A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation JS Chadha, N Garg, A Kumar, VN Muralidhara Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 72 | 2009 |
Minimizing total flow-time: The unrelated case N Garg, A Kumar, VN Muralidhara Algorithms and Computation: 19th International Symposium, ISAAC 2008, Gold …, 2008 | 18 | 2008 |
Efficient format preserving encrypted databases P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Electronics, Computing and …, 2015 | 13 | 2015 |
The covert set-cover problem with application to Network Discovery S Sen, VN Muralidhara WALCOM: Algorithms and Computation: 4th International Workshop, WALCOM 2010 …, 2010 | 11 | 2010 |
Towards privacy preserving threat intelligence S Dara, ST Zargar, VN Muralidhara Journal of information security and applications 38, 28-39, 2018 | 10 | 2018 |
Online travelling salesman problem on a circle VA Jawgal, VN Muralidhara, PS Srinivasan Theory and Applications of Models of Computation: 15th Annual Conference …, 2019 | 8 | 2019 |
Privacy preserving architectures for collaborative intrusion detection S Dara, VN Muralidhara arXiv preprint arXiv:1602.02452, 2016 | 5 | 2016 |
Pruning a random forest by learning a learning algorithm K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara Machine Learning and Data Mining in Pattern Recognition: 12th International …, 2016 | 5 | 2016 |
Premonition of storage response class using skyline ranked ensemble method K Dheenadayalan, VN Muralidhara, P Datla, G Srinivasaraghavan, ... 2014 21st International Conference on High Performance Computing (HiPC), 1-10, 2014 | 5 | 2014 |
Improvements on the Johnson bound for Reed–Solomon codes VN Muralidhara, S Sen Discrete Applied Mathematics 157 (4), 812-818, 2009 | 5 | 2009 |
A result on the distribution of quadratic residues with applications to elliptic curve cryptography M VN, S Sen Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007 | 4 | 2007 |
Self-tuning filers—overload prediction and preventive tuning using pruned random forest K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara Advances in Knowledge Discovery and Data Mining: 21st Pacific-Asia …, 2017 | 2 | 2017 |
Filer response time prediction using adaptively-learned forecasting models based on counter time series data S Deshpande, K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara 2016 15th IEEE International Conference on Machine Learning and Applications …, 2016 | 2 | 2016 |
Feasibility Study of Port Scan Detection on Encrypted Data P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Experimental evaluation of network telemetry anonymization for cloud based security analysis S Dara, BP Gopularam, VN Muralidhara, N Nalini 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Efficient format preserving encrypted databases C Prakruti, S Dara, VN Muralidhara Cryptology ePrint Archive, 2015 | 2 | 2015 |
Common substring in multiple sequences using hash based technique K Dheenadayalan, VN Muralidhara, J Katru 2013 International Conference on Technology, Informatics, Management …, 2013 | 2 | 2013 |
PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks K Murugesan, KK Thangadorai, VN Muralidhara 2021 8th International Conference on Future Internet of Things and Cloud …, 2021 | 1 | 2021 |
Storage load control through meta-scheduler using predictive analytics K Dheenadayalan, VN Muralidhara, G Srinivasaraghavan Distributed Computing and Internet Technology: 12th International Conference …, 2016 | 1 | 2016 |
Dynamic Control of Storage Bandwidth Using Double Deep Recurrent Q-Network K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018 | | 2018 |