V. N. Muralidhara

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Closed WiFi Hotspot - Truly Hidden Network.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

2021
PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2019
Online Travelling Salesman Problem on a Circle.
Proceedings of the Theory and Applications of Models of Computation, 2019

2018
Towards privacy preserving threat intelligence.
J. Inf. Secur. Appl., 2018

Dynamic Control of Storage Bandwidth Using Double Deep Recurrent Q-Network.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

2017
Similarity Based Interactive Private Information Retrieval.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

Self-tuning Filers - Overload Prediction and Preventive Tuning Using Pruned Random Forest.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Policy Gradient Reinforcement Learning for I/O Reordering on Storage Servers.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Privacy Preserving Architectures for Collaborative Intrusion Detection.
CoRR, 2016

Pruning a Random Forest by Learning a Learning Algorithm.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Simulator Prototyping Through Graphical Dependency Modeling.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Filer Response Time Prediction Using Adaptively-Learned Forecasting Models Based on Counter Time Series Data.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Storage Load Control Through Meta-Scheduler Using Predictive Analytics.
Proceedings of the Distributed Computing and Internet Technology, 2016

2015
Efficient Format Preserving Encrypted Databases.
IACR Cryptol. ePrint Arch., 2015

2014
Premonition of storage response class using Skyline ranked Ensemble method.
Proceedings of the 21st International Conference on High Performance Computing, 2014

2010
The Covert Set-Cover Problem with Application to Network Discovery.
Proceedings of the WALCOM: Algorithms and Computation, 4th International Workshop, 2010

2009
Improvements on the Johnson bound for Reed-Solomon codes.
Discret. Appl. Math., 2009

A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

2008
Minimizing Total Flow-Time: The Unrelated Case.
Proceedings of the Algorithms and Computation, 19th International Symposium, 2008

2007
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography.
Proceedings of the Progress in Cryptology, 2007


  Loading...