Past-Dependent Policies for Markov Decision Processes with Multiple Constraints (1989) (161)
- Video on demand over ATM: constant-rate transmission and transport (1996) (161)
- The KaZaA Overlay : A Measurement Study (2004) (157)
- Study companion, Computer networking, a top-down approach featuring the Internet, third edition, James F. Kurose, Keith W. Ross (2007) (155)
- Measuring and Evaluating Large-Scale CDNs (2008) (154)
- Optimal circuit access policies in an ISDN environment: a Markov decision approach (1989) (154)
- Queuing Network Models for Multi-Channel P2P Live Streaming Systems (2009) (153)
- Facebook users have become much more private: A large-scale study (2012) (153)
- Exploiting P2P systems for DDoS attacks (2006) (152)
- LayerP2P: Using Layered Video Chunks in P2P Live Streaming (2009) (151)
- Unraveling the BitTorrent Ecosystem (2011) (142)
- The pollution attack in P2P live video streaming: measurement results and defenses (2007) (140)
- Video-on-Demand Over ATM: Constant-Rate Transmission and Transport (1996) (140)
- Distributing layered encoded video through caches (2001) (140)
- Optimal peer selection for P2P downloading and streaming (2005) (131)
- Using layered video to provide incentives in P2P live streaming (2007) (131)
- View-Upload Decoupling: A Redesign of Multi-Channel P2P Video Systems (2009) (127)
- Identifying video spammers in online social networks (2008) (115)
- On the Optimal Control of Two Queues with Server Setup Times and its Analysis (1987) (112)
- Peer-Assisted File Distribution: The Minimum Distribution Time (2006) (109)
- Peer-Assisted VoD: Making Internet Video Distribution Cheap (2007) (106)
- Optimal load balancing and scheduling in a distributed computer system (1991) (104)
- Estimating age privacy leakage in online social networks (2012) (104)
- What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook (2011) (101)
- Performance evaluation of redirection schemes in content distribution networks (2001) (101)
- Substream Trading: Towards an open P2P live streaming system (2008) (100)
- Data indexing in peer-to-peer DHT networks (2004) (99)
- Algorithms to determine exact blocking probabilities for multirate tree networks (1990) (99)
- Percentile performance criteria for limiting average Markov decision processes (1995) (98)
- Adaptive rate control for streaming stored fine-grained scalable video (2002) (89)
- Video interactions in online video social networks (2009) (89)
- A framework for guaranteeing statistical QoS (2002) (87)
- BitTorrent Darknets (2010) (86)
- Broadcast yourself: understanding YouTube uploaders (2011) (86)
- Optimal streaming of layered video (2000) (85)
- Multichain Markov Decision Processes with a Sample Path Constraint: A Decomposition Approach (1991) (85)
- Understanding video interactions in youtube (2008) (84)
- Time-average optimal constrained semi-Markov decision processes (1986) (78)
- Markov Decision Processes with Sample Path Constraints: The Communicating Case (1989) (78)
- A Lightweight Currency Paradigm for the P2P Resource Market (2004) (75)
- Optimizing File Availability in Peer-to-Peer Content Distribution (2007) (73)
- Randomized Ensembled Double Q-Learning: Learning Fast Without a Model (2021) (73)
- A peer-to-peer video-on-demand system using multiple description coding and server diversity (2004) (72)
- Optimal priority assignment with hard constraint (1986) (72)
- Periodic broadcasting with VBR-encoded video (1999) (68)
- Multiclass P2P networks: Static resource allocation for service differentiation and bandwidth diversity (2005) (65)
- Fluid modeling of pollution proliferation in P2P networks (2006) (64)
- On Nonblocking Multirate Interconnection Networks (1991) (63)
- Understanding and Improving Ratio Incentives in Private Communities (2010) (62)
- "On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks (2014) (62)
- P2P Trading in Social Networks: The Value of Staying Connected (2010) (61)
- Monotonicity properties for the stochastic knapsack (1990) (60)
- Topology-Centric Look-Up Service (2003) (60)
- A measurement study of attacks on BitTorrent leechers (2008) (57)
- A dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks (1998) (56)
- Understanding Peer Exchange in BitTorrent Systems (2010) (56)
- Optimal scheduling of interactive and noninteractive traffic in telecommunication systems (1988) (56)
- P2P Video Live Streaming with MDC: Providing Incentives for Redistribution (2007) (54)
- Estimating the performance of hypothetical cloud service deployments: A measurement-based approach (2011) (52)
- I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy (2011) (51)
- Modeling and Analysis of Multichannel P2P Live Video Systems (2010) (51)
- Call Admission for Prerecorded Sources with Packet Loss (1997) (49)
- Packet multiplexers with adversarial regulated traffic (2002) (48)
- Measuring and Evaluating TCP Splitting for Cloud Services (2010) (48)
- Waiting for Anonymity: Understanding Delays in the Tor Overlay (2010) (48)
- Streaming layered encoded video using peers (2005) (47)
- Topology Mapping and Geolocating for China's Internet (2013) (46)
- Interactive video streaming with proxy servers (2000) (45)
- Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems (2005) (45)
- Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks (2017) (45)
- Optimal Peer Selection in a Free-Market Peer- Resource Economy (2004) (45)
- First Order Constrained Optimization in Policy Space (2020) (45)
- Improving the WWW: Caching or Multicast? (1998) (44)
- BAIL: Best-Action Imitation Learning for Batch Deep Reinforcement Learning (2019) (44)
- Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts (2009) (44)
- Guaranteeing statistical QoS to regulated traffic: the single node case (1999) (43)
- Measuring and evaluating large-scale CDNs Paper withdrawn at Mirosoft's request (2008) (42)
- A replicated architecture for the Domain Name System (2000) (42)
- Teletraffic engineering for product-form circuit-switched networks (1990) (42)
- Monte Carlo summation and integration applied to multiclass queuing networks (1994) (40)
- High-performance prefetching protocols for VBR prerecorded video (1998) (39)
- Caching video objects: layers vs versions? (2002) (37)
- Implementation of adaptive streaming of stored MPEG-4 FGS video over TCP (2002) (36)
- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? (2014) (36)
- Adaptive content management in structured P2P communities (2006) (36)
- Optimal content replication in P2P communities (2002) (36)
- Monte Carlo Summation Applied to Product-Form Loss Networks (1992) (36)
- Optimal dynamic scheduling in Jackson networks (1989) (36)
- Optimal streaming of layered video: joint scheduling and error concealment (2003) (35)
- I Know What You're Buying: Privacy Breaches on eBay (2014) (35)
- Optimal Peer-Assisted File Distribution: Single and Multi-Class Problems (2006) (32)
- Variability sensitive Markov decision processes (1989) (32)
- China's Internet: Topology mapping and geolocating (2012) (30)
- Fast algorithms for generating discrete random variates with changing distributions (1993) (30)
- Unified framework for optimal video streaming (2004) (30)
- The Right to be Forgotten in the Media: A Data-Driven Study (2016) (29)
- A join-the-shortest-queue prefetching protocol for VBR video on demand (1997) (28)
- Secure and resilient peer-to-peer e-mail design and implementation (2003) (28)
- Uniformization for semi-Markov decision processes under stationary policies (1987) (27)
- Xunlei: Peer-Assisted Download Acceleration on a Massive Scale (2012) (25)
- Boosting Soft Actor-Critic: Emphasizing Recent Experience without Forgetting the Past (2019) (25)
- I know where you are: Thwarting privacy protection in location-based social discovery services (2015) (24)
- A Measurement Study of Attacks on BitTorrent Seeds (2011) (24)
- Measurement and mitigation of BitTorrent leecher attacks (2009) (23)
- On Routing in ATM Networks (1993) (23)
- Stochastic fluid models for cache clusters (2005) (23)
- Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery (2014) (22)
- Striping for interactive video: is it worth it? (1999) (21)
- Supervised Policy Update for Deep Reinforcement Learning (2018) (20)
- Profiling high-school students with facebook: how online privacy laws can actually increase minors' risk (2013) (19)
- Dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks (1997) (19)
- User Anonymity on Twitter (2017) (19)
- You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users (2016) (19)
- The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children (2015) (18)
- Striving for Simplicity and Performance in Off-Policy DRL: Output Normalization and Non-Uniform Sampling (2019) (18)
- Redesigning multi-channel P2P live video systems with View-Upload Decoupling (2010) (18)
- Inflight Modifications of Content: Who Are the Culprits? (2011) (17)
- Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics (2017) (17)
- Peer-Driven Video Streaming : Multiple Descriptions versus Layering (2005) (16)
- Mechanism design for dynamic P2P streaming (2013) (16)
- Continuous media e-mail on the Internet: infrastructure inadequacies and a sender-side solution (2000) (15)
- On the Design of Prefetching Strategies in a Peer-Driven Video on-Demand System (2006) (15)
- Topology Optimization in Multi-tree Based P2P Streaming System (2009) (15)
- Video Pollution on the Web (2010) (14)
- Optimal multiplexing of heterogeneous traffic with hard constraint (1986) (14)
- Efficient substream encoding and transmission for P2P video on demand (2007) (14)
- Asymptotically optimal importance sampling for product-form queuing networks (1993) (14)
- A DNS Reflection Method for Global Traffic Management (2010) (13)
- Asynchronous voice: a personal account (2003) (13)
- Estimating heights from photo collections: a data-driven approach (2014) (13)
- Profiting from filesharing: A measurement study of economic incentives in cyberlockers (2012) (13)
- Proceedings of the 30th ACM International Conference on Multimedia (2002) (12)
- Thwarting location privacy protection in location-based social discovery services (2016) (12)
- VRL3: A Data-Driven Framework for Visual Deep Reinforcement Learning (2022) (12)
- Peer-assisted distribution of User Generated Content (2012) (12)
- Pollution in P2P Live Video Streaming (2009) (12)
- Efficient Entropy for Policy Gradient with Multidimensional Action Space (2018) (12)
- The Seed Attack : Can BitTorrent be Nipped in the Bud ? (2008) (11)
- Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach (2015) (11)
- A Decentralized Prefetching Protocol for VBR Video on Demand (1998) (11)
- Comparing the streaming of FGS encoded video at different aggregation levels: frame, GoP, and scene (2005) (11)
- You Can Yak But You Can't Hide (2015) (10)
- Proceedings of the Sixth International Workshop on Web Caching and Content Distribution (2001) (10)
- On-Policy Deep Reinforcement Learning for the Average-Reward Criterion (2021) (10)
- Solving product form stochastic networks with Monte Carlo summation (1990) (10)
- Advances in Peer-to-Peer Streaming Systems [Guest Editorial] (2007) (10)
- Discovery of In-Band Streaming Services in Peer-to-Peer Overlays (2007) (9)
- Performance modeling and optimization of interconnected Ethernets (1991) (9)
- Implementation of Monte Carlo Integration for the Analysis of Product-Form Queueing Networks (1997) (8)
- A Comprehensive Architecture for Continuous Media Email (2001) (8)
- The High-School Profiling Attack: How Online Privacy Laws Can Actually Increase Minors' Risk (2012) (8)
- Automated delivery of Web documents through a caching infrastructure (2003) (8)
- Performance modeling and optimization of networks of bridged LANs (1991) (8)
- On the Convergence of the Monte Carlo Exploring Starts Algorithm for Reinforcement Learning (2020) (8)
- Comparing the streaming of FGS encoded video at different aggregation levels: frame, GoP, and scene: Research Articles (2005) (7)
- Product-Form Loss Networks (1995) (7)
- Proceedings of the 2008 ACM CoNEXT Conference (2008) (6)
- Towards Simplicity in Deep Reinforcement Learning: Streamlined Off-Policy Learning (2019) (6)
- Supervised Policy Update (2018) (6)
- Pangolin: speeding up concurrent messaging for cloud-based social gaming (2011) (6)
- Taking the Pulse of US College Campuses with Location-Based Anonymous Mobile Apps (2017) (5)
- Mining Anonymity: Identifying Sensitive Accounts on Twitter (2017) (5)
- Asymptotic analysis for closed multiclass queueing networks in critical usage (1994) (5)
- A decomposition approximation method for multiclass BCMP queueing networks with multiple-server stations (1994) (5)
- Characterizing Video Responses in Social Networks (2008) (4)
- Adaptive Streaming of Layer-Encoded Multimedia Presentations (2000) (4)
- First Order Optimization in Policy Space for Constrained Deep Reinforcement Learning (2020) (4)
- Optimal dynamic routing in Markov queueing networks (1986) (4)
- Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights Into Global Migration Flows (2018) (4)
- Optimal streaming of layer-encoded multimedia presentations (2000) (4)
- Understanding and Improving Incentives in Private P 2 P Communities (2009) (4)
- Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity (2021) (4)
- Computer Networks: a top-down approach, 7th edition (2017) (4)
- Exploiting the Synergetic Relationship between Automobiles and Wireless Communications (2007) (3)
- Percentile Performance Criteria For Limiting (1995) (3)
- Optimal streaming of synchronized multimedia presentations (1999) (3)
- The Stochastic Knapsack (1995) (3)
- Adaptive Replication and Replacement in P 2 P Caching (3)
- Structured Peer-to-Peer Networks: Faster, Closer, Smarter (2005) (3)
- Two optimal peer selection problems (2004) (3)
- Performance modeling of heterogeneous data networks (1992) (3)
- Keynote speakers: Big data science and social networks — Accelerating insights and building value (2014) (2)
- A secure lightweight currency service provider (2004) (2)
- Capacity analysis of peer-to-peer adaptive streaming (2013) (2)
- Analytic Models for Separable Statistical Multiplexing (1995) (2)
- Computer Networking Complete Package (3rd Edition)with study companion (2006) (2)
