default search action
Ram Swaminathan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j11]Sujoy Basu, Alan H. Karp, Jun Li, James Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, Ram Swaminathan:
Fusion: Managing Healthcare Records at Cloud Scale. Computer 45(11): 42-49 (2012) - [j10]Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp:
Managing Data Retention Policies at Scale. IEEE Trans. Netw. Serv. Manag. 9(4): 393-406 (2012) - 2011
- [j9]Xiaozhou Li, Atri Rudra, Ram Swaminathan:
Flexible coloring. Inf. Process. Lett. 111(11): 538-540 (2011) - [c22]Yin Wang, Ahmed Nazeem, Ram Swaminathan:
On the Optimal Petri Net Representation for Service Composition. ICWS 2011: 235-242 - [c21]Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp:
Managing data retention policies at scale. Integrated Network Management 2011: 57-64 - 2010
- [j8]Eric Anderson, Joseph Hall, Jason D. Hartline, M. Hobbes, Anna R. Karlin, Jared Saia, Ram Swaminathan, John Wilkes:
Algorithms for Data Migration. Algorithmica 57(2): 349-380 (2010) - [j7]Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan:
Password-authenticated key exchange based on RSA. Int. J. Inf. Sec. 9(6): 387-410 (2010) - [c20]Joshua Robinson, Mohit Singh, Ram Swaminathan, Edward W. Knightly:
Deploying Mesh Nodes under Non-Uniform Propagation. INFOCOM 2010: 2142-2150
2000 – 2009
- 2009
- [j6]Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly:
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Trans. Netw. 17(1): 26-39 (2009) - [c19]Marcos Kawazoe Aguilera, Ram Swaminathan:
Remote storage with byzantine servers. SPAA 2009: 280-289 - 2008
- [c18]Joshua Robinson, Mustafa Uysal, Ram Swaminathan, Edward W. Knightly:
Adding Capacity Points to a Wireless Mesh Network Using Local Search. INFOCOM 2008: 1247-1255 - [c17]Krishnamurthy Viswanathan, Ram Swaminathan:
Framework and algorithms for collaborative compression. ISIT 2008: 2317-2321 - [c16]Joshua Paul Robinson, Ram Swaminathan, Edward W. Knightly:
Assessment of urban-scale wireless networks with a small number of measurements. MobiCom 2008: 187-198 - [c15]Krishnamurthy Viswanathan, Ram Swaminathan:
Improved string reconstruction over insertion-deletion channels. SODA 2008: 399-408 - [i1]Mehul A. Shah, Ram Swaminathan, Mary Baker:
Privacy-Preserving Audit and Extraction of Digital Contents. IACR Cryptol. ePrint Arch. 2008: 186 (2008) - 2007
- [j5]Kamalika Chaudhuri, Anshul Kothari, Rudi Pendavingh, Ram Swaminathan, Robert Endre Tarjan, Yunhong Zhou:
Server Allocation Algorithms for Tiered Systems. Algorithmica 48(2): 129-146 (2007) - [c14]Jay J. Wylie, Ram Swaminathan:
Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently. DSN 2007: 206-215 - [c13]Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan:
Auditing to Keep Online Storage Services Honest. HotOS 2007 - [c12]Marcos Kawazoe Aguilera, Ram Swaminathan:
Remote storage with byzantine servers. PODC 2007: 312-313 - 2006
- [c11]Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Edward W. Knightly:
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection. INFOCOM 2006 - 2005
- [j4]Eric Anderson, Susan Spence, Ram Swaminathan, Mahesh Kallahalla, Qian Wang:
Quickly finding near-optimal storage designs. ACM Trans. Comput. Syst. 23(4): 337-374 (2005) - [c10]Kamalika Chaudhuri, Anshul Kothari, Rudi Pendavingh, Ram Swaminathan, Robert Endre Tarjan, Yunhong Zhou:
Server Allocation Algorithms for Tiered Systems. COCOON 2005: 632-643 - [c9]Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:
Deadline scheduling for animation rendering. SIGMETRICS 2005: 384-385 - [c8]Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:
Value-maximizing deadline scheduling and its application to animation rendering. SPAA 2005: 299-308 - 2004
- [j3]Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan, David E. Lowell, Mike Wray, Tom Christian, Nigel Edwards, Chris I. Dalton, Frederic Gittler:
SoftUDC: A Software-Based Data Center for Utility Computing. Computer 37(11): 38-46 (2004) - [j2]Nina Mishra, Dana Ron, Ram Swaminathan:
A New Conceptual Clustering Framework. Mach. Learn. 56(1-3): 115-151 (2004) - [c7]Eric Anderson, Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan:
Buttress: A Toolkit for Flexible and High Fidelity I/O Benchmarking. FAST 2004: 45-58 - 2003
- [c6]Nina Mishra, Dana Ron, Ram Swaminathan:
On Finding Large Conjunctive Clusters. COLT 2003: 448-462 - [c5]Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, Kevin Fu:
Plutus: Scalable Secure File Sharing on Untrusted Storage. FAST 2003 - 2002
- [c4]Erik Riedel, Mahesh Kallahalla, Ram Swaminathan:
A Framework for Evaluating Storage System Security. FAST 2002: 15-30 - [c3]Eric Anderson, Ram Swaminathan, Alistair C. Veitch, Guillermo A. Alvarez, John Wilkes:
Selecting RAID Levels for Disk Arrays. FAST 2002: 189-201 - 2001
- [c2]Eric J. Anderson, Joseph Hall, Jason D. Hartline, Michael Hobbs, Anna R. Karlin, Jared Saia, Ram Swaminathan, John Wilkes:
An Experimental Study of Data Migration Algorithms. WAE 2001: 145-158 - 2000
- [c1]Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan:
Password-Authenticated Key Exchange Based on RSA. ASIACRYPT 2000: 599-613
1990 – 1999
- 1996
- [j1]Ram Swaminathan:
Divide-and-conquer algorithms for graph-layout problems. Networks 28(2): 69-85 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint