Ram Swaminathan

According to our database1, Ram Swaminathan authored at least 34 papers between 1996 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2012
Managing Data Retention Policies at Scale.
IEEE Trans. Network and Service Management, 2012

Fusion: Managing Healthcare Records at Cloud Scale.
IEEE Computer, 2012

2011
Flexible coloring.
Inf. Process. Lett., 2011

Managing data retention policies at scale.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

On the Optimal Petri Net Representation for Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2011

2010
Password-authenticated key exchange based on RSA.
Int. J. Inf. Sec., 2010

Algorithms for Data Migration.
Algorithmica, 2010

Deploying Mesh Nodes under Non-Uniform Propagation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks.
IEEE/ACM Trans. Netw., 2009

Remote storage with byzantine servers.
Proceedings of the SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2009

2008
Privacy-Preserving Audit and Extraction of Digital Contents.
IACR Cryptology ePrint Archive, 2008

Improved string reconstruction over insertion-deletion channels.
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2008

Assessment of urban-scale wireless networks with a small number of measurements.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Framework and algorithms for collaborative compression.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Adding Capacity Points to a Wireless Mesh Network Using Local Search.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Server Allocation Algorithms for Tiered Systems.
Algorithmica, 2007

Remote storage with byzantine servers.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Auditing to Keep Online Storage Services Honest.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Quickly finding near-optimal storage designs.
ACM Trans. Comput. Syst., 2005

Value-maximizing deadline scheduling and its application to animation rendering.
Proceedings of the SPAA 2005: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2005

Deadline scheduling for animation rendering.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Server Allocation Algorithms for Tiered Systems.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
A New Conceptual Clustering Framework.
Machine Learning, 2004

SoftUDC: A Software-Based Data Center for Utility Computing.
IEEE Computer, 2004

Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking.
Proceedings of the FAST '04 Conference on File and Storage Technologies, March 31, 2004

2003
Plutus: Scalable Secure File Sharing on Untrusted Storage.
Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31, 2003

On Finding Large Conjunctive Clusters.
Proceedings of the Computational Learning Theory and Kernel Machines, 2003

2002
A Framework for Evaluating Storage System Security.
Proceedings of the FAST '02 Conference on File and Storage Technologies, 2002

Selecting RAID Levels for Disk Arrays.
Proceedings of the FAST '02 Conference on File and Storage Technologies, 2002

2001
An Experimental Study of Data Migration Algorithms.
Proceedings of the Algorithm Engineering, 2001

2000
Password-Authenticated Key Exchange Based on RSA.
Proceedings of the Advances in Cryptology, 2000

1996
Divide-and-conquer algorithms for graph-layout problems.
Networks, 1996


  Loading...