
Sanjai Narain
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i1]Sanjai Narain, Emily Mak, Dana Chee, Todd Huster, Jeremy E. J. Cohen, Kishore Pochiraju, Brendan J. Englot, Niraj K. Jha, Karthik Narayan:
Robot Design With Neural Networks, MILP Solvers and Active Learning. CoRR abs/2010.09842 (2020)
2010 – 2019
- 2015
- [c24]Kishore Pochiraju, Sanjai Narain:
Cyber Physical System Integration and Configuration Guided by Satisfiability Modulo Theories. IRI 2015: 589-592 - 2014
- [c23]Shuyuan Zhang, Sharad Malik, Sanjai Narain, Laurent Vanbever:
In-Band Update for Network Routing Policy Migration. ICNP 2014: 356-361 - 2013
- [c22]Sanjai Narain:
ConfigAssure: A Science of Configuration. MILCOM 2013: 1497-1498 - 2012
- [c21]Shuyuan Zhang, Abdulrahman Mahmoud, Sharad Malik, Sanjai Narain:
Verification and synthesis of firewalls using SAT and QBF. ICNP 2012: 1-6 - 2011
- [c20]Sanjai Narain, Sharad Malik, Ehab Al-Shaer:
Towards Eliminating Configuration Errors in Cyber Infrastructure. SafeConfig 2011
2000 – 2009
- 2009
- [j5]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - [e1]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu:
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3 [contents] - 2008
- [j4]Sanjai Narain, Gary Levin, Sharad Malik, Vikram Kaul:
Declarative Infrastructure Configuration Synthesis and Debugging. J. Netw. Syst. Manag. 16(3): 235-258 (2008) - 2005
- [c19]Sanjai Narain:
Network Configuration Management via Model Finding. LISA 2005: 155-168 - 2004
- [j3]Xiaohu Qie, Sanjai Narain:
Using service grammar to diagnose BGP configuration errors. Sci. Comput. Program. 53(2): 125-141 (2004) - 2003
- [c18]William Stephens, Brian A. Coan, Sanjai Narain, Vikram Kaul, Kirthika Parmeswaran, Thanh Cheng:
A Toolkit For Building Secure, Fault-Tolerant Virtual Private Networks Technology Description. DISCEX (2) 2003: 55-57 - [c17]Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram Kaul, Kirthika Parmeswaran, William Stephens:
Building Autonomic Systems Via Configuration. Active Middleware Services 2003: 77-85 - [c16]Xiaohu Qie, Sanjai Narain:
Using Service Grammar to Diagnose BGP Configuration Errors. LISA 2003: 237-246 - 2002
- [c15]Melbourne Barton, Derek Atkins, John Lee, Sanjai Narain, Deidra Ritcherson, Kemal E. Tepe, K. Daniel Wong:
Integration of IP mobility and security for secure wireless communications. ICC 2002: 1045-1049 - 2001
- [c14]Sanjai Narain, M. Rangadurai, Abdul-Rahim Shareef:
Diagnosing configuration errors in virtual private networks. ICC 2001: 189-193 - [c13]Sanjai Narain, Ravichander Vaidyanathan, Stanley Moyer, William Stephens, Kirthika Parmeswaran, Abdul-Rahim Shareef:
Middleware For Building Adaptive Systems Via Configuration. LCTES/OM 2001: 188-195
1990 – 1999
- 1995
- [c12]Sanjai Narain:
Proofs from Temporal Hypotheses by Symbolic Simulation. Hybrid Systems 1995: 327-339 - 1993
- [c11]Sanjai Narain, Orville Cockings, Ritu Chadha:
A Formal Model of SONET's Alarm-Surveillance Procedures and their Simulation. FORTE 1993: 235-250 - 1992
- [c10]R. C. Sekar, Yow-Jian Lin, Sanjai Narain:
On Modelling and Reasoning About Hybrid Systems. PSTV 1992: 115-129 - 1991
- [c9]Sanjai Narain:
An axiomatic basis for general discrete-event modeling. Winter Simulation Conference 1991: 1073-1082 - 1990
- [c8]Sanjai Narain:
Lazy Evaluation in Logic Programming. ICCL 1990: 218-227 - [c7]Sanjai Narain, Jeff Rothenberg:
Proving temporal properties of hybrid systems. Winter Simulation Conference 1990: 250-256
1980 – 1989
- 1989
- [c6]Sanjai Narain:
Optimization by Non-Deterministic, Lazy Rewriting. RTA 1989: 326-342 - [c5]Sanjai Narain, Jeff Rothenberg:
A logic for simulating discontinous systems. Winter Simulation Conference 1989: 692-701 - 1988
- [b1]Sanjai Narain:
LOG(F): An Optimal Combination of Logic Programming, Rewriting and Lazy Evaluation. University of California at Los Angeles, 1988 - 1986
- [j2]Sanjai Narain:
A Technique for Doing Lazy Evaluation in Logic. J. Log. Program. 3(3): 259-276 (1986) - 1985
- [j1]Sanjai Narain:
Special Feature Mycin: Implementing the Expert System in Loglisp. IEEE Softw. 2(3): 83-88 (1985) - [c4]Sanjai Narain:
A Technique for Doing Lazy Evaluation in Logic. SLP 1985: 261-269 - 1984
- [c3]Sanjai Narain:
MYCIN in a Logic Programming Environment. COMPCON 1984: 192-199 - 1983
- [c2]Sanjai Narain, David McArthur, Philip Klahr:
Large-Scale System Development in Several Lisp Environments. IJCAI 1983: 859-861 - 1982
- [c1]Philip Klahr, David McArthur, Sanjai Narain:
SWIRL: An Object-Oriented Air Battle Simulator. AAAI 1982: 331-334
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-20 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint