Year |
Citation |
Score |
2024 |
Boyle N, Li Y, Sun X, Xu P, Lai CH, Betts S, Guo D, Simha R, Zeng C, Du J, Lu H. MeCP2 deficiency alters the response selectivity of prefrontal cortical neurons to different social stimuli. Eneuro. PMID 39266326 DOI: 10.1523/ENEURO.0003-24.2024 |
0.385 |
|
2024 |
Xu P, Park G, Sun X, Ge Q, Jin Z, Lai CH, Liu X, Liu Q, Simha R, Zeng C, Du J, Lu H. Different emotional states engage distinct descending pathways from the prefrontal cortex. Biorxiv : the Preprint Server For Biology. PMID 38853906 DOI: 10.1101/2024.05.28.596238 |
0.38 |
|
2022 |
Xu P, Yue Y, Su J, Sun X, Du H, Liu Z, Simha R, Zhou J, Zeng C, Lu H. Pattern decorrelation in the mouse medial prefrontal cortex enables social preference and requires MeCP2. Nature Communications. 13: 3899. PMID 35794118 DOI: 10.1038/s41467-022-31578-9 |
0.38 |
|
2021 |
Yue Y, Xu P, Liu Z, Sun X, Su J, Du H, Chen L, Ash RT, Smirnakis S, Simha R, Kusner L, Zeng C, Lu H. Motor training improves coordination and anxiety in symptomatic -null mice despite impaired functional connectivity within the motor circuit. Science Advances. 7: eabf7467. PMID 34678068 DOI: 10.1126/sciadv.abf7467 |
0.366 |
|
2017 |
Chen H, Wang G, Simha R, Du C, Zeng C. Erratum: Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 7: 46387. PMID 28664930 DOI: 10.1038/Srep46387 |
0.452 |
|
2016 |
Chen H, Wang G, Simha R, Du C, Zeng C. Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 6: 20067. PMID 31748542 DOI: 10.1038/srep20067 |
0.463 |
|
2016 |
Chen H, Wang G, Simha R, Du C, Zeng C. Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 7: 20067. PMID 26821940 DOI: 10.1038/Srep20067 |
0.52 |
|
2015 |
Bloom G, Narahari B, Simha R, Namazi A, Levy R. FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets Proceedings of the 2015 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2015. 48-51. DOI: 10.1109/HST.2015.7140235 |
0.429 |
|
2014 |
Bloom G, Simha R. Hardware-enhanced distributed access enforcement for role-based access control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 5-15. DOI: 10.1145/2613087.2613096 |
0.599 |
|
2013 |
Pearson CA, Zeng C, Simha R. Network class superposition analyses. Plos One. 8: e59046. PMID 23565141 DOI: 10.1371/Journal.Pone.0059046 |
0.636 |
|
2013 |
Leontie E, Bloom G, Simha R. Hardware and software support for fine-grained memory access control and encapsulation in C++ Splash 2013 - Proceedings of the 2013 Companion Publication For Conference On Systems, Programming, and Applications: Software For Humanity. 81-82. DOI: 10.1145/2508075.2508091 |
0.789 |
|
2012 |
Wang G, Rong Y, Chen H, Pearson C, Du C, Simha R, Zeng C. Process-driven inference of biological network structure: feasibility, minimality, and multiplicity. Plos One. 7: e40330. PMID 22815739 DOI: 10.1371/Journal.Pone.0040330 |
0.667 |
|
2012 |
Bloom G, Parmer G, Narahari B, Simha R. Shared hardware data structures for hard real-time systems Emsoft'12 - Proceedings of the 10th Acm International Conference On Embedded Software 2012, Co-Located With Esweek. 133-142. DOI: 10.1145/2380356.2380382 |
0.323 |
|
2012 |
Leontie E, Bloom G, Narahari B, Simha R. No principal too small: Memory access control for fine-grained protection domains Proceedings - 15th Euromicro Conference On Digital System Design, Dsd 2012. 163-170. DOI: 10.1109/DSD.2012.89 |
0.801 |
|
2012 |
Bloom G, Leontie E, Narahari B, Simha R. Hardware and security: Vulnerabilities and solutions Handbook On Securing Cyber-Physical Critical Infrastructure. 305-331. DOI: 10.1016/B978-0-12-415815-3.00012-1 |
0.773 |
|
2011 |
Leontie E, Bloom G, Simha R. Automation for creating and configuring security manifests for hardware containers 2011 4th Symposium On Configuration Analytics and Automation, Safeconfig 2011. DOI: 10.1109/SafeConfig.2011.6111677 |
0.809 |
|
2010 |
Wang G, Du C, Chen H, Simha R, Rong Y, Xiao Y, Zeng C. Process-based network decomposition reveals backbone motif structure. Proceedings of the National Academy of Sciences of the United States of America. 107: 10478-83. PMID 20498084 DOI: 10.1073/Pnas.0914180107 |
0.513 |
|
2010 |
Leontie E, Gelbart O, Narahari B, Simha R. Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards 2010 6th International Conference On Information Assurance and Security, Ias 2010. 125-130. DOI: 10.1109/ISIAS.2010.5604197 |
0.765 |
|
2009 |
Leontie E, Bloom G, Narahari B, Simha R, Zambreno J. Hardware-enforced fine-grained isolation of untrusted code Proceedings of the Acm Conference On Computer and Communications Security. 11-18. DOI: 10.1145/1655077.1655082 |
0.803 |
|
2009 |
Bloom G, Narahari B, Simha R. OS support for detecting trojan circuit attacks 2009 Ieee International Workshop On Hardware-Oriented Security and Trust, Host 2009. 100-103. DOI: 10.1109/HST.2009.5224959 |
0.35 |
|
2009 |
Leontie E, Bloom G, Narahari B, Simha R, Zambreno J. Hardware containers for software components: A trusted platform for COTS-based systems Proceedings - 12th Ieee International Conference On Computational Science and Engineering, Cse 2009. 2: 830-836. DOI: 10.1109/CSE.2009.56 |
0.799 |
|
2009 |
Bloom G, Narahari B, Simha R, Zambreno J. Providing secure execution environments with a last line of defense against Trojan circuit attacks Computers and Security. 28: 660-669. DOI: 10.1016/J.Cose.2009.03.002 |
0.633 |
|
2009 |
Gelbart O, Leontie E, Narahari B, Simha R. A compiler-hardware approach to software protection for embedded systems Computers and Electrical Engineering. 35: 315-328. DOI: 10.1016/J.Compeleceng.2008.06.010 |
0.749 |
|
2008 |
Gelbart O, Leontie E, Narahari B, Simha R. Architectural support for securing application data in embedded systems 2008 Ieee International Conference On Electro/Information Technology, Ieee Eit 2008 Conference. 19-24. DOI: 10.1109/EIT.2008.4554261 |
0.761 |
|
2007 |
Yu Y, Wang G, Simha R, Peng W, Turano F, Zeng C. Pathway switching explains the sharp response characteristic of hypoxia response network. Plos Computational Biology. 3: e171. PMID 17784783 DOI: 10.1371/Journal.Pcbi.0030171 |
0.48 |
|
2007 |
Gaiman M, Simha R, Narahari B. Privacy-preserving programming using sython Computers and Security. 26: 130-136. DOI: 10.1016/J.Cose.2006.08.009 |
0.367 |
|
2006 |
Zambreno J, Honbo D, Choudhary A, Simha R, Narahari B. High-performance software protection using reconfigurable architectures Proceedings of the Ieee. 94: 419-431. DOI: 10.1109/JPROC.2005.862474 |
0.39 |
|
2005 |
Zambreno J, Choudhary A, Simha R, Narahari B, Memon N. SAFE-OPS: An approach to embedded software security Acm Transactions On Embedded Computing Systems (Tecs). 4: 189-210. DOI: 10.1145/1053271.1053279 |
0.503 |
|
2004 |
Zambreno J, Choudhary A, Simha R, Narahari B. Flexible software protection using hardware/software codesign techniques Proceedings - Design, Automation and Test in Europe Conference and Exhibition. 1: 636-641. DOI: 10.1109/DATE.2004.1268916 |
0.392 |
|
1999 |
Narahari B, Shende S, Simha R, Subramanya SR. Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks Journal of Parallel and Distributed Computing. 57: 1-13. DOI: 10.1006/Jpdc.1998.1506 |
0.305 |
|
1997 |
Simha R, Majumdar A. An urn model with applications to database performance evaluation Computers and Operations Research. 24: 289-300. DOI: 10.1016/S0305-0548(96)00063-9 |
0.307 |
|
1996 |
Kim JB, Simha R, Suda T. Analysis of a finite buffer queue with heterogeneous Markov Modulated Arrival processes: a study of traffic burstiness and priority packet discarding Computer Networks and Isdn Systems. 28: 653-673. DOI: 10.1016/0169-7552(95)00008-9 |
0.316 |
|
1994 |
Simha R, Kurose JF. On-line Minimization of Call Setup Time via Load Balancing: A Stochastic Approximation Approach Ieee Transactions On Communications. 42: 1141-1152. DOI: 10.1109/Tcomm.1994.580223 |
0.616 |
|
1994 |
Choudhary AN, Narahari B, Nicol DM, Simha R. Optimal Processor Assignment for a Class of Pipelined Computations Ieee Transactions On Parallel and Distributed Systems. 5: 439-445. DOI: 10.1109/71.273050 |
0.307 |
|
1994 |
Simha R, Ofek Y. Reducing global address recognition delays in local area networks with spatial bandwidth reuse Computer Networks and Isdn Systems. 26: 1375-1384. DOI: 10.1016/0169-7552(94)90004-3 |
0.328 |
|
1989 |
Simha R, Kurose JF. Relative Reward Strength Algorithms for Learning Automata Ieee Transactions On Systems, Man and Cybernetics. 19: 388-398. DOI: 10.1109/21.31041 |
0.538 |
|
1989 |
Kurose JF, Simha R. A Microeconomic Approach to Optimal Resource Allocation in Distributed Computer Systems Ieee Transactions On Computers. 38: 705-717. DOI: 10.1109/12.24272 |
0.597 |
|
Show low-probability matches. |