default search action
R. K. Shyamasundar
Rudrapatna K. Shyamasundar
Person information
- affiliation: Tata Institute of Fundamental Research, Mumbai, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c142]Rudrapatna K. Shyamasundar:
Characterization of Consensus Correctness in Ripple (XRP) Networks. SECRYPT 2024: 103-113 - 2023
- [c141]Sangita Roy, Rudrapatna K. Shyamasundar:
An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress. DBSec 2023: 404-412 - [c140]Rudrapatna K. Shyamasundar:
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract. SECRYPT 2023: 557-566 - [c139]Sangita Roy, Rudrapatna K. Shyamasundar:
A Rand Index-Based Analysis of Consensus Protocols. SECRYPT 2023: 567-576 - [e19]Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar:
Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings. Lecture Notes in Computer Science 14424, Springer 2023, ISBN 978-3-031-49098-9 [contents] - 2022
- [c138]R. K. Shyamasundar:
A Framework of Runtime Monitoring for Correct Execution of Smart Contracts. ICBC 2022: 92-116 - [c137]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes. ICISS 2022: 84-102 - [c136]Sandip Ghosal, R. K. Shyamasundar:
Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling. ICISS 2022: 202-219 - [c135]Vishwas T. Patil, R. K. Shyamasundar:
Evolving Role of PKI in Facilitating Trust. PKIA 2022: 1-7 - [e18]Shiping Chen, Rudrapatna K. Shyamasundar, Liang-Jie Zhang:
Blockchain - ICBC 2022 - 5th International Conference, Held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings. Lecture Notes in Computer Science 13733, Springer 2022, ISBN 978-3-031-23494-1 [contents] - [e17]Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar:
Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings. Lecture Notes in Computer Science 13784, Springer 2022, ISBN 978-3-031-23689-1 [contents] - 2021
- [j53]Ying Li, R. K. Shyamasundar, Xinheng Wang:
Special issue on computational intelligence for social media data mining and knowledge discovery. Comput. Intell. 37(2): 658-659 (2021) - [j52]Anshu S. Anand, Karthik Sayani, R. K. Shyamasundar:
Fortress Abstractions in X10 Framework. Int. J. Parallel Program. 49(6): 911-933 (2021) - [j51]R. K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal, Aniket Kuiri:
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models. Inf. Syst. Frontiers 23(4): 811-833 (2021) - [j50]Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin:
Guest editorial special issue on "P2P computing for deep learning". Peer-to-Peer Netw. Appl. 14(3): 1734-1735 (2021) - [c134]B. S. Radhika, R. K. Shyamasundar:
Realizing Information Flow Control in ABAC Mining. CSS 2021: 107-119 - [c133]Vishwas Patil, R. K. Shyamasundar:
Landcoin: A Practical Protocol for Transfer-of-Asset. ICISS 2021: 124-141 - [c132]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. ICSE (NIER) 2021: 31-35 - [c131]Amit Goyal, R. K. Shyamasundar, G. Sivakumar, Raoul Jetley, Srini Ramaswamy:
Empirical Analysis of Greedy, GE and GRE Heuristics. ISEC 2021: 6:1-6:11 - [c130]Amit Goyal, Akshat Garg, Digvijaysingh Gour, R. K. Shyamasundar, G. Sivakumar:
Information Flow Secure CAmkES. IoTBDS 2021: 237-244 - [c129]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen:
SP*: An Information Flow Secure Linux. ISPA/BDCloud/SocialCom/SustainCom 2021: 1603-1612 - [c128]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil:
App2SecApp: privacy protection from Android applications. SAC 2021: 908-911 - [c127]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Towards Unifying RBAC with Information Flow Control. SACMAT 2021: 45-54 - [c126]Parjanya Vyas, R. K. Shyamasundar:
SecSDN: A Novel Architecture for a Secure SDN. SECRYPT 2021: 587-594 - [e16]Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan:
Information Systems Security - 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings. Lecture Notes in Computer Science 13146, Springer 2021, ISBN 978-3-030-92570-3 [contents] - [i6]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. CoRR abs/2103.02171 (2021) - [i5]Sandip Ghosal, R. K. Shyamasundar:
Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs/2103.06039 (2021) - 2020
- [j49]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. Comput. Secur. 94: 101816 (2020) - [c125]Sandip Ghosal, R. K. Shyamasundar:
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. APSEC 2020: 51-60 - [c124]Sandip Ghosal, R. K. Shyamasundar:
Information Flow Security Certification for SPARK Programs. DBSec 2020: 137-150
2010 – 2019
- 2019
- [j48]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
STMs in practice: Partial rollback vs pure abort mechanisms. Concurr. Comput. Pract. Exp. 31(5) (2019) - [j47]Anshu S. Anand, Akash Srivastava, R. K. Shyamasundar:
A deadlock-free lock-based synchronization for GPUs. Concurr. Comput. Pract. Exp. 31(7) (2019) - [c123]Vishwas T. Patil, R. K. Shyamasundar:
Is Privacy a Myth for Facebook Users? ICETE (2) 2019: 510-516 - [c122]Amit Goyal, R. K. Shyamasundar, Raoul Jetley, Devina Mohan, Srini Ramaswamy:
Test Suite Minimization of Evolving Software Systems: A Case Study. ICSOFT 2019: 226-237 - [c121]Manjunath Bilur, Anugrah Gari, R. K. Shyamasundar:
Threat Assessment of Enterprise Applications via Graphical Modelling. NSS 2019: 146-166 - [c120]Rudrapatna K. Shyamasundar, Swatish Satheesan, Deepali Mittal, Aakash Chaudhary:
SecHadoop: A Privacy Preserving Hadoop. UCC 2019: 111-121 - [e15]Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - 2018
- [c119]Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar:
Role of Apps in Undoing of Privacy Policies on Facebook. DBSec 2018: 85-98 - [c118]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. DBSec 2018: 219-231 - [c117]Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:
Security Analysis of EMV Protocol and Approaches for Strengthening It. ICDCIT 2018: 69-85 - [c116]Shashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. ICDCIT 2018: 86-104 - [c115]Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:
Static Security Certification of Programs via Dynamic Labelling. ICETE (2) 2018: 400-411 - [c114]Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar:
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. ICISS 2018: 24-43 - [c113]Vishwas T. Patil, R. K. Shyamasundar:
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. ICISS 2018: 364-385 - [c112]Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar:
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. ICISS 2018: 427-447 - [c111]N. V. Narendra Kumar, R. K. Shyamasundar:
A Semantic Notion of Secure Information-Flow. ISEA-ISAP 2018: 35-52 - [c110]Sandip Ghosal, R. K. Shyamasundar:
A Solution to "Confused Deputy" Problem Using RWFM Labels. ISEA-ISAP 2018: 67-76 - [c109]Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. TrustCom/BigDataSE 2018: 790-799 - [e14]Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9 [contents] - [i4]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal:
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management. CoRR abs/1806.07530 (2018) - [i3]Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal:
Crowdsensing and privacy in smart city applications. CoRR abs/1806.07534 (2018) - 2017
- [c108]Vishwas T. Patil, R. K. Shyamasundar:
Undoing of Privacy Policies on Facebook. DBSec 2017: 239-255 - [c107]N. V. Narendra Kumar, R. K. Shyamasundar:
Analyzing Protocol Security Through Information-Flow Control. ICDCIT 2017: 159-171 - [c106]N. V. Narendra Kumar, R. K. Shyamasundar:
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. ICDCIT 2017: 183-195 - [c105]Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:
Semi Supervised NLP Based Classification of Malware Documents. ICISS 2017: 334-344 - [c104]R. K. Shyamasundar, N. V. Narendra Kumar, Priyanka Teltumde:
Realizing software vault on Android through information-flow control. ISCC 2017: 1007-1014 - [c103]Vishwas T. Patil, R. K. Shyamasundar:
Privacy as a Currency: Un-regulated?. SECRYPT 2017: 586-595 - [c102]N. V. Narendra Kumar, R. K. Shyamasundar:
A Complete Generative Label Model for Lattice-Based Access Control Models. SEFM 2017: 35-53 - [e13]Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0 [contents] - 2016
- [c101]Abhiroop Bhatnagar, Amit Kumar, Ratan K. Ghosh, Rudrapatna K. Shyamasundar:
A framework of community inspired distributed message dissemination and emergency alert response system over smart phones. COMSNETS 2016: 1-8 - [c100]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c99]N. V. Narendra Kumar, R. K. Shyamasundar:
An End-to-End Privacy Preserving Design of a Map-Reduce Framework. HPCC/SmartCity/DSS 2016: 1469-1476 - [c98]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity proof for CaPR+ algorithm. ICDCN 2016: 16:1-16:4 - 2015
- [c97]N. V. Narendra Kumar, R. K. Shyamasundar:
POSTER: Dynamic Labelling for Analyzing Security Protocols. CCS 2015: 1665-1667 - [c96]Anshu S. Anand, R. K. Shyamasundar:
Scaling Computation on GPUs Using Powerlists. HiPC Workshops 2015: 34-43 - [c95]S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ICISS 2015: 551-561 - [c94]Christophe Cérin, R. K. Shyamasundar, Yuqing Gao, Congfeng Jiang:
HPDIC Introduction and Committees. IPDPS Workshops 2015: 536 - [c93]N. V. Narendra Kumar, R. K. Shyamasundar:
Labelled mobile ambients model for information flow security in distributed systems. SIN 2015: 330-337 - [i2]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity Proof for CaPR+ Algorithm. CoRR abs/1510.06967 (2015) - 2014
- [j46]Shashank Shekhar, Ranjeet Mishra, R. K. Ghosh, R. K. Shyamasundar:
Post-order based routing & transport protocol for wireless sensor networks. Pervasive Mob. Comput. 11: 229-243 (2014) - [c92]N. V. Narendra Kumar, R. K. Shyamasundar:
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels. BDCloud 2014: 753-760 - [e12]Atul Prakash, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4 [contents] - 2013
- [c91]Mesfin Belachew, R. K. Shyamasundar:
Public private partnerships (PPP) in the e-government initiatives for developing nations: the case of Ethiopia. ICEGOV 2013: 42-45 - [c90]Ankur Narang, Abhinav Srivastava, R. K. Shyamasundar:
High Performance Adaptive Distributed Scheduling Algorithm. IPDPS Workshops 2013: 1725-1734 - [c89]R. K. Shyamasundar:
Security and protection of SCADA: a bigdata algorithmic approach. SIN 2013: 20-27 - [e11]R. K. Shyamasundar, Lokendra Shastri, D. Janakiram, Srinivas Padmanabhuni:
Proceedings of the 6th ACM India Computing Convention, COMPUTE 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013. ACM 2013, ISBN 978-1-4503-2545-5 [contents] - [e10]Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha:
Distributed Computing and Networking, 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings. Lecture Notes in Computer Science 7730, Springer 2013, ISBN 978-3-642-35667-4 [contents] - 2012
- [c88]Supriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. CUBE 2012: 635-640 - [c87]Ankur Narang, Abhinav Srivastava, Ramnik Jain, R. K. Shyamasundar:
Dynamic Distributed Scheduling Algorithm for State Space Search. Euro-Par 2012: 141-154 - [c86]Shashank Shekhar, R. K. Ghosh, R. K. Shyamasundar:
Postorder Based Routing and Transport Protocol for WSNs. ICDCN 2012: 281-294 - [c85]Saurabh Joshi, R. K. Shyamasundar, Sanjeev K. Aggarwal:
A New Method of MHP Analysis for Languages with Dynamic Barriers. IPDPS Workshops 2012: 519-528 - [e9]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 5th ACM COMPUTE Conference: Intelligent & scalable system technologies, Pune, India, January 23-24, 2012. ACM 2012, ISBN 978-1-4503-1440-4 [contents] - 2011
- [j45]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Performance driven multi-objective distributed scheduling for parallel computations. ACM SIGOPS Oper. Syst. Rev. 45(2): 14-27 (2011) - [j44]Ankur Narang, Rudrapatna K. Shyamasundar:
Performance driven distributed scheduling of parallel hybrid computations. Theor. Comput. Sci. 412(32): 4212-4225 (2011) - [c84]Nihita Goel, R. K. Shyamasundar:
An Executional Framework for BPMN Using Orc. APSCC 2011: 29-36 - [c83]Nihita Goel, N. V. Narendra Kumar, R. K. Shyamasundar:
SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services. ECOWS 2011: 109-116 - [c82]Shivali Agarwal, Saurabh Joshi, Rudrapatna K. Shyamasundar:
Distributed Generalized Dynamic Barrier Synchronization. ICDCN 2011: 143-154 - [c81]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Affinity Driven Distributed Scheduling Algorithm for Parallel Computations. ICDCN 2011: 167-178 - [p2]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Towards Checking Tampering of Software. Cyber Security, Cyber Crime and Cyber Forensics 2011: 204-219 - [e8]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, Bangalore, India, March 25-26, 2011. ACM 2011, ISBN 978-1-4503-0750-5 [contents] - 2010
- [c80]Nihita Goel, R. K. Shyamasundar:
Automatic Monitoring of SLAs of Web Services. APSCC 2010: 99-106 - [c79]Shivali Agarwal, R. K. Shyamasundar:
A Proof System for a PGAS Language. Concurrency, Compositionality, and Correctness 2010: 162-184 - [c78]R. K. Shyamasundar, Harshit J. Shah, N. V. Narendra Kumar:
Malware: From Modelling to Practical Detection. ICDCIT 2010: 21-39 - [c77]Hrushikesha Mohanty, Rajesh Kurra, R. K. Shyamasundar:
A Framework for Web-Based Negotiation. ICDCIT 2010: 140-151 - [c76]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Can we certify systems for freedom from malware. ICSE (2) 2010: 175-178 - [e7]R. K. Shyamasundar, Prasad Deshpande:
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010. ACM 2010, ISBN 978-1-4503-0001-8 [contents]
2000 – 2009
- 2009
- [j43]A. K. Bhattacharjee, R. K. Shyamasundar:
Activity Diagrams : A Formal Framework to Model Business Processes and Code Generation. J. Object Technol. 8(1): 189-220 (2009) - [c75]Hrushikesha Mohanty, Martha VenkataSwamy, Srini Ramaswamy, R. K. Shyamasundar:
Translating Security Policy to Executable Code for Sandboxing Linux Kernel. EMS 2009: 124-129 - [c74]Harshit J. Shah, R. K. Shyamasundar, Pradeep Varma:
Concurrent SSA for general barrier-synchronized parallel programs. IPDPS 2009: 1-12 - [c73]Shivali Agarwal, Ankur Narang, R. K. Shyamasundar:
Distributed Scheduling of Parallel Hybrid Computations. ISAAC 2009: 1144-1154 - [c72]R. K. Shyamasundar, Shivali Agarwal:
