Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Sandeep Karanth"'
Unlock the power of your data with Hadoop 2.X ecosystem and its data warehousing techniques across large data setsAbout This BookConquer the mountain of data using Hadoop 2.X toolsThe authors succeed in creating a context for Hadoop and its ecosystem
Autor:
Sandeep Karanth
Do you want to broaden your Hadoop skill set and take your knowledge to the next level? Do you wish to enhance your knowledge of Hadoop to solve challenging data processing problems? Are your Hadoop jobs, Pig scripts, or Hive queries not working as f
Autor:
Ivan Osipkov, Harsha Talkad, Tanvir Ahmed, Muralidhar Koka, Anand Tripathi, Sandeep Karanth, Devdatta Kulkarni
Publikováno v:
Software: Practice and Experience. 37:493-522
In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mech
Autor:
Jinwook Shin, Sandeep Karanth, John Lambert, Srivatsan Laxman, Ramarathnam Venkatesan, Prasad Naldurg
Publikováno v:
AISec
Malware writers are constantly looking for new vulnerabilities to exploit in popular software applications. A successful exploit of a previously unknown vulnerability, that evades state-of-the art anti-virus and intrusion-detection systems is called
Autor:
Jitendra Padhye, Lenin Ravindranath, Vishnu Navda, Sandeep Karanth, Ramachandran Ramjee, Thomas Moscibroda, Ranveer Chandra
Publikováno v:
ICNP
IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast streams using Wi-Fi networks. However, multicast over Wi-Fi suffers from several
Autor:
D. Johnson, Sandeep Karanth, Harsha Talkad, Ivan Osipkov, Tanvir Ahmed, Muralidhar Koka, Anand Tripathi, S. Dier
Publikováno v:
ICAC
We present the mechanisms for self-recovery in Konark, a mobile agent based system for monitoring network computing systems. An important aspect of our design is the use of the monitoring system's inherent capabilities to detect its own component fai
Publikováno v:
ACM Transactions on Privacy & Security; Oct2017, Vol. 20 Issue 4, p12-12:28, 28p
Publikováno v:
ACM Transactions on Multimedia Computing, Communications & Applications; Aug2015, Vol. 12 Issue 1, p1-23, 23p
Publikováno v:
2013 IEEE 10th International Conference on High Performance Computing & Communications & 2013 IEEE International Conference on Embedded & Ubiquitous Computing; 2013, p1884-1889, 6p
Autor:
Karanth, Sandeep, Laxman, Srivatsan, Naldurg, Prasad, Venkatesan, Ramarathnam, Lambert, J., Shin, Jinwook
Publikováno v:
Proceedings of the 4th ACM Workshop: Security & Artificial Intelligence; Oct2011, p31-42, 12p