Skip navigation

Building Resilient Cyberinfrastructure

1. Clements, A., Gustafson, E., Scharnowski, T., Grosen, P., Fritz, D., Kruegel, C., Vigna, G., Bagchi, S., and Payer, M. (2020). HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/halucinator_usenixsec20_cameraready.pdf. Cited by 1. [ http ]

2. Bagchi, S., Abdelzaher, T. F., Govindan, R., Shenoy, P., Atrey, A., Ghosh, P., and Xu, R. (2020). New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges. IEEE Internet of Things Journal, https://arxiv.org/abs/2005.07338. [ http ]

3. Almakhdhub, N. S., Clements, A. A., Bagchi, S., and Payer, M. (2020). μRAI: Return Address Integrity for Embedded Systems. Other, https://engineering.purdue.edu/dcsl/publications/papers/2020/uRAI_ndss20_cameraready.pdf. [ http ]

4. Woods, D., Abdallah, M., Bagchi, S., Sundaram, S., and Cason, T. (2020). Network Defense and Behavioral Biases: An Experimental Study. Other, . [ http ]

5. Shirey, R., Rao, S., and Sundaram, S. (2020). Measuring fixed wing UAS networks at long range.. Other, . [ http ]

6. Mitra, A., Bagchi, S., and Sundaram, S. (2020). Event-Triggered Distributed Inference. arXiv preprint arXiv:2004.01302, . [ http ]

7. Ye, L., Woodford, N., Roy, S., and Sundaram, S. (2020). On the Complexity and Approximability of Optimal Sensor Selection and Attack for Kalman Filtering. arXiv preprint arXiv:2003.11951, . [ http ]

8. So, A. M., Jain, P., Ma, W., and Scutari, G. (2020). Non-Convex Optimization for Signal Processing and Machine Learning. Other, . Cited by 1. [ http ]

9. Mitra, A., Richards, J. A., Bagchi, S., and Sundaram, S. (2019). Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements. Autonomous Robots, Springer US. Cited by 13. [ http ]

10. Laguna, I., Wood, P. C., Singh, R., and Bagchi, S. (2019). GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications. Other, Springer, Cham. Cited by 8. [ http ]

11. Mahgoub, A., Wood, P., Medoff, A., Mitra, S., Meyer, F., Chaterji, S., and Bagchi, S. (2019). EUNOMIA: Online reconfiguration of Clustered NoSQL Databases for Time-VaryingWorkloads. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/online-nosql-tuning_usenixatc19_submitted.pdf. Cited by 8. [ http ]

12. Saumya, C., Koo, J., Kulkarni, M., and Bagchi, S. (2019). XSTRESSOR: Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions. Other, IEEE. Cited by 5. [ http ]

13. Abdallah, M., Naghizadeh, P., Hota, A., Cason, T., Bagchi, S., and Sundaram, S. (2019). The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems. Other, . Cited by 4. [ http ]

14. Koo, J., Saumya, C., Kulkarni, M., and Bagchi, S. (2019). PySE: Automatic Worst-Case Test Generation by Reinforcement Learning. Other, . Cited by 4. [ http ]

15. Kotipalli, P., Singh, R., Wood, P., Laguna, I., and Bagchi, S. (2019). AMPT-GA: Automatic Mixed Precision Floating Point Tuning for GPU Applications. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/gpu-fp-tuning_ics19_submitted.pdf. Cited by 2. [ http ]

16. Almakhdhub, N., Clements, A., Payer, M., and Bagchi, S. (2019). BenchIoT: A Security Benchmark for the Internet of Things. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/final_iot2_dsn19_cameraready.pdf. Cited by 1. [ http ]

17. Wood, P., Zhang, H., Siddiqui, M., and Bagchi, S. (2019). Dependability in Edge Computing. Communications of the ACM, https://engineering.purdue.edu/dcsl/publications/papers/2018/final_edge_reliability_cacm18_revision.pdf. [ http ]

18. Hall, M., Ladner, R., Levitt, D., Quiñones, M. A. P., and Bagchi, S. (2019). Smoothing the path to computing: pondering uses for big data. Communications of the ACM, ACM. [ http ]

19. Palod, P., Patwari, A., Bahety, S., Bagchi, S., and Goyal, P. (2019). Misleading Metadata Detection on YouTube. Other, arXiv preprint arXiv:1901.08759. [ http ]

