Остановите войну!
for scientists:
default search action
R. K. Shyamasundar
- > Home > Persons > R. K. Shyamasundar
Publications
- 2023
- [e19]Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar:
Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings. Lecture Notes in Computer Science 14424, Springer 2023, ISBN 978-3-031-49098-9 [contents] - 2022
- [c137]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes. ICISS 2022: 84-102 - [c136]Sandip Ghosal, R. K. Shyamasundar:
Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling. ICISS 2022: 202-219 - [c135]Vishwas T. Patil, R. K. Shyamasundar:
Evolving Role of PKI in Facilitating Trust. PKIA 2022: 1-7 - [e18]Shiping Chen, Rudrapatna K. Shyamasundar, Liang-Jie Zhang:
Blockchain - ICBC 2022 - 5th International Conference, Held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings. Lecture Notes in Computer Science 13733, Springer 2022, ISBN 978-3-031-23494-1 [contents] - [e17]Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar:
Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings. Lecture Notes in Computer Science 13784, Springer 2022, ISBN 978-3-031-23689-1 [contents] - 2021
- [j53]Ying Li, R. K. Shyamasundar, Xinheng Wang:
Special issue on computational intelligence for social media data mining and knowledge discovery. Comput. Intell. 37(2): 658-659 (2021) - [j52]Anshu S. Anand, Karthik Sayani, R. K. Shyamasundar:
Fortress Abstractions in X10 Framework. Int. J. Parallel Program. 49(6): 911-933 (2021) - [j50]Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin:
Guest editorial special issue on "P2P computing for deep learning". Peer-to-Peer Netw. Appl. 14(3): 1734-1735 (2021) - [c134]B. S. Radhika, R. K. Shyamasundar:
Realizing Information Flow Control in ABAC Mining. CSS 2021: 107-119 - [c133]Vishwas Patil, R. K. Shyamasundar:
Landcoin: A Practical Protocol for Transfer-of-Asset. ICISS 2021: 124-141 - [c132]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. ICSE (NIER) 2021: 31-35 - [c131]Amit Goyal, R. K. Shyamasundar, G. Sivakumar, Raoul Jetley, Srini Ramaswamy:
Empirical Analysis of Greedy, GE and GRE Heuristics. ISEC 2021: 6:1-6:11 - [c130]Amit Goyal, Akshat Garg, Digvijaysingh Gour, R. K. Shyamasundar, G. Sivakumar:
Information Flow Secure CAmkES. IoTBDS 2021: 237-244 - [c129]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen:
SP*: An Information Flow Secure Linux. ISPA/BDCloud/SocialCom/SustainCom 2021: 1603-1612 - [c128]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil:
App2SecApp: privacy protection from Android applications. SAC 2021: 908-911 - [c127]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Towards Unifying RBAC with Information Flow Control. SACMAT 2021: 45-54 - [c126]Parjanya Vyas, R. K. Shyamasundar:
SecSDN: A Novel Architecture for a Secure SDN. SECRYPT 2021: 587-594 - [e16]Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan:
Information Systems Security - 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings. Lecture Notes in Computer Science 13146, Springer 2021, ISBN 978-3-030-92570-3 [contents] - [i6]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. CoRR abs/2103.02171 (2021) - [i5]Sandip Ghosal, R. K. Shyamasundar:
Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs/2103.06039 (2021) - 2020
- [j49]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. Comput. Secur. 94: 101816 (2020) - [c125]Sandip Ghosal, R. K. Shyamasundar:
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. APSEC 2020: 51-60 - [c124]Sandip Ghosal, R. K. Shyamasundar:
Information Flow Security Certification for SPARK Programs. DBSec 2020: 137-150 - 2019
- [j48]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
STMs in practice: Partial rollback vs pure abort mechanisms. Concurr. Comput. Pract. Exp. 31(5) (2019) - [j47]Anshu S. Anand, Akash Srivastava, R. K. Shyamasundar:
A deadlock-free lock-based synchronization for GPUs. Concurr. Comput. Pract. Exp. 31(7) (2019) - [c123]Vishwas T. Patil, R. K. Shyamasundar:
Is Privacy a Myth for Facebook Users? ICETE (2) 2019: 510-516 - [c122]Amit Goyal, R. K. Shyamasundar, Raoul Jetley, Devina Mohan, Srini Ramaswamy:
Test Suite Minimization of Evolving Software Systems: A Case Study. ICSOFT 2019: 226-237 - [e15]Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - 2018
- [c119]Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar:
Role of Apps in Undoing of Privacy Policies on Facebook. DBSec 2018: 85-98 - [c118]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. DBSec 2018: 219-231 - [c117]Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:
Security Analysis of EMV Protocol and Approaches for Strengthening It. ICDCIT 2018: 69-85 - [c116]Shashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. ICDCIT 2018: 86-104 - [c115]Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:
Static Security Certification of Programs via Dynamic Labelling. ICETE (2) 2018: 400-411 - [c114]Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar:
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. ICISS 2018: 24-43 - [c113]Vishwas T. Patil, R. K. Shyamasundar:
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. ICISS 2018: 364-385 - [c112]Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar:
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. ICISS 2018: 427-447 - [c111]N. V. Narendra Kumar, R. K. Shyamasundar:
A Semantic Notion of Secure Information-Flow. ISEA-ISAP 2018: 35-52 - [c110]Sandip Ghosal, R. K. Shyamasundar:
A Solution to "Confused Deputy" Problem Using RWFM Labels. ISEA-ISAP 2018: 67-76 - [c109]Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. TrustCom/BigDataSE 2018: 790-799 - [e14]Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9 [contents] - [i4]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal:
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management. CoRR abs/1806.07530 (2018) - [i3]Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal:
Crowdsensing and privacy in smart city applications. CoRR abs/1806.07534 (2018) - 2017
- [c108]Vishwas T. Patil, R. K. Shyamasundar:
Undoing of Privacy Policies on Facebook. DBSec 2017: 239-255 - [c107]N. V. Narendra Kumar, R. K. Shyamasundar:
Analyzing Protocol Security Through Information-Flow Control. ICDCIT 2017: 159-171 - [c106]N. V. Narendra Kumar, R. K. Shyamasundar:
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. ICDCIT 2017: 183-195 - [c105]Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:
Semi Supervised NLP Based Classification of Malware Documents. ICISS 2017: 334-344 - [c104]R. K. Shyamasundar, N. V. Narendra Kumar, Priyanka Teltumde:
Realizing software vault on Android through information-flow control. ISCC 2017: 1007-1014 - [c103]Vishwas T. Patil, R. K. Shyamasundar:
Privacy as a Currency: Un-regulated?. SECRYPT 2017: 586-595 - [c102]N. V. Narendra Kumar, R. K. Shyamasundar:
A Complete Generative Label Model for Lattice-Based Access Control Models. SEFM 2017: 35-53 - [e13]Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0 [contents] - 2016
- [c101]Abhiroop Bhatnagar, Amit Kumar, Ratan K. Ghosh, Rudrapatna K. Shyamasundar:
A framework of community inspired distributed message dissemination and emergency alert response system over smart phones. COMSNETS 2016: 1-8 - [c100]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c99]N. V. Narendra Kumar, R. K. Shyamasundar:
An End-to-End Privacy Preserving Design of a Map-Reduce Framework. HPCC/SmartCity/DSS 2016: 1469-1476 - [c98]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity proof for CaPR+ algorithm. ICDCN 2016: 16:1-16:4 - 2015
- [c97]N. V. Narendra Kumar, R. K. Shyamasundar:
POSTER: Dynamic Labelling for Analyzing Security Protocols. CCS 2015: 1665-1667 - [c96]Anshu S. Anand, R. K. Shyamasundar:
Scaling Computation on GPUs Using Powerlists. HiPC Workshops 2015: 34-43 - [c95]S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ICISS 2015: 551-561 - [c94]Christophe Cérin, R. K. Shyamasundar, Yuqing Gao, Congfeng Jiang:
HPDIC Introduction and Committees. IPDPS Workshops 2015: 536 - [c93]N. V. Narendra Kumar, R. K. Shyamasundar:
Labelled mobile ambients model for information flow security in distributed systems. SIN 2015: 330-337 - [i2]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity Proof for CaPR+ Algorithm. CoRR abs/1510.06967 (2015) - 2014
- [j46]Shashank Shekhar, Ranjeet Mishra, R. K. Ghosh, R. K. Shyamasundar:
Post-order based routing & transport protocol for wireless sensor networks. Pervasive Mob. Comput. 11: 229-243 (2014) - [c92]N. V. Narendra Kumar, R. K. Shyamasundar:
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels. BDCloud 2014: 753-760 - [e12]Atul Prakash, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4 [contents] - 2013
- [c90]Ankur Narang, Abhinav Srivastava, R. K. Shyamasundar:
High Performance Adaptive Distributed Scheduling Algorithm. IPDPS Workshops 2013: 1725-1734 - [e11]R. K. Shyamasundar, Lokendra Shastri, D. Janakiram, Srinivas Padmanabhuni:
Proceedings of the 6th ACM India Computing Convention, COMPUTE 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013. ACM 2013, ISBN 978-1-4503-2545-5 [contents] - [e10]Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha:
Distributed Computing and Networking, 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings. Lecture Notes in Computer Science 7730, Springer 2013, ISBN 978-3-642-35667-4 [contents] - 2012
- [c88]Supriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. CUBE 2012: 635-640 - [c87]Ankur Narang, Abhinav Srivastava, Ramnik Jain, R. K. Shyamasundar:
Dynamic Distributed Scheduling Algorithm for State Space Search. Euro-Par 2012: 141-154 - [c86]Shashank Shekhar, R. K. Ghosh, R. K. Shyamasundar:
Postorder Based Routing and Transport Protocol for WSNs. ICDCN 2012: 281-294 - [c85]Saurabh Joshi, R. K. Shyamasundar, Sanjeev K. Aggarwal:
A New Method of MHP Analysis for Languages with Dynamic Barriers. IPDPS Workshops 2012: 519-528 - [e9]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 5th ACM COMPUTE Conference: Intelligent & scalable system technologies, Pune, India, January 23-24, 2012. ACM 2012, ISBN 978-1-4503-1440-4 [contents] - 2011
- [j45]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Performance driven multi-objective distributed scheduling for parallel computations. ACM SIGOPS Oper. Syst. Rev. 45(2): 14-27 (2011) - [j44]Ankur Narang, Rudrapatna K. Shyamasundar:
Performance driven distributed scheduling of parallel hybrid computations. Theor. Comput. Sci. 412(32): 4212-4225 (2011) - [c84]Nihita Goel, R. K. Shyamasundar:
An Executional Framework for BPMN Using Orc. APSCC 2011: 29-36 - [c83]Nihita Goel, N. V. Narendra Kumar, R. K. Shyamasundar:
SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services. ECOWS 2011: 109-116 - [c82]Shivali Agarwal, Saurabh Joshi, Rudrapatna K. Shyamasundar:
Distributed Generalized Dynamic Barrier Synchronization. ICDCN 2011: 143-154 - [c81]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Affinity Driven Distributed Scheduling Algorithm for Parallel Computations. ICDCN 2011: 167-178 - [p2]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Towards Checking Tampering of Software. Cyber Security, Cyber Crime and Cyber Forensics 2011: 204-219 - [e8]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, Bangalore, India, March 25-26, 2011. ACM 2011, ISBN 978-1-4503-0750-5 [contents] - 2010
- [c80]Nihita Goel, R. K. Shyamasundar:
Automatic Monitoring of SLAs of Web Services. APSCC 2010: 99-106 - [c79]Shivali Agarwal, R. K. Shyamasundar:
A Proof System for a PGAS Language. Concurrency, Compositionality, and Correctness 2010: 162-184 - [c78]R. K. Shyamasundar, Harshit J. Shah, N. V. Narendra Kumar:
Malware: From Modelling to Practical Detection. ICDCIT 2010: 21-39 - [c77]Hrushikesha Mohanty, Rajesh Kurra, R. K. Shyamasundar:
A Framework for Web-Based Negotiation. ICDCIT 2010: 140-151 - [c76]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Can we certify systems for freedom from malware. ICSE (2) 2010: 175-178 - 2009
- [j43]A. K. Bhattacharjee, R. K. Shyamasundar:
Activity Diagrams : A Formal Framework to Model Business Processes and Code Generation. J. Object Technol. 8(1): 189-220 (2009) - [c75]Hrushikesha Mohanty, Martha VenkataSwamy, Srini Ramaswamy, R. K. Shyamasundar:
Translating Security Policy to Executable Code for Sandboxing Linux Kernel. EMS 2009: 124-129 - [c74]Harshit J. Shah, R. K. Shyamasundar, Pradeep Varma:
Concurrent SSA for general barrier-synchronized parallel programs. IPDPS 2009: 1-12 - [c73]Shivali Agarwal, Ankur Narang, R. K. Shyamasundar:
Distributed Scheduling of Parallel Hybrid Computations. ISAAC 2009: 1144-1154 - [c72]R. K. Shyamasundar, Shivali Agarwal:
Brief announcement: distributed phase synchronization of dynamic set of processes. PODC 2009: 274-275 - [c71]Pradeep Varma, R. K. Shyamasundar, Harshit J. Shah:
Backward-compatible constant-time exception-protected memory. ESEC/SIGSOFT FSE 2009: 71-80 - 2008
- [c70]Shivali Agarwal, Rajkishore Barik, V. Krishna Nandivada, R. K. Shyamasundar, Pradeep Varma:
Static Detection of Place Locality and Elimination of Runtime Checks. APLAS 2008: 53-74 - [c69]A. K. Bhattacharjee, R. K. Shyamasundar:
ScriptOrc: A Specification Language for Web Service Choreography. APSCC 2008: 1089-1096 - [c68]Shivali Agarwal, Rajkishore Barik, R. K. Shyamasundar:
A Static Characterization of Affinity in a Distributed Program. HPCC 2008: 572-579 - [c67]A. K. Bhattacharjee, R. K. Shyamasundar:
Choreography = Orchestration with Scripts + Conversations. ICWS 2008: 824-827 - 2007
- [c66]Hrushikesha Mohanty, Jitesh Mulchandani, Deepak Chenthati, R. K. Shyamasundar:
Modeling Web Services with FSM Modules. Asia International Conference on Modelling and Simulation 2007: 100-105 - [c65]Harshit J. Shah, R. K. Shyamasundar:
On Run-Time Enforcement of Policies. ASIAN 2007: 268-281 - [c62]Frederic Doucet, R. K. Shyamasundar, Ingolf H. Krüger, Saurabh Joshi, Rajesh K. Gupta:
Reactivity in SystemC Transaction-Level Models. Haifa Verification Conference 2007: 34-50 - [c61]Hrushikesha Mohanty, Kakarlamudi Prasad, R. K. Shyamasundar:
Trust Assessment in Web Services: an Extension to jUDDI. ICEBE 2007: 759-762 - [c60]Shivali Agarwal, Rajkishore Barik, Vivek Sarkar, R. K. Shyamasundar:
May-happen-in-parallel analysis of X10 programs. PPoPP 2007: 183-193 - [c59]Shivali Agarwal, Rajkishore Barik, Dan Bonachea, Vivek Sarkar, R. K. Shyamasundar, Katherine A. Yelick:
Deadlock-free scheduling of X10 computations with bounded resources. SPAA 2007: 229-240 - 2006
- [j37]Susmit Jha, R. K. Shyamasundar:
Adapting Biochemical Kripke Structures for Distributed Model Checking. Trans. Comp. Sys. Biology 7: 107-122 (2006) - [c58]N. V. Narendra Kumar, R. K. Shyamasundar:
Specification and Realization of Access Control in SPKI/SDSI. ICISS 2006: 177-193 - [c57]Frederic Doucet, Ingolf Krüger, Rajesh K. Gupta, R. K. Shyamasundar:
Compositional interaction specifications for SystemC. MEMOCODE 2006: 201 - 2005
- [j36]Vishwas Patil, R. K. Shyamasundar:
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. Inf. Syst. Frontiers 7(4-5): 371-389 (2005) - [c56]A. K. Bhattacharjee, R. K. Shyamasundar:
Validated Code Generation for Activity Diagrams. ICDCIT 2005: 508-521 - 2004
- [c54]Rajesh Gupta, R. K. Shyamasundar:
Reactive Framework for Resource Aware Distributed Computing. ASIAN 2004: 452-467 - [c53]Vishwas Patil, R. K. Shyamasundar:
An Efficient, Secure and Delegable Micro-Payment System. EEE 2004: 394-404 - [c52]Vishwas Patil, R. K. Shyamasundar:
Towards a Flexible Access Control Mechanism for E-Transactions. EGCDMAS 2004: 66-81 - [c51]Amit Jain, R. K. Shyamasundar:
Failure Detection and Membership Management in Grid Environments. GRID 2004: 44-52 - 2003
- [c45]Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyamasundar:
MOBICHARTS: A Notation to Specify Mobile Computing Applications. HICSS 2003: 298 - 2002
- [c42]R. K. Shyamasundar, Basant Rajan, Manish Prasad, Amit Jain:
LLM: A Low Latency Messaging Infrastructure for Linux Clusters. HiPC 2002: 112-123 - 2001
- [j33]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems. Reliab. Eng. Syst. Saf. 71(3): 299-310 (2001) - [j32]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems: [Reliability Engineering and System Safety, 71(3), 2001, 299-310]. Reliab. Eng. Syst. Saf. 72(2): 223 (2001) - 2000
- [j31]R. K. Shyamasundar, S. Ramesh:
Languages for Reactive Specifications: Synchrony Vs Asynchrony. Int. J. Found. Comput. Sci. 11(2): 283-314 (2000) - [c37]Basant Rajan, R. K. Shyamasundar:
Modeling Distributed Embedded Systems in Multiclock ESTEREL. FORTE 2000: 301-316 - [c36]A. K. Bhattacharjee, Gopa Sen, S. D. Dhodapkar, Kundapur Karunakar, Basant Rajan, R. K. Shyamasundar:
A System for Object Code Validation. FTRTFT 2000: 152-169 - [c35]Basant Rajan, R. K. Shyamasundar:
Multiclock Esterel: A Reactive Framework for Asynchronous Design. IPDPS 2000: 201-210 - [c34]Basant Rajan, R. K. Shyamasundar:
Modeling VHDL in Multiclock ESTEREL. VLSI Design 2000: 76-83 - 1999
- [c33]Sanjit A. Seshia, R. K. Shyamasundar, A. K. Bhattacharjee, S. D. Dhodapkar:
A Translation of Statecharts to Esterel. World Congress on Formal Methods 1999: 983-1007 - [c32]A. K. Bhattacharjee, S. D. Dhodapkar, Sanjit A. Seshia, R. K. Shyamasundar:
A Graphical Environment for the Specification and Verification of Reactive Systems. SAFECOMP 1999: 431-444 - 1998
- [j29]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Transformational Methodology for Proving Termination of Logic Programs. J. Log. Program. 34(1): 1-41 (1998) - 1997
- [j27]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Proving Termination of GHC Programs. New Gener. Comput. 15(3): 293-338 (1997) - [c29]Deepak Kapur, R. K. Shyamasundar:
Synthesizing Controllers for Hybrid Systems. HART 1997: 361-375 - 1996
- [j25]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Mapping Linear Recurrence Equations onto Systolic Architectures. Int. J. High Speed Comput. 8(3): 229-270 (1996) - [c28]Rupak Majumdar, R. K. Shyamasundar:
Design of Controllers for Linear Hybrid Systems. ASIAN 1996: 309-320 - [c26]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Mapping Linear Recurrences onto Systolic Arrays. IPPS 1996: 891-897 - 1995
- [c23]M. R. K. Krishna Rao, R. K. Shyamasundar:
Unification-Free Execution of Well-Moded and Well-Typed Prolog Programs. SAS 1995: 243-260 - 1994
- [c22]R. K. Shyamasundar, S. Ramesh:
Languages for Reactive Specifications: Synchrony Vs Asynchrony. FTRTFT 1994: 621-640 - [c21]R. K. Shyamasundar, S. Ramesh:
Semantics and Verification of Hierarchical CRP Programs. Hybrid Systems 1994: 436-461 - [c20]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Derivation of Systolic Programs. ICPP (3) 1994: 69-73 - 1993
- [j21]R. K. Shyamasundar, K. T. Narayana, Toniann Pitassi:
Semantics of Nondeterministic Asynchronous Broadcast Networks. Inf. Comput. 104(2): 215-252 (1993) - [c17]M. R. K. Krishna Rao, Paritosh K. Pandya, R. K. Shyamasundar:
Verification Tools in the Development of Provably Correct Compilers. FME 1993: 442-461 - [c16]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Proving Termination of GHC Programs. ICLP 1993: 720-736 - [c14]Gérard Berry, S. Ramesh, R. K. Shyamasundar:
Communicating Reactive Processes. POPL 1993: 85-98 - 1992
- [c13]R. K. Shyamasundar, M. R. K. Krishna Rao, Deepak Kapur:
Rewriting Concepts in the Study of Termination of Logic Programs. ALPUK 1992: 3-20 - 1991
- [c11]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
A Transformational Methodology for Proving Termination of Logic Programs. CSL 1991: 213-226 - 1990
- [j19]Kamal Lodaya, R. K. Shyamasundar:
Proof Theory for Exception Handling in a Tasking Environment. Acta Informatica 28(1): 7-41 (1990) - 1989
- [c6]Rudrapatna K. Shyamasundar, Jozef Hooman, Rob Gerth:
Reasoning of real-time distributed programming languages. IWSSD 1989: 91-99 - 1988
- [j15]Ron Koymans, R. K. Shyamasundar, Willem P. de Roever, Rob Gerth, S. Arun-Kumar:
Compositional Semantics for Real-Time Distributed Computing. Inf. Comput. 79(3): 210-256 (1988) - 1987
- [c4]R. K. Shyamasundar, K. T. Narayana, Toniann Pitassi:
Semantics for Nondeterministic Asynchronous Broadcast Networks. ICALP 1987: 72-83 - 1985
- [c3]Ron Koymans, R. K. Shyamasundar, Willem P. de Roever, Rob Gerth, S. Arun-Kumar:
Compositional Semantics for Real-time Distributed Computing. Logic of Programs 1985: 167-189 - 1984
- [c2]Ramaswamy Ramanujam, R. K. Shyamasundar:
Process Specification of Logic Programs. FSTTCS 1984: 31-43 - [e1]Mathai Joseph, R. K. Shyamasundar:
Foundations of Software Technology and Theoretical Computer Science, Fourth Conference, Bangalore, India, December 13-15, 1984, Proceedings. Lecture Notes in Computer Science 181, Springer 1984, ISBN 3-540-13883-8 [contents]
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint