Ashwin Kumar Kayyoor
Ashwin Kumar Kayyoor
Senior Distributed Systems Engineer, Netflix
Verified email at - Homepage
Cited by
Cited by
SWORD: scalable workload-aware data placement for transactional workloads
A Quamar, KA Kumar, A Deshpande
Proceedings of the 16th international conference on extending database …, 2013
Hybrid approach using case-based reasoning and rule-based reasoning for domain independent clinical decision support in ICU
KA Kumar, Y Singh, S Sanyal
Expert Systems with Applications 36 (1), 65-71, 2009
SWORD: workload-aware data placement and replica selection for cloud data management systems
KA Kumar, A Quamar, A Deshpande, S Khuller
The VLDB Journal 23, 845-870, 2014
Data Placement and Replica Selection for Improving Co-location in Distributed Environments
AK Kayyoor, A Deshpande, S Khuller
Technical Report, 2011
Sensor metadata management and its application in collaborative environmental research
N Dawes, KA Kumar, S Michel, K Aberer, M Lehning
2008 IEEE Fourth International Conference on EScience, 143-150, 2008
Environmental Monitoring 2.0
S Michel, A Salehi, L Luo, N Dawes, K Aberer, G Barrenetxea, M Bavay, ...
2009 IEEE 25th International Conference on Data Engineering, 1507-1510, 2009
Multi-level reputation-based greylisting
AGK Janecek, WN Gansterer, KA Kumar
2008 Third International Conference on Availability, Reliability and …, 2008
Utility-Driven Graph Summarization
KA Kumar, P Efstathopoulos
Proceedings of the VLDB Endowment 12 (4), 335-347, 2019
Hone: " Scaling down" Hadoop on shared-memory systems
KA Kumar, J Gluck, A Deshpande, J Lin
Proceedings of the VLDB Endowment 6 (12), 1354-1357, 2013
Lean on me: Mining internet service dependencies from large-scale dns data
M Dell'Amico, L Bilge, A Kayyoor, P Efstathopoulos, PA Vervier
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Systems and methods for clustering data to improve data analytics
A Kayyoor, H Aloysius, B Tca
US Patent 11,036,800, 2021
Preventing a malicious computer application from executing in a computing environment
AK Kayyoor, P Efstathopoulos
US Patent 10,311,231, 2019
Optimization Techniques for “Scaling Down” Hadoop on Multi-Core, Shared-Memory Systems
KA Kumar, J Gluck, A Deshpande, J Lin
EDBT: 17th International Conference on Extending Database Technology, 2014
Prioritizing backup operations using heuristic techniques
V Janakiraman, AK Kayyoor
US Patent 10,606,705, 2020
Automatically detecting insider threats using user collaboration patterns
S Bhatkar, S Shintre, A Kayyoor
US Patent 10,341,373, 2019
Hybrid approach for parallelization of sequential code with function level and block level parallelization
KA Kumar, AK Pappu, KS Kumar, S Sanyal
International Symposium on Parallel Computing in Electrical Engineering …, 2006
Systems and methods for file system metadata analytics
A Kayyoor, M Vaidya, S Dargude, H Ashwani
US Patent 10,997,499, 2021
Systems and methods for detecting anomalous behavior in shared data repositories
A Kayyoor, S Bhatkar, S Shintre
US Patent 10,425,435, 2019
Classification using projection of graphs into summarized spaces
P Efstathopoulos, AK Kayyoor
US Patent 11,032,303, 2021
Insider threat detection under user-resource bi-partite graphs
S Shintre, S Bhatkar, AK Kayyoor
US Patent 10,686,816, 2020
The system can't perform the operation now. Try again later.
Articles 1–20