Follow
Ashwin Kumar Kayyoor
Ashwin Kumar Kayyoor
Senior Distributed Systems Engineer, Netflix
Verified email at netflix.com - Homepage
Title
Cited by
Cited by
Year
SWORD: scalable workload-aware data placement for transactional workloads
A Quamar, KA Kumar, A Deshpande
Proceedings of the 16th international conference on extending database …, 2013
1562013
Hybrid approach using case-based reasoning and rule-based reasoning for domain independent clinical decision support in ICU
KA Kumar, Y Singh, S Sanyal
Expert Systems with Applications 36 (1), 65-71, 2009
1322009
SWORD: workload-aware data placement and replica selection for cloud data management systems
KA Kumar, A Quamar, A Deshpande, S Khuller
The VLDB Journal 23 (6), 845-870, 2014
1002014
Data Placement and Replica Selection for Improving Co-location in Distributed Environments
AK Kayyoor, A Deshpande, S Khuller
Technical Report, 2011
55*2011
Sensor metadata management and its application in collaborative environmental research
N Dawes, KA Kumar, S Michel, K Aberer, M Lehning
2008 IEEE Fourth International Conference on eScience, 143-150, 2008
512008
Environmental Monitoring 2.0
S Michel, A Salehi, L Luo, N Dawes, K Aberer, G Barrenetxea, M Bavay, ...
2009 IEEE 25th International Conference on Data Engineering, 1507-1510, 2009
382009
Multi-level reputation-based greylisting
AGK Janecek, WN Gansterer, KA Kumar
2008 Third International Conference on Availability, Reliability and …, 2008
342008
Hone: " Scaling down" Hadoop on shared-memory systems
KA Kumar, J Gluck, A Deshpande, J Lin
Proceedings of the VLDB Endowment 6 (12), 1354-1357, 2013
292013
Utility-Driven Graph Summarization
KA Kumar, P Efstathopoulos
Proceedings of the VLDB Endowment 12 (4), 335-347, 2019
202019
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
192017
Optimization Techniques for “Scaling Down” Hadoop on Multi-Core, Shared-Memory Systems
KA Kumar, J Gluck, A Deshpande, J Lin
EDBT: 17th International Conference on Extending Database Technology, 2014
132014
Hybrid approach for parallelization of sequential code with function level and block level parallelization
KA Kumar, AK Pappu, KS Kumar, S Sanyal
International Symposium on Parallel Computing in Electrical Engineering …, 2006
82006
Preventing a malicious computer application from executing in a computing environment
AK Kayyoor, P Efstathopoulos
US Patent 10,311,231, 2019
62019
Prioritizing backup operations using heuristic techniques
V Janakiraman, AK Kayyoor
US Patent 10,606,705, 2020
52020
Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection
AK Kayyoor, SK Nanda, P Efstathopoulos
US Patent 9,692,768, 2017
42017
Insider threat detection under user-resource bi-partite graphs
S Shintre, S Bhatkar, AK Kayyoor
US Patent 10,686,816, 2020
32020
Systems and methods for detecting anomalous behavior in shared data repositories
A Kayyoor, S Bhatkar, S Shintre
US Patent 10,425,435, 2019
32019
Emerging Cost Effective Big Data Architectures
K Ashwin Kumar
Handbook of Big Data Technologies, 755-776, 2017
32017
Automatically detecting insider threats using user collaboration patterns
S Bhatkar, S Shintre, A Kayyoor
US Patent 10,341,373, 2019
22019
Environmental Monitoring 2.0 (Demonstration)
S Michel, A Salehi, L Luo, N Dawes, K Aberer, G Barrenetxea, M Bavay, ...
Proceedings of the 25th International Conference on Data Engineering (ICDE …, 0
2
The system can't perform the operation now. Try again later.
Articles 1–20