P. Lalith Suresh

According to our database1, P. Lalith Suresh authored at least 14 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Kraken: Online and Elastic Resource Reservations for Cloud Datacenters.
IEEE/ACM Trans. Netw., 2018

2017
Rein: Taming Tail Latency in Key-Value Stores via Multiget Scheduling.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

2016
Kraken: Online and elastic resource reservations for multi-tenant datacenters.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Kraken: Towards Elastic Performance Guarantees in Multi-tenant Data Centers.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

BRB: BetteR Batch Scheduling to Reduce Tail Latencies in Cloud Data Stores.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

C3: Cutting Tail Latency in Cloud Data Stores via Adaptive Replica Selection.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

2014
Exploiting convergence characteristics to tackle collusion attacks in OLSR for <i>Security and Communication Networks</i>.
Secur. Commun. Networks, 2014

Programmatic Orchestration of WiFi Networks.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2012
Demo: programming enterprise WLANs with odin.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

2011
ns-3-click: click modular router integration for ns-3.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Acceleration of Functional Validation Using GPGPU.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011

DoS Attacks in MANETs: Detection and Countermeasures.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Collusion attack resistance through forced MPR switching in OLSR.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

A collusion attack detection method for OLSR-based MANETS employing scruple packets.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010


  Loading...