Addressing failures in exascale computing M Snir, RW Wisniewski, JA Abraham, SV Adve, S Bagchi, P Balaji, J Belak, ... The International Journal of High Performance Computing Applications 28 (2 …, 2014 | 521 | 2014 |
Watson: beyond jeopardy! D Ferrucci, A Levas, S Bagchi, D Gondek, ET Mueller Artificial Intelligence 199, 93-105, 2013 | 486 | 2013 |
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks I Khalil, S Bagchi, NB Shroff 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 436 | 2005 |
Chameleon: A software infrastructure for adaptive fault tolerance ZT Kalbarczyk, RK Iyer, S Bagchi, K Whisnant IEEE Transactions on Parallel and Distributed Systems 10 (6), 560-579, 1999 | 259 | 1999 |
The MG-RAST metagenomics database and portal in 2015 A Wilke, J Bischof, W Gerlach, E Glass, T Harrison, KP Keegan, T Paczian, ... Nucleic acids research 44 (D1), D590-D594, 2016 | 222 | 2016 |
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment B Foo, YS Wu, YC Mao, S Bagchi, E Spafford 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 218 | 2005 |
TCP/IP timing channels: Theory to implementation SH Sellke, CC Wang, S Bagchi, N Shroff IEEE INFOCOM 2009, 2204-2212, 2009 | 213 | 2009 |
Exactly-once delivery in a content-based publish-subscribe system S Bhola, R Strom, S Bagchi, Y Zhao, J Auerbach Proceedings International Conference on Dependable Systems and Networks, 7-16, 2002 | 208 | 2002 |
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks I Khalil, S Bagchi, NB Shroff Ad Hoc Networks 6 (3), 344-362, 2008 | 207 | 2008 |
Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS YS Wu, B Foo, Y Mei, S Bagchi 19th Annual Computer Security Applications Conference (ACSAC), 234-244, 2003 | 190 | 2003 |
Modeling and automated containment of worms SH Sellke, NB Shroff, S Bagchi IEEE Transactions on Dependable and Secure Computing 5 (2), 71-86, 2008 | 182 | 2008 |
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments YS Wu, S Bagchi, S Garg, N Singh International conference on dependable systems and networks, 2004, 433-442, 2004 | 177 | 2004 |
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation A Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ... 29th USENIX Security Symposium (USENIX Sec), 1--19, 2020 | 159 | 2020 |
Stream: Low overhead wireless reprogramming for sensor networks RK Panta, I Khalil, S Bagchi IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 149 | 2007 |
Characterizing failures in mobile oses: A case study with android and symbian AK Maji, K Hao, S Sultana, S Bagchi 2010 IEEE 21st international symposium on software reliability engineering …, 2010 | 147 | 2010 |
An empirical study of the robustness of inter-component communication in android AK Maji, FA Arshad, S Bagchi, JS Rellermeyer IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012 | 143 | 2012 |
MG-RAST version 4—lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis F Meyer, S Bagchi, S Chaterji, W Gerlach, A Grama, T Harrison, T Paczian, ... Briefings in bioinformatics 20 (4), 1151-1159, 2019 | 137 | 2019 |
MCREngine: A scalable checkpointing system using data-aware aggregation and compression TZ Islam, K Mohror, S Bagchi, A Moody, BR De Supinski, R Eigenmann SC'12: Proceedings of the International Conference on High Performance …, 2012 | 134 | 2012 |
Protecting bare-metal embedded systems with privilege overlays AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ... 2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017 | 130 | 2017 |
Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks S Bagchi, NB Shroff, IMI Khalil, RK Panta, MD Krasniewski, JV Krogmeier US Patent 8,107,397, 2012 | 128 | 2012 |