default search action
Rahul Simha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Rahul Simha, Amruth N. Kumar, Rajendra K. Raj:
Undergraduate Computer Science Curricula. Commun. ACM 67(2): 29-31 (2024) - 2021
- [j30]Pablo Frank-Bolton, Roxana Leontie, Evan M. Drumwright, Rahul Simha:
Annotation scaffolds for manipulating articulated objects. Auton. Robots 45(6): 885-903 (2021) - [j29]James Marshall, Robert Gifford, Gedare Bloom, Gabriel Parmer, Rahul Simha:
Precise Cache Profiling for Studying Radiation Effects. ACM Trans. Embed. Comput. Syst. 20(3): 25:1-25:25 (2021) - 2020
- [c47]Pablo Frank-Bolton, Rahul Simha:
The Reverse Exam: A Gamified Exam Structure to Motivate Studying and Reduce Anxiety. SIGCSE 2020: 713-719
2010 – 2019
- 2019
- [c46]Anderson Thomas, Troy Stopera, Pablo Frank-Bolton, Rahul Simha:
Stochastic Tree-Based Generation of Program-Tracing Practice Questions. SIGCSE 2019: 91-97 - [i2]Blake Johnson, Rahul Simha:
CRAQL: A Composable Language for Querying Source Code. CoRR abs/1901.09409 (2019) - 2018
- [c45]Shweta Jain, Rahul Simha:
Blockchain for the Common Good: A Digital Currency for Citizen Philanthropy and Social Entrepreneurship. iThings/GreenCom/CPSCom/SmartData 2018: 1387-1394 - [c44]Pablo Frank-Bolton, Rahul Simha:
Docendo Discimus: Students Learn by Teaching Peers Through Video. SIGCSE 2018: 473-478 - [i1]Pablo Frank-Bolton, Rahul Simha:
Annotation Scaffolds for Object Modeling and Manipulation. CoRR abs/1808.06679 (2018) - 2016
- [c43]Jennifer Hill, Rahul Simha:
Automatic Generation of Context-Based Fill-in-the-Blank Exercises Using Co-occurrence Likelihoods and Google n-grams. BEA@NAACL-HLT 2016: 23-30 - [c42]Jennifer Hill, Rahul Simha:
Designing a Literacy-Based Mobile Application for Adult Learners. CHI Extended Abstracts 2016: 3076-3083 - [c41]Gedare Bloom, Gabriel Parmer, Rahul Simha:
LockDown: an operating system for achieving service continuity by quarantining principals. EUROSEC 2016: 7:1-7:6 - [c40]James Marshall, Gedare Bloom, Gabriel Parmer, Rahul Simha:
n-Modular Redundant Real-Time Middleware: Design and Implementation. EWiLi 2016 - 2015
- [c39]Gedare Bloom, Bhagirath Narahari, Rahul Simha, Ali Namazi, Renato Levy:
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets. HOST 2015: 48-51 - 2014
- [c38]Gedare Bloom, Rahul Simha:
Hardware-enhanced distributed access enforcement for role-based access control. SACMAT 2014: 5-16 - 2013
- [c37]Eugen Leontie, Gedare Bloom, Rahul Simha:
Hardware and software support for fine-grained memory access control and encapsulation in C++. SPLASH (Companion Volume) 2013: 81-82 - [c36]Scotty Smith, Gedare Bloom, Rahul Simha:
PyLOM: a language and run-time system for planning applications. SPLASH (Companion Volume) 2013: 91-92 - 2012
- [c35]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha:
No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains. DSD 2012: 163-170 - [c34]Gedare Bloom, Gabriel Parmer, Bhagirath Narahari, Rahul Simha:
Shared hardware data structures for hard real-time systems. EMSOFT 2012: 133-142 - [c33]Roxana Leontie, Evan M. Drumwright, Dylan A. Shell, Rahul Simha:
Load Equalization on a Two-Armed Robot via Proprioceptive Sensing. ISER 2012: 499-513 - 2011
- [c32]Eugen Leontie, Gedare Bloom, Rahul Simha:
Automation for Creating and Configuring Security Manifests for Hardware Containers. SafeConfig 2011 - 2010
- [c31]Eugen Leontie, Olga Gelbart, Bhagirath Narahari, Rahul Simha:
Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards. IAS 2010: 125-130
2000 – 2009
- 2009
- [j28]Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha:
A compiler-hardware approach to software protection for embedded systems. Comput. Electr. Eng. 35(2): 315-328 (2009) - [j27]Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Providing secure execution environments with a last line of defense against Trojan circuit attacks. Comput. Secur. 28(7): 660-669 (2009) - [c30]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware-enforced fine-grained isolation of untrusted code. SecuCode@CCS 2009: 11-18 - [c29]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. CSE (2) 2009: 830-836 - [c28]Gedare Bloom, Bhagirath Narahari, Rahul Simha:
OS Support for Detecting Trojan Circuit Attacks. HOST 2009: 100-103 - 2008
- [c27]Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha:
Architectural support for securing application data in embedded systems. EIT 2008: 19-24 - [c26]Yu Tang, Shuyu Chen, Changqing Bu, Guanghui Chang, Rahul Simha:
Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading. HPCC 2008: 258-265 - 2007
- [j26]Michael Gaiman, Rahul Simha, Bhagirath Narahari:
Privacy-preserving programming using sython. Comput. Secur. 26(2): 130-136 (2007) - [j25]Yihai Yu, Guanyu Wang, Rahul Simha, Weiqun Peng, Frank Turano, Chen Zeng:
Pathway Switching Explains the Sharp Response Characteristic of Hypoxia Response Network. PLoS Comput. Biol. 3(8) (2007) - [c25]Vijay Kongubangaram, Olga Gelbart, Rahul Simha, Bhagirath Narahari:
Compiler-Directed Region-Based Security for Low-Overhead Software Protection. DASC 2007: 47-54 - 2006
- [j24]Hidayet Ozgur Sanli, Rahul Simha, Bhagirath Narahari:
Geometric Chemotaxis: A Biologically-Inspired Framework for a Class of Wireless Coverage Problems. Ad Hoc Sens. Wirel. Networks 2(4) (2006) - [j23]Olga Gelbart, Bhagirath Narahari, Rahul Simha:
SPEE: A Secure Program Execution Environment tool using code integrity checking. J. High Speed Networks 15(1): 21-32 (2006) - [j22]Joseph Zambreno, Daniel Honbo, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari:
High-Performance Software Protection Using Reconfigurable Architectures. Proc. IEEE 94(2): 419-431 (2006) - [c24]Poorvi L. Vora, Rahul Simha, Jonathan Stanton:
A performance ratings framework for the evaluation of electronic voting systems: project highlights: exploratory research. DG.O 2006: 460-461 - [c23]Rahul Simha, K. Gopinath:
Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival. International Conference on Computational Science (3) 2006: 679-686 - 2005
- [j21]Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon:
SAFE-OPS: An approach to embedded software security. ACM Trans. Embed. Comput. Syst. 4(1): 189-210 (2005) - [c22]Rahul Simha, Hidayet Ozgur Sanli:
A Joint Design Approach for Communication Schedule and Layout of Wireless Sensor Networks. ICWN 2005: 420-426 - [c21]Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno:
CODESSEAL: Compiler/FPGA Approach to Secure Applications. ISI 2005: 530-535 - [c20]Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno:
