K. R. Jayaram

According to our database1, K. R. Jayaram authored at least 31 papers between 2006 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Dependability in a Multi-tenant Multi-framework Deep Learning as-a-Service Platform.
CoRR, 2018

Dependability in a Multi-tenant Multi-framework Deep Learning as-a-Service Platform.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
IBM Deep Learning Service.
IBM Journal of Research and Development, 2017

IBM Deep Learning Service.
CoRR, 2017

Agile Composition of Compliant Data Analytics Platforms.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Scalable, Efficient Anonymization with INCOGNITO - Framework & Algorithm.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Benchmarking Intrusion Detection Systems with Adaptive Provisioning of Virtualized Resources.
Proceedings of the Self-Aware Computing Systems., 2017

Software Architectures for Self-protection in IaaS Clouds.
Proceedings of the Self-Aware Computing Systems., 2017

2016
Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Exploiting Causality to Engineer Elastic Distributed Software.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Subscription Normalization for Effective Content-Based Messaging.
IEEE Trans. Parallel Distrib. Syst., 2015

Towards Explicitly Elastic Programming Frameworks.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Decentralized Fault-Tolerant Event Correlation.
ACM Trans. Internet Techn., 2014

Trustworthy geographically fenced hybrid clouds.
Proceedings of the 15th International Middleware Conference, 2014

Fast, expressive top-k matching.
Proceedings of the 15th International Middleware Conference, 2014

2013
Parametric Content-Based Publish/Subscribe.
ACM Trans. Comput. Syst., 2013

Views and Transactional Storage for Large Graphs.
Proceedings of the Middleware 2013, 2013

Elastic Remote Methods.
Proceedings of the Middleware 2013, 2013

2012
Abstracting Context in Event-Based Software.
Trans. Aspect-Oriented Software Development, 2012

Brief Announcement: Weighted Partial Message Matching for Implicit Multicast Systems.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

2011
FAIDECS: Fair Decentralized Event Correlation.
Proceedings of the Middleware 2011, 2011

Split and Subsume: Subscription Normalization for Effective Content-Based Messaging.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Program analysis for event-based distributed systems.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

Putting events in context: aspects for event-based distributed programming.
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011

2010
Parametric Subscriptions for Content-Based Publish/Subscribe Networks.
Proceedings of the Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Bangalore, India, November 29, 2010

Scalable Efficient Composite Event Detection.
Proceedings of the Coordination Models and Languages, 12th International Conference, 2010

2009
Context-oriented programming with EventJava.
Proceedings of the International Workshop on Context-Oriented Programming, 2009

EventJava: An Extension of Java for Event Correlation.
Proceedings of the ECOOP 2009, 2009

2008
Lazy argument passing in Java RMI.
Proceedings of the 6th International Symposium on Principles and Practice of Programming in Java, 2008

On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2006
Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006


  Loading...