Fog computing: A taxonomy, survey and future directions R Mahmud, R Kotagiri, R Buyya Internet of everything: algorithms, methodologies, technologies and …, 2018 | 1147 | 2018 |
Survey of network-based defense mechanisms countering the DoS and DDoS problems T Peng, C Leckie, K Ramamohanarao ACM Computing Surveys (CSUR) 39 (1), 3-es, 2007 | 1099 | 2007 |
A model for spectra-based software diagnosis L Naish, HJ Lee, K Ramamohanarao ACM Transactions on software engineering and methodology (TOSEM) 20 (3), 1-32, 2011 | 636 | 2011 |
Workflow scheduling algorithms for grid computing J Yu, R Buyya, K Ramamohanarao Metaheuristics for scheduling in distributed computing environments, 173-214, 2008 | 607 | 2008 |
An effective retinal blood vessel segmentation method using multi-scale line detection UTV Nguyen, A Bhuiyan, LAF Park, K Ramamohanarao Pattern recognition 46 (3), 703-715, 2013 | 606 | 2013 |
Inverted files versus signature files for text indexing J Zobel, A Moffat, K Ramamohanarao ACM Transactions on Database Systems (TODS) 23 (4), 453-490, 1998 | 549 | 1998 |
A taxonomy of data grids for distributed data sharing, management, and processing S Venugopal, R Buyya, K Ramamohanarao ACM Computing Surveys (CSUR) 38 (1), 3-es, 2006 | 475 | 2006 |
Protection from distributed denial of service attacks using history-based IP filtering T Peng, C Leckie, K Ramamohanarao IEEE International Conference on Communications, 2003. ICC'03. 1, 482-486, 2003 | 427 | 2003 |
Quality of Experience (QoE)-aware placement of applications in Fog computing environments R Mahmud, SN Srirama, K Ramamohanarao, R Buyya Journal of Parallel and Distributed Computing 132, 190-203, 2019 | 327 | 2019 |
An estimation of sensor energy consumption MN Halgamuge, M Zukerman, K Ramamohanarao, HL Vu Progress In Electromagnetics Research B, 259-295, 2009 | 279 | 2009 |
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates C Liu, J Chen, LT Yang, X Zhang, C Yang, R Ranjan, R Kotagiri IEEE Transactions on Parallel and Distributed Systems 25 (9), 2234-2244, 2013 | 278 | 2013 |
Proactively detecting distributed denial of service attacks using source IP address monitoring T Peng, C Leckie, K Ramamohanarao Networking 2004: Networking Technologies, Services, and Protocols …, 2004 | 275 | 2004 |
Tensor canonical correlation analysis for multi-view dimension reduction Y Luo, D Tao, K Ramamohanarao, C Xu, Y Wen IEEE transactions on Knowledge and Data Engineering 27 (11), 3111-3124, 2015 | 265 | 2015 |
Latency-aware application module management for fog computing environments R Mahmud, K Ramamohanarao, R Buyya ACM Transactions on Internet Technology (TOIT) 19 (1), 1-21, 2018 | 264 | 2018 |
Layered approach using conditional random fields for intrusion detection KK Gupta, B Nath, R Kotagiri IEEE Transactions on dependable and secure Computing 7 (1), 35-49, 2008 | 227 | 2008 |
A generalization of the differential approach to recursive query evaluation I Balbin, K Ramamohanarao The Journal of Logic Programming 4 (3), 259-262, 1987 | 196 | 1987 |
Dynamic scheduling for stochastic edge-cloud computing environments using a3c learning and residual recurrent neural networks S Tuli, S Ilager, K Ramamohanarao, R Buyya IEEE transactions on mobile computing 21 (3), 940-954, 2020 | 195 | 2020 |
Robust scheduling of scientific workflows with deadline and budget constraints in clouds D Poola, SK Garg, R Buyya, Y Yang, K Ramamohanarao 2014 IEEE 28th international conference on advanced information networking …, 2014 | 194 | 2014 |
Mapping connectomes with diffusion MRI: deterministic or probabilistic tractography? T Sarwar, K Ramamohanarao, A Zalesky Magnetic resonance in medicine 81 (2), 1368-1384, 2019 | 187 | 2019 |
Application management in fog computing environments: A taxonomy, review and future directions R Mahmud, K Ramamohanarao, R Buyya ACM Computing Surveys (CSUR) 53 (4), 1-43, 2020 | 186 | 2020 |