Ravishankar K. Iyer
Affiliations: | University of Illinois, Urbana-Champaign, Urbana-Champaign, IL |
Area:
Computer ScienceGoogle:
"Ravishankar Iyer"Children
Sign in to add traineeSaurabh Bagchi | grad student | 2001 | UIUC (E-Tree) |
David T. Stott | grad student | 2001 | UIUC |
Karthik Pattabiraman | grad student | 2009 | UIUC |
Gabriela Jacques Da Silva | grad student | 2010 | UIUC |
Long Wang | grad student | 2010 | UIUC |
Keun S. Yim | grad student | 2013 | UIUC |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Heldenbrand JR, Baheti S, Bockol MA, et al. (2019) Recommendations for performance optimizations when using GATK3.8 and GATK4. Bmc Bioinformatics. 20: 557 |
Banerjee SS, El-Hadedy M, Lim JB, et al. (2019) ASAP: |
Lin H, Slagell A, Kalbarczyk ZT, et al. (2018) Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids Ieee Transactions On Smart Grid. 9: 163-178 |
Jha S, Formicola V, Martino CD, et al. (2018) Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters Ieee Transactions On Dependable and Secure Computing. 15: 915-930 |
Pham C, Wang L, Tak BC, et al. (2017) Failure Diagnosis for Distributed Systems Using Targeted Fault Injection Ieee Transactions On Parallel and Distributed Systems. 28: 503-516 |
Tan R, Nguyen HH, Foo EYS, et al. (2017) Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control Ieee Transactions On Information Forensics and Security. 12: 1609-1624 |
Li Q, Alemzadeh H, Kalbarczyk Z, et al. (2015) A fault-tolerant hardware architecture for robust wearable heart rate monitoring Proceedings of the 2015 9th International Conference On Pervasive Computing Technologies For Healthcare, Pervasivehealth 2015. 185-192 |
Estrada ZJ, Deng F, Stephens Z, et al. (2015) Performance comparison and tuning of virtual machines for sequence alignment software Scalable Computing. 16: 71-84 |
Wang L, Kalbarczyk Z, Iyer RK, et al. (2015) VM-μcheckpoint: Design, modeling, and assessment of lightweight in-memory VM checkpointing Ieee Transactions On Dependable and Secure Computing. 12: 243-255 |
Martino CD, Chen D, Goel G, et al. (2014) Analysis and diagnosis of SLA violations in a production saas cloud Proceedings - International Symposium On Software Reliability Engineering, Issre. 178-188 |