Brief announcement: distributed phase synchronization of dynamic set of processes. PODC 2009: 274-275 - [c71]Pradeep Varma, R. K. Shyamasundar, Harshit J. Shah:
Backward-compatible constant-time exception-protected memory. ESEC/SIGSOFT FSE 2009: 71-80 - [e6]R. K. Shyamasundar:
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009. ACM 2009, ISBN 978-1-60558-476-8 [contents] - 2008
- [j42]Jagadish Suryadevara, Lawrence Chung, R. K. Shyamasundar:
cmUML - A UML based Framework for Formal Specification of Concurrent, Reactive Systems. J. Object Technol. 7(8): 187-207 (2008) - [c70]Shivali Agarwal, Rajkishore Barik, V. Krishna Nandivada, R. K. Shyamasundar, Pradeep Varma:
Static Detection of Place Locality and Elimination of Runtime Checks. APLAS 2008: 53-74 - [c69]A. K. Bhattacharjee, R. K. Shyamasundar:
ScriptOrc: A Specification Language for Web Service Choreography. APSCC 2008: 1089-1096 - [c68]Shivali Agarwal, Rajkishore Barik, R. K. Shyamasundar:
A Static Characterization of Affinity in a Distributed Program. HPCC 2008: 572-579 - [c67]A. K. Bhattacharjee, R. K. Shyamasundar:
Choreography = Orchestration with Scripts + Conversations. ICWS 2008: 824-827 - [e5]R. K. Shyamasundar:
Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008. ACM 2008, ISBN 978-1-59593-950-0 [contents] - 2007
- [j41]Jagadish Suryadevara, R. K. Shyamasundar:
UML-based Approach to Specify Secured, Fine-grained Concurrent Access to Shared Resources. J. Object Technol. 6(1): 107-119 (2007) - [c66]Hrushikesha Mohanty, Jitesh Mulchandani, Deepak Chenthati, R. K. Shyamasundar:
Modeling Web Services with FSM Modules. Asia International Conference on Modelling and Simulation 2007: 100-105 - [c65]Harshit J. Shah, R. K. Shyamasundar:
On Run-Time Enforcement of Policies. ASIAN 2007: 268-281 - [c64]Krishnamani Kalyanasundaram, R. K. Shyamasundar:
Verification of Clock Synchronization in TTP. Formal Models, Languages and Applications 2007: 176-195 - [c63]Roberto Cavada, Alessandro Cimatti, Anders Franzén, Krishnamani Kalyanasundaram, Marco Roveri, R. K. Shyamasundar:
Computing Predicate Abstractions by Integrating BDDs and SMT Solvers. FMCAD 2007: 69-76 - [c62]Frederic Doucet, R. K. Shyamasundar, Ingolf H. Krüger, Saurabh Joshi, Rajesh K. Gupta:
Reactivity in SystemC Transaction-Level Models. Haifa Verification Conference 2007: 34-50 - [c61]Hrushikesha Mohanty, Kakarlamudi Prasad, R. K. Shyamasundar:
Trust Assessment in Web Services: an Extension to jUDDI. ICEBE 2007: 759-762 - [c60]Shivali Agarwal, Rajkishore Barik, Vivek Sarkar, R. K. Shyamasundar:
May-happen-in-parallel analysis of X10 programs. PPoPP 2007: 183-193 - [c59]Shivali Agarwal, Rajkishore Barik, Dan Bonachea, Vivek Sarkar, R. K. Shyamasundar, Katherine A. Yelick:
Deadlock-free scheduling of X10 computations with bounded resources. SPAA 2007: 229-240 - 2006
- [j40]N. Raja, R. K. Shyamasundar:
Actors as a Coordinating Model of Computation. Informatica (Slovenia) 30(2): 233-244 (2006) - [j39]N. Raja, R. K. Shyamasundar:
A closer look at constraints as processes. Inf. Process. Lett. 98(5): 206-210 (2006) - [j38]Rohit N. Kundaji, R. K. Shyamasundar:
Refinement calculus: A basis for translation validation, debugging and certification. Theor. Comput. Sci. 354(1): 153-168 (2006) - [j37]Susmit Jha, R. K. Shyamasundar:
Adapting Biochemical Kripke Structures for Distributed Model Checking. Trans. Comp. Sys. Biology 7: 107-122 (2006) - [c58]N. V. Narendra Kumar, R. K. Shyamasundar:
Specification and Realization of Access Control in SPKI/SDSI. ICISS 2006: 177-193 - [c57]