Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: V. N. Muralidhara
@inproceedings{DBLP:conf/iccel/MurugesanSTM23, author = {Kumar Murugesan and Srihari Sriram and Kavin Kumar Thangadorai and V. N. Muralidhara}, title = {Closed WiFi Hotspot - Truly Hidden Network}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023, Las Vegas, NV, USA, January 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE56470.2023.10043474}, doi = {10.1109/ICCE56470.2023.10043474}, timestamp = {Tue, 21 Feb 2023 18:13:47 +0100}, biburl = {https://dblp.org/rec/conf/iccel/MurugesanSTM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/MurugesanTM21, author = {Kumar Murugesan and Kavin Kumar Thangadorai and V. N. Muralidhara}, editor = {Muhammad Younas and Irfan Awan and Perin {\"{U}}nal}, title = {PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks}, booktitle = {8th International Conference on Future Internet of Things and Cloud, FiCloud 2021, Rome, Italy, August 23-25, 2021}, pages = {92--98}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FiCloud49777.2021.00021}, doi = {10.1109/FICLOUD49777.2021.00021}, timestamp = {Mon, 28 Aug 2023 21:17:47 +0200}, biburl = {https://dblp.org/rec/conf/ficloud/MurugesanTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/JawgalMS19, author = {Vinay A. Jawgal and V. N. Muralidhara and P. S. Srinivasan}, editor = {T. V. Gopal and Junzo Watada}, title = {Online Travelling Salesman Problem on a Circle}, booktitle = {Theory and Applications of Models of Computation - 15th Annual Conference, {TAMC} 2019, Kitakyushu, Japan, April 13-16, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11436}, pages = {325--336}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-14812-6\_20}, doi = {10.1007/978-3-030-14812-6\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/tamc/JawgalMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DaraZM18, author = {Sashank Dara and Saman Taghavi Zargar and V. N. Muralidhara}, title = {Towards privacy preserving threat intelligence}, journal = {J. Inf. Secur. Appl.}, volume = {38}, pages = {28--39}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2017.11.006}, doi = {10.1016/J.JISA.2017.11.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DaraZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/DheenadayalanSM18, author = {Kumar Dheenadayalan and Gopalakrishnan Srinivasaraghavan and V. N. Muralidhara}, editor = {Long Cheng and Andrew Chi{-}Sing Leung and Seiichi Ozawa}, title = {Dynamic Control of Storage Bandwidth Using Double Deep Recurrent Q-Network}, booktitle = {Neural Information Processing - 25th International Conference, {ICONIP} 2018, Siem Reap, Cambodia, December 13-16, 2018, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {11307}, pages = {222--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04239-4\_20}, doi = {10.1007/978-3-030-04239-4\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/DheenadayalanSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/DheenadayalanSM17, author = {Kumar Dheenadayalan and Gopalakrishnan Srinivasaraghavan and V. N. Muralidhara}, editor = {Derong Liu and Shengli Xie and Yuanqing Li and Dongbin Zhao and El{-}Sayed M. El{-}Alfy}, title = {Policy Gradient Reinforcement Learning for {I/O} Reordering on Storage Servers}, booktitle = {Neural Information Processing - 24th International Conference, {ICONIP} 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10634}, pages = {849--859}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70087-8\_87}, doi = {10.1007/978-3-319-70087-8\_87}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/DheenadayalanSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/DheenadayalanSM17, author = {Kumar Dheenadayalan and Gopalakrishnan Srinivasaraghavan and V. N. Muralidhara}, editor = {Jinho Kim and Kyuseok Shim and Longbing Cao and Jae{-}Gil Lee and Xuemin Lin and Yang{-}Sae Moon}, title = {Self-tuning Filers - Overload Prediction and Preventive Tuning Using Pruned Random Forest}, booktitle = {Advances in Knowledge Discovery and Data Mining - 21st Pacific-Asia Conference, {PAKDD} 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10235}, pages = {495--507}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57529-2\_39}, doi = {10.1007/978-3-319-57529-2\_39}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/DheenadayalanSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/DaraM17, author = {Sashank Dara and V. N. Muralidhara}, editor = {Sk Subidh Ali and Jean{-}Luc Danger and Thomas Eisenbarth}, title = {Similarity Based Interactive Private Information Retrieval}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, {SPACE} 2017, Goa, India, December 13-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10662}, pages = {151--169}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71501-8\_9}, doi = {10.1007/978-3-319-71501-8\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/DaraM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/DheenadayalanMS16, author = {Kumar Dheenadayalan and V. N. Muralidhara and Gopalakrishnan Srinivasaraghavan}, editor = {Nikolaj S. Bj{\o}rner and Sanjiva Prasad and Laxmi Parida}, title = {Storage Load Control Through Meta-Scheduler Using Predictive Analytics}, booktitle = {Distributed Computing and Internet Technology - 12th International Conference, {ICDCIT} 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9581}, pages = {75--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-28034-9\_9}, doi = {10.1007/978-3-319-28034-9\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/DheenadayalanMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/DeshpandeDSM16, author = {Saurabh Deshpande and Kumar Dheenadayalan and G. Srinivasaraghavan and V. N. Muralidhara}, title = {Filer Response Time Prediction Using Adaptively-Learned Forecasting Models Based on Counter Time Series Data}, booktitle = {15th {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2016, Anaheim, CA, USA, December 18-20, 2016}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICMLA.2016.0012}, doi = {10.1109/ICMLA.2016.0012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmla/DeshpandeDSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mldm/DheenadayalanSM16, author = {Kumar Dheenadayalan and G. Srinivasaraghavan and V. N. Muralidhara}, editor = {Petra Perner}, title = {Pruning a Random Forest by Learning a Learning Algorithm}, booktitle = {Machine Learning and Data Mining in Pattern Recognition - 12th International Conference, {MLDM} 2016, New York, NY, USA, July 16-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9729}, pages = {516--529}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41920-6\_41}, doi = {10.1007/978-3-319-41920-6\_41}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mldm/DheenadayalanSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mldm/DheenadayalanMS16, author = {Kumar Dheenadayalan and V. N. Muralidhara and G. Srinivasaraghavan}, editor = {Petra Perner}, title = {Simulator Prototyping Through Graphical Dependency Modeling}, booktitle = {Machine Learning and Data Mining in Pattern Recognition - 12th International Conference, {MLDM} 2016, New York, NY, USA, July 16-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9729}, pages = {584--598}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41920-6\_46}, doi = {10.1007/978-3-319-41920-6\_46}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mldm/DheenadayalanMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DaraM16, author = {Sashank Dara and V. N. Muralidhara}, title = {Privacy Preserving Architectures for Collaborative Intrusion Detection}, journal = {CoRR}, volume = {abs/1602.02452}, year = {2016}, url = {http://arxiv.org/abs/1602.02452}, eprinttype = {arXiv}, eprint = {1602.02452}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DaraM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CDM15, author = {Prakruti C and Sashank Dara and V. N. Muralidhara}, title = {Efficient Format Preserving Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2015}, url = {http://eprint.iacr.org/2015/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipc/DheenadayalanMD14, author = {Kumar Dheenadayalan and V. N. Muralidhara and Pushpa Datla and G. Srinivasaraghavan and Maulik Shah}, title = {Premonition of storage response class using Skyline ranked Ensemble method}, booktitle = {21st International Conference on High Performance Computing, HiPC 2014, Goa, India, December 17-20, 2014}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HiPC.2014.7116886}, doi = {10.1109/HIPC.2014.7116886}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hipc/DheenadayalanMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-1090, author = {Sandeep Sen and V. N. Muralidhara}, title = {The covert set-cover problem with application to Network Discovery}, journal = {CoRR}, volume = {abs/1202.1090}, year = {2012}, url = {http://arxiv.org/abs/1202.1090}, eprinttype = {arXiv}, eprint = {1202.1090}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-1090.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/walcom/SenM10, author = {Sandeep Sen and V. N. Muralidhara}, editor = {Md. Saidur Rahman and Satoshi Fujita}, title = {The Covert Set-Cover Problem with Application to Network Discovery}, booktitle = {{WALCOM:} Algorithms and Computation, 4th International Workshop, {WALCOM} 2010, Dhaka, Bangladesh, February 10-12, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5942}, pages = {228--239}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11440-3\_21}, doi = {10.1007/978-3-642-11440-3\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/walcom/SenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/MuralidharaS09, author = {V. N. Muralidhara and Sandeep Sen}, title = {Improvements on the Johnson bound for Reed-Solomon codes}, journal = {Discret. Appl. Math.}, volume = {157}, number = {4}, pages = {812--818}, year = {2009}, url = {https://doi.org/10.1016/j.dam.2008.06.014}, doi = {10.1016/J.DAM.2008.06.014}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/MuralidharaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChadhaGKM09, author = {Jivitej S. Chadha and Naveen Garg and Amit Kumar and V. N. Muralidhara}, editor = {Michael Mitzenmacher}, title = {A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {679--684}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536506}, doi = {10.1145/1536414.1536506}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/ChadhaGKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/GargKM08, author = {Naveen Garg and Amit Kumar and V. N. Muralidhara}, editor = {Seok{-}Hee Hong and Hiroshi Nagamochi and Takuro Fukunaga}, title = {Minimizing Total Flow-Time: The Unrelated Case}, booktitle = {Algorithms and Computation, 19th International Symposium, {ISAAC} 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5369}, pages = {424--435}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-92182-0\_39}, doi = {10.1007/978-3-540-92182-0\_39}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/GargKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MuralidharaS07, author = {V. N. Muralidhara and Sandeep Sen}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {48--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_5}, doi = {10.1007/978-3-540-77026-8\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MuralidharaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.