A microeconomic approach to optimal resource allocation in distributed computer systems JF Kurose, R Simha IEEE Transactions on computers 38 (5), 705-717, 1989 | 407 | 1989 |
Strong minimum energy topology in wireless sensor networks: NP-completeness and heuristics X Cheng, B Narahari, R Simha, MX Cheng, D Liu IEEE Transactions on mobile computing 2 (3), 248-256, 2003 | 228 | 2003 |
Machine learning method for real-time non-invasive prediction of individual thermal preference in transient conditions AC Cosma, R Simha Building and Environment 148, 372-383, 2019 | 126 | 2019 |
On the wavelength assignment problem in multifiber WDM star and ring networks G Li, R Simha Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000 | 122 | 2000 |
Thermal comfort modeling in transient conditions using real-time local body temperature extraction with a thermographic camera AC Cosma, R Simha Building and Environment 143, 36-47, 2018 | 117 | 2018 |
The partition coloring problem and its application to wavelength routing and assignment G Li, R Simha Proceedings of the First Workshop on Optical Networks 1, 2000 | 103 | 2000 |
OS support for detecting Trojan circuit attacks G Bloom, B Narahari, R Simha 2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009 | 91 | 2009 |
Experimental evaluation of dynamic data allocation strategies in a distributed database with changing workloads A Brunstrom, ST Leutenegger, R Simha Proceedings of the fourth international conference on Information and …, 1995 | 91 | 1995 |
Optimal processor assignment for a class of pipelined computations AN Choudhary, B Narahari, DM Nicol, R Simha IEEE transactions on parallel and distributed systems 5 (4), 439-445, 1994 | 88 | 1994 |
Transform-based indexing of audio data for multimedia databases SR Subramanya, R Simha, B Narahari, A Youssef Proceedings of IEEE International Conference on Multimedia Computing and …, 1997 | 78 | 1997 |
SAFE-OPS: An approach to embedded software security J Zambreno, A Choudhary, R Simha, B Narahari, N Memon ACM Transactions on Embedded Computing Systems (TECS) 4 (1), 189-210, 2005 | 68 | 2005 |
Process-based network decomposition reveals backbone motif structure G Wang, C Du, H Chen, R Simha, Y Rong, Y Xiao, C Zeng Proceedings of the National Academy of Sciences 107 (23), 10478-10483, 2010 | 66 | 2010 |
Automatic generation of context-based fill-in-the-blank exercises using co-occurrence likelihoods and Google n-grams J Hill, R Simha Proceedings of the 11th Workshop on Innovative Use of NLP for Building …, 2016 | 59 | 2016 |
Relative reward strength algorithms for learning automata R Simha, JF Kurose IEEE Transactions on Systems, Man, and Cybernetics 19 (2), 388-398, 1989 | 59 | 1989 |
Analysis of individual packet loss in a finite buffer queue with heterogeneous Markov modulated arrival processes: a study of traffic burstiness and priority packet discarding JJ Bae, T Suda, R Simha [Proceedings] IEEE INFOCOM'92: The Conference on Computer Communications …, 1992 | 57 | 1992 |
Providing secure execution environments with a last line of defense against trojan circuit attacks G Bloom, B Narahari, R Simha, J Zambreno computers & security 28 (7), 660-669, 2009 | 52 | 2009 |
On sampling controlled stochastic approximation D Paul, S Rahul Automatic Control, IEEE Transactions on 36 (8), 915-924, 1991 | 50 | 1991 |
Using the contrast within a single face heat map to assess personal thermal comfort AC Cosma, R Simha Building and Environment 160, 106163, 2019 | 45 | 2019 |
CODESSEAL: Compiler/FPGA approach to secure applications O Gelbart, P Ott, B Narahari, R Simha, A Choudhary, J Zambreno Intelligence and Security Informatics: IEEE International Conference on …, 2005 | 38 | 2005 |
Pathway switching explains the sharp response characteristic of hypoxia response network Y Yu, G Wang, R Simha, W Peng, F Turano, C Zeng PLoS computational biology 3 (8), e171, 2007 | 36 | 2007 |