Segui
Ashwin Kumar Kayyoor
Ashwin Kumar Kayyoor
Senior Distributed Systems Engineer, Netflix
Email verificata su netflix.com - Home page
Titolo
Citata da
Citata da
Anno
SWORD: scalable workload-aware data placement for transactional workloads
A Quamar, KA Kumar, A Deshpande
Proceedings of the 16th international conference on extending database …, 2013
1702013
Hybrid approach using case-based reasoning and rule-based reasoning for domain independent clinical decision support in ICU
KA Kumar, Y Singh, S Sanyal
Expert Systems with Applications 36 (1), 65-71, 2009
1402009
SWORD: workload-aware data placement and replica selection for cloud data management systems
KA Kumar, A Quamar, A Deshpande, S Khuller
The VLDB Journal 23, 845-870, 2014
1142014
Data Placement and Replica Selection for Improving Co-location in Distributed Environments
AK Kayyoor, A Deshpande, S Khuller
Technical Report, 2011
57*2011
Sensor metadata management and its application in collaborative environmental research
N Dawes, KA Kumar, S Michel, K Aberer, M Lehning
2008 IEEE Fourth International Conference on EScience, 143-150, 2008
532008
Environmental Monitoring 2.0
S Michel, A Salehi, L Luo, N Dawes, K Aberer, G Barrenetxea, M Bavay, ...
2009 IEEE 25th International Conference on Data Engineering, 1507-1510, 2009
412009
Multi-level reputation-based greylisting
AGK Janecek, WN Gansterer, KA Kumar
2008 Third International Conference on Availability, Reliability and …, 2008
352008
Hone: " Scaling down" Hadoop on shared-memory systems
KA Kumar, J Gluck, A Deshpande, J Lin
Proceedings of the VLDB Endowment 6 (12), 1354-1357, 2013
342013
Utility-Driven Graph Summarization
KA Kumar, P Efstathopoulos
Proceedings of the VLDB Endowment 12 (4), 335-347, 2019
322019
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
282017
Preventing a malicious computer application from executing in a computing environment
AK Kayyoor, P Efstathopoulos
US Patent 10,311,231, 2019
142019
Optimization Techniques for “Scaling Down” Hadoop on Multi-Core, Shared-Memory Systems
KA Kumar, J Gluck, A Deshpande, J Lin
EDBT: 17th International Conference on Extending Database Technology, 2014
132014
Systems and methods for clustering data to improve data analytics
A Kayyoor, H Aloysius, B Tca
US Patent 11,036,800, 2021
92021
Prioritizing backup operations using heuristic techniques
V Janakiraman, AK Kayyoor
US Patent 10,606,705, 2020
92020
Hybrid approach for parallelization of sequential code with function level and block level parallelization
KA Kumar, AK Pappu, KS Kumar, S Sanyal
International Symposium on Parallel Computing in Electrical Engineering …, 2006
82006
Automatically detecting insider threats using user collaboration patterns
S Bhatkar, S Shintre, A Kayyoor
US Patent 10,341,373, 2019
72019
Classification using projection of graphs into summarized spaces
P Efstathopoulos, AK Kayyoor
US Patent 11,032,303, 2021
62021
Systems and methods for file system metadata analytics
A Kayyoor, M Vaidya, S Dargude, H Ashwani
US Patent 10,997,499, 2021
62021
Insider threat detection under user-resource bi-partite graphs
S Shintre, S Bhatkar, AK Kayyoor
US Patent 10,686,816, 2020
62020
Systems and methods for detecting anomalous behavior in shared data repositories
A Kayyoor, S Bhatkar, S Shintre
US Patent 10,425,435, 2019
62019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20