A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation JS Chadha, N Garg, A Kumar, VN Muralidhara Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 77 | 2009 |
Minimizing total flow-time: The unrelated case N Garg, A Kumar, VN Muralidhara International Symposium on Algorithms and Computation, 424-435, 2008 | 18 | 2008 |
Towards privacy preserving threat intelligence S Dara, ST Zargar, VN Muralidhara Journal of information security and applications 38, 28-39, 2018 | 14 | 2018 |
The covert set-cover problem with application to network discovery S Sen, VN Muralidhara International Workshop on Algorithms and Computation, 228-239, 2010 | 14 | 2010 |
Efficient format preserving encrypted databases P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Electronics, Computing and …, 2015 | 13 | 2015 |
Online travelling salesman problem on a circle VA Jawgal, VN Muralidhara, PS Srinivasan International Conference on Theory and Applications of Models of Computation …, 2019 | 11 | 2019 |
Pruning a random forest by learning a learning algorithm K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara Machine Learning and Data Mining in Pattern Recognition: 12th International …, 2016 | 6 | 2016 |
PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks K Murugesan, KK Thangadorai, VN Muralidhara 2021 8th International Conference on Future Internet of Things and Cloud …, 2021 | 5 | 2021 |
Privacy preserving architectures for collaborative intrusion detection S Dara, VN Muralidhara arXiv preprint arXiv:1602.02452, 2016 | 5 | 2016 |
Premonition of storage response class using skyline ranked ensemble method K Dheenadayalan, VN Muralidhara, P Datla, G Srinivasaraghavan, ... 2014 21st International Conference on High Performance Computing (HiPC), 1-10, 2014 | 5 | 2014 |
A result on the distribution of quadratic residues with applications to elliptic curve cryptography M VN, S Sen International Conference on Cryptology in India, 48-57, 2007 | 5 | 2007 |
Improvements on the Johnson bound for Reed–Solomon codes VN Muralidhara, S Sen Discrete Applied Mathematics 157 (4), 812-818, 2009 | 4 | 2009 |
Self-tuning filers—overload prediction and preventive tuning using pruned random forest K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara Advances in Knowledge Discovery and Data Mining: 21st Pacific-Asia …, 2017 | 2 | 2017 |
Filer response time prediction using adaptively-learned forecasting models based on counter time series data S Deshpande, K Dheenadayalan, G Srinivasaraghavan, VN Muralidhara 2016 15th IEEE International Conference on Machine Learning and Applications …, 2016 | 2 | 2016 |
Storage load control through meta-scheduler using predictive analytics K Dheenadayalan, VN Muralidhara, G Srinivasaraghavan Distributed Computing and Internet Technology: 12th International Conference …, 2016 | 2 | 2016 |
Feasibility Study of Port Scan Detection on Encrypted Data P Chandrashekar, S Dara, VN Muralidhara 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Experimental evaluation of network telemetry anonymization for cloud based security analysis S Dara, BP Gopularam, VN Muralidhara, N Nalini 2015 IEEE International Conference on Cloud Computing in Emerging Markets …, 2015 | 2 | 2015 |
Efficient format preserving encrypted databases C Prakruti, S Dara, VN Muralidhara Cryptology ePrint Archive, 2015 | 2 | 2015 |
Common substring in multiple sequences using hash based technique K Dheenadayalan, VN Muralidhara, J Katru 2013 International Conference on Technology, Informatics, Management …, 2013 | 2 | 2013 |
Closed WiFi Hotspot-Truly Hidden Network K Murugesan, S Sriram, K Kumar, VN Muralidhara 2023 IEEE International Conference on Consumer Electronics (ICCE), 01-06, 2023 | 1 | 2023 |