Rahul Simha

According to our database1, Rahul Simha authored at least 78 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Undergraduate Computer Science Curricula.
Commun. ACM, February, 2024

2021
Precise Cache Profiling for Studying Radiation Effects.
ACM Trans. Embed. Comput. Syst., 2021

Annotation scaffolds for manipulating articulated objects.
Auton. Robots, 2021

2020
The Reverse Exam: A Gamified Exam Structure to Motivate Studying and Reduce Anxiety.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
CRAQL: A Composable Language for Querying Source Code.
CoRR, 2019

Stochastic Tree-Based Generation of Program-Tracing Practice Questions.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
Annotation Scaffolds for Object Modeling and Manipulation.
CoRR, 2018

Docendo Discimus: Students Learn by Teaching Peers Through Video.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Blockchain for the Common Good: A Digital Currency for Citizen Philanthropy and Social Entrepreneurship.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2016
n-Modular Redundant Real-Time Middleware: Design and Implementation.
Proceedings of the Embedded Operating Systems Workshop co-located with the Embedded Systems Week (ESWEEK 2016), 2016

LockDown: an operating system for achieving service continuity by quarantining principals.
Proceedings of the 9th European Workshop on System Security, 2016

Designing a Literacy-Based Mobile Application for Adult Learners.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Automatic Generation of Context-Based Fill-in-the-Blank Exercises Using Co-occurrence Likelihoods and Google n-grams.
Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications, 2016

2015
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Hardware-enhanced distributed access enforcement for role-based access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
PyLOM: a language and run-time system for planning applications.
Proceedings of the SPLASH'13, 2013

Hardware and software support for fine-grained memory access control and encapsulation in C++.
Proceedings of the SPLASH'13, 2013

2012
Load Equalization on a Two-Armed Robot via Proprioceptive Sensing.
Proceedings of the Experimental Robotics, 2012

Shared hardware data structures for hard real-time systems.
Proceedings of the 12th International Conference on Embedded Software, 2012

No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2011
Automation for Creating and Configuring Security Manifests for Hardware Containers.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2010
Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Providing secure execution environments with a last line of defense against Trojan circuit attacks.
Comput. Secur., 2009

A compiler-hardware approach to software protection for embedded systems.
Comput. Electr. Eng., 2009

OS Support for Detecting Trojan Circuit Attacks.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Hardware-enforced fine-grained isolation of untrusted code.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

2008
Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Architectural support for securing application data in embedded systems.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

2007
Pathway Switching Explains the Sharp Response Characteristic of Hypoxia Response Network.
PLoS Comput. Biol., 2007

Privacy-preserving programming using sython.
Comput. Secur., 2007

Compiler-Directed Region-Based Security for Low-Overhead Software Protection.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

2006
High-Performance Software Protection Using Reconfigurable Architectures.
Proc. IEEE, 2006

SPEE: A Secure Program Execution Environment tool using code integrity checking.
J. High Speed Networks, 2006

Geometric Chemotaxis: A Biologically-Inspired Framework for a Class of Wireless Coverage Problems.
Ad Hoc Sens. Wirel. Networks, 2006

Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival.
Proceedings of the Computational Science, 2006

A performance ratings framework for the evaluation of electronic voting systems: project highlights: exploratory research.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

2005
SAFE-OPS: An approach to embedded software security.
ACM Trans. Embed. Comput. Syst., 2005

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.
Proceedings of the Intelligence and Security Informatics, 2005

CODESSEAL: Compiler/FPGA Approach to Secure Applications.
Proceedings of the Intelligence and Security Informatics, 2005

A Joint Design Approach for Communication Schedule and Layout of Wireless Sensor Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
HomeOS: Context-Aware Home Connectivity.
Proceedings of the International Conference on Wireless Networks, 2004

Addressing application integrity attacks using a reconfigurable architecture.
Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, 2004

Flexible Software Protection Using Hardware/Software Codesign Techniques.
Proceedings of the 2004 Design, 2004

2003
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics.
IEEE Trans. Mob. Comput., 2003

Audio Data Indexing Using Discrete Cosine Transform.
Int. J. Comput. Their Appl., 2003

Energy balance in wireless networks using connection segmentation and range control.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

2002
An efficient algorithm for reducing the number of Add-Drop Multiplexers in SONET/WDM rings.
J. High Speed Networks, 2002

Algorithms for budget-constrained survivable topology design.
Proceedings of the IEEE International Conference on Communications, 2002

2001
On the wavelength assignment problem in multifiber WDM star and ring networks.
IEEE/ACM Trans. Netw., 2001

Simulated N-Body: New Particle Physics-Based Heuristics for a Euclidean Location-Allocation Problem.
J. Heuristics, 2001

2000
Study of link congestion during I/O transfers in 2-D meshes using wormhole routing.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks.
J. Parallel Distributed Comput., 1999

On bounds for the wavelength assignment problem on optical ring networks.
J. High Speed Networks, 1999

Automated classification of audio data and retrieval based on audio classes.
Proceedings of the Computers and Their Applications (CATA-99), 1999

I/O performance of X-Y routing in 2-D meshes under various node-to-disk assignments.
Proceedings of the Computers and Their Applications (CATA-99), 1999

1998
Dynamic load balancing schemes for computing accessible surface area of protein molecules.
Proceedings of the 5th International Conference On High Performance Computing, 1998

1997
An urn model with applications to database performance evaluation.
Comput. Oper. Res., 1997

Transform-Based Indexing of Audio Data for Multimedia Databases.
Proceedings of the International Conference on Multimedia Computing and Systems, 1997

1996
Efficient algorithms for erasure node placement on slotted dual bus networks.
IEEE/ACM Trans. Netw., 1996

Static Assignment of Stochastic Tasks Using Majorization.
IEEE Trans. Computers, 1996

Analysis of a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Processes: A Study of Traffic Burstiness and Priority Packet Discarding.
Comput. Networks ISDN Syst., 1996

File allocation for a parallel Webserver.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

1995
Fast Simulation of a Voice-Data Multiplexer.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

Experimental Evaluation of Dynamic Data Allocation Strategies in A Distributed Database with Changing Workloads.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

1994
Optimal Processor Assignment for a Class of Pipelined Computations.
IEEE Trans. Parallel Distributed Syst., 1994

On-line minimization of call setup time via load balancing: a stochastic approximation approach.
IEEE Trans. Commun., 1994

On Lookahead in the List Update Problem.
Inf. Process. Lett., 1994

Reducing Global Address Recognition Delays in Local Area Networks with Spatial Bandwidth Reuse.
Comput. Networks ISDN Syst., 1994

1993
Load Balancing of Complex Stochastic Tasks Using Stochastic Majorization.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

1992
Some theorems on conditional Pasta: A stochastic integral approach.
Oper. Res. Lett., 1992

Single Path Routing with Delay Considerations.
Comput. Networks ISDN Syst., 1992

Analysis of Individual Packet Loss in a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Process: A Study of Traffic Burstiness and Priority Packet Discarding.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
A Starvation-Free Access Protocol for a Full-Duplex Buffer Insertion Ring Local Area Network.
Comput. Networks ISDN Syst., 1991

1989
Relative reward strength algorithms for learning automata.
IEEE Trans. Syst. Man Cybern., 1989

A Microeconomic Approach to Optimal Resource Allocation in Distributed Computer Systems.
IEEE Trans. Computers, 1989

1987
Second Derivative Algorithms for Optimal Resource Allocation in Distributed Computer Systems.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
A Microeconomic Approach to Optimal File Allocation.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986


  Loading...