Jayaraj Poroor

According to our database1, Jayaraj Poroor authored at least 16 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Natural Hoare Logic: Towards formal verification of programs from logical forms of natural language specifications.
CoRR, 2021

Robust I/O-compute concurrency for machine learning pipelines in constrained cyber-physical devices.
Proceedings of the LCTES '21: 22nd ACM SIGPLAN/SIGBED International Conference on Languages, 2021

2020
MotePy: A domain specific language for low-overhead machine learning and data processing.
CoRR, 2020

2019
Low-level strongly typed dataframes for machine learning and statistical computing in resource-constrained devices.
Proceedings of the 9th International Symposium on Embedded Computing and System Design, 2019

2018
Verticalthings - a language-based microkernel for constrained IoT devices: work-in-progress.
Proceedings of the International Conference on Embedded Software, 2018

2014
Design for Prevention of Intranet Information Leakage via Emails.
Proceedings of the Security in Computing and Communications, 2014

MAESTRO: A time-driven embedded testbed Architecture with Event-driven Synchronization.
Proceedings of the 20th IEEE Real-Time and Embedded Technology and Applications Symposium, 2014

Architectural Recommendations in Building a Network Based Secure, Scalable and Interoperable Internet of Things Middleware.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2013
Modeling mobile stateful channels in <i>π</i>πZ.
Sci. Comput. Program., 2013

2012
C<sup>2</sup>L: A Formal Policy Language for Secure Cloud Configurations.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Formal analysis of event-driven cyber physical systems.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Verifying security properties of internet protocol stacks: The split verification approach.
J. Syst. Archit., 2011

Formal specification and verification of vehicular handoff using π-calculus.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2009
DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts.
IEEE Internet Comput., 2009

Fast Dual-Radio Cross-Layer Handoffs in Multi-Hop Infrastructure-mode 802.11 Wireless Networks for In-Vehicle Multimedia Infotainment
CoRR, 2009

Mesh-tree topology for vehicular networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009


  Loading...