Shobha Venkataraman

According to our database1, Shobha Venkataraman authored at least 33 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Theseus: A Library for Differentiable Nonlinear Optimization.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Neural Fixed-Point Acceleration for Convex Optimization.
CoRR, 2021

CrypTen: Secure Multi-Party Computation Meets Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2019
Towards Identifying Impacted Users in Cellular Services.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
Assessing the Impact of Network Events with User Feedback.
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018

2017
AESOP: Automatic Policy Learning for Predicting and Mitigating Network Service Impairments.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

2016
Characterizing and Optimizing Cellular Network Performance During Crowded Events.
IEEE/ACM Trans. Netw., 2016

2014
Prometheus: toward quality-of-experience estimation for mobile apps from passive network measurements.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Modeling web quality-of-experience on cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

2013
A first look at cellular network performance during crowded events.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Understanding the complexity of 3G UMTS network performance.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Automatically Inferring the Evolution of Malicious Activity on the Internet.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Characterizing data usage patterns in a large cellular network.
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, 2012

Tracking dynamic network properties at internet-scale.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2011
Internet-scale Visualization and Detection of Performance Events.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

Large-scale app-based reporting of customer problems in cellular networks: potential and limitations.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Making sense of customer tickets in cellular networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Identifying diverse usage behaviors of smartphone apps.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

BitShred: feature hashing malware for scalable triage and semantic analysis.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Speed testing without speed tests: estimating achievable download speed from passive measurements.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Tracking Dynamic Sources of Malicious Activity at Internet Scale.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

2008
Limits of Learning-based Signature Generation with Adversaries.
Proceedings of the Network and Distributed System Security Symposium, 2008

2007
Exploiting Network Structure for Proactive Spam Mitigation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007

Detecting Stealthy Spreaders Using Online Outdegree Histograms.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

2006
Black Box Anomaly Detection: Is It Utopian?.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

2005
New Streaming Algorithms for Fast Detection of Superspreaders.
Proceedings of the Network and Distributed System Security Symposium, 2005

2004
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

2003
Efficient Solution Algorithms for Factored MDPs.
J. Artif. Intell. Res., 2003

Incentive mechanisms for smoothing out a focused demand for network resources.
Comput. Commun., 2003

2002
Context-Specific Multiagent Coordination and Planning with Factored MDPs.
Proceedings of the Eighteenth National Conference on Artificial Intelligence and Fourteenth Conference on Innovative Applications of Artificial Intelligence, July 28, 2002

2001
Smoothing out focused demand for network resources.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001


  Loading...