Rahul Simha - Publications

Affiliations: 
College of William and Mary, Williamsburg, VA 
 The George Washington University, Washington, DC, United States 
Area:
Computer Science

37 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2024 Boyle N, Li Y, Sun X, Xu P, Lai CH, Betts S, Guo D, Simha R, Zeng C, Du J, Lu H. MeCP2 deficiency alters the response selectivity of prefrontal cortical neurons to different social stimuli. Eneuro. PMID 39266326 DOI: 10.1523/ENEURO.0003-24.2024  0.385
2024 Xu P, Park G, Sun X, Ge Q, Jin Z, Lai CH, Liu X, Liu Q, Simha R, Zeng C, Du J, Lu H. Different emotional states engage distinct descending pathways from the prefrontal cortex. Biorxiv : the Preprint Server For Biology. PMID 38853906 DOI: 10.1101/2024.05.28.596238  0.38
2022 Xu P, Yue Y, Su J, Sun X, Du H, Liu Z, Simha R, Zhou J, Zeng C, Lu H. Pattern decorrelation in the mouse medial prefrontal cortex enables social preference and requires MeCP2. Nature Communications. 13: 3899. PMID 35794118 DOI: 10.1038/s41467-022-31578-9  0.38
2021 Yue Y, Xu P, Liu Z, Sun X, Su J, Du H, Chen L, Ash RT, Smirnakis S, Simha R, Kusner L, Zeng C, Lu H. Motor training improves coordination and anxiety in symptomatic -null mice despite impaired functional connectivity within the motor circuit. Science Advances. 7: eabf7467. PMID 34678068 DOI: 10.1126/sciadv.abf7467  0.366
2017 Chen H, Wang G, Simha R, Du C, Zeng C. Erratum: Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 7: 46387. PMID 28664930 DOI: 10.1038/Srep46387  0.452
2016 Chen H, Wang G, Simha R, Du C, Zeng C. Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 6: 20067. PMID 31748542 DOI: 10.1038/srep20067  0.463
2016 Chen H, Wang G, Simha R, Du C, Zeng C. Boolean Models of Biological Processes Explain Cascade-Like Behavior. Scientific Reports. 7: 20067. PMID 26821940 DOI: 10.1038/Srep20067  0.52
2015 Bloom G, Narahari B, Simha R, Namazi A, Levy R. FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets Proceedings of the 2015 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2015. 48-51. DOI: 10.1109/HST.2015.7140235  0.429
2014 Bloom G, Simha R. Hardware-enhanced distributed access enforcement for role-based access control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 5-15. DOI: 10.1145/2613087.2613096  0.599
2013 Pearson CA, Zeng C, Simha R. Network class superposition analyses. Plos One. 8: e59046. PMID 23565141 DOI: 10.1371/Journal.Pone.0059046  0.636
2013 Leontie E, Bloom G, Simha R. Hardware and software support for fine-grained memory access control and encapsulation in C++ Splash 2013 - Proceedings of the 2013 Companion Publication For Conference On Systems, Programming, and Applications: Software For Humanity. 81-82. DOI: 10.1145/2508075.2508091  0.789
2012 Wang G, Rong Y, Chen H, Pearson C, Du C, Simha R, Zeng C. Process-driven inference of biological network structure: feasibility, minimality, and multiplicity. Plos One. 7: e40330. PMID 22815739 DOI: 10.1371/Journal.Pone.0040330  0.667
2012 Bloom G, Parmer G, Narahari B, Simha R. Shared hardware data structures for hard real-time systems Emsoft'12 - Proceedings of the 10th Acm International Conference On Embedded Software 2012, Co-Located With Esweek. 133-142. DOI: 10.1145/2380356.2380382  0.323
2012 Leontie E, Bloom G, Narahari B, Simha R. No principal too small: Memory access control for fine-grained protection domains Proceedings - 15th Euromicro Conference On Digital System Design, Dsd 2012. 163-170. DOI: 10.1109/DSD.2012.89  0.801
2012 Bloom G, Leontie E, Narahari B, Simha R. Hardware and security: Vulnerabilities and solutions Handbook On Securing Cyber-Physical Critical Infrastructure. 305-331. DOI: 10.1016/B978-0-12-415815-3.00012-1  0.773
2011 Leontie E, Bloom G, Simha R. Automation for creating and configuring security manifests for hardware containers 2011 4th Symposium On Configuration Analytics and Automation, Safeconfig 2011. DOI: 10.1109/SafeConfig.2011.6111677  0.809
2010 Wang G, Du C, Chen H, Simha R, Rong Y, Xiao Y, Zeng C. Process-based network decomposition reveals backbone motif structure. Proceedings of the National Academy of Sciences of the United States of America. 107: 10478-83. PMID 20498084 DOI: 10.1073/Pnas.0914180107  0.513
2010 Leontie E, Gelbart O, Narahari B, Simha R. Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards 2010 6th International Conference On Information Assurance and Security, Ias 2010. 125-130. DOI: 10.1109/ISIAS.2010.5604197  0.765
2009 Leontie E, Bloom G, Narahari B, Simha R, Zambreno J. Hardware-enforced fine-grained isolation of untrusted code Proceedings of the Acm Conference On Computer and Communications Security. 11-18. DOI: 10.1145/1655077.1655082  0.803
2009 Bloom G, Narahari B, Simha R. OS support for detecting trojan circuit attacks 2009 Ieee International Workshop On Hardware-Oriented Security and Trust, Host 2009. 100-103. DOI: 10.1109/HST.2009.5224959  0.35
2009 Leontie E, Bloom G, Narahari B, Simha R, Zambreno J. Hardware containers for software components: A trusted platform for COTS-based systems Proceedings - 12th Ieee International Conference On Computational Science and Engineering, Cse 2009. 2: 830-836. DOI: 10.1109/CSE.2009.56  0.799
2009 Bloom G, Narahari B, Simha R, Zambreno J. Providing secure execution environments with a last line of defense against Trojan circuit attacks Computers and Security. 28: 660-669. DOI: 10.1016/J.Cose.2009.03.002  0.633
2009 Gelbart O, Leontie E, Narahari B, Simha R. A compiler-hardware approach to software protection for embedded systems Computers and Electrical Engineering. 35: 315-328. DOI: 10.1016/J.Compeleceng.2008.06.010  0.749
2008 Gelbart O, Leontie E, Narahari B, Simha R. Architectural support for securing application data in embedded systems 2008 Ieee International Conference On Electro/Information Technology, Ieee Eit 2008 Conference. 19-24. DOI: 10.1109/EIT.2008.4554261  0.761
2007 Yu Y, Wang G, Simha R, Peng W, Turano F, Zeng C. Pathway switching explains the sharp response characteristic of hypoxia response network. Plos Computational Biology. 3: e171. PMID 17784783 DOI: 10.1371/Journal.Pcbi.0030171  0.48
2007 Gaiman M, Simha R, Narahari B. Privacy-preserving programming using sython Computers and Security. 26: 130-136. DOI: 10.1016/J.Cose.2006.08.009  0.367
2006 Zambreno J, Honbo D, Choudhary A, Simha R, Narahari B. High-performance software protection using reconfigurable architectures Proceedings of the Ieee. 94: 419-431. DOI: 10.1109/JPROC.2005.862474  0.39
2005 Zambreno J, Choudhary A, Simha R, Narahari B, Memon N. SAFE-OPS: An approach to embedded software security Acm Transactions On Embedded Computing Systems (Tecs). 4: 189-210. DOI: 10.1145/1053271.1053279  0.503
2004 Zambreno J, Choudhary A, Simha R, Narahari B. Flexible software protection using hardware/software codesign techniques Proceedings - Design, Automation and Test in Europe Conference and Exhibition. 1: 636-641. DOI: 10.1109/DATE.2004.1268916  0.392
1999 Narahari B, Shende S, Simha R, Subramanya SR. Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks Journal of Parallel and Distributed Computing. 57: 1-13. DOI: 10.1006/Jpdc.1998.1506  0.305
1997 Simha R, Majumdar A. An urn model with applications to database performance evaluation Computers and Operations Research. 24: 289-300. DOI: 10.1016/S0305-0548(96)00063-9  0.307
1996 Kim JB, Simha R, Suda T. Analysis of a finite buffer queue with heterogeneous Markov Modulated Arrival processes: a study of traffic burstiness and priority packet discarding Computer Networks and Isdn Systems. 28: 653-673. DOI: 10.1016/0169-7552(95)00008-9  0.316
1994 Simha R, Kurose JF. On-line Minimization of Call Setup Time via Load Balancing: A Stochastic Approximation Approach Ieee Transactions On Communications. 42: 1141-1152. DOI: 10.1109/Tcomm.1994.580223  0.616
1994 Choudhary AN, Narahari B, Nicol DM, Simha R. Optimal Processor Assignment for a Class of Pipelined Computations Ieee Transactions On Parallel and Distributed Systems. 5: 439-445. DOI: 10.1109/71.273050  0.307
1994 Simha R, Ofek Y. Reducing global address recognition delays in local area networks with spatial bandwidth reuse Computer Networks and Isdn Systems. 26: 1375-1384. DOI: 10.1016/0169-7552(94)90004-3  0.328
1989 Simha R, Kurose JF. Relative Reward Strength Algorithms for Learning Automata Ieee Transactions On Systems, Man and Cybernetics. 19: 388-398. DOI: 10.1109/21.31041  0.538
1989 Kurose JF, Simha R. A Microeconomic Approach to Optimal Resource Allocation in Distributed Computer Systems Ieee Transactions On Computers. 38: 705-717. DOI: 10.1109/12.24272  0.597
Show low-probability matches.