Ravishankar K. Iyer
#74,583
Most Influential Person Now
Indian academic
Ravishankar K. Iyer's AcademicInfluence.com Rankings
Ravishankar K. Iyercomputer-science Degrees
Computer Science
#3127
World Rank
#3278
Historical Rank
Cloud Computing
#14
World Rank
#14
Historical Rank
Database
#2280
World Rank
#2395
Historical Rank
Ravishankar K. Iyerengineering Degrees
Engineering
#2591
World Rank
#3542
Historical Rank
Systems Engineering
#41
World Rank
#44
Historical Rank
Electrical Engineering
#637
World Rank
#699
Historical Rank
Download Badge
Computer Science Engineering
Why Is Ravishankar K. Iyer Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ravishankar K. Iyer is the George and Ann Fisher Distinguished Professor of Engineering at the University of Illinois at Urbana-Champaign. He is a specialist in reliable and secure networks and systems.
Ravishankar K. Iyer's Published Works
Published Works
- Big Data: Astronomical or Genomical? (2015) (1079)
- Fault Injection Techniques and Tools (1997) (909)
- Experimental evaluation (1995) (622)
- Transparent runtime randomization for security (2003) (278)
- Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data (2015) (252)
- FINE: A Fault Injection and Monitoring Environment for Tracing the UNIX System Behavior under Faults (1993) (224)
- Characterization of linux kernel behavior under errors (2003) (221)
- Chameleon: a software infrastructure for adaptive fault tolerance (1998) (209)
- Defeating memory corruption attacks via pointer taintedness detection (2005) (192)
- Measurement and modeling of computer reliability as affected by system activity (1986) (191)
- Accurate Low-Cost Methods for Performance Evaluation of Cache Memory Systems (1988) (189)
- Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters (2014) (175)
- DEPEND: A Simulation-Based Environment for System Level Dependability Analysis (1997) (175)
- An experimental study of soft errors in microprocessors (2005) (175)
- Software Dependability in the Tandem GUARDIAN System (1995) (161)
- Failure data analysis of a LAN of Windows NT based computers (1999) (157)
- Networked Windows NT system field failure data analysis (1999) (153)
- A Measurement-Based Model for Workload Dependence of CPU Errors (1986) (149)
- Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges (2015) (143)
- Predictability of Process Resource Usage: A Measurement-Based Study on UNIX (1989) (138)
- A Gate-Level Simulation Environment for Alpha-Particle-Induced Transient Faults (1996) (138)
- Experimental analysis of computer system dependability (1996) (136)
- An approach towards benchmarking of fault-tolerant commercial systems (1996) (129)
- Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control (2017) (125)
- Faults, symptoms, and software fault tolerance in the Tandem GUARDIAN90 operating system (1993) (123)
- Architecture Support for Defending Against Buffer Overflow Attacks (2002) (122)
- FOCUS: An Experimental Environment for Fault Sensitivity Analysis (1992) (112)
- Analysis of Safety-Critical Computer Failures in Medical Devices (2013) (108)
- Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol (2013) (100)
- Prediction-Based Dynamic Load-Sharing Heuristics (1993) (98)
- Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU (2011) (97)
- Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids (2018) (96)
- Effect of System Workload on Operating System Reliability: A Study on IBM 3081 (1985) (94)
- Measuring Fault Tolerance with the FTAPE Fault Injection Tool (1995) (91)
- Analysis and Modeling of Correlated Failures in Multicomputer Systems (1992) (89)
- SymPLFIED: Symbolic program-level fault injection and error detection framework (2008) (87)
- Performability Modeling Based on Real Data: A Case Study (1988) (87)
- Recent advances and new avenues in hardware-level reliability support (2005) (85)
- Hardware-Related Software Errors: Measurement and Analysis (1985) (85)
- An architectural framework for providing reliability and security support (2004) (82)
- FIRM: An Intelligent Fine-Grained Resource Management Framework for SLO-Oriented Microservices (2020) (81)
- Dependability Measurement and Modeling of a Multicomputer System (1993) (81)
- Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data (2018) (79)
- Modeling coordinated checkpointing for large-scale supercomputers (2005) (79)
- Application-based metrics for strategic placement of detectors (2005) (77)
- A Statistical Failure/Load Relationship: Results of a Multicomputer Study (1982) (74)
- Optimal False Data Injection Attack against Automatic Generation Control in Power Grids (2016) (71)
- Measurement-Based Analysis of Error Latency (1987) (69)
- Reliability of Internet hosts: a case study from the end user's perspective (1997) (69)
- Error sensitivity of the Linux kernel executing on PowerPC G4 and Pentium 4 processors (2004) (67)
- Stress-Based and Path-Based Fault Injection (1999) (66)
- Improving Log-based Field Failure Data Analysis of multi-node computing systems (2011) (65)
- Failure analysis and modeling of a VAXcluster system (1990) (64)
- A Soldier Health Monitoring System for Military Applications (2010) (64)
- ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection (2019) (63)
- Self-Healing Attack-Resilient PMU Network for Power System Operation (2018) (63)
- Active replication of multithreaded applications (2006) (61)
- Automatic Recognition of Intermittent Failures: An Experimental Study of Field Data (1990) (60)
- Analysis of security data from a large computing organization (2011) (59)
- Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation (2016) (58)
- Analyze-NOW-an environment for collection and analysis of failures in a network of workstations (1996) (58)
- Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5,000,000 HPC Application Runs (2015) (57)
- A preemptive deterministic scheduling algorithm for multithreaded replicas (2003) (57)
- Pharmacogenomics‐Driven Prediction of Antidepressant Treatment Outcomes: A Machine‐Learning Approach With Multi‐trial Replication (2019) (56)
- Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware (2006) (55)
- A Framework for Classifying Peer-to-Peer Technologies (2002) (55)
- CloudVal: A framework for validation of virtualization environment in cloud infrastructure (2011) (53)
- Simulation of software behavior under hardware faults (1993) (53)
- Error/failure analysis using event logs from fault tolerant systems (1991) (53)
- A system model for dynamically reconfigurable software (2003) (53)
- A data-driven finite state machine model for analyzing security vulnerabilities (2003) (52)
- F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids (2016) (50)
- Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation (1999) (49)
- Beta-defensin 1, aryl hydrocarbon receptor and plasma kynurenine in major depressive disorder: metabolomics-informed genomics (2018) (49)
- Dependability Analysis of a High-Speed Network Using Software-Implemented Fault Injection and Simulated Fault Injection (1998) (48)
- An experimental study of security vulnerabilities caused by errors (2001) (48)
- Automated Derivation of Application-aware Error Detectors using Static Analysis (2007) (47)
- Simulating Next-Generation Sequencing Datasets from Empirical Mutation and Sequencing Models (2016) (47)
- Semantic security analysis of SCADA networks to detect malicious control commands in power grids (2013) (47)
- AV-FUZZER: Finding Safety Violations in Autonomous Driving Systems (2020) (46)
- A fast and accurate gate-level transient fault simulation environment (1993) (45)
- Illinois wireless wind tunnel: a testbed for experimental evaluation of wireless networks (2005) (45)
- Integrating artificial intelligence with real-time intracranial EEG monitoring to automate interictal identification of seizure onset zones in focal epilepsy (2018) (45)
- Failure Diagnosis for Distributed Systems Using Targeted Fault Injection (2017) (45)
- Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment (2000) (44)
- Game Theory with Learning for Cyber Security Monitoring (2016) (43)
- Microprocessor sensitivity to failures: control vs. execution and combinational vs. sequential logic (2005) (43)
- How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones (2007) (42)
- Analog-digital simulation of transient-induced logic errors and upset susceptibility of an advanced control system (1990) (40)
- Analysis of the VAX/VMS error logs in multicomputer environments-a case study of software dependability (1992) (39)
- Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach (2011) (39)
- Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis (2011) (39)
- ASAP: Accelerated Short-Read Alignment on Programmable Hardware (2017) (39)
- AVFI: Fault Injection for Autonomous Vehicles (2018) (38)
- Transient fault behavior in a microprocessor-A case study (1988) (38)
- Processor-Level Selective Replication (2007) (38)
- Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems (2015) (37)
- An Architectural Framework for Detecting Process Hangs/Crashes (2005) (37)
- Error Propagation in a Digital Avionic Processor: A Simulation-Based Study (1986) (36)
- Application fault tolerance with Armor middleware (2005) (36)
- Recognition of Error Symptoms in Large Systems (1986) (35)
- Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants (2014) (35)
- A Study of Software Failures and Recovery in the MVS Operating System (1984) (35)
- A Comparison of Parallel Sorting Algorithms on Different Architectures (1998) (34)
- ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids (2015) (34)
- Toward Application-Aware Security and Reliability (2007) (33)
- An end-to-end approach for the automatic derivation of application-aware error detectors (2009) (33)
- FTAPE: A fault injection tool to measure fault Tolerance (1994) (32)
- An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks (2006) (31)
- Preemptive intrusion detection: theoretical framework and real-world measurements (2015) (31)
- A hierarchical approach for dependability analysis of a commercial cache-based RAID storage architecture (1998) (30)
- Security Vulnerabilities: From Analysis to Detection and Masking Techniques (2006) (30)
- Device-level transient fault modeling (1994) (29)
- Augmentation of Physician Assessments with Multi-Omics Enhances Predictability of Drug Response: A Case Study of Major Depressive Disorder (2018) (29)
- Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring (2015) (29)
- Loose synchronization of multithreaded replicas (2002) (29)
- Seizure Forecasting and the Preictal State in Canine Epilepsy (2017) (29)
- Geist: a generator for e-commerce & internet server traffic (2001) (29)
- Architectural impact of secure socket layer on Internet servers (2012) (28)
- A Data-Driven Approach to Soil Moisture Collection and Prediction (2016) (28)
- Architectural impact of secure socket layer on Internet servers (2000) (27)
- Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach (2011) (27)
- Measurement-based analysis of software reliability (1996) (27)
- An experimental evaluation of the REE SIFT environment for spaceborne applications (2002) (27)
- Impact of Correlated Failures on Dependability in a VAXcluster System (1992) (27)
- Neutralization of errors and attacks in wireless ad hoc networks (2005) (27)
- LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications (2015) (27)
- Group communication protocols under errors (2003) (26)
- Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics (2004) (26)
- A Performance Evaluation of Sequence Alignment Software in Virtualized Environments (2014) (26)
- Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors (2019) (25)
- Measurement-based Analysis of Networked System Availability (2000) (25)
- Error Behavior Comparison of Multiple Computing Systems: A Case Study Using Linux on Pentium, Solaris on SPARC, and AIX on POWER (2008) (25)
- Fault behavior dictionary for simulation of device-level transients (1993) (25)
- A measurement-based model of software reliability in a production environment (1987) (25)
- Human Verbal Memory Encoding Is Hierarchically Distributed in a Continuous Processing Stream (2019) (25)
- A STATISTICAL LOAD DEPENDENCY MODEL FOR CPU ERRORS AT SLAC (1995) (24)
- Analysis of failures in the Tandem NonStop-UX Operating System (1995) (24)
- Checkpointing virtual machines against transient errors (2010) (24)
- A framework for database audit and control flow checking for a wireless telephone network controller (2001) (24)
- Inner-Circle Consistency for Wireless Ad Hoc Networks (2007) (24)
- Fault Injection (2010) (24)
- A user-oriented synthetic workload generator (1992) (22)
- Architectural impact of secure socket layer on Internet servers: A retrospect (2000) (22)
- Diagnosing Rediscovered Software Problems Using Symptoms (2000) (22)
- Toward a high availability cloud: Techniques and challenges (2012) (22)
- Reliability MicroKernel: Providing Application-Aware Reliability in the OS (2007) (22)
- Analysis of Credential Stealing Attacks in an Open Networked Environment (2010) (22)
- An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring (2011) (22)
- Evaluating the security threat of firewall data corruption caused by instruction transient errors (2002) (22)
- A Performance Model for Peer to Peer File Sharing Services (2001) (21)
- Analysis of software halts in the tandem GUARDIAN operating system (1992) (21)
- An Experimental Study of Memory Fault Latency (1989) (19)
- Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud (2014) (19)
- The Effects of an ARMOR-based SIFT environment on the performance and dependability of user applications (2004) (19)
- Fault injection-based assessment of partial fault tolerance in stream processing applications (2011) (19)
- A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures (2016) (19)
- Characterization of operational failures from a business data processing SaaS platform (2014) (19)
- An object-oriented testbed for the evaluation of checkpointing and recovery systems (1997) (19)
- Fault latency in the memory - An experimental study on VAX 11/780 (1986) (18)
- Dependability analysis of a commercial high-speed network (1997) (18)
- An OS-level Framework for Providing Application-Aware Reliability (2006) (18)
- The Chameleon infrastructure for adaptive, software implemented fault tolerance (1998) (18)
- Safety-critical cyber-physical attacks: analysis, detection, and mitigation (2016) (18)
- Detection and visualization of complex structural variants from long reads (2018) (18)
- EEG-GRAPH: A Factor-Graph-Based Model for Capturing Spatial, Temporal, and Observational Relationships in Electroencephalograms (2017) (18)
- The effect of system workload on error latency: an experimental study (1985) (17)
- A fault-tolerant programmable voter for software-based N-modular redundancy (2012) (17)
- Recommendations for performance optimizations when using GATK3.8 and GATK4 (2019) (17)
- An efficient embedded hardware for high accuracy detection of epileptic seizures (2010) (16)
- Addressing TCP/IP processing challenges using the IA and IXP processors (2003) (16)
- Identifying software problems using symptoms (1994) (16)
- Modeling and evaluating the security threats of transient errors in firewall software (2004) (16)
- A Simulation-Based Study of a Triple Modular Redundant System Using DEFEND (1991) (16)
- RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers (2019) (16)
- On accelerating pair-HMM computations in programmable hardware (2017) (16)
- Measurement-based analysis of fault and error sensitivities of dynamic memory (2010) (16)
- Impact of device level faults in a digital avionic processor (1988) (15)
- Micro-checkpointing: checkpointing for multithreaded applications (2000) (15)
- Modeling and Measuring Multiprogramming and System Overheads on a Shared-Memory Multiprocessor: Case Study (1991) (15)
- CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks (2019) (15)
- Performance prediction and tuning on a multiprocessor (1991) (15)
- Performance degradation due to multiprogramming and system overheads in real workloads: case study on a shared memory multiprocessor (1990) (14)
- Model-based unsupervised learning informs metformin-induced cell-migration inhibition through an AMPK-independent mechanism in breast cancer (2017) (14)
- SOFTWARE RELATED FAILURES ON THE IBM 3081: A RELATIONSHIP WITH SYSTEM UTILIZATION. (1982) (14)
- FOCUS: an experimental environment for validation of fault-tolerant systems-case study of a jet-engine controller (1989) (14)
- Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots (2019) (13)
- Modeling stream processing applications for dependability evaluation (2011) (13)
- Measuring Congestion in High-Performance Datacenter Interconnects (2020) (13)
- Performance implications of chipset caches in web servers (2003) (13)
- Incorporating Reconfigurability, Error Detection and Recovery into the Chameleon ARMOR Architecture (1998) (13)
- Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report (2017) (13)
- Machine learning for load balancing in the Linux kernel (2020) (12)
- Hierarchical approach to accurate fault modeling for system evaluation (1998) (12)
- Measuring the Resiliency of Extreme-Scale Computing Environments (2016) (12)
- Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters (2018) (12)
- NFTAPE: networked fault tolerance and performance evaluator (2002) (12)
- Unsupervised machine-learning classification of electrophysiologically active electrodes during human cognitive task performance (2019) (12)
- Quantitative Analysis of Long-Latency Failures in System Software (2009) (12)
- Simulation of Software Behavior Under Hardware Faults (1995) (12)
- AcMC 2: Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models (2019) (12)
- Impact of JIT/JVM optimizations on JAVA application performance (2003) (12)
- Fault-Tolerant Computing: An Overview (1991) (12)
- ML-Driven Malware that Targets AV Safety (2020) (12)
- On the Potential of Peer-to-Peer Computing (2001) (11)
- Machine Learning Helps Identify New Drug Mechanisms in Triple-Negative Breast Cancer (2018) (11)
- Design and performance of compressed interconnects for high performance servers (2003) (11)
- A Contextual-Bandit-Based Approach for Informed Decision-Making in Clinical Trials (2018) (11)
- Geist: A Web Traffic Generation Tool (2002) (11)
- Discovering Application-Level Insider Attacks Using Symbolic Execution (2009) (11)
- Performance benchmarking of GATK3.8 and GATK4 (2018) (10)
- Editorial: State of the Journal Address (2005) (10)
- A Measurement-Based Model to Predict the Performance Impact of System Modifications: A Case Study (1995) (10)
- Low Predictability of Readmissions and Death Using Machine Learning in Cirrhosis. (2020) (10)
- Efficient and Scalable Workflows for Genomic Analyses (2016) (10)
- Security Vulnerabilities - From Data Analysis to Protection Mechanisms (2003) (10)
- MEASURE+: a measurement-based dependability analysis package (1993) (10)
- Pervasive embedded real time monitoring of EEG & SpO2 (2009) (10)
- A Measurement-Based Performability Model for a Multiprocessor System (1987) (10)
- Measurement-based characterization of global memory and network contention, operating system and parallelisation overheads: case study on a shared-memory multiprocessor (1994) (10)
- Chameleon: adaptive fault tolerance using reliable, mobile agents (1997) (10)
- A variance minimization approach to tolerance design (1980) (10)
- Analysis of large system black-box test data (1992) (9)
- Pervasive embedded systems for detection of traumatic brain injury (2009) (9)
- Towards resiliency in embedded medical monitoring devices (2012) (9)
- Design and Evaluation of Preemptive Control Signature ( PECOS ) Checking (2003) (9)
- Prediction of short-term antidepressant response using probabilistic graphical models with replication across multiple drugs and treatment settings (2021) (9)
- Wear-out simulation environment for VLSI designs (1993) (9)
- Error latency measurements in symbolic architectures (1991) (9)
- A Moment Approach to Evaluation and Optimization of Complex System Reliability (1978) (9)
- HARDWARE AND SOFTWARE ERROR DETECTION (2003) (9)
- Characterization of the error resiliency of power grid substation devices (2012) (9)
- Automated fault-injection-based dependability analysis of distributed computer systems (2001) (9)
- Towards an unified security testbed and security analytics framework (2015) (9)
- Availability attacks on computing systems through alteration of environmental control: smart malware approach (2019) (9)
- Data-driven longitudinal modeling and prediction of symptom dynamics in major depressive disorder: Integrating factor graphs and learning methods (2017) (9)
- A Study of Network Congestion in Two Supercomputing High-Speed Interconnects (2019) (8)
- Diagnostic reasoning in digital systems (1988) (8)
- Integration of machine learning and pharmacogenomic biomarkers for predicting response to antidepressant treatment: can computational intelligence be used to augment clinical assessments? (2019) (8)
- Introduction to the IEEE Transactions on Dependable and Secure Computing (2004) (8)
- Characterizing Supercomputer Traffic Networks Through Link-Level Analysis (2018) (8)
- Inductive Bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters (2019) (8)
- Formalizing System Behavior for Evaluating a System Hang Detector (2008) (8)
- A Processor-Level Framework for High-Performance and High-Dependability (2001) (8)
- Improving cache performance of network intensive workloads (2001) (8)
- Performance Analysis of a Shared Memory Multiprocessor: Case Study (1988) (8)
- Building Reliable and Secure Virtual Machines Using Architectural Invariants (2014) (8)
- Use of Hybrid and Hierarchical Simulation to Reduce Computation Costs (1993) (8)
- Experimental evaluation of performance and scalability of a multiprogrammed shared-memory multiprocessor (1993) (7)
- Software Fault Tolerance in Computer Operating Systems (1994) (7)
- A Variance Minimization Method of Reliability Design (1977) (7)
- Hardware support for high performance, intrusion- and fault-tolerant systems (2004) (7)
- Reliability Evaluation of Fault-Tolerant Systems—Effect of Variability in Failure Rates (1984) (7)
- VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing (2015) (7)
- Impact of Loop Granularity and Self-Preemption on the Performance of Loop Parallel Applications on a Multiprogrammed Shared-Memory Multiprocessor (1994) (7)
- A foundation for adaptive fault tolerance in software (2003) (7)
- Checkpointing of control structures in main memory database systems (2004) (7)
- Comparing fail-silence provided by process duplication versus internal error detection for DHCP server (2001) (7)
- Safety Implications of Robotic Surgery: A Study of 13 Years of FDA Data on da Vinci Surgical Systems (2013) (7)
- Multiprogramming Performance Degradation: Case Study on a Shared Memory Multiprocesor (1989) (7)
- Measurement of I/O bus contention and correlation among heterogeneous device types in a single-bus multiprocessor system (1994) (7)
- PERMANENT CPU ERRORS AND SYSTEM ACTIVITY: MEASUREMENT AND MODELLING. (1983) (7)
- Personalized password guessing: a new security threat (2014) (7)
- STATISTICAL STUDY OF HARDWARE-RELATED SOFTWARE ERRORS IN MVS. (1984) (7)
- Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks (2020) (7)
- Field Failures And Reliability In Operation (1993) (7)
- Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo (2019) (6)
- Effectiveness of machine checks for error diagnostics (2009) (6)
- Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems (2022) (6)
- An exponential failure/load relationship: results of a multi-computer statistical study (1981) (6)
- Predicting Brain Age Using Structural Neuroimaging and Deep Learning (2018) (6)
- An adaptive architecture for monitoring and failure analysis of high-speed networks (2002) (6)
- SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework (2013) (6)
- An evaluation of zookeeper for high availability in system S (2014) (6)
- Preemptive intrusion detection (2014) (6)
- Live Forensics for HPC Systems: A Case Study on Distributed Storage Systems (2020) (6)
- Path-Based Fault Injection (1997) (6)
- Measurement-based reliability/performability models (1987) (5)
- Efficient service of rediscovered software problems (1996) (5)
- Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software (2015) (5)
- Measurement-Based Analysis of Multiple Latent Errors and Near-coincident Fault Discovery in a Shared Memory Multiprocessor (1988) (5)
- Pluggable Watchdog: Transparent Failure Detection for MPI Programs (2013) (5)
- Automated derivation of application-aware error and attack detectors (2009) (5)
- BayesPerf: minimizing performance monitoring errors using Bayesian statistics (2021) (5)
- Dynamic VM Dependability Monitoring Using Hypervisor Probes (2015) (5)
- Effect of Uncertainty in Failure Rates on Memory System Reliability (1986) (5)
- A Simulation Framework to Evaluate Virtual CPU Scheduling Algorithms (2013) (4)
- FAMAS: FAult Modeling via Adaptive Simulation (1997) (4)
- A Codesigned Fault Tolerance System for Heterogeneous Many-Core Processors (2011) (4)
- Attacking supercomputers through targeted alteration of environmental control: A data driven case study (2016) (4)
- Reinforcement Learning based Disease Progression Model for Alzheimer's Disease (2021) (4)
- Reliable system design: Models, metrics and design techniques (2008) (4)
- A Software Framework for Simulation of Safety Hazards in Robotic Surgical Systems (2015) (4)
- A software multilevel fault injection mechanism: case study evaluating the Virtual Interface Architecture (1999) (4)
- Pervasive real-time biomedical monitoring system (2009) (4)
- Benchmarking the Operating System against Faults Impacting Operating System Functions (2008) (4)
- A Computationally Efficient Model for Predicting Successful Memory Encoding Using Machine-Learning-based EEG Channel Selection (2019) (4)
- RMED: A reconfigurable architecture for embedded medical monitoring (2011) (4)
- Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach (2008) (4)
- Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks (2019) (4)
- A fault-tolerant hardware architecture for robust wearable heart rate monitoring (2015) (4)
- Measurement-Based Dependability Evaluation of Operational Computer Systems (1994) (4)
- Unsupervised single-cell analysis in triple-negative breast cancer: A case study (2016) (4)
- Second workshop on dependable and secure nanocomputing (2008) (4)
- Sex is associated with differences in gut microbial composition and function in hepatic encephalopathy. (2020) (4)
- Pre-processed Tracing Data for Popular Microservice Benchmarks (2020) (4)
- ON THE EMPLOYMENT OF VARIANCE FOR RELIABILITY MODELLING OF FAULT TOLERANT SYSTEMS. (1979) (4)
- Workshop on Dependable and Secure Nanocomputing (2007) (4)
- Chameleon: A Software Infrastructure and Testbed for Reliable High-Speed Networked Computing (1997) (3)
- Dynamic Load-Sharing Using Predicted Process Resource Requirements (1990) (3)
- Using a Specification-based Intrusion Detection System to Extend the DNP3 Protocol with Security Functionalities (2012) (3)
- A framework for generation, replay, and analysis of real-world attack variants (2016) (3)
- A flexible software architecture for high availability computing (1998) (3)
- Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks (2020) (3)
- Is Function-as-a-Service a Good Fit for Latency-Critical Services? (2021) (3)
- Electrophysiological Correlates of Brain Health Help Diagnose Epilepsy and Lateralize Seizure Focus (2020) (3)
- Measuring the Mappability Spectrum of Reference Genome Assemblies (2018) (3)
- Fault-Injection-Based Assessment of Fail-Silence Provided by Process Duplication versus Internal Error Detection in Scientific-Based Applications (2000) (3)
- A compiler-enabled model- and measurement-driven adaptation environment for dependability and performance (2005) (3)
- PB-Motif—A Method for Identifying Gene/Pseudogene Rearrangements With Long Reads: An Application to CYP21A2 Genotyping (2021) (3)
- Inter-ictal Seizure Onset Zone localization using unsupervised clustering and Bayesian Filtering (2017) (3)
- TRACTION (2019) (3)
- Assessing the crash-failure assumption of group communication protocols (2005) (3)
- Exogene: A performant workflow for detecting viral integrations from paired-end next-generation sequencing data (2021) (3)
- Modeling and Analyzing the Security Threat of Firewall Data Corruption Caused by Instruction Transient Errors (2002) (3)
- Managing business health in the presence of malicious attacks (2011) (3)
- Design and Evaluation of Preemptive Control Signature Checking for Distributed Applications (2000) (3)
- Measurement and simulation based performance analysis of parallel I/O in a high-performance cluster system (1996) (3)
- The Mystery of the Failing Jobs: Insights from Operational Data from Two University-Wide Computing Systems (2020) (3)
- Error-injection-based failure characterization of the IEEE 1394 bus (2003) (3)
- Dependability analysis of a cache-based RAID system via fast distributed simulation (1998) (3)
- A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19 (2020) (3)
- Predicting Longitudinal Cognitive Scores Using Baseline Imaging and Clinical Variables (2020) (3)
- A hardware-in-the-loop simulator for safety training in robotic surgery (2016) (3)
- Measurement and Modeling of Computer System Failures (1989) (2)
- Decomposing Genomics Algorithms: Core Computations for Accelerating Genomics (2014) (2)
- Holistic Measurement-Driven System Assessment (2017) (2)
- A Measurement-Based Study of Concurrency in a Multiprocessor (1987) (2)
- Critical Variable Recomputation for Transient Error Detection (2007) (2)
- Live Forensics for Distributed Storage Systems (2019) (2)
- Hierarchical simulation to assess hardware and software dependability (1997) (2)
- Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster) (2014) (2)
- Unraveling complex local genomic rearrangements from long-read data (2017) (2)
- Software and hardware techniques for masking security vulnerabilities (2003) (2)
- Reinforcement learning for resource management in multi-tenant serverless platforms (2022) (2)
- The future of fault tolerant computing (2015) (2)
- Application-Aware Reliability and Security: The Trusted ILLIAC Approach (2006) (2)
- Improved GPU Implementations of the Pair-HMM Forward Algorithm for DNA Sequence Alignment (2021) (2)
- Trusted ILLIAC - A Configurable Application-Aware High-Performance Platform for Trustworthy Computing (2007) (2)
- Towards Longitudinal Analysis of a Population's Electronic Health Records Using Factor Graphs (2016) (2)
- Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data (2002) (2)
- The Evolution of Fault Tolerant Computing at the University of Illinois (1987) (2)
- A framework for assessing the dependability of supercomputers via automated log analysis (2008) (2)
- STUDY OF THE EFFECT OF UNCERTAINTY IN FAILURE RATE ESTIMATION ON SYSTEM RELIABILITY. (1980) (2)
- A Joint Model for Predicting Structural and Functional Brain Health in Elderly Individuals (2019) (2)
- Micro-architectural anatomy of a commercial TCP/IP stack (2004) (2)
- Software-Defined Networking for Smart Grid Resilience : Opportunities and Challenges [ Position Paper ] (2015) (2)
- AHEMS: Asynchronous Hardware-Enforced Memory Safety (2014) (2)
- Surgeon Training in Telerobotic Surgery via a Hardware-in-the-Loop Simulator (2017) (2)
- DSIM: A distributed simulator (1990) (1)
- Neutralization of Accidental Errors and Malicious Activities in Wireless Ad Hoc Networks (2005) (1)
- A speculation-based approach for performance and dependability analysis: a case study (1998) (1)
- Measurement and Analysis of Operating System Fault Tolerance (1992) (1)
- Approximations to Moments of Parallel-System Lifetime based on Sampling from a Finite Population (1979) (1)
- Summary: Experimental validation of real-time fault-tolerant systems (1992) (1)
- Memory management and usage in a LISP system: a measurement-based study (1990) (1)
- Dependability of Commercial Systems (1995) (1)
- Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality 1 (2021) (1)
- Helmet Integrated Nanosensors, Signal Processing and Wireless Real Time Data Communication for Monitoring Blast Exposure to Battlefield Personnel (2009) (1)
- SVAuth - A Single-Sign-On Integration Solution with Runtime Verification (2017) (1)
- MEASURE: An integrated data-analysis and model identification facility (1990) (1)
- Correction to: Recommendations for performance optimizations when using GATK3.8 and GATK4 (2019) (1)
- Modeling the data management system of Space Station Freedom with DEPEND (1993) (1)
- Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions (2008) (1)
- Design for security: measurement, analysis and mitigation techniques (2005) (1)
- USER-ORIENTED ANALYSIS OF FILE USAGE IN UNIX. (1986) (1)
- Security vulnerabilities: from measurements to design (2006) (1)
- A Mean-Field Game Approach to Cloud Resource Management with Function Approximation (2022) (1)
- SLO beyond the Hardware Isolation Limits (2021) (1)
- Space-borne computing for the year 2000 and beyond (1988) (1)
- Hierarchical Error Detection and Recovery in a Software Implemented Fault Tolerance (SIFT) Environme (1999) (1)
- Computer-aided design of dependable mission critical systems (Panel session) (1989) (1)
- Fast Distributed Simulation for Dependability Analysis of a Cache-based RAID System (1998) (1)
- VARIANCE MINIMIZATION APPROACH TO THE CHOICE OF COMPONENT GRADES IN LINEAR SYSTEMS. (1978) (1)
- An object-oriented environment for fast simulation using compiler techniques (1998) (1)
- Modeling of single event upsets for fault-tolerant system validation (1993) (1)
- TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base (2007) (1)
- HTAF: Hybrid Testing Automation Framework to Leverage Local and Global Computing Resources (2011) (1)
- Large system test data analysis (1994) (1)
- Prediction of adenocarcinoma development using game theory (2017) (1)
- Ensuring Critical Data Integrity via Information Flow Signatures (2007) (1)
- Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster (2018) (1)
- Security Testbed : Scalable Infrastructure for Interactive Attack Replay and Testing of Security Monitoring Tools (2015) (1)
- Peer to Peer Computing: the hype, the hard problems, and the quest for solutions (2001) (1)
- Intrusion and fault tolerance: for wireline and wireless networks (2005) (1)
- Hierarchical application aware error detection and recovery (2004) (1)
- Dependable Computing for Critical Applications (1998) (1)
- Impact of Malicious SCADA Commands on Power Grids’ Dynamic Responses (2018) (1)
- Application-aware Congestion Mitigation forHigh-Performance Computing Systems (2020) (1)
- An approach to evaluating the effects of realistic faults in digital circuits (1999) (1)
- A Smart Voting Subsystem for Distributed Fault Tolerance (2000) (1)
- Measurement-based performance evaluation technique for high-performance computers (1993) (1)
- A ML-based Runtime System for Executing Dataflow Graphs on Heterogeneous Processors (2018) (1)
- Analysis of the impact of sequencing errors on BLAST using fault injection (2013) (0)
- Editorial: Dependability and Security--Looking Foward to 2006 (2006) (0)
- SIMPPO: a scalable and incremental online learning framework for serverless resource management (2022) (0)
- Usage analysis of user files in UNIX (1987) (0)
- Report of the IEEE Workshop on Measurement and Modeling of Computer Dependability (1990) (0)
- Watch out for the risky actors: Assessing risk in dynamic environments for safe driving (2021) (0)
- Evaluating Hardware Memory Disaggregation under Delay and Contention (2022) (0)
- Delay sensitivity-driven congestion mitigation for HPC systems (2021) (0)
- An Operating-System-Level Framework for Providing Application-Aware Reliability (2006) (0)
- Measurement-based modeling and analysis methodology for characterizing parallel I/O performance (1998) (0)
- Joint Panel - IPDS and Workshop on Dependability Benchmarking (2002) (0)
- Measurement-based performance analysis and modeling of parallel systems (1996) (0)
- An Exper imental Evaluation of the REE SIFT Environment for Spacebor ne Applications (2002) (0)
- IEEE Transactions on Dependable and Secure Computing: Editor's note (2004) (0)
- Computing in space: Issues and answers (1993) (0)
- SymposiumonFault-Tolerarv aRs Rs S l Computing (1985) (0)
- Recommendations for performance optimizations when using GATK3.8 and GATK4 (2019) (0)
- Resilience of Medical Devices and Systems (2015) (0)
- PROBABILISTIC MODEL FOR OPTIMISATION OF TELEPHONE NETWORKS. (1977) (0)
- Workshop on Dependable and Secure Nanocomputing — Call for Contributions — (2007) (0)
- Impact of Loop Granularity and Self-Preemption on th e Performance of Loop Parallel Applications on a Multiprogrammed (1994) (0)
- 1987ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM DunfeyCityLineHotel (1987) (0)
- Artificial Intelligence and Pharmacogenomics (2019) (0)
- Design for dependability (1991) (0)
- Third workshop on dependable and secure nanocomputing (2009) (0)
- Center for Reliable and High-Performance Computing EXPERIMENTAL ANALYSIS OF COMPUTER SYSTEM DEPENDABILITY (2017) (0)
- Internet Internet DMZ Intranet DMZ IntranetProduction Network Zone LDAPDatabaseDirectoryServerWeb Server 1 Appl Server 1 Order Mgmt Appl Server 3 User Forums Appl Server 2 Customer SupportProductsDatabase (2011) (0)
- Software-based Signaturing in Distributed Systems (1999) (0)
- Guest Editor's Introduction Experimental Computer Science (1990) (0)
- Fault Tolerance in Computer Operating Systems (2008) (0)
- AcMC 2 : Accelerated Markov Chain Monte Carlo for Probabilistic Models (2019) (0)
- Genomic and Synthetic Biology Digital Biosecurity. (2021) (0)
- Dependable Computing: Design and Assessment (2015) (0)
- Speculation-based distributed simulation for dependability and performance analysis (1999) (0)
- AUTOMATION DERIVATION OF APPLICATION-A WARE ERROR DETECTORS USING COMPILER ANALYSIS (2017) (0)
- Guest Editors' Introduction (1992) (0)
- Tributes to Prof. Edward J. McCluskey (2008) (0)
- Analysis of field data on computer failures (2008) (0)
- Availability of Commercial Parallel Systems (1996) (0)
- Editorial: Dependability and Security (2007) (0)
- Model-based Unsupervised Learning to Establish Drug Mechanisms : A Case Study of Metformin ’ s Mechanisms in Triple-Negative Breast Cancer (2017) (0)
- Watch Out for the Safety-Threatening Actors: Proactively Mitigating Safety Hazards (2022) (0)
- A Measurement-Based Study of Memory Usage and Garbage Collection in a Lisp System (1990) (0)
- Providing application-aware reliability through os/hypervisor-level techniques (2010) (0)
- Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control (2018) (0)
- VM-mCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory (2015) (0)
- Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds (2017) (0)
- IGen : The Illinois Genomics Execution Environment (2015) (0)
- Recent Advances in Industry and Experimental Research in Processor Level Error Detection and Recovery (2006) (0)
- 458 ARTIFICIAL INTELLIGENCE TECHNIQUES DEMONSTRATE BETTER PREDICTION FOR 90-DAY READMISSION AND DEATH IN WOMEN THAN MEN WITH CIRRHOSIS. (2020) (0)
- Modeling and Simulation of Adhoc / P 2 P Resource Sharing Networks Modeling and Simulation of Adhoc / P 2 P Resource Sharing Networks (0)
- William C. Carter Award Paper (2010) (0)
- Automated Classification of Computer-Based Medical Device Recalls: An Application of Natural Language Processing and Statistical Learning (2014) (0)
- Effects of Learning-Based Action-Space Attacks on Autonomous Driving Agents (2023) (0)
- A MomentApproach toEvaluation andOptimization of Complex SystemReliability (1978) (0)
- Cots hardware and software in high-availability systems (1999) (0)
- Approximations toMomentsofParallel-System Lifetime based onSampling fromaFinite Population (1979) (0)
- Artificial-intelligence-augmented psychiatry with pharmacogenomics: towards individualization of antidepressant selection in patients with major depressive disorder (2019) (0)
- Statistical models to capture mutational properties for NextGen Sequencing Data (2016) (0)
- Heterogeneous I/O Contention in a Single-Bus Multiprocessor (1996) (0)
- The Era of Heterogeneity: Are we prepared? (2011) (0)
- Overview of ICLASS research: Reliable and parallel computing (1987) (0)
- Fourth workshop on dependable and secure nanocomputing (2010) (0)
- Panel: Field Failures And Reliability In Operation. (1993) (0)
- Hard CPU Related Failures and System Activity: Measurement and Modelling. (1983) (0)
- Analysis of large system black box verification test data (1993) (0)
- Providing Adaptive Fault Tolerance through the Reconfigurable ARMOR Architecture of Chameleon (2007) (0)
- Coalition Service Registry for Ad-hoc Dynamic Coalitions (2008) (0)
- Keynote I: The era of heterogeneity: Are we prepared? (2011) (0)
- Excellent processor architecture of power efficiency (2016) (0)
- Hardware Implementation of Information Flow Signatures Derived via Program Analysis (2010) (0)
- Measurement-based analysis of error latency. [in computer operating system] (1987) (0)
- Dynamic Tracking of Information Flow Signatures for Security Checking (2007) (0)
- Introduction of new Associate Editors (2004) (0)
- Telogator: a method for reporting chromosome-specific telomere lengths from long reads (2022) (0)
- Measurement-based characterization of parallel i/o systems (1999) (0)
- Trustworthy Services Built on Event-Based Probing for Layered Defense (2017) (0)
- MEASURE+ - A Measurement-Based Dependability Analysis Package (1993) (0)
- 717 MICROBIOTA IN STOOL ARE SUPERIOR TO SALIVA IN DIFFERENTIATING CIRRHOSIS AND HEPATIC ENCEPHALOPATHY USING ARTIFICIAL INTELLIGENCE APPROACHES (2021) (0)
- CLOUDVAL: A FRAMEWORK FOR FAILURE VALIDATION OF VIRTUALIZATION ENVIRONMENT IN CLOUD INFRASTRUCTURE BY CUONG (2013) (0)
- PERFORM ABILITY MODELING BASED ON REAL DATA : A CASE STUDY (2017) (0)
- The evolution of dependable computing at the University of Illinois (2004) (0)
- Benchmarking of fault-tolerant systems (1996) (0)
- TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation (2019) (0)
- 3rd Workshop on Security and Dependability of Critical Embedded Real-Time Systems (2018) (0)
- Analyzing Security Vulnerabilities and Attacks (2011) (0)
This paper list is powered by the following services:
Other Resources About Ravishankar K. Iyer
What Schools Are Affiliated With Ravishankar K. Iyer?
Ravishankar K. Iyer is affiliated with the following schools: