Mudhakar Srivatsa
Orcid: 0000-0002-5874-3750
According to our database1,
Mudhakar Srivatsa
authored at least 164 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Accelerating a Triton Fused Kernel for W4A16 Quantized Inference with SplitK work decomposition.
CoRR, 2024
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
2023
SudokuSens: Enhancing Deep Learning Robustness for IoT Sensing Applications using a Generative Approach.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023
2022
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Rethinking data-driven networking with foundation models: challenges and opportunities.
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022
Proceedings of the Federated Learning, 2022
2021
Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Proceedings of the Workshop Proceedings of the 15th International AAAI Conference on Web and Social Media, 2021
2020
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Internet of Things - ICIOT 2020, 2020
Proceedings of the 2020 IEEE International Conference on Edge Computing, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
IEEE Trans. Serv. Comput., 2019
ACM Trans. Knowl. Discov. Data, 2019
Constructing distributed time-critical applications using cognitive enabled services.
Future Gener. Comput. Syst., 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
J. Netw. Comput. Appl., 2017
Beyond Spatial Auto-Regressive Models: Predicting Housing Prices with Satellite Imagery.
Proceedings of the 2017 IEEE Winter Conference on Applications of Computer Vision, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
Int. J. Networked Distributed Comput., 2016
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 17th International Middleware Conference, Trento, Italy, December 12, 2016
Proceedings of the Industrial Track of the 17th International Middleware Conference, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Proceedings of the 24th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2016
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
J. Netw. Comput. Appl., 2015
Expert Syst. Appl., 2015
CoRR, 2015
Joint Source Selection and Data Extrapolation in Social Sensing for Disaster Response.
CoRR, 2015
Proceedings of the 2015 USENIX Annual Technical Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015
Fast and Flexible Conversion of Geohash Codes to and from Latitude/Longitude Coordinates.
Proceedings of the 23rd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
IEEE Trans. Mob. Comput., 2014
EAI Endorsed Trans. Collab. Comput., 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014
On Critical Event Observability Using Social Networks: A Disaster Monitoring Perspective.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation.
J. Comput. Secur., 2013
IBM J. Res. Dev., 2013
Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
TAF: A trust assessment framework for inferencing with uncertain streaming information.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013
Proceedings of the 21st SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2013
Proceedings of the 16th International Conference on Information Fusion, 2013
Proceedings of the 16th International Conference on Information Fusion, 2013
IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
IEEE/ACM Trans. Netw., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Parallel Distributed Syst., 2011
ACM Trans. Comput. Syst., 2011
Proceedings of the Web Information System Engineering - WISE 2011, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011
Proceedings of the 14th International Conference on Information Fusion, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Semantic Web - ISWC 2010 - 9th International Semantic Web Conference, 2010
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach.
IEEE Trans. Parallel Distributed Syst., 2009
IEEE/ACM Trans. Netw., 2009
A Framework for Distributed Monitoring and Root Cause Analysis for Large IP Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach.
ACM Trans. Web, 2008
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
DSphere: A Source-Centric Approach to Crawling, Indexing and Searching the World Wide Web.
Proceedings of the 23rd International Conference on Data Engineering, 2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2006
Large Scaling Unstructured Peer-to-Peer Networks with Heterogeneity-Aware Topology and Routing.
IEEE Trans. Parallel Distributed Syst., 2006
J. Parallel Distributed Comput., 2006
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006
A Middleware System for Protecting Against Application Level Denial of Service Attacks.
Proceedings of the Middleware 2006, 2006
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
Proceedings of the Computer Security, 2006
2005
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks.
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Scaling Unstructured Peer-to-Peer Networks With Multi-Tier Capacity-Aware Overlay Topologies.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Proceedings of the Distributed Multimedia Information Retrieval, 2003