Rahul Potharaju

According to our database1, Rahul Potharaju authored at least 34 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Hyperspace: The Indexing Subsystem of Azure Synapse.
Proc. VLDB Endow., 2021

Move Fast and Meet Deadlines: Fine-grained Real-time Stream Processing with Cameo.
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021

2020
Helios: Hyperscale Indexing for the Cloud & Edge.
Proc. VLDB Endow., 2020

2019
Active Entity Recognition in Low Resource Settings.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Serverless Event-Stream Processing over Virtual Actors.
Proceedings of the 9th Biennial Conference on Innovative Data Systems Research, 2019

2018
Chi: A Scalable and Programmable Control Plane for Distributed Stream Processing Systems.
Proc. VLDB Endow., 2018

2017
A Longitudinal Study of Google Play.
IEEE Trans. Comput. Soc. Syst., 2017

2016
Automated Adversarial Testing of Unmodified Wireless Routing Implementations.
IEEE/ACM Trans. Netw., 2016

2015
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection.
Proc. VLDB Endow., 2015

Taming epidemic outbreaks in mobile adhoc networks.
Ad Hoc Networks, 2015

The Dark Menace: Characterizing Network-based Attacks in the Cloud.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

A Longitudinal Study of the Google App Market.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Errata for: A Framework for Network Aware Caching for Video on Demand Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2014

Private Badges for Geosocial Networks.
IEEE Trans. Mob. Comput., 2014

Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2014

Where the Sidewalk Ends: Extending the Internet AS Graph Using Traceroutes from P2P Users.
IEEE Trans. Computers, 2014

On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
A framework for network aware caching for video on demand systems.
ACM Trans. Multim. Comput. Commun. Appl., 2013

Adversarial testing of wireless routing implementations.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

An empirical analysis of intra- and inter-datacenter network failures for geo-distributed services.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Demystifying the dark side of the middle: a field study of middlebox failures in datacenters.
Proceedings of the 2013 Internet Measurement Conference, 2013

When the network crumbles: an empirical study of cloud network failures and their impact on services.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

2012
Network Aware Caching for Video on Demand systems.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Android permissions: a perspective combining risks and benefits.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

The Shy Mayor: Private Badges in GeoSocial Networks.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Understanding end-user perception of network problems.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

2010
Pandora: a platform for worm simulations in mobile ad-hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...