- Efficient Simulation of Large-Scale Loss Networks (1991) (2)
- P 2 P Trading in Online Social Networks : the Value of Staying Connected (2009) (2)
- Performance of FDDI under overload (1992) (2)
- Structural properties of optimal policies in an ISDN circuit-switched access port (1988) (2)
- ON THE IPAD ( Or : Music stands just weren ' t designed to support laptops . ) (2014) (2)
- Broadcasting and streaming stored video (2000) (2)
- A Comprehensive Architecture for Continuous Media E-Mail on the Internet (2001) (2)
- Distributing Frequently-Changing Documents in the Web: Multicasting or Hierarchical Caching? (2007) (2)
- Chapter 7: Multimedia Networking (2008) (2)
- Efficient Substream Encoding for P 2 P Video on Demand (2006) (2)
- Percentile Objective Criteria in Average Reward Markov Decision Processes (1989) (1)
- Automated Delivery of Web Documents Through a (2003) (1)
- Markov decision processes with constraints (1984) (1)
- Prefetching protocols for VBR video on demand (1997) (1)
- Loss Models For Broadband Networks With Non-Linear Constraint Functions (1999) (1)
- Replicating the DNS using Satellite Broadcast (1)
- Dynamic Routing in ATM Networks (1995) (1)
- Multiservice Loss Systems (1995) (1)
- On the Privacy of Peer-Assisted Distribution of Security Patches (2010) (1)
- Optimal priority assignment with constraint (1983) (1)
- Aggressive Q-Learning with Ensembles: Achieving Both High Sample Efficiency and High Asymptotic Performance (2021) (1)
- Thwarting privacy protection on location-based social discovery services (2015) (1)
- A Simple and Robust P 2 P Scheme for VoD in a Resource Rich Walled Garden Network (2009) (1)
- PROCESSES UNDER STATIONARY POLICIES (1987) (1)
- Integrated Use of Tools and Technologies for Rapidly Prototyping Simulated Data Products of Future NASA Observing Systems For Evaluation in Applications of National Importance (2006) (1)
- Is BitTorrent Unstoppable? (2008) (1)
- An Optimistic Fair RSA Based Protocol for E-Commerce (2019) (0)
- Measurement and vulnerability analysis of overlay networks and peer-to-peer systems (2012) (0)
- Dynamic Routing in Telephone Networks (1995) (0)
- ULTI-DIMENSIONAL A CTION S PACE (2018) (0)
- Performance analysis for multirate circuit switching: simple tree networks (1989) (0)
- On the Efficiency of P 2 P Service Trading through Social Networks (2009) (0)
- Multiservice Interconnection Networks (1995) (0)
- Advanced Networking ’2006 (2006) (0)
- Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, Madrid, Spain, December 9-12, 2008 (2008) (0)
- Waiting for Anonymity : Understanding Delays in Tor (2009) (0)
- On the Convergence of Monte Carlo UCB for Random-Length Episodic MDPs (2022) (0)
- Guaranteeing Statistical QoS to Regulated Tra c : The Multiple Node Case 1 (2007) (0)
- Understanding the Start-up Delay of Mesh-pull Peer-to-Peer Live Streaming Systems (2008) (0)
- Measuring and Optimizing TCP Splitting for Cloud Services (2009) (0)
- The Generalized Stochastic Knapsack (1995) (0)
- A Comprehensive for Continuous Email (2001) (0)
- Welcome message from the conference chairs (2002) (0)
- A sample path theory for time-average Markov decision processes (1987) (0)
- Proceedings of the 13th Asian Internet Engineering Conference (2012) (0)
- Streaming Stored Continuous Media over Fair-Share Bandwidth Despina Saparilla (2000) (0)
- Attacking Age Privacy in Online Social Networks (2011) (0)
- Policy Gradient For Multidimensional Action Spaces: Action Sampling and Entropy Bonus (2018) (0)
- Welcome to AINTEC 2012 (2012) (0)
- Discrete-time equivalence for constrained semi-Markov decision processes (1985) (0)
- Optimal Streaming of Layered Video Despina Saparilla (2000) (0)
- Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics (2016) (0)
- Program chairs' message (2008) (0)
- Monte Carlo Summation for Product-Form Loss Networks (1995) (0)
- A Framework for Guaranteeing Statisti al QoS ( Extended Version ) (2020) (0)
- Optimal scheduling for an M/G/1 queueing system with multiple constraints (1987) (0)
- P 2 P Systems (2004) (0)
- Deposit and Insurance Schemes for Non-Monitored P 2 P Service (2005) (0)
- Video Packets in Wireless Ad-Hoc Network: Two Ray Propagation Model (2020) (0)
- Networks and Protocols ’2005 (2005) (0)
- Providing Incentives in P 2 P Adaptive Streaming (2012) (0)
This paper list is powered by the following services:
Other Resources About Keith W. Ross
What Schools Are Affiliated With Keith W. Ross?
Keith W. Ross is affiliated with the following schools:
What Are Keith W. Ross's Academic Contributions?
Keith W. Ross is most known for their academic work in the field of computer science. They are also known for their academic work in the fields of
Keith W. Ross has made the following academic contributions: