default search action
Priya Chandran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Swapneel C. Mhatre, Priya Chandran:
On the Measurement of Performance Metrics for Virtualization-Enhanced Architectures. SAC 2023: 49-56 - 2022
- [i3]Swapneel C. Mhatre, Priya Chandran:
On the Simulation of Hypervisor Instructions for Accurate Timing Simulation of Virtualized Systems. CoRR abs/2206.00258 (2022) - 2020
- [c17]Shruti Nair, Madhumita Mohan, Jemima Rajesh, Priya Chandran:
On Finding the Best Learning Model for Assessing Confidence in Speech. MLMI 2020: 58-64 - [c16]Swapneel C. Mhatre, Priya Chandran:
On making xen detect hypercalls and memory accesses for simulating virtualization-enabled processors. SAC 2020: 154-161
2010 – 2019
- 2019
- [j8]Jeethu V. Devasia, Priya Chandran:
Graph pruning based approach for inferring disease causing genes and associated pathways. Int. J. Bioinform. Res. Appl. 15(4): 359-370 (2019) - [j7]Shyam P. Joy, Priya Chandran:
Towards a Secure Development Environment for Collaborative Applications. Int. J. e Collab. 15(1): 1-20 (2019) - [j6]Shyam P. Joy, Priya Chandran:
A formal framework for verifying IKA property of protocols. J. King Saud Univ. Comput. Inf. Sci. 31(3): 318-326 (2019) - [c15]Ojus Thomas Lee, Vijay Sharma, S. D. Madhu Kumar, Priya Chandran:
Modelling multi level consistency in erasure code based storage systems. SAC 2019: 122-129 - [c14]Jeethu V. Devasia, Priya Chandran, Anjana Soman, Aiswarya Elezabeth Mathew, Jaya Jharwal:
Graph sparsification with parallelization to optimize the identification of causal genes and dysregulated pathways. SAC 2019: 747-753 - 2018
- [j5]Jithin R, Priya Chandran:
Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices. Future Internet 10(12): 119 (2018) - [j4]Priya Chandran, Chelpa Lingam:
Adaptive jitter buffer management: a game theoretic approach. Int. J. Commun. Networks Distributed Syst. 21(1): 130-146 (2018) - [j3]Jeethu V. Devasia, Priya Chandran:
Inferring disease causing genes and their pathways: GpRr method. J. Comput. Sci. 26: 108-117 (2018) - [c13]Swapneel C. Mhatre, Priya Chandran, Jithin R:
On the Simulation of Processors Enhanced for Security in Virtualization. ICPE Companion 2018: 51-52 - 2017
- [j2]T. P. Shabeera, S. D. Madhu Kumar, Priya Chandran:
Curtailing job completion time in MapReduce clouds through improved Virtual Machine allocation. Comput. Electr. Eng. 58: 190-202 (2017) - [c12]G. J. Akash, Ojus Thomas Lee, S. D. Madhu Kumar, Priya Chandran, Alfredo Cuzzocrea:
RAPID: A Fast Data Update Protocol in Erasure Coded Storage Systems for Big Data. CCGrid 2017: 890-897 - [c11]Priya Chandran, Lakshya Garg, Aditya Kumar:
Multikernel Simulation: A New Approach to Study Rollback Sensitive Memory Architecture. CIC 2017: 437-442 - [c10]Ojus Thomas Lee, G. J. Akash, S. D. Madhu Kumar, Priya Chandran:
A Method for Storage Node Allocation in Erasure Code Based Storage Systems. CIC 2017: 449-454 - [c9]Jeethu V. Devasia, Priya Chandran, Garge Shreya, Aparna R., Abijith R.:
On parallelizing graph theoretical approaches for identifying causal genes and pathways from very large biological networks. ICC 2017: 176:1-176:6 - 2016
- [c8]Shubham Shoundic, Priya Chandran, Payas Krishna, Vinod Reddy, Bodasingi Jayachandra, Lakshit Pande:
Extended-HyperWall: Hardware support for rollback secure virtualization. ICACCI 2016: 1674-1681 - [c7]Ojus Thomas Lee, S. D. Madhu Kumar, Priya Chandran:
ECSim: A simulation tool for performance evaluation of erasure coded storage systems. ICACCI 2016: 2713-2718 - [c6]Jithin R, Priya Chandran:
Dynamic partitioning of physical memory among virtual machines: ASMI: architectural support for memory isolation. SAC 2016: 474-476 - [i2]Jeethu V. Devasia, Priya Chandran:
Inferring disease causing genes and their pathways: A mathematical perspective. CoRR abs/1611.02538 (2016) - 2015
- [i1]Jithin R, Priya Chandran:
Dynamic Partitioning of Physical Memory Among Virtual Machines, ASMI: Architectural Support for Memory Isolation. CoRR abs/1503.03169 (2015) - 2014
- [c5]Jithin R, Priya Chandran:
Virtual Machine Isolation - A Survey on the Security of Virtual Machines. SNDS 2014: 91-102 - [e1]Manish Parashar, Umesh Bellur, S. D. Madhu Kumar, Priya Chandran, Murali Krishnan, Kamesh Madduri, Sushil K. Prasad, C. Chandra Sekhar, Nanjangud C. Narendra, Carlos Valera, Sanjay Chaudhary, Kavi Arya, Xiaolin Li:
Seventh International Conference on Contemporary Computing, IC3 2014, Noida, India, August 7-9, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5172-7 [contents] - 2012
- [j1]P. G. Ranjith, Priya Chandran, Shalini Kaleeswaran:
On covert channels between virtual machines. J. Comput. Virol. 8(3): 85-97 (2012) - [c4]T. P. Shabeera, Priya Chandran, S. D. Madhu Kumar:
Authenticated and persistent skip graph: a data structure for cloud based data-centric applications. ICACCI 2012: 155-160 - 2011
- [c3]Merin Sebastian, Priya Chandran:
Towards designing a tool for event reconstruction using Gladyshev Approach. SAC 2011: 193-194
2000 – 2009
- 2009
- [c2]P. Ezudheen, Priya Chandran, Joy Chandra, Biju Puthur Simon, Deepak Ravi:
Parallelizing SystemC Kernel for Fast Hardware Simulation on SMP Machines. PADS 2009: 80-87 - 2007
- [c1]Ashish Kumar Singh, Priya Chandran:
A Secure and Efficient Multi-authority Proactive Election Scheme. ICISS 2007: 208-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint