Saurabh Bagchi
Saurabh Bagchi
Electrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue University
Verified email at - Homepage
Cited by
Cited by
Addressing failures in exascale computing
M Snir, RW Wisniewski, JA Abraham, SV Adve, S Bagchi, P Balaji, J Belak, ...
The International Journal of High Performance Computing Applications 28 (2 …, 2014
Watson: beyond jeopardy!
D Ferrucci, A Levas, S Bagchi, D Gondek, ET Mueller
Artificial Intelligence 199, 93-105, 2013
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
Chameleon: A software infrastructure for adaptive fault tolerance
ZT Kalbarczyk, RK Iyer, S Bagchi, K Whisnant
IEEE Transactions on Parallel and Distributed Systems 10 (6), 560-579, 1999
The MG-RAST metagenomics database and portal in 2015
A Wilke, J Bischof, W Gerlach, E Glass, T Harrison, KP Keegan, T Paczian, ...
Nucleic acids research 44 (D1), D590-D594, 2016
ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment
B Foo, YS Wu, YC Mao, S Bagchi, E Spafford
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
TCP/IP timing channels: Theory to implementation
SH Sellke, CC Wang, S Bagchi, N Shroff
IEEE INFOCOM 2009, 2204-2212, 2009
Exactly-once delivery in a content-based publish-subscribe system
S Bhola, R Strom, S Bagchi, Y Zhao, J Auerbach
Proceedings International Conference on Dependable Systems and Networks, 7-16, 2002
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Ad Hoc Networks 6 (3), 344-362, 2008
Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS
YS Wu, B Foo, Y Mei, S Bagchi
19th Annual Computer Security Applications Conference (ACSAC), 234-244, 2003
Modeling and automated containment of worms
SH Sellke, NB Shroff, S Bagchi
IEEE Transactions on Dependable and Secure Computing 5 (2), 71-86, 2008
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
YS Wu, S Bagchi, S Garg, N Singh
International conference on dependable systems and networks, 2004, 433-442, 2004
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
A Clements, E Gustafson, T Scharnowski, P Grosen, D Fritz, C Kruegel, ...
29th USENIX Security Symposium (USENIX Sec), 1--19, 2020
Stream: Low overhead wireless reprogramming for sensor networks
RK Panta, I Khalil, S Bagchi
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Characterizing failures in mobile oses: A case study with android and symbian
AK Maji, K Hao, S Sultana, S Bagchi
2010 IEEE 21st international symposium on software reliability engineering …, 2010
An empirical study of the robustness of inter-component communication in android
AK Maji, FA Arshad, S Bagchi, JS Rellermeyer
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
MG-RAST version 4—lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis
F Meyer, S Bagchi, S Chaterji, W Gerlach, A Grama, T Harrison, T Paczian, ...
Briefings in bioinformatics 20 (4), 1151-1159, 2019
MCREngine: A scalable checkpointing system using data-aware aggregation and compression
TZ Islam, K Mohror, S Bagchi, A Moody, BR De Supinski, R Eigenmann
SC'12: Proceedings of the International Conference on High Performance …, 2012
Protecting bare-metal embedded systems with privilege overlays
AA Clements, NS Almakhdhub, KS Saab, P Srivastava, J Koo, S Bagchi, ...
2017 IEEE Symposium on Security and Privacy (SP), 289-303, 2017
{SONIC}: Application-aware Data Passing for Chained Serverless Applications
A Mahgoub, K Shankar, S Mitra, A Klimovic, S Chaterji, S Bagchi
2021 USENIX Annual Technical Conference (USENIX ATC 21), 285-301, 2021
The system can't perform the operation now. Try again later.
Articles 1–20