Skip navigation

Building Resilient Cyberinfrastructure

1. Mitra, A., Richards, J. A., Bagchi, S., and Sundaram, S. (2019). Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements. Autonomous Robots, Springer US. Cited by 4. [ http ]

2. Mahgoub, A., Wood, P., Medoff, A., Mitra, S., Meyer, F., Chaterji, S., and Bagchi, S. (2019). EUNOMIA: Online reconfiguration of Clustered NoSQL Databases for Time-VaryingWorkloads. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/online-nosql-tuning_usenixatc19_submitted.pdf. Cited by 1. [ http ]

3. Abdallah, M., Naghizadeh, P., Hota, A., Cason, T., Bagchi, S., and Sundaram, S. (2019). The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems. Other, . [ http ]

4. Laguna, I., Wood, P. C., Singh, R., and Bagchi, S. (2019). GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications. Other, Springer, Cham. [ http ]

5. Kotipalli, P., Singh, R., Wood, P., Laguna, I., and Bagchi, S. (2019). AMPT-GA: Automatic Mixed Precision Floating Point Tuning for GPU Applications. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/gpu-fp-tuning_ics19_submitted.pdf. [ http ]

6. Wood, P., Zhang, H., Siddiqui, M., and Bagchi, S. (2019). Dependability in Edge Computing. Communications of the ACM, https://engineering.purdue.edu/dcsl/publications/papers/2018/final_edge_reliability_cacm18_revision.pdf. [ http ]

7. Almakhdhub, N., Clements, A., Payer, M., and Bagchi, S. (2019). BenchIoT: A Security Benchmark for the Internet of Things. Other, https://engineering.purdue.edu/dcsl/publications/papers/2019/final_iot2_dsn19_cameraready.pdf. [ http ]

8. Saumya, C., Koo, J., Kulkarni, M., and Bagchi, S. (2019). XSTRESSOR: Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions. Other, IEEE. [ http ]

9. Koo, J., Saumya, C., Kulkarni, M., and Bagchi, S. (2019). PySE: Automatic Worst-Case Test Generation by Reinforcement Learning. Other, . [ http ]

10. Saumya, C., Koo, J., Kulkarni, M., and Bagchi, S. (2019). XSTRESSOR: Automatic Generation of Large-Scale Test Inputs by Inferring Path Conditions. Other, . [ http ]

11. Hall, M., Ladner, R., Levitt, D., Quiñones, M. A. P., and Bagchi, S. (2019). Smoothing the path to computing: pondering uses for big data. Communications of the ACM, ACM. [ http ]

12. Palod, P., Patwari, A., Bahety, S., Bagchi, S., and Goyal, P. (2019). Misleading Metadata Detection on YouTube. Other, arXiv preprint arXiv:1901.08759. [ http ]

13. Liu, J., Robson, M., Quinn, T., and Kulkarni, M. (2019). Efficient GPU tree walks for effective distributed n-body simulations. Other, ACM. [ http ]

14. Sakka, L., Sundararajah, K., Newton, R. R., and Kulkarni, M. (2019). Sound, fine-grained traversal fusion for heterogeneous trees. Other, ACM. [ http ]

15. Vollmer, M., Koparkar, C., Rainey, M., Sakka, L., Kulkarni, M., and Newton, R. R. (2019). LoCal: a language for programs operating on serialized data. Other, ACM. [ http ]

16. Sundararajah, K., and Kulkarni, M. (2019). Composable, sound transformations of nested recursion and loops. Other, ACM. [ http ]

17. Wright, C., Krishnamoorty, S., and Kulkarni, M. (2019). MULKSG: MULtiple KSimultaneous Graph Assembly. Other, Springer, Cham. [ http ]

18. Saumya, C., Koo, J., Kulkarni, M., and Bagchi, S. (2019). XSTRESSOR: Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions. Other, IEEE. [ http ]

19. Koo, J., Saumya, C., Kulkarni, M., and Bagchi, S. (2019). PySE: Automatic Worst-Case Test Generation by Reinforcement Learning. Other, IEEE. [ http ]

20. Sakka, L., Sundararajah, K., Newton, R. R., and Kulkarni, M. (2019). Sound, Fine-Grained Traversal Fusion for Heterogeneous Trees-Extended Version. arXiv preprint arXiv:1904.07061, . [ http ]

21. Gutierrez, C. N., Kim, T., Corte, R. D., Avery, J., Goldwasser, D., Cinque, M., and Bagchi, S. (2018). Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE. Cited by 4. [ http ]

22. Bagchi, S., Kumar, R., Kalyanam, R., Harrell, S., Ellis, C. A., and Song, C. (2018). FRESCO: Open Source Data Repository for Computational Usage and Failures. Other, . [ http ]

23. Gutierrez, C. N., Spafford, E. H., Bagchi, S., and Yurek, T. (2018). Reactive redundancy for data destruction protection (R2D2). Computers & Security, Elsevier Advanced Technology. [ http ]

24. Shankar, R., Kobin, B., Bagchi, S., Kistler, M., and Rellermeyer, J. (2018). MAVIS: Managing Datacenters using Smartphones. arXiv preprint arXiv:1802.06270, . [ http ]

25. Clements, A. A., Almakhdhub, N. S., Saab, K. S., Srivastava, P., Koo, J., Bagchi, S., and Payer, M. (2017). Protecting Bare-metal Embedded Systems With Privilege Overlays. Other, IEEE. Cited by 20. [ http ]

26. Mitra, S., Gupta, M. K., Misailovic, S., and Bagchi, S. (2017). Phase-aware optimization in approximate computing. Code Generation and Optimization (CGO), 2017 IEEE/ACM International Symposium on, IEEE. Cited by 14. [ http ]

27. Mahgoub, A., Wood, P., Ganesh, S., Mitra, S., Gerlach, W., Harrison, T., Meyer, F., Grama, A., Bagchi, S., and Chaterji, S. (2017). Rafiki: A Middleware for Parameter Tuning of NoSQL Datastores for Dynamic Metagenomics Workloads. ACM/IFIP/USENIX Middleware Conference, . Cited by 7. [ http ]

28. Patwari, A., Laguna, I., Schulz, M., and Bagchi, S. (2017). Understanding the Spatial Characteristics of DRAM Errors in HPC Clusters. Other, ACM. Cited by 3. [ http ]

29. Kannan, S., Wood, P., Deatrick, L., Beane, P., Chaterji, S., and Bagchi, S. (2017). TopHat: Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. International Conference on Security and Privacy in Communication System, Springer. Cited by 1. [ http ]

30. Bagchi, K. J. S., Theera-Ampornpunt, N., Ammar, M., Zegura, E., Mangla, T., and Panta, R. K. (2017). TANGO: Performance and Fault Management in Cellular Networks through Cooperation between Devices and Edge Computing Nodes. Other, . [ http ]

31. Thottethodi, M., Vijaykumar, T., and Kulkarni, M. (2017). Efficient Collaborative Approximation in MapReduce without Missing Rare Keys. Other, IEEE. [ http ]

32. Notarnicola, I., Sun, Y., Scutari, G., and Notarstefano, G. (2017). Distributed big-data optimization via block communications. Other, IEEE. Cited by 5. [ http ]

33. Cannelli, L., Facchinei, F., Kungurtsev, V., and Scutari, G. (2017). Asynchronous parallel nonconvex large-scale optimization. Other, IEEE. Cited by 2. [ http ]

34. Huang, G., Xu, M., Lin, F. X., Liu, Y., Ma, Y., Pushp, S., and Liu, X. (2017). ShuffleDog: Characterizing and Adapting User-Perceived Latency of Android Apps. IEEE Transactions on Mobile Computing, IEEE. Cited by 10. [ http ]

35. Akyildiz, I. F., Wang, P., and Lin, S. (2016). SoftWater: Software-defined networking for next-generation underwater communication systems. Ad Hoc Networks, Elsevier. Cited by 44. [ http ]

36. Mitra, S., Panta, R., Ra, M., and Bagchi, S. (2016). Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. Proceedings of the Eleventh European Conference on Computer Systems, ACM. Cited by 36. [ http ]

37. Mangla, T., Theera-Ampornpunt, N., Ammar, M., Zegura, E., and Bagchi, S. (2016). Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments. Proceedings of the 8th International Workshop on Mobile Video, ACM. Cited by 22. [ http ]

38. Mahadik, K., Wright, C., Zhang, J., Kulkarni, M., Bagchi, S., and Chaterji, S. (2016). SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications. Proceedings of the 2016 International Conference on Supercomputing, ACM. Cited by 15. [ http ]

39. Thomas, T. E., Bhattad, A. J., Mitra, S., and Bagchi, S. (2016). Sirius: Neural network based probabilistic assertions for detecting silent data corruption in parallel programs. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 6. [ http ]

40. Shin, D., Bagchi, S., and Wang, C. (2016). Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks. IEEE Transactions on Mobile Computing, IEEE. Cited by 4. [ http ]

41. Theera-Ampornpunt, N., Mangla, T., Bagchi, S., Panta, R., Joshi, K., Ammar, M., and Zegura, E. (2016). TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 2. [ http ]

42. Mitra, S., Javagal, S., Maji, A. K., Gamblin, T., Moody, A., Harrell, S., and Bagchi, S. (2016). A Study of Failures in Community Clusters: The Case of Conte. Software Reliability Engineering Workshops (ISSREW), 2016 IEEE International Symposium on, IEEE. Cited by 1. [ http ]

43. Sarmin, S., Bagchi, S., and Al Islam, A. (2016). Chameleon: defending secret information from eavesdropping over physical environment. 2016 International Conference on Networking Systems and Security (NSysS), IEEE. [ http ]

44. Liu, J., Hegde, N., and Kulkarni, M. (2016). Hybrid CPU-GPU scheduling and execution of tree traversals. Proceedings of the 2016 International Conference on Supercomputing, ACM. Cited by 13. [ http ]

45. Hegde, N., Liu, J., and Kulkarni, M. (2016). SPIRIT: a runtime system for distributed irregular tree applications. Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, ACM. Cited by 1. [ http ]

46. Lu, Y., Kulkarni, M., Jaber, N., and Zhu, J. X. (2016). Programming language support for analyzing non-persistent data. Technologies for Homeland Security (HST), 2016 IEEE Symposium on, IEEE. [ http ]

47. Di Lorenzo, P., and Scutari, G. (2016). Next: In-network nonconvex optimization. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 134. [ http ]

48. Sun, Y., Scutari, G., and Palomar, D. (2016). Distributed nonconvex multiagent optimization over time-varying networks. arXiv preprint arXiv:1607.00249, . Cited by 56. [ http ]

49. Al-Shuwaili, A. N., Simeone, O., Bagheri, A., and Scutari, G. (2016). Joint Uplink/Downlink Optimization for Backhaul-Limited Mobile Cloud Computing with User Scheduling. arXiv preprint arXiv:1607.06521, . Cited by 25. [ http ]

50. Guan, Z., Melodia, T., and Scutari, G. (2016). To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks. IEEE/ACM Transactions on Networking, IEEE. Cited by 19. [ http ]

51. Di Lorenzo, P., and Scutari, G. (2016). Distributed nonconvex optimization over time-varying networks. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 13. [ http ]

52. Song, P., Scutari, G., Facchinei, F., and Lampariello, L. (2016). D3m: Distributed multi-cell multigroup multicasting. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 10. [ http ]

53. Maji, A. K., Mitra, S., and Bagchi, S. (2015). Ice: An integrated configuration engine for interference mitigation in cloud services. Autonomic Computing (ICAC), 2015 IEEE International Conference on, IEEE. Cited by 21. [ http ]

54. Wood, P., Gutierrez, C., and Bagchi, S. (2015). Denial of Service Elusion (DoSE): Keeping clients connected for less. Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on, IEEE. Cited by 18. [ http ]

55. Laguna, I., Ahn, D. H., Supinski, B. R. d., Gamblin, T., Lee, G. L., Schulz, M., Bagchi, S., Kulkarni, M., Zhou, B., Chen, Z., and Qin, F. (2015). Debugging high-performance computing applications at massive scales. Communications of the ACM, ACM. Cited by 13. [ http ]

56. Tancreti, M., Sundaram, V., Bagchi, S., and Eugster, P. (2015). TARDIS: software-only system-level record and replay in wireless sensor networks. Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM. Cited by 12. [ http ]

57. Mitra, S., Bronevetsky, G., Javagal, S., and Bagchi, S. (2015). Dealing with the unknown: Resilience to prediction errors. Parallel Architecture and Compilation (PACT), 2015 International Conference on, IEEE. Cited by 8. [ http ]

58. Gutierrez, C. N., Bagchi, S., Mohammed, H., and Avery, J. (2015). Modeling Deception In Information Security As A Hypergame–A Primer. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. Cited by 5. [ http ]

59. Avery, J., Gutierrez, C., Wood, P., Corte, R. D., Modelo-Howard, J. F. G., Berndt, B., McDermott, K., Bagchi, S., Goldwasser, D., and Cinque, M. (2015). SNIPE: signature generation for phishing emails. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. Cited by 1. [ http ]

60. Tancreti, M., Sundaram, V., Bagchi, S., and Eugster, P. (2015). Software-only system-level record and replay in wireless sensor networks. Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM. [ http ]

61. Ren, B., Jo, Y., Krishnamoorthy, S., Agrawal, K., and Kulkarni, M. (2015). Efficient execution of recursive programs on commodity vector hardware. ACM SIGPLAN Notices, ACM. Cited by 21. [ http ]

62. Bond, M. D., Kulkarni, M., Cao, M., Salmi, M. F., and Huang, J. (2015). Efficient Deterministic Replay of Multithreaded Executions in a Managed Language Virtual Machine. Proceedings of the Principles and Practices of Programming on The Java Platform, ACM. Cited by 13. [ http ]

63. Liu, C., and Kulkarni, M. (2015). Optimizing the LULESH stencil code using concurrent collections. Proceedings of the 5th International Workshop on Domain-Specific Languages and High-Level Frameworks for High Performance Computing, ACM. Cited by 5. [ http ]

64. Sengupta, A., Cao, M., Bond, M. D., and Kulkarni, M. (2015). Toward Efficient Strong Memory Model Support for the Java Platform via Hybrid Synchronization. Proceedings of the Principles and Practices of Programming on The Java Platform, ACM. Cited by 4. [ http ]

65. Kulkarni, M., and Lu, Y. (2015). Beyond Big Data--Rethinking Programming Languages for Non-persistent Data. 2015 International Conference on Cloud Computing and Big Data (CCBD), IEEE. Cited by 3. [ http ]

66. Sardellitti, S., Scutari, G., and Barbarossa, S. (2015). Joint optimization of radio and computational resources for multicell mobile-edge computing. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 360. [ http ]

67. Facchinei, F., Scutari, G., and Sagratella, S. (2015). Parallel selective algorithms for nonconvex big data optimization. IEEE Transactions on Signal Processing, IEEE. Cited by 129. [ http ]

68. Di Lorenzo, P., and Scutari, G. (2015). Distributed nonconvex optimization over networks. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2015 IEEE 6th International Workshop on, IEEE. Cited by 25. [ http ]

69. Xu, C., Lin, F. X., Wang, Y., and Zhong, a. L. (2015). Automated OS-level Device Runtime Power Management. Proc. Int. Conf. Architectural Support for Programming Languages and Operating Systems, ACM. Cited by 22. [ http ]

70. Lin, F. X., Wang, Z., and Zhong, L. (2015). K2: A Mobile Operating System for Heterogeneous Coherence Domains. ACM Transactions on Computer Systems (TOCS), ACM. Cited by 6. [ http ]

71. Snir, M., Wisniewski, R. W., Abraham, J. A., Adve, S. V., Bagchi, S., Balaji, P., Belak, J., Bose, P., Cappello, F., Carlson, B., and others, B. (2014). Addressing failures in exascale computing. International Journal of High Performance Computing Applications, Sage Publications. Cited by 260. [ http ]

72. Maji, A. K., Mitra, S., Zhou, B., Bagchi, S., and Verma, A. (2014). Mitigating interference in cloud services by middleware reconfiguration. Proceedings of the 15th International Middleware Conference, ACM. Cited by 50. [ http ]

73. Mitra, S., Laguna, I., Ahn, D. H., Bagchi, S., Schulz, M., and Gamblin, T. (2014). Accurate application progress analysis for large-scale parallel debugging. ACM SIGPLAN Notices, ACM. Cited by 25. [ http ]

74. Mahadik, K., Chaterji, S., Zhou, B., Kulkarni, M., and Bagchi, S. (2014). Orion: Scaling genomic sequence matching with fine-grained parallelization. SC14: International Conference for High Performance Computing, Networking, Storage and Analysis, IEEE. Cited by 17. [ http ]

75. Howard, G. M., Gutierrez, C. N., Arshad, F. A., Bagchi, S., and Qi, Y. (2014). psigene: Webcrawling to generalize sql injection signatures. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE. Cited by 17. [ http ]

76. Islam, T. Z., Bagchi, S., and Eigenmann, R. (2014). Reliable and Efficient Distributed Checkpointing System for Grid Environments. Journal of Grid Computing, Springer. Cited by 6. [ http ]

77. Avery, J., Modelo-Howard, G., Arshad, F., Bagchi, S., and Qi, Y. (2014). pSigene: generalizing attack signatures. Proceedings of the 15th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

78. Bowen, Z., Bronevetsky, G., Casas-Guix, M., and Bagchi, S. (2014). KONGMING: Performance Prediction in the Cloud via Multidimensional Interference Surrogates. Tech Report, Lawrence Livermore National Laboratory (LLNL), Livermore, CA. [ http ]

79. Arshad, F. A., Maji, A. K., Mudgal, S., and Bagchi, S. (2014). Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?. 11th International Conference on Autonomic Computing (ICAC 14), . [ http ]

80. Kulkarni, M., Choudhary, L., Kumbhani, B., and Kshetrimayum, R. S. (2014). Performance analysis comparison of transmit antenna selection with maximal ratio combining and orthogonal space time block codes in equicorrelated Rayleigh fading multiple input multiple output channels. IET Communications, IET. Cited by 12. [ http ]

81. Bond, M. D., Kulkarni, M., Cao, M., Salmi, M. F., and Huang, J. (2014). Efficient Deterministic Replay of Multithreaded Programs Based on Efficient Tracking of Cross-Thread Dependences. Ohio Sate CSE Tech Report OSU-CISRC-12/14-TR20. Ohio State University, . Cited by 1. [ http ]

82. Sardellitti, S., Barbarossa, S., and Scutari, G. (2014). Distributed mobile cloud computing: Joint optimization of radio and computational resources. 2014 IEEE Globecom Workshops (GC Wkshps), IEEE. Cited by 19. [ http ]

83. Facchinei, F., Pang, J., Scutari, G., and Lampariello, L. (2014). VI-constrained hemivariational inequalities: distributed algorithms and power control in ad-hoc networks. Mathematical Programming, Springer. Cited by 19. [ http ]

84. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint optimization of radio and computational resources for multicell mobile cloud computing. Signal Processing Advances in Wireless Communications (SPAWC), 2014 IEEE 15th International Workshop on, IEEE. Cited by 14. [ http ]

85. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Distributed joint optimization of radio and computational resources for mobile cloud computing. Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, IEEE. Cited by 10. [ http ]

86. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint cell selection and radio resource allocation in MIMO small cell networks via successive convex approximation. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 10. [ http ]

87. LiKamWa, R., Wang, Z., Carroll, A., Lin, F. X., and Zhong, L. (2014). Draining our glass: An energy and heat characterization of google glass. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 75. [ http ]

88. Xu, C., Lin, F. X., and Zhong, L. (2014). Device drivers should not do power management. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 5. [ http ]

89. Shin, D., Moses, D., Venkatachalam, M., and Bagchi, S. (2013). Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches. IEEE network, IEEE. Cited by 44. [ http ]

90. Shin, D., and Bagchi, S. (2013). An optimization framework for monitoring multi-channel multi-radio wireless mesh networks. Ad Hoc Networks, Elsevier. Cited by 19. [ http ]

91. Arshad, F. A., Krause, R. J., and Bagchi, S. (2013). Characterizing configuration problems in java ee application servers: An empirical study with glassfish and jboss. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), IEEE. Cited by 16. [ http ]

92. Laguna, I., Mitra, S., Arshad, F. A., Theera-Ampornpunt, N., Zhu, Z., Bagchi, S., Midkiff, S. P., Kistler, M., and Gheith, A. (2013). Automatic problem localization via multi-dimensional metric profiling. 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, IEEE. Cited by 13. [ http ]

93. Theera-Ampornpunt, N., Bagchi, S., Joshi, K. R., and Panta, R. K. (2013). Using big data for more dependability: a cellular network tale. Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, ACM. Cited by 11. [ http ]

94. Shin, D., Bagchi, S., and Wang, C. (2013). Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks. 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), IEEE. Cited by 5. [ http ]

95. Khalil, I., Bagchi, S., AbuAli, N., and Hayajneh, M. (2013). DISA: Detection and isolation of sneaky attackers in locally monitored multi‐hop wireless networks. Security and Communication Networks, . Cited by 3. [ http ]

96. Mitra, S., Laguna, I., Ahn, D. H., Gamblin, T., Schulz, M., and Bagchi, S. (2013). Scalable parallel debugging via loop-aware progress dependence analysis. appear as a poster at the 25th IEEE/ACM International Conference for High Performance Computing, Networking, Storage and Analysis (Supercomputing), . Cited by 2. [ http ]

97. Koo, J., Shin, D., Lin, X., and Bagchi, S. (2013). A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks. Ad Hoc Networks, Elsevier. Cited by 1. [ http ]

98. Bagchi, S., Arshad, F., Rellermeyer, J., Osiecki, T., Kistler, M., and Gheith, A. (2013). Lilliput meets brobdingnagian: Data center systems management through mobile devices. 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE. Cited by 1. [ http ]

99. Modelo-Howard, G., Arshad, F., Gutierrez, C., Bagchi, S., and Qi, Y. (2013). pSigene: webcrawling to generalize SQLi signatures. Proceedings of the 14th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

100. Chuang, W., Sang, B., Yoo, S., Gu, R., Kulkarni, M., and Killian, C. (2013). Eventwave: Programming model and runtime support for tightly-coupled elastic cloud applications. Proceedings of the 4th annual Symposium on Cloud Computing, ACM. Cited by 26. [ http ]

101. Zhou, B., Too, J., Kulkarni, M., and Bagchi, S. (2013). WuKong: automatically detecting and localizing bugs that manifest at large system scales. Proceedings of the 22nd international symposium on High-performance parallel and distributed computing, ACM. Cited by 16. [ http ]

102. AlSaber, N., and Kulkarni, M. (2013). SemCache: semantics-aware caching for efficient GPU offloading. Proceedings of the 27th international ACM conference on International conference on supercomputing, ACM. Cited by 15. [ http ]

103. Liu, C., Jamal, M. H., Kulkarni, M., Prakash, A., and Pai, V. (2013). Exploiting domain knowledge to optimize parallel computational mechanics codes. Proceedings of the 27th international ACM conference on International conference on supercomputing, ACM. Cited by 11. [ http ]

104. Yang, Y., Scutari, G., Song, P., and Palomar, D. P. (2013). Robust MIMO cognitive radio systems under interference temperature constraints. IEEE Journal on Selected Areas in Communications, IEEE. Cited by 48. [ http ]

105. Islam, T. Z., Mohror, K., Bagchi, S., Moody, A., Supinski, B. R. D., and Eigenmann, R. (2012). McrEngine: A scalable checkpointing system using data-aware aggregation and compression. Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, IEEE Computer Society Press. Cited by 95. [ http ]

106. Maji, A. K., Arshad, F. A., Bagchi, S., and Rellermeyer, J. S. (2012). An empirical study of the robustness of inter-component communication in Android. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 95. [ http ]

107. Bronevetsky, G., Laguna, I., de Supinski, B. R., and Bagchi, S. (2012). Automatic fault characterization via abnormality-enhanced classification. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 46. [ http ]

108. Shin, D., Bagchi, S., and Wang, C. (2012). Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 32. [ http ]

109. Laguna, I., Ahn, D. H., de Supinski, B. R., Bagchi, S., and Gamblin, T. (2012). Probabilistic diagnosis of performance faults in large-scale parallel applications. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 22. [ http ]

110. Tsai, T., Theera-Ampornpunt, N., and Bagchi, S. (2012). A study of soft error consequences in hard disk drives. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 13. [ http ]

111. Rellermeyer, J. S., and Bagchi, S. (2012). Dependability as a cloud service-a modular approach. IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), IEEE. Cited by 8. [ http ]

112. Al Islam, A. A., Alam, S. I., Raghunathan, V., and Bagchi, S. (2012). Multi-armed bandit congestion control in multi-hop infrastructure wireless mesh networks. 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, IEEE. Cited by 7. [ http ]

113. Arshad, F. A., Modelo-Howard, G., and Bagchi, S. (2012). To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network. 2012 20th IEEE International Conference on Network Protocols (ICNP), IEEE. Cited by 4. [ http ]

114. Panta, R. K., and Bagchi, S. (2012). Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, IEEE. Cited by 3. [ http ]

115. Zhou, B., Kulkarni, M., and Bagchi, S. (2012). ABHRANTA: Locating Bugs that Manifest at Large System Scales.. HotDep, . Cited by 3. [ http ]

116. Jo, Y., and Kulkarni, M. (2012). Automatically enhancing locality for tree traversals with traversal splicing. ACM SIGPLAN Notices, ACM. Cited by 23. [ http ]

117. Bond, M. D., and Kulkarni, M. (2012). Tracking Conflicting Accesses Efficiently for Software Record and Replay. Tech Report, Technical report, Ohio State University. Cited by 2. [ http ]

118. Chuang, W., Sang, B., Killian, C. E., and Kulkarni, M. (2012). Programming Model Support for Dependable, Elastic Cloud Applications.. HotDep, . Cited by 2. [ http ]

119. Scutari, G., Palomar, D. P., Facchinei, F., and Pang, J. (2012). Monotone games for cognitive radio systems. Distributed Decision Making and Control, Springer. Cited by 64. [ http ]

120. Scutari, G., Facchinei, F., Pang, J., and Lampariello, L. (2012). Equilibrium selection in power control games on the interference channel. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 12. [ http ]

121. Scutari, G., Facchinei, F., and Pang, J. (2012). Equilibrium selection in MIMO communication games. 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE. Cited by 2. [ http ]

122. Liu, C., Li, J., Huang, W., Rubio, J., Speight, E., and Lin, X. (2012). Power-efficient time-sensitive mapping in heterogeneous systems. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 42. [ http ]

123. Lin, F. X., Wang, Z., and Zhong, L. (2012). Supporting distributed execution of smartphone workloads on loosely coupled heterogeneous processors. Presented as part of the 2012 Workshop on Power-Aware Computing and Systems, . Cited by 12. [ http ]

124. Wang, Z., Lin, F. X., Zhong, L., and Chishtie, M. (2012). Guadalupe: a browser design for heterogeneous hardware. arXiv preprint arXiv:1212.5170, . Cited by 1. [ http ]

125. Hacker, T. J., Eigenmann, R., Bagchi, S., Irfanoglu, A., Pujol, S., Catlin, A., and Rathje, E. (2011). The neeshub cyberinfrastructure for earthquake engineering. Computing in Science \& Engineering, AIP Publishing. Cited by 50. [ http ]

126. Panta, R. K., Bagchi, S., and Midkiff, S. P. (2011). Efficient incremental code update for sensor networks. ACM Transactions on Sensor Networks (TOSN), ACM. Cited by 38. [ http ]

127. Laguna, I., Gamblin, T., de Supinski, B. R., Bagchi, S., Bronevetsky, G., Anh, D. H., Schulz, M., and Rountree, B. (2011). Large scale debugging of parallel tasks with automaded. Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, ACM. Cited by 26. [ http ]

128. Zhou, B., Kulkarni, M., and Bagchi, S. (2011). Vrisha: using scaling properties of parallel programs for bug detection and localization. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 19. [ http ]

129. Hariharan, S., Shroff, N. B., and Bagchi, S. (2011). Secure neighbor discovery through overhearing in static multihop wireless networks. Computer Networks, Elsevier. Cited by 17. [ http ]

130. Wang, M., Li, Z., Li, F., Feng, X., Bagchi, S., and Lu, Y. (2011). Dependence-based multi-level tracing and replay for wireless sensor networks debugging. ACM SIGPLAN Notices, ACM. Cited by 11. [ http ]

131. Modelo-Howard, G., Sweval, J., and Bagchi, S. (2011). Secure configuration of intrusion detection sensors for changing enterprise systems. International Conference on Security and Privacy in Communication Systems, Springer. Cited by 7. [ http ]

132. Maji, A. K., and Bagchi, S. (2011). v-CAPS: a confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks. International Conference on Security and Privacy in Communication Systems, Springer Berlin Heidelberg. Cited by 6. [ http ]

133. Modelo-Howard, G., Bagchi, S., and Lebanon, G. (2011). Approximation algorithms for determining placement of intrusion detectors. CERIASTech. Report, . Cited by 3. [ http ]

134. Theera-Ampornpunt, N., Zhou, B., and Bagchi, S. (2011). Predicting Time to Failure for Large Scale Distributed Systems. 42nd Annual IEEE/IFIP International Conference On Dependable Systems And Networks (DSN 2011), . Cited by 2. [ http ]

135. Sinha, K., and Kulkarni, M. (2011). Techniques for fine-grained, multi-site computation offloading. Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Computer Society. Cited by 59. [ http ]

136. Jo, Y., and Kulkarni, M. (2011). Enhancing locality for recursive traversals of recursive structures. ACM SIGPLAN Notices, ACM. Cited by 39. [ http ]

137. Zhou, B., Kulkarni, M., and Bagchi, S. (2011). Vrisha: using scaling properties of parallel programs for bug detection and localization. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 19. [ http ]

138. Yoo, S., Lee, H., Killian, C., and Kulkarni, M. (2011). Incontext: simple parallelism for distributed applications. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 14. [ http ]

139. Lin, F. X., Ashbrook, D., and White, S. (2011). RhythmLink: securely pairing I/O-constrained devices by tapping. Proceedings of the 24th annual ACM symposium on User interface software and technology, ACM. Cited by 24. [ http ]