default search action
Himanshu Raj
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Umesh Krishnaswamy, Ramesh Govindan, Srikanth Kandula:
Finding Adversarial Inputs for Heuristics using Multi-level Optimization. NSDI 2024 - [c23]Pooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, Himanshu Raj:
Solving Max-Min Fair Resource Allocations Quickly on Large Graphs. NSDI 2024 - [i3]Himanshu Raj, Shubham Kumar, J. Kalaivani:
EmpowerAbility: A portal for employment & scholarships for differently-abled. CoRR abs/2403.11769 (2024) - 2023
- [c22]Umesh Krishnaswamy, Rachee Singh, Paul Mattes, Paul-Andre C. Bissonnette, Nikolaj S. Bjørner, Zahira Nasrin, Sonal Kothari, Prabhakar Reddy, John Abeln, Srikanth Kandula, Himanshu Raj, Luis Irún-Briz, Jamie Gaudette, Erica Lan:
OneWAN is better than two: Unifying a split WAN architecture. NSDI 2023: 515-529 - [i2]Pooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, Himanshu Raj:
Solving Max-Min Fair Resource Allocations Quickly on Large Graphs. CoRR abs/2310.09699 (2023) - [i1]Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Umesh Krishnaswamy, Ramesh Govindan, Srikanth Kandula:
Finding Adversarial Inputs for Heuristics using Multi-level Optimization. CoRR abs/2311.12779 (2023) - 2022
- [c21]Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Srikanth Kandula:
Minding the gap between fast heuristics and their optimal counterparts. HotNets 2022: 138-144 - [c20]Umesh Krishnaswamy, Rachee Singh, Nikolaj S. Bjørner, Himanshu Raj:
Decentralized cloud wide-area network traffic engineering with BLASTSHIELD. NSDI 2022: 325-338
2010 – 2019
- 2016
- [c19]Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork Löser, Dennis Mattoon, Magnus Nyström, David Robinson, Rob Spiger, Stefan Thom, David Wooten:
fTPM: A Software-Only Implementation of a TPM Chip. USENIX Security Symposium 2016: 841-856 - 2015
- [c18]Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal de Lara, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Protecting Data on Smartphones and Tablets from Memory Attacks. ASPLOS 2015: 177-189 - 2014
- [j2]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. login Usenix Mag. 39(4) (2014) - [c17]Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Using ARM trustzone to build a trusted language runtime for mobile applications. ASPLOS 2014: 67-80 - [c16]Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman:
cTPM: A Cloud TPM for Cross-Device Trusted Applications. NSDI 2014: 187-201 - 2013
- [c15]Himanshu Raj, Karsten Schwan, Ripal Nathuji:
M-ECho: A Middleware for Morphable Data-Streaming in Pervasive Systems. EESR 2013 - [c14]Himanshu Raj, Stefan Saroiu, Alec Wolman, Jitendra Padhye:
Splitting the bill for mobile data with SIMlets. HotMobile 2013: 1 - 2012
- [c13]Anh Nguyen, Himanshu Raj, Shravan K. Rayanchu, Stefan Saroiu, Alec Wolman:
Delusional boot: securing hypervisors without massive re-engineering. EuroSys 2012: 141-154 - [c12]He Liu, Stefan Saroiu, Alec Wolman, Himanshu Raj:
Software abstractions for trusted sensors. MobiSys 2012: 365-378 - [c11]Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England:
Trusted VM Snapshots in Untrusted Cloud Infrastructures. RAID 2012: 1-21 - 2011
- [c10]Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman:
Trusted language runtime (TLR): enabling trusted applications on smartphones. HotMobile 2011: 21-26 - [e1]Sanjay Kumar, Himanshu Raj, Karsten Schwan:
3rd Workshop on I/O Virtualization, WIOV'11, Portland, OR, USA, June 14, 2011. USENIX Association 2011 [contents]
2000 – 2009
- 2009
- [c9]Himanshu Raj, Ripal Nathuji, Abhishek Singh, Paul England:
Resource management for isolation enhanced cloud services. CCSW 2009: 77-84 - [c8]Himanshu Raj, Karsten Schwan:
Extending virtualization services with trust guarantees via behavioral monitoring. VDTS@EuroSys 2009: 24-29 - 2008
- [b1]Himanshu Raj:
Virtualization services: scalable methods for virtualizing multicore systems. Georgia Institute of Technology, Atlanta, GA, USA, 2008 - [j1]Himanshu Raj, Karsten Schwan:
O2S2: enhanced object-based virtualized storage. ACM SIGOPS Oper. Syst. Rev. 42(6): 24-29 (2008) - 2007
- [c7]Himanshu Raj, Karsten Schwan:
High performance and scalable I/O virtualization via self-virtualized devices. HPDC 2007: 179-188 - [c6]Himanshu Raj, Radhika Niranjan, Sanjay Kumar, Ada Gavrilovska, Balasubramanian Seshasayee, Karsten Schwan:
Enabling semantic communications for virtual machines via iConnect. VTDC@SC 2007: 1:1-1:8 - 2006
- [c5]Keith J. O'Hara, Ripal Nathuji, Himanshu Raj, Karsten Schwan, Tucker R. Balch:
AutoPower: Toward Energy-aware Software Systems for Distributed Mobile Robots. ICRA 2006: 2757-2762 - [c4]Himanshu Raj, Balasubramanian Seshasayee, Keith J. O'Hara, Ripal Nathuji, Karsten Schwan, Tucker R. Balch:
Spirits: Using Virtualization and Pervasiveness to Manage Mobile Robot Software Systems. SelfMan 2006: 116-129 - 2004
- [c3]Himanshu Raj, Rich Gossweiler, Dejan S. Milojicic:
ContentCascade Incremental Content Exchange between Public Displays and Personal Devices. MobiQuitous 2004: 374-381 - [c2]Pradnya Karbhari, Mostafa H. Ammar, Amogh Dhamdhere, Himanshu Raj, George F. Riley, Ellen W. Zegura:
Bootstrapping in Gnutella: A Measurement Study. PAM 2004: 22-32 - 2003
- [c1]Qi He, Mostafa H. Ammar, George F. Riley, Himanshu Raj, Richard Fujimoto:
Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems. MASCOTS 2003: 71-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint