|
Search the dblp DataBase
Bhagirath Narahari:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- S. R. Subramanya, Bhagirath Narahari
Scheduling I/O transfers in a 2-D mesh with packet deadlines. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 1998, pp:277-279 [Conf]
- S. R. Subramanya, Rahul Simha, Bhagirath Narahari
Study of link congestion during I/O transfers in 2-D meshes using wormhole routing. [Citation Graph (0, 0)][DBLP] Computers and Their Applications, 2000, pp:186-189 [Conf]
- Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari
Flexible Software Protection Using Hardware/Software Codesign Techniques. [Citation Graph (0, 0)][DBLP] DATE, 2004, pp:636-641 [Conf]
- Alok N. Choudhary, Vijay Gehlot, Bhagirath Narahari
Syntax and Semantics of PRETSEL - A Specification Language for Parallel Real-Time Systems. [Citation Graph (0, 0)][DBLP] HICSS (1), 1996, pp:525-0 [Conf]
- Yuen-Wah Ma, Bhagirath Narahari
Optimal Mappings among Interconnection Networks for Performance Evaluation. [Citation Graph (0, 0)][DBLP] ICDCS, 1986, pp:16-25 [Conf]
- S. R. Subramanya, Rahul Simha, Bhagirath Narahari, Abdou Youssef
Transform-Based Indexing of Audio Data for Multimedia Databases. [Citation Graph (0, 0)][DBLP] ICMCS, 1997, pp:211-218 [Conf]
- Hyeong-Ah Choi, Bhagirath Narahari
Algorithms for Mapping and Partitioning Chain Structured Parallel Computations. [Citation Graph (0, 0)][DBLP] ICPP (1), 1991, pp:625-628 [Conf]
- Ramesh Krishnamurti, Bhagirath Narahari
Preemptive Scheduling of Independent Jobs on Partitionable Parallel Architectures. [Citation Graph (0, 0)][DBLP] ICPP (1), 1992, pp:268-275 [Conf]
- Bhagirath Narahari, Hyeong-Ah Choi
Allocating Partitions to Task Precedence Graphs. [Citation Graph (0, 0)][DBLP] ICPP (1), 1991, pp:621-624 [Conf]
- Neal Rosen, Rizwan Sattar, Robert W. Lindeman, Rahul Simha, Bhagirath Narahari
HomeOS: Context-Aware Home Connectivity. [Citation Graph (0, 0)][DBLP] International Conference on Wireless Networks, 2004, pp:739-744 [Conf]
- Bhagirath Narahari, Ramesh Krishnamurti
Scheduling Independent Tasks of Partitionable Hypercube Multiprocessors. [Citation Graph (0, 0)][DBLP] IPPS, 1993, pp:118-122 [Conf]
- Edward B. Suh, B. K. Lee, Robert L. Martino, Bhagirath Narahari, Alok N. Choudhary
Parallel Computation of Solvent Accessible Surface Area of Protein Molecules. [Citation Graph (0, 0)][DBLP] IPPS, 1993, pp:685-689 [Conf]
- Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno
CODESSEAL: Compiler/FPGA Approach to Secure Applications. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:530-535 [Conf]
- Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:543-548 [Conf]
- Hyeong-Ah Choi, Bhagirath Narahari, Shmuel Rotenstreich, Abdou Youssef
Scheduling on Parallel Processing Systems Using Parallel Primitives. [Citation Graph (0, 0)][DBLP] PARBASE / Architectures, 1990, pp:88-107 [Conf]
- Hansoo Kim, Vinod Kathail, Kanchi Gopinath, Bhagirath Narahari
Fine Grained Register Allocation for EPIC Processors With Predication. [Citation Graph (0, 0)][DBLP] PDPTA, 1999, pp:2760-2766 [Conf]
- Hyeong-Ah Choi, Bhagirath Narahari
Scheduling precedence graphs to minimize total system time in partitionable parallel architectures. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:407-410 [Conf]
- Stuart Ullman, Bhagirath Narahari
Mapping binary precedence trees to hypercubes and meshes. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:838-841 [Conf]
- Rahul Simha, Bhagirath Narahari
Single Path Routing with Delay Considerations. [Citation Graph (0, 0)][DBLP] Computer Networks and ISDN Systems, 1992, v:24, n:5, pp:405-419 [Journal]
- Michael Gaiman, Rahul Simha, Bhagirath Narahari
Privacy-preserving programming using sython. [Citation Graph (0, 0)][DBLP] Computers & Security, 2007, v:26, n:2, pp:130-136 [Journal]
- Yijie Han, Bhagirath Narahari, Hyeong-Ah Choi
Mapping a Chain Task to Chained Processors. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1992, v:44, n:3, pp:141-148 [Journal]
- Y. W. Eva Ma, Bhagirath Narahari, Lixin Tao
Optimal Embedding of 2-D Torus Into Ring. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1992, v:41, n:4, pp:227-231 [Journal]
- S. R. Subramanya, Abdou Youssef, Bhagirath Narahari, Rahul Simha
Audio Data Indexing Using Discrete Cosine Transform. [Citation Graph (0, 0)][DBLP] I. J. Comput. Appl., 2003, v:10, n:3, pp:198-210 [Journal]
- Olga Gelbart, Bhagirath Narahari, Rahul Simha
SPEE: A Secure Program Execution Environment tool using code integrity checking. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:1, pp:21-32 [Journal]
- Hyeong-Ah Choi, Bhagirath Narahari
Efficient Algorithms for Mapping and Partioning a Class of Parallel Computations. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 1993, v:19, n:4, pp:349-363 [Journal]
- Bhagirath Narahari, Sunil M. Shende, Rahul Simha, S. R. Subramanya
Routing and Scheduling I/O Transfers on Wormhole-Routed Mesh Networks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 1999, v:57, n:1, pp:1-13 [Journal]
- Abdou Youssef, Bhagirath Narahari
Topological Properties of Generalized Banyan-Hypercube Networks. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 1992, v:14, n:1, pp:98-104 [Journal]
- Alok N. Choudhary, Bhagirath Narahari, Ramesh Krishnamurti
An Efficient Heuristic Scheme for Dynamic Remapping of Parallel Computations. [Citation Graph (0, 0)][DBLP] Parallel Computing, 1993, v:19, n:6, pp:621-632 [Journal]
- Ramesh Krishnamurti, Bhagirath Narahari
Optimal Subcube Assignment for Partitionable Hypercubes. [Citation Graph (0, 0)][DBLP] Parallel Processing Letters, 1992, v:2, n:, pp:89-95 [Journal]
- Stuart Ullman, Bhagirath Narahari
Mapping Binary Precedence Trees to Hypercubes. [Citation Graph (0, 0)][DBLP] Parallel Processing Letters, 1992, v:2, n:, pp:81-87 [Journal]
- Ramesh Krishnamurti, Bhagirath Narahari
An Approximation Algorithm for Preemptive Scheduling on Parallel-Task Systems. [Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 1995, v:8, n:4, pp:661-669 [Journal]
- Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon
SAFE-OPS: An approach to embedded software security. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2005, v:4, n:1, pp:189-210 [Journal]
- Xiuzhen Cheng, Bhagirath Narahari, Rahul Simha, Maggie Xiaoyan Cheng, Dan Liu
Strong Minimum Energy Topology in Wireless Sensor Networks: NP-Completeness and Heuristics. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2003, v:2, n:3, pp:248-256 [Journal]
- Bhagirath Narahari, Sunil M. Shende, Rahul Simha
Efficient algorithms for erasure node placement on slotted dual bus networks. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1996, v:4, n:5, pp:779-784 [Journal]
- Alok N. Choudhary, Bhagirath Narahari, David M. Nicol, Rahul Simha
Optimal Processor Assignment for a Class of Pipelined Computations. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1994, v:5, n:4, pp:439-445 [Journal]
- Abdou Youssef, Bhagirath Narahari
The Banyan-Hypercube Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1990, v:1, n:2, pp:160-169 [Journal]
- S. R. Subramanya, Rahul Simha, Bhagirath Narahari
I/O performance of X-Y routing in 2-D meshes under various node-to-disk assignments. [Citation Graph (0, 0)][DBLP] Computers and Their Applications, 1999, pp:302-304 [Conf]
- S. R. Subramanya, Abdou Youssef, Bhagirath Narahari, Rahul Simha
Automated classification of audio data and retrieval based on audio classes. [Citation Graph (0, 0)][DBLP] Computers and Their Applications, 1999, pp:141-145 [Conf]
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. [Citation Graph (, )][DBLP]
Detecting Trojan Circuit Attacks. [Citation Graph (, )][DBLP]
Architectural support for securing application data in embedded systems. [Citation Graph (, )][DBLP]
Providing secure execution environments with a last line of defense against Trojan circuit attacks. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.456secs
|