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. ISI 2005: 543-548 - 2004
- [c19]Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari:
Flexible Software Protection Using Hardware/Software Codesign Techniques. DATE 2004: 636-641 - [c18]Joseph Zambreno, Rahul Simha, Alok N. Choudhary:
Addressing application integrity attacks using a reconfigurable architecture. FPGA 2004: 250 - [c17]Neal Rosen, Rizwan Sattar, Robert W. Lindeman, Rahul Simha, Bhagirath Narahari:
HomeOS: Context-Aware Home Connectivity. International Conference on Wireless Networks 2004: 739-744 - 2003
- [j20]S. R. Subramanya, Abdou Youssef, Bhagirath Narahari, Rahul Simha:
Audio Data Indexing Using Discrete Cosine Transform. Int. J. Comput. Their Appl. 10(3): 198-210 (2003) - [j19]Xiuzhen Cheng, Bhagirath Narahari, Rahul Simha, Maggie Xiaoyan Cheng, Dan Liu:
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics. IEEE Trans. Mob. Comput. 2(3): 248-256 (2003) - [c16]Nitin Kumar Singh, Rahul Simha, Bhagirath Narahari:
Energy balance in wireless networks using connection segmentation and range control. WCNC 2003: 1871-1876 - 2002
- [j18]Guangzhi Li, Rahul Simha:
An efficient algorithm for reducing the number of Add-Drop Multiplexers in SONET/WDM rings. J. High Speed Networks 11(1): 67-77 (2002) - [c15]Nikhil Garg, Rahul Simha, Wenxun Xing:
Algorithms for budget-constrained survivable topology design. ICC 2002: 2162-2166 - 2001
- [j17]Rahul Simha, Weidong Cai, Valentin I. Spitkovsky:
Simulated N-Body: New Particle Physics-Based Heuristics for a Euclidean Location-Allocation Problem. J. Heuristics 7(1): 23-36 (2001) - [j16]Guangzhi Li, Rahul Simha:
On the wavelength assignment problem in multifiber WDM star and ring networks. IEEE/ACM Trans. Netw. 9(1): 60-68 (2001) - 2000
- [c14]S. R. Subramanya, Rahul Simha, Bhagirath Narahari:
Study of link congestion during I/O transfers in 2-D meshes using wormhole routing. CATA 2000: 186-189 - [c13]Guangzhi Li, Rahul Simha:
On the Wavelength Assignment Problem in Multifiber WDM Star and Ring Networks. INFOCOM 2000: 1771-1780
1990 – 1999
- 1999
- [j15]Guangzhi Li, Rahul Simha:
On bounds for the wavelength assignment problem on optical ring networks. J. High Speed Networks 8(4): 303-309 (1999) - [j14]Bhagirath Narahari, Sunil M. Shende, Rahul Simha, S. R. Subramanya:
Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks. J. Parallel Distributed Comput. 57(1): 1-13 (1999) - [c12]S. R. Subramanya, Abdou Youssef, Bhagirath Narahari, Rahul Simha:
Automated classification of audio data and retrieval based on audio classes. CATA 1999: 141-145 - [c11]S. R. Subramanya, Rahul Simha, Bhagirath Narahari:
I/O performance of X-Y routing in 2-D meshes under various node-to-disk assignments. CATA 1999: 302-304 - 1998
- [c10]Edward B. Suh, Bhagirath Narahari, Rahul Simha:
Dynamic load balancing schemes for computing accessible surface area of protein molecules. HiPC 1998: 326-333 - 1997
- [j13]Rahul Simha, Amitava Majumdar:
An urn model with applications to database performance evaluation. Comput. Oper. Res. 24(4): 289-300 (1997) - [c9]S. R. Subramanya, Rahul Simha, Bhagirath Narahari, Abdou Youssef:
Transform-Based Indexing of Audio Data for Multimedia Databases. ICMCS 1997: 211-218 - 1996
- [j12]Jaime Bae Kim, Rahul Simha, Tatsuya Suda:
Analysis of a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Processes: A Study of Traffic Burstiness and Priority Packet Discarding. Comput. Networks ISDN Syst. 28(5): 653-673 (1996) - [j11]David M. Nicol, Rahul Simha, Donald F. Towsley:
Static Assignment of Stochastic Tasks Using Majorization. IEEE Trans. Computers 45(6): 730-740 (1996) - [j10]Bhagirath Narahari, Sunil M. Shende, Rahul Simha:
Efficient algorithms for erasure node placement on slotted dual bus networks. IEEE/ACM Trans. Netw. 4(5): 779-784 (1996) - [c8]Rahul Simha, Bhagirath Narahari, Hyeong-Ah Choi, Li-Chuan Chen:
File allocation for a parallel Webserver. HiPC 1996: 16-21 - 1995
- [c7]Anna Brunström, Scott T. Leutenegger, Rahul Simha:
Experimental Evaluation of Dynamic Data Allocation Strategies in A Distributed Database with Changing Workloads. CIKM 1995: 395-402 - [c6]Philip Heidelberger, Rahul Simha:
Fast Simulation of a Voice-Data Multiplexer. INFOCOM 1995: 361-368 - 1994
- [j9]Rahul Simha, Yoram Ofek:
Reducing Global Address Recognition Delays in Local Area Networks with Spatial Bandwidth Reuse. Comput. Networks ISDN Syst. 26(11): 1375-1384 (1994) - [j8]Rahul Simha, Amitava Majumdar:
On Lookahead in the List Update Problem. Inf. Process. Lett. 50(2): 105-110 (1994) - [j7]Rahul Simha, James F. Kurose:
On-line minimization of call setup time via load balancing: a stochastic approximation approach. IEEE Trans. Commun. 42(234): 1141-1152 (1994) - [j6]Alok N. Choudhary, Bhagirath Narahari, David M. Nicol, Rahul Simha:
Optimal Processor Assignment for a Class of Pipelined Computations. IEEE Trans. Parallel Distributed Syst. 5(4): 439-445 (1994) - 1993
- [c5]David M. Nicol, Rahul Simha, Donald F. Towsley:
Load Balancing of Complex Stochastic Tasks Using Stochastic Majorization. INFOCOM 1993: 1306-1313 - 1992
- [j5]Rahul Simha, Bhagirath Narahari:
Single Path Routing with Delay Considerations. Comput. Networks ISDN Syst. 24(5): 405-419 (1992) - [j4]Walter A. Rosenkrantz, Rahul Simha:
Some theorems on conditional Pasta: A stochastic integral approach. Oper. Res. Lett. 11(3): 173-177 (1992) - [c4]Jaime Jungok Bae, Tatsuya Suda, Rahul Simha:
Analysis of Individual Packet Loss in a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Process: A Study of Traffic Burstiness and Priority Packet Discarding. INFOCOM 1992: 219-230 - 1991
- [j3]Rahul Simha, Yoram Ofek:
A Starvation-Free Access Protocol for a Full-Duplex Buffer Insertion Ring Local Area Network. Comput. Networks ISDN Syst. 21(2): 109-120 (1991) - [c3]Rahul Simha, James F. Kurose:
On-line Minimization of Call Setup Time via Load Balancing: A Stochastic Approximation Approach. INFOCOM 1991: 597-607
1980 – 1989
- 1989
- [j2]James F. Kurose, Rahul Simha:
A Microeconomic Approach to Optimal Resource Allocation in Distributed Computer Systems. IEEE Trans. Computers 38(5): 705-717 (1989) - [j1]Rahul Simha, James F. Kurose:
Relative reward strength algorithms for learning automata. IEEE Trans. Syst. Man Cybern. 19(2): 388-398 (1989) - 1987
- [c2]James F. Kurose, Rahul Simha:
Second Derivative Algorithms for Optimal Resource Allocation in Distributed Computer Systems. ICDCS 1987: 56-63 - 1986
- [c1]James F. Kurose, Rahul Simha:
A Microeconomic Approach to Optimal File Allocation. ICDCS 1986: 28-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint