Clay Codes: Moulding {MDS} Codes to Yield an {MSR} Code M Vajha, V Ramkumar, B Puranik, G Kini, E Lobo, B Sasidharan, ... 16th {USENIX} Conference on File and Storage Technologies ({FAST} 18), 139-154, 2018 | 117 | 2018 |
Data management in distributed file systems S Narayanamurthy, G Makkar, K Muthyala, A Suresh US Patent 9,507,800, 2016 | 96 | 2016 |
Distributed file system snapshot G Makkar, S Narayanamurthy, K Muthyala US Patent 9,336,219, 2016 | 63 | 2016 |
Using random forests for network-based anomaly detection at active routers G Prashanth, V Prashanth, P Jayashree, N Srinivasan 2008 International Conference on Signal Processing, Communications and …, 2008 | 39 | 2008 |
Performance impact analysis of network change J Basak, V Mathur, S Nandi, S Narayanamurthy, K Voruganti US Patent 8,903,995, 2014 | 34 | 2014 |
Distributed file system gateway K Muthyala, G Makkar, A Suresh, S Narayanamurthy US Patent 9,575,974, 2017 | 26 | 2017 |
Evaluation of codes with inherent double replication for hadoop MN Krishnan, N Prakash, V Lalitha, B Sasidharan, PV Kumar, ... 6th {USENIX} Workshop on Hot Topics in Storage and File Systems (HotStorage 14), 2014 | 18 | 2014 |
Object store architecture for distributed data processing system G Makkar, S Narayanamurthy, K Muthyala, S Daniel US Patent 9,582,213, 2017 | 17 | 2017 |
Deduplication of encrypted data within a remote data store S Narayanamurthy, P Deshmukh US Patent 11,106,375, 2021 | 15 | 2021 |
Secure proofs of storage for deduplication S Narayanamurthy US Patent 9,571,287, 2017 | 15 | 2017 |
Multiple node repair using high rate minimum storage regeneration erasure code SA Hussain, S Narayanamurthy US Patent 10,452,477, 2019 | 13 | 2019 |
Reduction of false alarm rate in detecting network anomaly using mahalanobis distance and similarity measure N Srinivasan, V Vaidehi 2007 International Conference on Signal Processing, Communications and …, 2007 | 11 | 2007 |
Fuzzy rule-base based intrusion detection system on application layer S Sangeetha, S Haripriya, SG Mohana Priya, V Vaidehi, N Srinivasan International Conference on Network Security and Applications, 27-36, 2010 | 10 | 2010 |
Aggregate inline deduplication with volume granular encryption S Narayanamurthy, DN Pawar, J Vasudeva, P Deshmukh, S Nandi US Patent App. 16/354,562, 2020 | 9 | 2020 |
Timed coloured Petri net model for misuse intrusion detection N Srinivasan, V Vaidehi First International Conference on Industrial and Information Systems, 550-555, 2006 | 9 | 2006 |
Implementation of application layer intrusion detection system using protocol analysis S Sangeetha, V Vaidehi, N Srinivasan, KV Rajkumar, S Pradeep, ... 2008 International Conference on Signal Processing, Communications and …, 2008 | 6 | 2008 |
WORMStore: A specialized object store for write-once read-many workloads S Narayanamurthy, K Muthyala, G Makkar 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation …, 2014 | 5 | 2014 |
Model building for dynamic multi-tenant provider environments J Basak, K Wadhwani, K Voruganti, S Narayanamurthy, V Mathur, ... ACM SIGOPS Operating Systems Review 46 (3), 20-31, 2012 | 5 | 2012 |
Modern erasure codes for distributed storage systems S Narayanamurthy Storage Developer Conference (SDC), SNIA, Santa Clara, 2016 | 4 | 2016 |
Performance Analysis of Soft Computing Based Anomaly Detectors. N Srinivasan, V Vaidehi Int. J. Netw. Secur. 7 (3), 436-447, 2008 | 4 | 2008 |