K. Gopinath

Affiliations:
  • Indian Institute of Science, Bangalore, India
  • Stanford University, CA, USA (Ph.D., 1988)


According to our database1, K. Gopinath authored at least 83 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Practical Coded Sharding.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

2022
Healthcare AI: A Bibliometric Review.
Proceedings of the Transfer, Diffusion and Adoption of Next-Generation Digital Technologies, 2022

Human Resource Analytics: Leveraging Machine Learning for Employee Attrition Prediction.
Proceedings of the Transfer, Diffusion and Adoption of Next-Generation Digital Technologies, 2022

Enhancing the Credit Card Fraud Detection Using Decision Tree and Adaptive Boosting Techniques.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

GARUDA: Heap aware symbolic execution.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

2021
Fast local page-tables for virtualized NUMA servers with vMitosis.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Need for a Deeper Cross-Layer Optimization for Dense NAND SSD to Improve Read Performance of Big Data Applications: A Case for Melded Pages.
Proceedings of the 12th USENIX Workshop on Hot Topics in Storage and File Systems, 2020

2019
HawkEye: Efficient Fine-grained OS Support for Huge Pages.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Analysis of Newer Aadhaar Privacy Models.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Probabilistic Sequential Consistency in Social Networks.
Proceedings of the 25th IEEE International Conference on High Performance Computing, 2018

A frugal approach to reduce RCU grace period overhead.
Proceedings of the Thirteenth EuroSys Conference, 2018

Making Huge Pages Actually Useful.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
The RCU-Reader Preemption Problem in VMs.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Towards a More Secure Aadhaar.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Scalable Performance Tuning of Hadoop MapReduce: A Noisy Gradient Approach.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Performance Tuning of Hadoop MapReduce: A Noisy Gradient Approach.
CoRR, 2016

A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.
Comput. J., 2016

Prudent Memory Reclamation in Procrastination-Based Synchronization.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

A Case for Protecting Huge Pages from the Kernel.
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016

2015
Scalable Reliability Modelling of RAID Storage Subsystems.
CoRR, 2015

Are Markov Models Effective for Storage Reliability Modelling?
CoRR, 2015

Towards Practical Page Placement for a Green Memory Manager.
Proceedings of the 22nd IEEE International Conference on High Performance Computing, 2015

2014
Human Activity Recognition by Matching Curve Shapes.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

2013
Distributed Wear levelling of Flash Memories
CoRR, 2013

LFTL: A multi-threaded FTL for a Parallel IO Flash Card under Linux
CoRR, 2013

Combining concern input with program analysis for bloat detection.
Proceedings of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications, 2013

Subtle Topic Models and Discovering Subtly Manifested Software Concerns Automatically.
Proceedings of the 30th International Conference on Machine Learning, 2013

Vision-based typing interface for chording input with keystroke detection using kalman filter.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

Elastic Resources Framework in IaaS, Preserving Performance SLAs.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Does lean imply green?: a study of the power performance implications of Java runtime bloat.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012

LoadIQ: Learning to Identify Workload Phases from a Live Storage Trace.
Proceedings of the 4th USENIX Workshop on Hot Topics in Storage and File Systems, 2012

Scalable lock-free FIFO queues using efficient elimination techniques.
Proceedings of the 5th ACM COMPUTE Conference: Intelligent & scalable system technologies, 2012

2011
PRESIDIO: A Framework for Efficient Archival Data Storage.
ACM Trans. Storage, 2011

Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software?
Computer, 2011

The interplay of software bloat, hardware energy proportionality and system bottlenecks.
Proceedings of the 4th Workshop on Power-Aware Computing and Systems, 2011

Virtually Cool Ternary Content Addressable Memory.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Reuse, Recycle to De-bloat Software.
Proceedings of the ECOOP 2011 - Object-Oriented Programming, 2011

2010
Discovery of Application Workloads from Network File Traces.
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010

2008
Structure and Interpretation of Computer Programs
CoRR, 2008

Structure and Interpretation of Computer Programs.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

SPKI/SDSI certificate chain discovery with generic constraints.
Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, 2008

MAC Design for Heterogeneous Application Support in OFDM Based Wireless Systems.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
SAFIUS - A Secure and Accountable Filesystem over Untrusted Storage.
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007

G<sub>its</sub><sup>2</sup> VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-term Archival Storage.
Proceedings of the Fourth International IEEE Security in Storage Workshop, 2007

Recovery from DoS Attacks in MIPv6: Modeling and Validation.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

Performance Evaluation of Multiple TCP connections in iSCSI.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

Optimizing multimedia experience in a thin client environment for a resource constrained processor.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

Static Program Analysis for Security.
Proceedings of the Compiler Design Handbook: Optimizations and Machine Code Generation, 2007

2006
An empirical analysis of heterogeneity in IEEE 802.11 MAC protocol implementations and its implications.
Proceedings of the First ACM Workshop on Wireless Network Testbeds, 2006

Design and Analysis of Rate Aware Ad Hoc 802.11 Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Insurable Storage Services: Creating a Marketplace for Long-Term Document Archival.
Proceedings of the Computational Science, 2006

Access control in communication systems.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

Proactive Leader Election in Asynchronous Shared Memory Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2006

An Extended Verifiable Secret Redistribution Protocol for Archival Systems.
Proceedings of the The First International Conference on Availability, 2006

2005
Evaluation of Advanced TCP Stacks in the iSCSI Environment using Simulation Model.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005

Improved Probabilistic Models for 802.11 Protocol Verification.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Scalable Probabilistic Models for 802.11 Protocol Verification
CoRR, 2004

Formal Proof of Impossibility of Reliability in Crashing Protocols.
Proceedings of the Distributed Computing, 2004

Efficient Algorithms for Intrusion Detection.
Proceedings of the Distributed Computing and Internet Technology, 2004

iSAN - An Intelligent Storage Area Network Architecture.
Proceedings of the High Performance Computing, 2004

2003
Verifying a UMTS Protocol Using Spin and EASN.
Proceedings of the International Workshop on Software Verification and Validation, 2003

2002
Register Allocation.
Proceedings of the Compiler Design Handbook: Optimizations and Machine Code Generation, 2002

2001
Predictable Management of System Resources for Linux.
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001

A SPIN-Based Model Checker for Telecommunication Protocols.
Proceedings of the Model Checking Software, 2001

Verification of a Leader Election Algorithm in Timed Asynchronous Systems.
Proceedings of the FST TCS 2001: Foundations of Software Technology and Theoretical Computer Science, 2001

EASN: Integrating ASN.1 and Model Checking.
Proceedings of the Computer Aided Verification, 13th International Conference, 2001

The Design, Implementation, and Framework for a Linux-Based Temperature-Sensitive Storage System.
Proceedings of the 5th Annual Linux Showcase & Conference 2001, 2001

2000
Performance of Switch Blocking on Multithreaded Architectures.
J. Univers. Comput. Sci., 2000

A 3-Tier RAID Storage System with RAID1, RAID5, and Compressed RAID5 for Linux.
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000

A Multi-Tier RAID Storage System with RAID1 and RAID5.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1999
Fine Grained Register Allocation for EPIC Processors With Predication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Register allocation in hyper-block for EPIC processors.
Proceedings of the Parallel Computing: Fundamentals & Applications, 1999

Combining Conditional Constant Propagation and Interprocedural Alias Analysis.
Proceedings of the High Performance Computing, 1999

1998
Data structure distribution and multi-threading of Linux file system for multiprocessors.
Proceedings of the 5th International Conference On High Performance Computing, 1998

Formal Verification of an O. S. Submodule.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1998

1997
A C++ Simulator Generator from Graphical Specifications.
Softw. Pract. Exp., 1997

Alias Analysis for Fortran90 Array Slices.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

Characterizing vulnerability of parallelism to resource constraints.
Proceedings of the Fourth International on High-Performance Computing, 1997

1996
Program analysis for page size selection.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

1994
Performance of Switch Blocking on Multithreaded Architectures.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

1991
Memory Models Compiler Optimizations and P-RISC.
Proceedings of the International Conference on Parallel Processing, 1991

1989
Copy Elimination in Functional Languages.
Proceedings of the Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, 1989


  Loading...