default search action
R. K. Shyamasundar
Person information
- affiliation: Tata Institute of Fundamental Research, Mumbai, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [e20]Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar:
Information Systems Security - 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings. Lecture Notes in Computer Science 15416, Springer 2025, ISBN 978-3-031-80019-1 [contents] - 2024
- [c144]R. K. Shyamasundar, Snehal Borse, Mohammad Ummair:
Enhancing Robustness of Smart Contracts Through Declarations. ICBC 2024: 50-68 - [c143]Vishwas Patil, R. K. Shyamasundar:
A Decoupling Mechanism for Transaction Privacy. ICISS 2024: 359-379 - [c142]Rudrapatna K. Shyamasundar:
Characterization of Consensus Correctness in Ripple (XRP) Networks. SECRYPT 2024: 103-113 - 2023
- [c141]Sangita Roy, Rudrapatna K. Shyamasundar:
An Analysis of Hybrid Consensus in Blockchain Protocols for Correctness and Progress. DBSec 2023: 404-412 - [c140]Rudrapatna K. Shyamasundar:
ERC20: Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract. SECRYPT 2023: 557-566 - [c139]Sangita Roy, Rudrapatna K. Shyamasundar:
A Rand Index-Based Analysis of Consensus Protocols. SECRYPT 2023: 567-576 - [e19]Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar:
Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings. Lecture Notes in Computer Science 14424, Springer 2023, ISBN 978-3-031-49098-9 [contents] - 2022
- [c138]R. K. Shyamasundar:
A Framework of Runtime Monitoring for Correct Execution of Smart Contracts. ICBC 2022: 92-116 - [c137]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes. ICISS 2022: 84-102 - [c136]Sandip Ghosal, R. K. Shyamasundar:
Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling. ICISS 2022: 202-219 - [c135]Vishwas T. Patil, R. K. Shyamasundar:
Evolving Role of PKI in Facilitating Trust. PKIA 2022: 1-7 - [e18]Shiping Chen, Rudrapatna K. Shyamasundar, Liang-Jie Zhang:
Blockchain - ICBC 2022 - 5th International Conference, Held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings. Lecture Notes in Computer Science 13733, Springer 2022, ISBN 978-3-031-23494-1 [contents] - [e17]Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar:
Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings. Lecture Notes in Computer Science 13784, Springer 2022, ISBN 978-3-031-23689-1 [contents] - 2021
- [j53]Ying Li, R. K. Shyamasundar, Xinheng Wang:
Special issue on computational intelligence for social media data mining and knowledge discovery. Comput. Intell. 37(2): 658-659 (2021) - [j52]Anshu S. Anand, Karthik Sayani, R. K. Shyamasundar:
Fortress Abstractions in X10 Framework. Int. J. Parallel Program. 49(6): 911-933 (2021) - [j51]R. K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal, Aniket Kuiri:
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models. Inf. Syst. Frontiers 23(4): 811-833 (2021) - [j50]Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin:
Guest editorial special issue on "P2P computing for deep learning". Peer-to-Peer Netw. Appl. 14(3): 1734-1735 (2021) - [c134]B. S. Radhika, R. K. Shyamasundar:
Realizing Information Flow Control in ABAC Mining. CSS 2021: 107-119 - [c133]Vishwas Patil, R. K. Shyamasundar:
Landcoin: A Practical Protocol for Transfer-of-Asset. ICISS 2021: 124-141 - [c132]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. ICSE (NIER) 2021: 31-35 - [c131]Amit Goyal, R. K. Shyamasundar, G. Sivakumar, Raoul Jetley, Srini Ramaswamy:
Empirical Analysis of Greedy, GE and GRE Heuristics. ISEC 2021: 6:1-6:11 - [c130]Amit Goyal, Akshat Garg, Digvijaysingh Gour, R. K. Shyamasundar, G. Sivakumar:
Information Flow Secure CAmkES. IoTBDS 2021: 237-244 - [c129]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen:
SP*: An Information Flow Secure Linux. ISPA/BDCloud/SocialCom/SustainCom 2021: 1603-1612 - [c128]Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil:
App2SecApp: privacy protection from Android applications. SAC 2021: 908-911 - [c127]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Towards Unifying RBAC with Information Flow Control. SACMAT 2021: 45-54 - [c126]Parjanya Vyas, R. K. Shyamasundar:
SecSDN: A Novel Architecture for a Secure SDN. SECRYPT 2021: 587-594 - [e16]Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan:
Information Systems Security - 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings. Lecture Notes in Computer Science 13146, Springer 2021, ISBN 978-3-030-92570-3 [contents] - [i6]Sandip Ghosal, R. K. Shyamasundar:
An Axiomatic Approach to Detect Information Leaks in Concurrent Programs. CoRR abs/2103.02171 (2021) - [i5]Sandip Ghosal, R. K. Shyamasundar:
Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language. CoRR abs/2103.06039 (2021) - 2020
- [j49]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. Comput. Secur. 94: 101816 (2020) - [c125]Sandip Ghosal, R. K. Shyamasundar:
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. APSEC 2020: 51-60 - [c124]Sandip Ghosal, R. K. Shyamasundar:
Information Flow Security Certification for SPARK Programs. DBSec 2020: 137-150
2010 – 2019
- 2019
- [j48]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
STMs in practice: Partial rollback vs pure abort mechanisms. Concurr. Comput. Pract. Exp. 31(5) (2019) - [j47]Anshu S. Anand, Akash Srivastava, R. K. Shyamasundar:
A deadlock-free lock-based synchronization for GPUs. Concurr. Comput. Pract. Exp. 31(7) (2019) - [c123]Vishwas T. Patil, R. K. Shyamasundar:
Is Privacy a Myth for Facebook Users? ICETE (2) 2019: 510-516 - [c122]Amit Goyal, R. K. Shyamasundar, Raoul Jetley, Devina Mohan, Srini Ramaswamy:
Test Suite Minimization of Evolving Software Systems: A Case Study. ICSOFT 2019: 226-237 - [c121]Manjunath Bilur, Anugrah Gari, R. K. Shyamasundar:
Threat Assessment of Enterprise Applications via Graphical Modelling. NSS 2019: 146-166 - [c120]Rudrapatna K. Shyamasundar, Swatish Satheesan, Deepali Mittal, Aakash Chaudhary:
SecHadoop: A Privacy Preserving Hadoop. UCC 2019: 111-121 - [e15]Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar:
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings. Lecture Notes in Computer Science 11952, Springer 2019, ISBN 978-3-030-36944-6 [contents] - 2018
- [c119]Vishwas T. Patil, Nivia Jatain, R. K. Shyamasundar:
Role of Apps in Undoing of Privacy Policies on Facebook. DBSec 2018: 85-98 - [c118]B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. DBSec 2018: 219-231 - [c117]Khedkar Shrikrishna, N. V. Narendra Kumar, R. K. Shyamasundar:
Security Analysis of EMV Protocol and Approaches for Strengthening It. ICDCIT 2018: 69-85 - [c116]Shashank Khobragade, N. V. Narendra Kumar, R. K. Shyamasundar:
Secure Synthesis of IoT via Readers-Writers Flow Model. ICDCIT 2018: 86-104 - [c115]Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:
Static Security Certification of Programs via Dynamic Labelling. ICETE (2) 2018: 400-411 - [c114]Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar:
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. ICISS 2018: 24-43 - [c113]Vishwas T. Patil, R. K. Shyamasundar:
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. ICISS 2018: 364-385 - [c112]Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar:
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. ICISS 2018: 427-447 - [c111]N. V. Narendra Kumar, R. K. Shyamasundar:
A Semantic Notion of Secure Information-Flow. ISEA-ISAP 2018: 35-52 - [c110]Sandip Ghosal, R. K. Shyamasundar:
A Solution to "Confused Deputy" Problem Using RWFM Labels. ISEA-ISAP 2018: 67-76 - [c109]Rudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas:
An Experimental Flow Secure File System. TrustCom/BigDataSE 2018: 790-799 - [e14]Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9 [contents] - [i4]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal:
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management. CoRR abs/1806.07530 (2018) - [i3]Raj Gaire, Ratan K. Ghosh, Jongkil Kim, Alexander Krumpholz, Rajiv Ranjan, R. K. Shyamasundar, Surya Nepal:
Crowdsensing and privacy in smart city applications. CoRR abs/1806.07534 (2018) - 2017
- [c108]Vishwas T. Patil, R. K. Shyamasundar:
Undoing of Privacy Policies on Facebook. DBSec 2017: 239-255 - [c107]N. V. Narendra Kumar, R. K. Shyamasundar:
Analyzing Protocol Security Through Information-Flow Control. ICDCIT 2017: 159-171 - [c106]N. V. Narendra Kumar, R. K. Shyamasundar:
Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies. ICDCIT 2017: 183-195 - [c105]Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:
Semi Supervised NLP Based Classification of Malware Documents. ICISS 2017: 334-344 - [c104]R. K. Shyamasundar, N. V. Narendra Kumar, Priyanka Teltumde:
Realizing software vault on Android through information-flow control. ISCC 2017: 1007-1014 - [c103]Vishwas T. Patil, R. K. Shyamasundar:
Privacy as a Currency: Un-regulated?. SECRYPT 2017: 586-595 - [c102]N. V. Narendra Kumar, R. K. Shyamasundar:
A Complete Generative Label Model for Lattice-Based Access Control Models. SEFM 2017: 35-53 - [e13]Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0 [contents] - 2016
- [c101]Abhiroop Bhatnagar, Amit Kumar, Ratan K. Ghosh, Rudrapatna K. Shyamasundar:
A framework of community inspired distributed message dissemination and emergency alert response system over smart phones. COMSNETS 2016: 1-8 - [c100]R. K. Shyamasundar, N. V. Narendra Kumar, Muttukrishnan Rajarajan:
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. HPCC/SmartCity/DSS 2016: 1410-1417 - [c99]N. V. Narendra Kumar, R. K. Shyamasundar:
An End-to-End Privacy Preserving Design of a Map-Reduce Framework. HPCC/SmartCity/DSS 2016: 1469-1476 - [c98]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity proof for CaPR+ algorithm. ICDCN 2016: 16:1-16:4 - 2015
- [c97]N. V. Narendra Kumar, R. K. Shyamasundar:
POSTER: Dynamic Labelling for Analyzing Security Protocols. CCS 2015: 1665-1667 - [c96]Anshu S. Anand, R. K. Shyamasundar:
Scaling Computation on GPUs Using Powerlists. HiPC Workshops 2015: 34-43 - [c95]S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ICISS 2015: 551-561 - [c94]Christophe Cérin, R. K. Shyamasundar, Yuqing Gao, Congfeng Jiang:
HPDIC Introduction and Committees. IPDPS Workshops 2015: 536 - [c93]N. V. Narendra Kumar, R. K. Shyamasundar:
Labelled mobile ambients model for information flow security in distributed systems. SIN 2015: 330-337 - [i2]Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
Opacity Proof for CaPR+ Algorithm. CoRR abs/1510.06967 (2015) - 2014
- [j46]Shashank Shekhar, Ranjeet Mishra, R. K. Ghosh, R. K. Shyamasundar:
Post-order based routing & transport protocol for wireless sensor networks. Pervasive Mob. Comput. 11: 229-243 (2014) - [c92]N. V. Narendra Kumar, R. K. Shyamasundar:
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels. BDCloud 2014: 753-760 - [e12]Atul Prakash, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4 [contents] - 2013
- [c91]Mesfin Belachew, R. K. Shyamasundar:
Public private partnerships (PPP) in the e-government initiatives for developing nations: the case of Ethiopia. ICEGOV 2013: 42-45 - [c90]Ankur Narang, Abhinav Srivastava, R. K. Shyamasundar:
High Performance Adaptive Distributed Scheduling Algorithm. IPDPS Workshops 2013: 1725-1734 - [c89]R. K. Shyamasundar:
Security and protection of SCADA: a bigdata algorithmic approach. SIN 2013: 20-27 - [e11]R. K. Shyamasundar, Lokendra Shastri, D. Janakiram, Srinivas Padmanabhuni:
Proceedings of the 6th ACM India Computing Convention, COMPUTE 2013, Vellore, Tamil Nadu, India, August 22 - 24, 2013. ACM 2013, ISBN 978-1-4503-2545-5 [contents] - [e10]Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha:
Distributed Computing and Networking, 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings. Lecture Notes in Computer Science 7730, Springer 2013, ISBN 978-3-642-35667-4 [contents] - 2012
- [c88]Supriya Vaddi, Hrushikesha Mohanty, R. K. Shyamasundar:
Service maps in XML. CUBE 2012: 635-640 - [c87]Ankur Narang, Abhinav Srivastava, Ramnik Jain, R. K. Shyamasundar:
Dynamic Distributed Scheduling Algorithm for State Space Search. Euro-Par 2012: 141-154 - [c86]Shashank Shekhar, R. K. Ghosh, R. K. Shyamasundar:
Postorder Based Routing and Transport Protocol for WSNs. ICDCN 2012: 281-294 - [c85]Saurabh Joshi, R. K. Shyamasundar, Sanjeev K. Aggarwal:
A New Method of MHP Analysis for Languages with Dynamic Barriers. IPDPS Workshops 2012: 519-528 - [e9]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 5th ACM COMPUTE Conference: Intelligent & scalable system technologies, Pune, India, January 23-24, 2012. ACM 2012, ISBN 978-1-4503-1440-4 [contents] - 2011
- [j45]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Performance driven multi-objective distributed scheduling for parallel computations. ACM SIGOPS Oper. Syst. Rev. 45(2): 14-27 (2011) - [j44]Ankur Narang, Rudrapatna K. Shyamasundar:
Performance driven distributed scheduling of parallel hybrid computations. Theor. Comput. Sci. 412(32): 4212-4225 (2011) - [c84]Nihita Goel, R. K. Shyamasundar:
An Executional Framework for BPMN Using Orc. APSCC 2011: 29-36 - [c83]Nihita Goel, N. V. Narendra Kumar, R. K. Shyamasundar:
SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services. ECOWS 2011: 109-116 - [c82]Shivali Agarwal, Saurabh Joshi, Rudrapatna K. Shyamasundar:
Distributed Generalized Dynamic Barrier Synchronization. ICDCN 2011: 143-154 - [c81]Ankur Narang, Abhinav Srivastava, Naga Praveen Kumar Katta, Rudrapatna K. Shyamasundar:
Affinity Driven Distributed Scheduling Algorithm for Parallel Computations. ICDCN 2011: 167-178 - [p2]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Towards Checking Tampering of Software. Cyber Security, Cyber Crime and Cyber Forensics 2011: 204-219 - [e8]R. K. Shyamasundar, Lokendra Shastri:
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, Bangalore, India, March 25-26, 2011. ACM 2011, ISBN 978-1-4503-0750-5 [contents] - 2010
- [c80]Nihita Goel, R. K. Shyamasundar:
Automatic Monitoring of SLAs of Web Services. APSCC 2010: 99-106 - [c79]Shivali Agarwal, R. K. Shyamasundar:
A Proof System for a PGAS Language. Concurrency, Compositionality, and Correctness 2010: 162-184 - [c78]R. K. Shyamasundar, Harshit J. Shah, N. V. Narendra Kumar:
Malware: From Modelling to Practical Detection. ICDCIT 2010: 21-39 - [c77]Hrushikesha Mohanty, Rajesh Kurra, R. K. Shyamasundar:
A Framework for Web-Based Negotiation. ICDCIT 2010: 140-151 - [c76]N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Can we certify systems for freedom from malware. ICSE (2) 2010: 175-178 - [e7]R. K. Shyamasundar, Prasad Deshpande:
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010. ACM 2010, ISBN 978-1-4503-0001-8 [contents]
2000 – 2009
- 2009
- [j43]A. K. Bhattacharjee, R. K. Shyamasundar:
Activity Diagrams : A Formal Framework to Model Business Processes and Code Generation. J. Object Technol. 8(1): 189-220 (2009) - [c75]Hrushikesha Mohanty, Martha VenkataSwamy, Srini Ramaswamy, R. K. Shyamasundar:
Translating Security Policy to Executable Code for Sandboxing Linux Kernel. EMS 2009: 124-129 - [c74]Harshit J. Shah, R. K. Shyamasundar, Pradeep Varma:
Concurrent SSA for general barrier-synchronized parallel programs. IPDPS 2009: 1-12 - [c73]Shivali Agarwal, Ankur Narang, R. K. Shyamasundar:
Distributed Scheduling of Parallel Hybrid Computations. ISAAC 2009: 1144-1154 - [c72]R. K. Shyamasundar, Shivali Agarwal:
Brief announcement: distributed phase synchronization of dynamic set of processes. PODC 2009: 274-275 - [c71]Pradeep Varma, R. K. Shyamasundar, Harshit J. Shah:
Backward-compatible constant-time exception-protected memory. ESEC/SIGSOFT FSE 2009: 71-80 - [e6]R. K. Shyamasundar:
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, Bangalore, India, January 9-10, 2009. ACM 2009, ISBN 978-1-60558-476-8 [contents] - 2008
- [j42]Jagadish Suryadevara, Lawrence Chung, R. K. Shyamasundar:
cmUML - A UML based Framework for Formal Specification of Concurrent, Reactive Systems. J. Object Technol. 7(8): 187-207 (2008) - [c70]Shivali Agarwal, Rajkishore Barik, V. Krishna Nandivada, R. K. Shyamasundar, Pradeep Varma:
Static Detection of Place Locality and Elimination of Runtime Checks. APLAS 2008: 53-74 - [c69]A. K. Bhattacharjee, R. K. Shyamasundar:
ScriptOrc: A Specification Language for Web Service Choreography. APSCC 2008: 1089-1096 - [c68]Shivali Agarwal, Rajkishore Barik, R. K. Shyamasundar:
A Static Characterization of Affinity in a Distributed Program. HPCC 2008: 572-579 - [c67]A. K. Bhattacharjee, R. K. Shyamasundar:
Choreography = Orchestration with Scripts + Conversations. ICWS 2008: 824-827 - [e5]R. K. Shyamasundar:
Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008. ACM 2008, ISBN 978-1-59593-950-0 [contents] - 2007
- [j41]Jagadish Suryadevara, R. K. Shyamasundar:
UML-based Approach to Specify Secured, Fine-grained Concurrent Access to Shared Resources. J. Object Technol. 6(1): 107-119 (2007) - [c66]Hrushikesha Mohanty, Jitesh Mulchandani, Deepak Chenthati, R. K. Shyamasundar:
Modeling Web Services with FSM Modules. Asia International Conference on Modelling and Simulation 2007: 100-105 - [c65]Harshit J. Shah, R. K. Shyamasundar:
On Run-Time Enforcement of Policies. ASIAN 2007: 268-281 - [c64]Krishnamani Kalyanasundaram, R. K. Shyamasundar:
Verification of Clock Synchronization in TTP. Formal Models, Languages and Applications 2007: 176-195 - [c63]Roberto Cavada, Alessandro Cimatti, Anders Franzén, Krishnamani Kalyanasundaram, Marco Roveri, R. K. Shyamasundar:
Computing Predicate Abstractions by Integrating BDDs and SMT Solvers. FMCAD 2007: 69-76 - [c62]Frederic Doucet, R. K. Shyamasundar, Ingolf H. Krüger, Saurabh Joshi, Rajesh K. Gupta:
Reactivity in SystemC Transaction-Level Models. Haifa Verification Conference 2007: 34-50 - [c61]Hrushikesha Mohanty, Kakarlamudi Prasad, R. K. Shyamasundar:
Trust Assessment in Web Services: an Extension to jUDDI. ICEBE 2007: 759-762 - [c60]Shivali Agarwal, Rajkishore Barik, Vivek Sarkar, R. K. Shyamasundar:
May-happen-in-parallel analysis of X10 programs. PPoPP 2007: 183-193 - [c59]Shivali Agarwal, Rajkishore Barik, Dan Bonachea, Vivek Sarkar, R. K. Shyamasundar, Katherine A. Yelick:
Deadlock-free scheduling of X10 computations with bounded resources. SPAA 2007: 229-240 - 2006
- [j40]N. Raja, R. K. Shyamasundar:
Actors as a Coordinating Model of Computation. Informatica (Slovenia) 30(2): 233-244 (2006) - [j39]N. Raja, R. K. Shyamasundar:
A closer look at constraints as processes. Inf. Process. Lett. 98(5): 206-210 (2006) - [j38]Rohit N. Kundaji, R. K. Shyamasundar:
Refinement calculus: A basis for translation validation, debugging and certification. Theor. Comput. Sci. 354(1): 153-168 (2006) - [j37]Susmit Jha, R. K. Shyamasundar:
Adapting Biochemical Kripke Structures for Distributed Model Checking. Trans. Comp. Sys. Biology 7: 107-122 (2006) - [c58]N. V. Narendra Kumar, R. K. Shyamasundar:
Specification and Realization of Access Control in SPKI/SDSI. ICISS 2006: 177-193 - [c57]Frederic Doucet, Ingolf Krüger, Rajesh K. Gupta, R. K. Shyamasundar:
Compositional interaction specifications for SystemC. MEMOCODE 2006: 201 - [p1]Neelima Arora, R. K. Shyamasundar:
UGSP: Authentication based secure protocol for AD-HOC networks. e-Business and Telecommunication Networks 2006: 242-247 - 2005
- [j36]Vishwas Patil, R. K. Shyamasundar:
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. Inf. Syst. Frontiers 7(4-5): 371-389 (2005) - [c56]A. K. Bhattacharjee, R. K. Shyamasundar:
Validated Code Generation for Activity Diagrams. ICDCIT 2005: 508-521 - [c55]Neelima Arora, R. K. Shyamasundar:
PGSP: a protocol for secure communication in peer-to-peer system. WCNC 2005: 2094-2099 - 2004
- [j35]N. Raja, R. K. Shyamasundar:
Type Systems for Concurrent Programming Calculi. Informatica (Slovenia) 28(1): 103-113 (2004) - [c54]Rajesh Gupta, R. K. Shyamasundar:
Reactive Framework for Resource Aware Distributed Computing. ASIAN 2004: 452-467 - [c53]Vishwas Patil, R. K. Shyamasundar:
An Efficient, Secure and Delegable Micro-Payment System. EEE 2004: 394-404 - [c52]Vishwas Patil, R. K. Shyamasundar:
Towards a Flexible Access Control Mechanism for E-Transactions. EGCDMAS 2004: 66-81 - [c51]Amit Jain, R. K. Shyamasundar:
Failure Detection and Membership Management in Grid Environments. GRID 2004: 44-52 - [c50]Neelima Arora, R. K. Shyamasundar:
UGSP: Secure Key Establishment Protocol for Ad-Hoc Network. ICDCIT 2004: 391-399 - [c49]Neelima Arora, R. K. Shyamasundar:
UGSP: Authentication Based Secure Protocol for Ad-Hoc Networks. ICETE (3) 2004: 191-196 - [c48]Rohit N. Kundaji, R. K. Shyamasundar:
Development of Semantic Debuggers Based on Refinement Calculus. ICLP 2004: 460-461 - [c47]Mohit Garg, R. K. Shyamasundar:
A Distributed Clustering Framework in Mobile Ad Hoc Networks. International Conference on Wireless Networks 2004: 32-38 - [c46]Krishnamani Kalyanasundaram, R. K. Shyamasundar:
Formal verification of pipelined processors with precise exceptions. MEMOCODE 2004: 129-139 - 2003
- [j34]N. Raja, R. K. Shyamasundar:
Type Systems for Concurrent Programming Calculi. Informatica (Slovenia) 27(4): 433-443 (2003) - [c45]Satyajit Acharya, Hrushikesha Mohanty, R. K. Shyamasundar:
MOBICHARTS: A Notation to Specify Mobile Computing Applications. HICSS 2003: 298 - [c44]Vivek S. Borkar, Mehul S. Dave, R. K. Shyamasundar:
Algorithmic Mechanisms for Secure Multi-Auction Systems. IICAI 2003: 212-225 - 2002
- [c43]R. K. Shyamasundar, Siddharth B. Deshmukh:
MicroBill: An Efficient Secure System for Subscription Based Services. ASIAN 2002: 220-232 - [c42]R. K. Shyamasundar, Basant Rajan, Manish Prasad, Amit Jain:
LLM: A Low Latency Messaging Infrastructure for Linux Clusters. HiPC 2002: 112-123 - [c41]R. K. Shyamasundar:
Analyzing Cryptographic Protocols in a Reactive Framework. VMCAI 2002: 46-64 - [i1]D. Ravi, R. K. Shyamasundar:
Approximate Computation of Reach Sets in Hybrid Systems. CoRR cs.LO/0202006 (2002) - 2001
- [j33]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems. Reliab. Eng. Syst. Saf. 71(3): 299-310 (2001) - [j32]A. K. Bhattacharjee, S. D. Dhodapkar, R. K. Shyamasundar:
PERTS: an environment for specification and verification of reactive systems: [Reliability Engineering and System Safety, 71(3), 2001, 299-310]. Reliab. Eng. Syst. Saf. 72(2): 223 (2001) - [c40]Mesfin Belachew, R. K. Shyamasundar:
MSC+: From Requirement to Prototyped Systems. ECRTS 2001: 117-124 - [c39]R. K. Shyamasundar, J. V. Aghav:
Validating Real-Time Constraints in Embedded Systems. PRDC 2001: 347-355 - [c38]Siddharth R. Phanse, R. K. Shyamasundar:
Application of Esterel for Modelling and Verification of Cachet Protocol on CRF Memory Model. VLSI Design 2001: 179-188 - 2000
- [j31]R. K. Shyamasundar, S. Ramesh:
Languages for Reactive Specifications: Synchrony Vs Asynchrony. Int. J. Found. Comput. Sci. 11(2): 283-314 (2000) - [j30]K. C. Anand, R. K. Shyamasundar:
Formal Verification of Activity-Based Specification of Protocols. J. Parallel Distributed Comput. 60(5): 639-676 (2000) - [c37]Basant Rajan, R. K. Shyamasundar:
Modeling Distributed Embedded Systems in Multiclock ESTEREL. FORTE 2000: 301-316 - [c36]A. K. Bhattacharjee, Gopa Sen, S. D. Dhodapkar, Kundapur Karunakar, Basant Rajan, R. K. Shyamasundar:
A System for Object Code Validation. FTRTFT 2000: 152-169 - [c35]Basant Rajan, R. K. Shyamasundar:
Multiclock Esterel: A Reactive Framework for Asynchronous Design. IPDPS 2000: 201-210 - [c34]Basant Rajan, R. K. Shyamasundar:
Modeling VHDL in Multiclock ESTEREL. VLSI Design 2000: 76-83
1990 – 1999
- 1999
- [c33]Sanjit A. Seshia, R. K. Shyamasundar, A. K. Bhattacharjee, S. D. Dhodapkar:
A Translation of Statecharts to Esterel. World Congress on Formal Methods 1999: 983-1007 - [c32]A. K. Bhattacharjee, S. D. Dhodapkar, Sanjit A. Seshia, R. K. Shyamasundar:
A Graphical Environment for the Specification and Verification of Reactive Systems. SAFECOMP 1999: 431-444 - 1998
- [j29]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Transformational Methodology for Proving Termination of Logic Programs. J. Log. Program. 34(1): 1-41 (1998) - [c31]Sophie Pinchinat, Éric Rutten, R. K. Shyamasundar:
Taxonomy and Expressiveness of Preemption: A Syntactic Approach. ASIAN 1998: 125-141 - [c30]N. Raja, R. K. Shyamasundar:
Mobile Computation: Calculus and Languages (A Tutorial). ASIAN 1998: 300-304 - 1997
- [j28]Ashok Khemka, R. K. Shyamasundar:
An Optimal Multiprocessor Real-Time Scheduling Algorithm. J. Parallel Distributed Comput. 43(1): 37-45 (1997) - [j27]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Proving Termination of GHC Programs. New Gener. Comput. 15(3): 293-338 (1997) - [j26]N. Raja, R. K. Shyamasundar:
Combinatory Formaulations of Concurrent Languages. ACM Trans. Program. Lang. Syst. 19(6): 899-915 (1997) - [c29]Deepak Kapur, R. K. Shyamasundar:
Synthesizing Controllers for Hybrid Systems. HART 1997: 361-375 - [e4]R. K. Shyamasundar, Kazunori Ueda:
Advances in Computing Science - ASIAN '97, Third Asian Computing Science Conference, Kathmandu, Nepal, December 9-11, 1997, Proceedings. Lecture Notes in Computer Science 1345, Springer 1997, ISBN 3-540-63875-X [contents] - 1996
- [j25]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Mapping Linear Recurrence Equations onto Systolic Architectures. Int. J. High Speed Comput. 8(3): 229-270 (1996) - [c28]Rupak Majumdar, R. K. Shyamasundar:
Design of Controllers for Linear Hybrid Systems. ASIAN 1996: 309-320 - [c27]N. Raja, R. K. Shyamasundar:
Actors as a Coordinating Model of Computation (Extended Abstract). Ershov Memorial Conference 1996: 191-202 - [c26]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Mapping Linear Recurrences onto Systolic Arrays. IPPS 1996: 891-897 - 1995
- [j24]N. Raja, R. K. Shyamasundar:
The Quine-Bernays Combinatory Calculus. Int. J. Found. Comput. Sci. 6(4): 417-430 (1995) - [c25]Sophie Pinchinat, Éric Rutten, R. K. Shyamasundar:
Preemption Primitives in Reactive Languages (A Preliminary Report). ASIAN 1995: 111-125 - [c24]N. Raja, R. K. Shyamasundar:
Combinatory Formulations of Concurrent Languages. ASIAN 1995: 156-170 - [c23]M. R. K. Krishna Rao, R. K. Shyamasundar:
Unification-Free Execution of Well-Moded and Well-Typed Prolog Programs. SAS 1995: 243-260 - 1994
- [j23]Leo Yuhsiang Liu, R. K. Shyamasundar:
RT-CDL: A Distributed Real-Time Design Language and Its Operational Semantics. Comput. Lang. 20(1): 1-23 (1994) - [j22]R. K. Shyamasundar, Bal Wang:
A Methodology for Provin Termination of Logic Programs. J. Log. Program. 21(1): 1-30 (1994) - [c22]R. K. Shyamasundar, S. Ramesh:
Languages for Reactive Specifications: Synchrony Vs Asynchrony. FTRTFT 1994: 621-640 - [c21]R. K. Shyamasundar, S. Ramesh:
Semantics and Verification of Hierarchical CRP Programs. Hybrid Systems 1994: 436-461 - [c20]Ladan Kazerouni, Basant Rajan, R. K. Shyamasundar:
Derivation of Systolic Programs. ICPP (3) 1994: 69-73 - [c19]R. K. Shyamasundar:
Specifying Dynamic Reat-Time Systems in CRP. IFIP Congress (1) 1994: 75-80 - 1993
- [j21]R. K. Shyamasundar, K. T. Narayana, Toniann Pitassi:
Semantics of Nondeterministic Asynchronous Broadcast Networks. Inf. Comput. 104(2): 215-252 (1993) - [j20]Ashok Khemka, R. K. Shyamasundar:
Multiprocessor Scheduling of Periodic Tasks in a Hard Real-Time Environment. Int. J. High Speed Comput. 5(4): 617-636 (1993) - [c18]R. K. Shyamasundar:
Specification of Hybrid Systems in CRP. AMAST 1993: 225-236 - [c17]M. R. K. Krishna Rao, Paritosh K. Pandya, R. K. Shyamasundar:
Verification Tools in the Development of Provably Correct Compilers. FME 1993: 442-461 - [c16]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
Proving Termination of GHC Programs. ICLP 1993: 720-736 - [c15]Ashok Khemka, K. V. Subramanyam, R. K. Shyamasundar:
Multiprocessors Scheduling for Imprecise Computations in a Hard Real-Time Environment. IPPS 1993: 374-378 - [c14]Gérard Berry, S. Ramesh, R. K. Shyamasundar:
Communicating Reactive Processes. POPL 1993: 85-98 - [e3]R. K. Shyamasundar:
Foundations of Software Technology and Theoretical Computer Science, 13th Conference, Bombay, India, December 15-17, 1993, Proceedings. Lecture Notes in Computer Science 761, Springer 1993, ISBN 3-540-57529-4 [contents] - 1992
- [c13]R. K. Shyamasundar, M. R. K. Krishna Rao, Deepak Kapur:
Rewriting Concepts in the Study of Termination of Logic Programs. ALPUK 1992: 3-20 - [c12]Ashok Khemka, R. K. Shyamasundar:
Multiprocessor Scheduling of Periodic Tasks in a Hard Real-Time Environment. IPPS 1992: 76-81 - [e2]R. K. Shyamasundar:
Foundations of Software Technology and Theoretical Computer Science, 12th Conference, New Delhi, India, December 18-20, 1992, Proceedings. Lecture Notes in Computer Science 652, Springer 1992, ISBN 3-540-56287-7 [contents] - 1991
- [c11]M. R. K. Krishna Rao, Deepak Kapur, R. K. Shyamasundar:
A Transformational Methodology for Proving Termination of Logic Programs. CSL 1991: 213-226 - [c10]Bal Wang, R. K. Shyamasundar:
Methodology for Proving the Termination of Logic Programs. STACS 1991: 214-227 - 1990
- [j19]Kamal Lodaya, R. K. Shyamasundar:
Proof Theory for Exception Handling in a Tasking Environment. Acta Informatica 28(1): 7-41 (1990) - [j18]Leo Yuhsiang Liu, R. K. Shyamasundar:
Exception Handling in RT-CDL. Comput. Lang. 15(3): 177-192 (1990) - [j17]Leo Yuhsiang Liu, R. K. Shyamasundar:
Static Analysis of Real-Time Distributed Systems. IEEE Trans. Software Eng. 16(4): 373-388 (1990) - [c9]Bal Wang, R. K. Shyamasundar:
Towards a Characterization of Termination of Logic Programs. PLILP 1990: 204-221
1980 – 1989
- 1989
- [j16]R. K. Shyamasundar, James W. Thatcher:
Language Constructs for Specifying Concurrency in CDL*. IEEE Trans. Software Eng. 15(8): 977-993 (1989) - [c8]Leo Yuhsiang Liu, R. K. Shyamasundar:
RT-CDL: A Real Time Design Language and Its Semantics. IFIP Congress 1989: 21-26 - [c7]Leo Yuhsiang Liu, R. K. Shyamasundar:
An operational semantics of real time design language RT-CDL. IWSSD 1989: 75-82 - [c6]Rudrapatna K. Shyamasundar, Jozef Hooman, Rob Gerth:
Reasoning of real-time distributed programming languages. IWSSD 1989: 91-99 - 1988
- [j15]Ron Koymans, R. K. Shyamasundar, Willem P. de Roever, Rob Gerth, S. Arun-Kumar:
Compositional Semantics for Real-Time Distributed Computing. Inf. Comput. 79(3): 210-256 (1988) - [c5]Leo Yuhsiang Liu, R. K. Shyamasundar:
Static Analysis of Real-time Distributed Systems. FTRTFT 1988: 134-138 - 1987
- [c4]R. K. Shyamasundar, K. T. Narayana, Toniann Pitassi:
Semantics for Nondeterministic Asynchronous Broadcast Networks. ICALP 1987: 72-83 - 1986
- [j14]A. Ravichandran, R. K. Shyamasundar:
Correctness proof for the majority consensus algorithm. Inf. Sci. 38(3): 213-227 (1986) - 1985
- [c3]Ron Koymans, R. K. Shyamasundar, Willem P. de Roever, Rob Gerth, S. Arun-Kumar:
Compositional Semantics for Real-time Distributed Computing. Logic of Programs 1985: 167-189 - 1984
- [j13]Subir Kumar Ghosh, R. K. Shyamasundar:
A linear time algorithm for computing the convex hull of an ordered crossing polygon. Pattern Recognit. 17(3): 351-358 (1984) - [j12]R. K. Shyamasundar:
A Simple Livelock-Free Algorithm for Packet Switching. Sci. Comput. Program. 4(3): 249-256 (1984) - [c2]Ramaswamy Ramanujam, R. K. Shyamasundar:
Process Specification of Logic Programs. FSTTCS 1984: 31-43 - [e1]Mathai Joseph, R. K. Shyamasundar:
Foundations of Software Technology and Theoretical Computer Science, Fourth Conference, Bangalore, India, December 13-15, 1984, Proceedings. Lecture Notes in Computer Science 181, Springer 1984, ISBN 3-540-13883-8 [contents] - 1983
- [j11]Subir Kumar Ghosh, R. K. Shyamasundar:
A linear time algorithm for obtaining the convex hull of a simple polygon. Pattern Recognit. 16(6): 587-592 (1983) - [j10]V. Murali, R. K. Shyamasundar:
A Sentence Generator for a Compiler for PT, a Pascal Subset. Softw. Pract. Exp. 13(9): 857-869 (1983) - [c1]S. Mahadevan, R. K. Shyamasundar:
Correctness Preserving Transformations for Distributed Programs. IFIP Congress 1983: 307-313 - 1982
- [j9]Kulathur S. Rajasethupathy, R. K. Shyamasundar:
A New Parsing Algorithm for EOL-Systems. J. Inf. Process. Cybern. 18(10/11): 543-564 (1982) - [j8]R. K. Shyamasundar:
On a Characterization of Pushdown Permuters. Theor. Comput. Sci. 17: 333-341 (1982) - 1981
- [j7]Eric C. R. Hehner, R. K. Shyamasundar:
An Implementation of P and V. Inf. Process. Lett. 12(4): 196-198 (1981) - 1980
- [j6]Kulathur S. Rajasethupathy, R. K. Shyamasundar:
Programmed OL-systems. Inf. Sci. 20(2): 137-150 (1980)
1970 – 1979
- 1978
- [j5]R. K. Shyamasundar:
LR-Deterministic Grammars. J. Inf. Process. Cybern. 14(7/8): 361-376 (1978) - [j4]R. K. Shyamasundar:
A note on the transitive closure of a boolean matrix. SIGACT News 9(4): 18-21 (1978) - [j3]R. K. Shyamasundar:
A note on the multiplication of 4x4 matrices. SIGACT News 10(1): 31-32 (1978) - 1976
- [j2]Werner Kuich, R. K. Shyamasundar:
The Structure Generating Function of Some Families of Languages. Inf. Control. 32(1): 85-92 (1976) - [j1]R. K. Shyamasundar:
A Note on Linear Precedence Functions. Inf. Process. Lett. 5(3): 81 (1976)
Coauthor Index
aka: Vishwas T. Patil
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint