Krishna P. N. Puttaswamy

According to our database1, Krishna P. N. Puttaswamy authored at least 21 papers between 2008 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
To Rent or to Buy in the Presence of Statistical Information: The Constrained Ski-Rental Problem.
IEEE/ACM Trans. Netw., 2015

2014
Preserving Location Privacy in Geosocial Applications.
IEEE Trans. Mob. Comput., 2014

2013
An ensemble of replication and erasure codes for cloud file systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

The constrained Ski-Rental problem and its application to online cloud cost optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Protecting cloud data using dynamic inline fingerprint checks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications.
ACM Trans. Web, 2012

Frugal storage for cloud file systems.
Proceedings of the European Conference on Computer Systems, 2012

Lowering Inter-datacenter Bandwidth Costs via Bulk Data Scheduling.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

ICN-RE: redundancy elimination for information-centric networking.
Proceedings of the ICN'12, 2012

2011
Deja vu: fingerprinting network problems.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Silverline: toward data confidentiality in storage-intensive cloud applications.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

2010
Fidelity-Aware Replication for Mobile Devices.
IEEE Trans. Mob. Comput., 2010

Preserving privacy in location-based mobile social applications.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Docx2Go: collaborative editing of fidelity reduced documents on mobile devices.
Proceedings of the 8th International Conference on Mobile Systems, 2010

Anonygator: Privacy and Integrity Preserving Data Aggregation.
Proceedings of the Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Bangalore, India, November 29, 2010

2009
Securing Structured Overlays against Identity Attacks.
IEEE Trans. Parallel Distributed Syst., 2009

Rome: Performance and Anonymity using Route Meshes.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

User interactions in social networks and their implications.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

StarClique: guaranteeing user privacy in social networks against intersection attacks.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Searching for Rare Objects Using Index Replication.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Protecting anonymity in dynamic peer-to-peer networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008


  Loading...