20. Gutierrez, C. N., Kim, T., Corte, R. D., Avery, J., Goldwasser, D., Cinque, M., and Bagchi, S. (2018). Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE. Cited by 12. [ http ]

21. Gutierrez, C. N., Spafford, E. H., Bagchi, S., and Yurek, T. (2018). Reactive redundancy for data destruction protection (R2D2). Computers & Security, Elsevier Advanced Technology. Cited by 3. [ http ]

22. Shankar, R., Kobin, B., Bagchi, S., Kistler, M., and Rellermeyer, J. (2018). MAVIS: Managing Datacenters using Smartphones. arXiv preprint arXiv:1802.06270, . [ http ]

23. Clements, A. A., Almakhdhub, N. S., Saab, K. S., Srivastava, P., Koo, J., Bagchi, S., and Payer, M. (2017). Protecting Bare-metal Embedded Systems With Privilege Overlays. Other, IEEE. Cited by 43. [ http ]

24. Mitra, S., Gupta, M. K., Misailovic, S., and Bagchi, S. (2017). Phase-aware optimization in approximate computing. Code Generation and Optimization (CGO), 2017 IEEE/ACM International Symposium on, IEEE. Cited by 26. [ http ]

25. Mahgoub, A., Wood, P., Ganesh, S., Mitra, S., Gerlach, W., Harrison, T., Meyer, F., Grama, A., Bagchi, S., and Chaterji, S. (2017). Rafiki: A Middleware for Parameter Tuning of NoSQL Datastores for Dynamic Metagenomics Workloads. ACM/IFIP/USENIX Middleware Conference, . Cited by 25. [ http ]

26. Patwari, A., Laguna, I., Schulz, M., and Bagchi, S. (2017). Understanding the Spatial Characteristics of DRAM Errors in HPC Clusters. Other, ACM. Cited by 6. [ http ]

27. Kannan, S., Wood, P., Deatrick, L., Beane, P., Chaterji, S., and Bagchi, S. (2017). TopHat: Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. International Conference on Security and Privacy in Communication System, Springer. Cited by 1. [ http ]

28. Bagchi, K. J. S., Theera-Ampornpunt, N., Ammar, M., Zegura, E., Mangla, T., and Panta, R. K. (2017). TANGO: Performance and Fault Management in Cellular Networks through Cooperation between Devices and Edge Computing Nodes. Other, . [ http ]

29. Huang, G., Xu, M., Lin, F. X., Liu, Y., Ma, Y., Pushp, S., and Liu, X. (2017). ShuffleDog: Characterizing and Adapting User-Perceived Latency of Android Apps. IEEE Transactions on Mobile Computing, IEEE. Cited by 12. [ http ]

30. Notarnicola, I., Sun, Y., Scutari, G., and Notarstefano, G. (2017). Distributed big-data optimization via block communications. Other, IEEE. Cited by 7. [ http ]

31. Cannelli, L., Facchinei, F., Kungurtsev, V., and Scutari, G. (2017). Asynchronous parallel nonconvex large-scale optimization. Other, IEEE. Cited by 5. [ http ]

32. Akyildiz, I. F., Wang, P., and Lin, S. (2016). SoftWater: Software-defined networking for next-generation underwater communication systems. Ad Hoc Networks, Elsevier. Cited by 61. [ http ]

33. Mitra, S., Panta, R., Ra, M., and Bagchi, S. (2016). Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. Proceedings of the Eleventh European Conference on Computer Systems, ACM. Cited by 50. [ http ]

34. Mangla, T., Theera-Ampornpunt, N., Ammar, M., Zegura, E., and Bagchi, S. (2016). Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments. Proceedings of the 8th International Workshop on Mobile Video, ACM. Cited by 33. [ http ]

35. Mahadik, K., Wright, C., Zhang, J., Kulkarni, M., Bagchi, S., and Chaterji, S. (2016). SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications. Proceedings of the 2016 International Conference on Supercomputing, ACM. Cited by 22. [ http ]

36. Thomas, T. E., Bhattad, A. J., Mitra, S., and Bagchi, S. (2016). Sirius: Neural network based probabilistic assertions for detecting silent data corruption in parallel programs. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 10. [ http ]

37. Shin, D., Bagchi, S., and Wang, C. (2016). Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks. IEEE Transactions on Mobile Computing, IEEE. Cited by 7. [ http ]

38. Theera-Ampornpunt, N., Mangla, T., Bagchi, S., Panta, R., Joshi, K., Ammar, M., and Zegura, E. (2016). TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 3. [ http ]

39. Mitra, S., Javagal, S., Maji, A. K., Gamblin, T., Moody, A., Harrell, S., and Bagchi, S. (2016). A Study of Failures in Community Clusters: The Case of Conte. Software Reliability Engineering Workshops (ISSREW), 2016 IEEE International Symposium on, IEEE. Cited by 2. [ http ]

40. Sarmin, S., Bagchi, S., and Al Islam, A. (2016). Chameleon: defending secret information from eavesdropping over physical environment. 2016 International Conference on Networking Systems and Security (NSysS), IEEE. [ http ]

41. Di Lorenzo, P., and Scutari, G. (2016). Next: In-network nonconvex optimization. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 209. [ http ]

42. Sun, Y., Scutari, G., and Palomar, D. (2016). Distributed nonconvex multiagent optimization over time-varying networks. arXiv preprint arXiv:1607.00249, . Cited by 73. [ http ]

43. Al-Shuwaili, A. N., Simeone, O., Bagheri, A., and Scutari, G. (2016). Joint Uplink/Downlink Optimization for Backhaul-Limited Mobile Cloud Computing with User Scheduling. arXiv preprint arXiv:1607.06521, . Cited by 39. [ http ]

44. Guan, Z., Melodia, T., and Scutari, G. (2016). To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks. IEEE/ACM Transactions on Networking, IEEE. Cited by 19. [ http ]

45. Song, P., Scutari, G., Facchinei, F., and Lampariello, L. (2016). D3m: Distributed multi-cell multigroup multicasting. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 16. [ http ]

46. Di Lorenzo, P., and Scutari, G. (2016). Distributed nonconvex optimization over time-varying networks. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 15. [ http ]

47. Maji, A. K., Mitra, S., and Bagchi, S. (2015). Ice: An integrated configuration engine for interference mitigation in cloud services. Autonomic Computing (ICAC), 2015 IEEE International Conference on, IEEE. Cited by 31. [ http ]

48. Wood, P., Gutierrez, C., and Bagchi, S. (2015). Denial of Service Elusion (DoSE): Keeping clients connected for less. Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on, IEEE. Cited by 20. [ http ]

49. Tancreti, M., Sundaram, V., Bagchi, S., and Eugster, P. (2015). Software-only system-level record and replay in wireless sensor networks. Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM. Cited by 19. [ http ]

50. Laguna, I., Ahn, D. H., Supinski, B. R. d., Gamblin, T., Lee, G. L., Schulz, M., Bagchi, S., Kulkarni, M., Zhou, B., Chen, Z., and Qin, F. (2015). Debugging high-performance computing applications at massive scales. Communications of the ACM, ACM. Cited by 16. [ http ]

51. Gutierrez, C. N., Bagchi, S., Mohammed, H., and Avery, J. (2015). Modeling Deception In Information Security As A Hypergame–A Primer. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. Cited by 9. [ http ]

52. Mitra, S., Bronevetsky, G., Javagal, S., and Bagchi, S. (2015). Dealing with the unknown: Resilience to prediction errors. Parallel Architecture and Compilation (PACT), 2015 International Conference on, IEEE. Cited by 8. [ http ]

53. Avery, J., Gutierrez, C., Wood, P., Corte, R. D., Modelo-Howard, J. F. G., Berndt, B., McDermott, K., Bagchi, S., Goldwasser, D., and Cinque, M. (2015). SNIPE: signature generation for phishing emails. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. Cited by 1. [ http ]

54. Xu, C., Lin, F. X., Wang, Y., and Zhong, a. L. (2015). Automated OS-level Device Runtime Power Management. Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, ACM. Cited by 26. [ http ]

55. Lin, F. X., Wang, Z., and Zhong, L. (2015). K2: A Mobile Operating System for Heterogeneous Coherence Domains. ACM Transactions on Computer Systems (TOCS), ACM. Cited by 10. [ http ]

56. Sardellitti, S., Scutari, G., and Barbarossa, S. (2015). Joint optimization of radio and computational resources for multicell mobile-edge computing. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 526. [ http ]

57. Facchinei, F., Scutari, G., and Sagratella, S. (2015). Parallel selective algorithms for nonconvex big data optimization. IEEE Transactions on Signal Processing, IEEE. Cited by 155. [ http ]

58. Di Lorenzo, P., and Scutari, G. (2015). Distributed nonconvex optimization over networks. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2015 IEEE 6th International Workshop on, IEEE. Cited by 33. [ http ]

59. Snir, M., Wisniewski, R. W., Abraham, J. A., Adve, S. V., Bagchi, S., Balaji, P., Belak, J., Bose, P., Cappello, F., Carlson, B., and others, B. (2014). Addressing failures in exascale computing. International Journal of High Performance Computing Applications, Sage Publications. Cited by 327. [ http ]

60. Maji, A. K., Mitra, S., Zhou, B., Bagchi, S., and Verma, A. (2014). Mitigating interference in cloud services by middleware reconfiguration. Proceedings of the 15th International Middleware Conference, ACM. Cited by 60. [ http ]

61. Mitra, S., Laguna, I., Ahn, D. H., Bagchi, S., Schulz, M., and Gamblin, T. (2014). Accurate application progress analysis for large-scale parallel debugging. ACM SIGPLAN Notices, ACM. Cited by 31. [ http ]

62. Mahadik, K., Chaterji, S., Zhou, B., Kulkarni, M., and Bagchi, S. (2014). Orion: Scaling genomic sequence matching with fine-grained parallelization. SC14: International Conference for High Performance Computing, Networking, Storage and Analysis, IEEE. Cited by 19. [ http ]

63. Howard, G. M., Gutierrez, C. N., Arshad, F. A., Bagchi, S., and Qi, Y. (2014). psigene: Webcrawling to generalize sql injection signatures. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE. Cited by 18. [ http ]

64. Islam, T. Z., Bagchi, S., and Eigenmann, R. (2014). Reliable and Efficient Distributed Checkpointing System for Grid Environments. Journal of Grid Computing, Springer. Cited by 6. [ http ]

65. Avery, J., Modelo-Howard, G., Arshad, F., Bagchi, S., and Qi, Y. (2014). pSigene: generalizing attack signatures. Proceedings of the 15th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

66. Bowen, Z., Bronevetsky, G., Casas-Guix, M., and Bagchi, S. (2014). KONGMING: Performance Prediction in the Cloud via Multidimensional Interference Surrogates. Tech Report, Lawrence Livermore National Laboratory (LLNL), Livermore, CA. [ http ]

67. Arshad, F. A., Maji, A. K., Mudgal, S., and Bagchi, S. (2014). Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?. 11th International Conference on Autonomic Computing (ICAC 14), . [ http ]

68. LiKamWa, R., Wang, Z., Carroll, A., Lin, F. X., and Zhong, L. (2014). Draining our glass: An energy and heat characterization of google glass. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 85. [ http ]

69. Xu, C., Lin, F. X., and Zhong, L. (2014). Device drivers should not do power management. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 5. [ http ]

70. Sardellitti, S., Barbarossa, S., and Scutari, G. (2014). Distributed mobile cloud computing: Joint optimization of radio and computational resources. 2014 IEEE Globecom Workshops (GC Wkshps), IEEE. Cited by 28. [ http ]

71. Facchinei, F., Pang, J., Scutari, G., and Lampariello, L. (2014). VI-constrained hemivariational inequalities: distributed algorithms and power control in ad-hoc networks. Mathematical Programming, Springer. Cited by 24. [ http ]

72. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint optimization of radio and computational resources for multicell mobile cloud computing. Signal Processing Advances in Wireless Communications (SPAWC), 2014 IEEE 15th International Workshop on, IEEE. Cited by 18. [ http ]

73. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Distributed joint optimization of radio and computational resources for mobile cloud computing. Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, IEEE. Cited by 13. [ http ]

74. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint cell selection and radio resource allocation in MIMO small cell networks via successive convex approximation. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 10. [ http ]

75. Shin, D., Moses, D., Venkatachalam, M., and Bagchi, S. (2013). Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches. IEEE network, IEEE. Cited by 45. [ http ]

76. Shin, D., and Bagchi, S. (2013). An optimization framework for monitoring multi-channel multi-radio wireless mesh networks. Ad Hoc Networks, Elsevier. Cited by 21. [ http ]

77. Arshad, F. A., Krause, R. J., and Bagchi, S. (2013). Characterizing configuration problems in java ee application servers: An empirical study with glassfish and jboss. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), IEEE. Cited by 16. [ http ]

78. Theera-Ampornpunt, N., Bagchi, S., Joshi, K. R., and Panta, R. K. (2013). Using big data for more dependability: a cellular network tale. Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, ACM. Cited by 14. [ http ]

79. Laguna, I., Mitra, S., Arshad, F. A., Theera-Ampornpunt, N., Zhu, Z., Bagchi, S., Midkiff, S. P., Kistler, M., and Gheith, A. (2013). Automatic problem localization via multi-dimensional metric profiling. 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, IEEE. Cited by 13. [ http ]

80. Shin, D., Bagchi, S., and Wang, C. (2013). Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks. 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), IEEE. Cited by 6. [ http ]

81. Khalil, I., Bagchi, S., AbuAli, N., and Hayajneh, M. (2013). DISA: Detection and isolation of sneaky attackers in locally monitored multi‐hop wireless networks. Security and Communication Networks, . Cited by 4. [ http ]

82. Mitra, S., Laguna, I., Ahn, D. H., Gamblin, T., Schulz, M., and Bagchi, S. (2013). Scalable parallel debugging via loop-aware progress dependence analysis. appear as a poster at the 25th IEEE/ACM International Conference for High Performance Computing, Networking, Storage and Analysis (Supercomputing), . Cited by 4. [ http ]

83. Koo, J., Shin, D., Lin, X., and Bagchi, S. (2013). A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks. Ad Hoc Networks, Elsevier. Cited by 1. [ http ]

84. Bagchi, S., Arshad, F., Rellermeyer, J., Osiecki, T., Kistler, M., and Gheith, A. (2013). Lilliput meets brobdingnagian: Data center systems management through mobile devices. 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE. Cited by 1. [ http ]

85. Modelo-Howard, G., Arshad, F., Gutierrez, C., Bagchi, S., and Qi, Y. (2013). pSigene: webcrawling to generalize SQLi signatures. Proceedings of the 14th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

86. Yang, Y., Scutari, G., Song, P., and Palomar, D. P. (2013). Robust MIMO cognitive radio systems under interference temperature constraints. IEEE Journal on Selected Areas in Communications, IEEE. Cited by 51. [ http ]

87. Maji, A. K., Arshad, F. A., Bagchi, S., and Rellermeyer, J. S. (2012). An empirical study of the robustness of inter-component communication in Android. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 106. [ http ]

88. Islam, T. Z., Mohror, K., Bagchi, S., Moody, A., Supinski, B. R. D., and Eigenmann, R. (2012). McrEngine: A scalable checkpointing system using data-aware aggregation and compression. Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, IEEE Computer Society Press. Cited by 102. [ http ]

89. Bronevetsky, G., Laguna, I., de Supinski, B. R., and Bagchi, S. (2012). Automatic fault characterization via abnormality-enhanced classification. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 48. [ http ]

90. Shin, D., Bagchi, S., and Wang, C. (2012). Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 32. [ http ]

91. Laguna, I., Ahn, D. H., de Supinski, B. R., Bagchi, S., and Gamblin, T. (2012). Probabilistic diagnosis of performance faults in large-scale parallel applications. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 24. [ http ]

92. Tsai, T., Theera-Ampornpunt, N., and Bagchi, S. (2012). A study of soft error consequences in hard disk drives. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 14. [ http ]

93. Al Islam, A. A., Alam, S. I., Raghunathan, V., and Bagchi, S. (2012). Multi-armed bandit congestion control in multi-hop infrastructure wireless mesh networks. 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, IEEE. Cited by 9. [ http ]

94. Rellermeyer, J. S., and Bagchi, S. (2012). Dependability as a cloud service-a modular approach. IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), IEEE. Cited by 8. [ http ]

95. Arshad, F. A., Modelo-Howard, G., and Bagchi, S. (2012). To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network. 2012 20th IEEE International Conference on Network Protocols (ICNP), IEEE. Cited by 4. [ http ]

96. Panta, R. K., and Bagchi, S. (2012). Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, IEEE. Cited by 4. [ http ]

97. Zhou, B., Kulkarni, M., and Bagchi, S. (2012). ABHRANTA: Locating Bugs that Manifest at Large System Scales.. HotDep, . Cited by 3. [ http ]

98. Liu, C., Li, J., Huang, W., Rubio, J., Speight, E., and Lin, X. (2012). Power-efficient time-sensitive mapping in heterogeneous systems. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 49. [ http ]

99. Lin, F. X., Wang, Z., and Zhong, L. (2012). Supporting distributed execution of smartphone workloads on loosely coupled heterogeneous processors. Presented as part of the 2012 Workshop on Power-Aware Computing and Systems, . Cited by 13. [ http ]

100. Wang, Z., Lin, F. X., Zhong, L., and Chishtie, M. (2012). Guadalupe: a browser design for heterogeneous hardware. arXiv preprint arXiv:1212.5170, . Cited by 1. [ http ]

101. Scutari, G., Palomar, D. P., Facchinei, F., and Pang, J. (2012). Monotone games for cognitive radio systems. Distributed Decision Making and Control, Springer. Cited by 78. [ http ]

102. Scutari, G., Facchinei, F., Pang, J., and Lampariello, L. (2012). Equilibrium selection in power control games on the interference channel. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 13. [ http ]

103. Scutari, G., Facchinei, F., and Pang, J. (2012). Equilibrium selection in MIMO communication games. 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE. Cited by 2. [ http ]

104. Hacker, T. J., Eigenmann, R., Bagchi, S., Irfanoglu, A., Pujol, S., Catlin, A., and Rathje, E. (2011). The neeshub cyberinfrastructure for earthquake engineering. Computing in Science \& Engineering, AIP Publishing. Cited by 53. [ http ]

105. Panta, R. K., Bagchi, S., and Midkiff, S. P. (2011). Efficient incremental code update for sensor networks. ACM Transactions on Sensor Networks (TOSN), ACM. Cited by 47. [ http ]

106. Laguna, I., Gamblin, T., de Supinski, B. R., Bagchi, S., Bronevetsky, G., Anh, D. H., Schulz, M., and Rountree, B. (2011). Large scale debugging of parallel tasks with automaded. Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, ACM. Cited by 40. [ http ]

107. Zhou, B., Kulkarni, M., and Bagchi, S. (2011). Vrisha: using scaling properties of parallel programs for bug detection and localization. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 22. [ http ]

108. Hariharan, S., Shroff, N. B., and Bagchi, S. (2011). Secure neighbor discovery through overhearing in static multihop wireless networks. Computer Networks, Elsevier. Cited by 17. [ http ]

109. Wang, M., Li, Z., Li, F., Feng, X., Bagchi, S., and Lu, Y. (2011). Dependence-based multi-level tracing and replay for wireless sensor networks debugging. ACM SIGPLAN Notices, ACM. Cited by 10. [ http ]

110. Modelo-Howard, G., Sweval, J., and Bagchi, S. (2011). Secure configuration of intrusion detection sensors for changing enterprise systems. International Conference on Security and Privacy in Communication Systems, Springer. Cited by 8. [ http ]

111. Maji, A. K., and Bagchi, S. (2011). v-CAPS: a confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks. International Conference on Security and Privacy in Communication Systems, Springer Berlin Heidelberg. Cited by 6. [ http ]

112. Theera-Ampornpunt, N., Zhou, B., and Bagchi, S. (2011). Predicting Time to Failure for Large Scale Distributed Systems. 42nd Annual IEEE/IFIP International Conference On Dependable Systems And Networks (DSN 2011), . Cited by 3. [ http ]

113. Modelo-Howard, G., Bagchi, S., and Lebanon, G. (2011). Approximation algorithms for determining placement of intrusion detectors. CERIASTech. Report, . Cited by 3. [ http ]

114. Lin, F. X., Ashbrook, D., and White, S. (2011). RhythmLink: securely pairing I/O-constrained devices by tapping. Proceedings of the 24th annual ACM symposium on User interface software and technology, ACM. Cited by 26. [ http ]