default search action
Saikat Guha 0002
Person information
- affiliation: Microsoft Research, Bangalore, India
- affiliation: Max Planck Institute for Software Systems, MPI-SWS, Germany
- affiliation (PhD 2009): Cornell University, Department of Computer Science, Ithaca, NY, USA
Other persons with the same name
- Saikat Guha — disambiguation page
- Saikat Guha 0001 — University of Arizona, College of Optical Sciences, USA (and 3 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Aryan Taneja, Rahul Bothra, Debopam Bhattacherjee, Rohan Gandhi, Venkata N. Padmanabhan, Ranjita Bhagwan, Nagarajan Natarajan, Saikat Guha, Ross Cutler:
Don't Forget the User: It's Time to Rethink Network Measurements. HotNets 2023: 109-116 - [i1]Aryan Taneja, Debopam Bhattacherjee, Saikat Guha, Venkata N. Padmanabhan:
On viewing SpaceX Starlink through the Social Media Lens. CoRR abs/2307.13441 (2023) - 2021
- [j2]Sagar Bharadwaj, Praveen Gupta, Ranjita Bhagwan, Saikat Guha:
Discovering Related Data At Scale. Proc. VLDB Endow. 14(8): 1392-1400 (2021)
2010 – 2019
- 2017
- [c30]Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren:
Exploring the dynamics of search advertiser fraud. Internet Measurement Conference 2017: 157-170 - 2016
- [j1]Chaolun Xia, Saikat Guha, S. Muthukrishnan:
How Much is Your Attention Worth?: Analysis of Prices in LinkedIn Advertising Network - Short talk. SIGMETRICS Perform. Evaluation Rev. 44(3): 38 (2016) - [c29]Chaolun Xia, Saikat Guha, S. Muthukrishnan:
Targeting algorithms for online social advertising markets. ASONAM 2016: 485-492 - 2015
- [c28]Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove:
Strength in Numbers: Robust Tamper Detection in Crowd Computations. COSN 2015: 113-124 - [c27]Bhanu Chandra Vattikonda, Vacha Dave, Saikat Guha, Alex C. Snoeren:
Empirical Analysis of Search Advertising Strategies. Internet Measurement Conference 2015: 79-91 - [c26]Bhanu Chandra Vattikonda, Santhosh Kodipaka, Hongyan Zhou, Vacha Dave, Saikat Guha, Alex C. Snoeren:
Interpreting Advertiser Intent in Sponsored Search. KDD 2015: 2177-2185 - 2014
- [c25]Paul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Characterizing Large-Scale Click Fraud in ZeroAccess. CCS 2014: 141-152 - [c24]Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove:
Towards Detecting Anomalous User Behavior in Online Social Networks. USENIX Security Symposium 2014: 223-238 - [c23]John P. Rula, Vishnu Navda, Fabián E. Bustamante, Ranjita Bhagwan, Saikat Guha:
No "one-size fits all": towards a principled approach for incentives in mobile crowdsourcing. HotMobile 2014: 3:1-3:5 - 2013
- [c22]Vacha Dave, Saikat Guha, Yin Zhang:
ViceROI: catching click-spam in search ad networks. CCS 2013: 765-776 - 2012
- [c21]Anshul Rai, Ranjita Bhagwan, Saikat Guha:
Generalized resource allocation for the cloud. SoCC 2012: 15 - [c20]Saikat Guha, Srikanth Kandula:
Act for affordable data care. HotNets 2012: 103-108 - [c19]Pavan K. Athivarapu, Ranjita Bhagwan, Saikat Guha, Vishnu Navda, Ramachandran Ramjee, Dushyant Arora, Venkata N. Padmanabhan, George Varghese:
RadioJockey: mining program execution to optimize cellular radio usage. MobiCom 2012: 101-112 - [c18]Saikat Guha, Mudit Jain, Venkata N. Padmanabhan:
Koi: A Location-Privacy Platform for Smartphone Apps. NSDI 2012: 183-196 - [c17]Vacha Dave, Saikat Guha, Yin Zhang:
Measuring and fingerprinting click-spam in ad networks. SIGCOMM 2012: 175-186 - 2011
- [c16]Alexey Reznichenko, Saikat Guha, Paul Francis:
Auctions in do-not-track compliant internet advertising. CCS 2011: 667-676 - [c15]Saikat Guha, Bin Cheng, Paul Francis:
Privad: Practical Privacy in Online Advertising. NSDI 2011 - 2010
- [c14]Saikat Guha, Bin Cheng, Paul Francis:
Challenges in measuring online advertising systems. Internet Measurement Conference 2010: 81-87 - [c13]Marcel Dischinger, Massimiliano Marcon, Saikat Guha, P. Krishna Gummadi, Ratul Mahajan, Stefan Saroiu:
Glasnost: Enabling End Users to Detect Traffic Differentiation. NSDI 2010: 405-418
2000 – 2009
- 2009
- [b1]Saikat Guha:
Chasing EME: Arguments for an End-Middle-End Internet. Cornell University, USA, 2009 - [c12]Saikat Guha, Alexey Reznichenko, Kevin Tang, Hamed Haddadi, Paul Francis:
Serving Ads from localhost for Performance, Privacy, and Profit. HotNets 2009 - [c11]Hamed Haddadi, Saikat Guha, Paul Francis:
Not All Adware Is Badware: Towards Privacy-Aware Advertising. I3E 2009: 161-172 - 2008
- [c10]Saikat Guha, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki:
How healthy are today's enterprise networks? Internet Measurement Conference 2008: 145-150 - [c9]Saikat Guha, Kevin Tang, Paul Francis:
NOYB: privacy in online social networks. WOSN 2008: 49-54 - 2007
- [c8]Siddhartha Annapureddy, Saikat Guha, Christos Gkantsidis, Dinan Gunawardena, Pablo Rodriguez:
Exploring VoD in P2P Swarming Systems. INFOCOM 2007: 2571-2575 - [c7]Saikat Guha, Paul Francis:
Identity Trail: Covert Surveillance Using DNS. Privacy Enhancing Technologies 2007: 153-166 - [c6]Saikat Guha, Paul Francis:
An end-middle-end approach to connection establishment. SIGCOMM 2007: 193-204 - [c5]Siddhartha Annapureddy, Saikat Guha, Christos Gkantsidis, Dinan Gunawardena, Pablo Rodriguez:
Is high-quality vod feasible using P2P swarming? WWW 2007: 903-912 - 2005
- [c4]Saikat Guha, Paul Francis:
Characterization and Measurement of TCP Traversal Through NATs and Firewalls. Internet Measurement Conference 2005: 199-211 - [c3]Saikat Guha, Rohan Murty, Emin Gün Sirer:
Sextant: a unified node and event localization framework using non-convex constraints. MobiHoc 2005: 205-216 - [c2]Chavdar Botev, Hubert Chao, Theodore Chao, Yim Cheng, Raymond Doyle, Sergey Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher Ré, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David Gries, Dexter Kozen, Andrew C. Myers, David I. Schwartz, Jayavel Shanmugasundaram:
Supporting workflow in a course management system. SIGCSE 2005: 262-266 - 2004
- [c1]Saikat Guha, Yutaka Takeda, Paul Francis:
NUTSS: a SIP-based approach to UDP and TCP network connectivity. FDNA@SIGCOMM 2004: 43-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint