Ramamohanarao (Rao) Kotagiri
Ramamohanarao (Rao) Kotagiri
Professor, Computing and Information Systems, The University of Melbourne
Verified email at unimelb.edu.au
TitleCited byYear
Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao
ACM Computing Surveys (CSUR) 39 (1), 3, 2007
7892007
Inverted files versus signature files for text indexing
J Zobel, A Moffat, K Ramamohanarao
ACM Transactions on Database Systems (TODS) 23 (4), 453-490, 1998
4651998
Workflow scheduling algorithms for grid computing
J Yu, R Buyya, K Ramamohanarao
Metaheuristics for scheduling in distributed computing environments, 173-214, 2008
4362008
A taxonomy of data grids for distributed data sharing, management, and processing
S Venugopal, R Buyya, K Ramamohanarao
ACM Computing Surveys (CSUR) 38 (1), 3, 2006
4222006
Protection from distributed denial of service attacks using history-based IP filtering
T Peng, C Leckie, K Ramamohanarao
IEEE International Conference on Communications, 2003. ICC'03. 1, 482-486, 2003
3482003
A model for spectra-based software diagnosis
L Naish, HJ Lee, K Ramamohanarao
ACM Transactions on software engineering and methodology (TOSEM) 20 (3), 11, 2011
2962011
An effective retinal blood vessel segmentation method using multi-scale line detection
UTV Nguyen, A Bhuiyan, LAF Park, K Ramamohanarao
Pattern recognition 46 (3), 703-715, 2013
2922013
Fog computing: A taxonomy, survey and future directions
R Mahmud, R Kotagiri, R Buyya
Internet of everything, 103-130, 2018
2842018
Proactively detecting distributed denial of service attacks using source IP address monitoring
T Peng, C Leckie, K Ramamohanarao
International conference on research in networking, 771-782, 2004
2282004
An estimation of sensor energy consumption
MN Halgamuge, M Zukerman, K Ramamohanarao, HL Vu
Progress in Electromagnetics Research 12, 259-295, 2009
1832009
Layered approach using conditional random fields for intrusion detection
KK Gupta, B Nath, R Kotagiri
IEEE Transactions on dependable and secure Computing 7 (1), 35-49, 2008
1712008
A generalization of the differential approach to recursive query evaluation
I Balbin, K Ramamohanarao
The Journal of Logic Programming 4 (3), 259-262, 1987
1711987
Multikey access methods based on superimposed coding techniques
R Sacks-Davis, A Kent, K Ramamohanarao
ACM Transactions on Database Systems (TODS) 12 (4), 655-696, 1987
1681987
Adjusted probabilistic packet marking for IP traceback
T Peng, C Leckie, K Ramamohanarao
International conference on research in networking, 697-708, 2002
1562002
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
C Liu, J Chen, LT Yang, X Zhang, C Yang, R Ranjan, R Kotagiri
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2234-2244, 2013
1472013
Deeps: A new instance-based lazy discovery and classification system
J Li, G Dong, K Ramamohanarao, L Wong
Machine learning 54 (2), 99-124, 2004
1472004
Role engineering using graph optimisation
D Zhang, K Ramamohanarao, T Ebringer
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1452007
Making use of the most expressive jumping emerging patterns for classification
J Li, G Dong, K Ramamohanarao
Knowledge and Information systems 3 (2), 131-145, 2001
1362001
A two level superimposed coding scheme for partial match retrieval
R Sacks-Davis, K Ramamohanarao
Information Systems 8 (4), 273-280, 1983
1281983
A probabilistic approach to detecting network scans
C Leckie, R Kotagiri
NOMS 2002. IEEE/IFIP Network Operations and Management Symposium.'Management …, 2002
1232002
The system can't perform the operation now. Try again later.
Articles 1–20