Amit Purohit

Learn More
Vendor strategies to standardize grid computing as the IT backbone for service-oriented architectures have created business opportunities to offer grid as a utility service for compute and data– intensive applications. With this shift in focus, there is an emerging need to incorporate agreements that represent the QoS expectations (e.g. response time) of(More)
Long-running server applications can easily execute millions of common data-intensive system calls each day, incurring large data copy overheads. We introduce a new framework, Compound System Calls (Cosy), to enhance the performance of such applications. Cosy provides a mechanism to safely execute data-intensive code segments in the kernel. Cosy encodes a C(More)
In this work, we investigate mechanisms to ensure that a shared data center can operate within a power budget, while optimizing a global objective function(e.g., maximize the overall revenue earned by the provider). We present the BrownMap methodology that is able to ensure that data centers can deal both with outages that reduce the available power or with(More)
Quorum sensing (QS) is a cell-to-cell communication system used by bacteria to regulate activities such as virulence, bioluminescence and biofilm formation. The most common QS signals in Gram-negative bacteria are N-acyl-homoserine lactones (AHLs). Aliivibrio salmonicida is the etiological agent of cold water vibriosis in Atlantic salmon, a disease which(More)
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (Cosy), to enhance the performance of such userlevel applications. Cosy provides a user-friendly mechanism to execute the data-intensive code segment of the application in the kernel. This is(More)
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cracking attacks. Considering that remote attackers usually do not have physical access to local machines, we propose a security architecture called NPTrace (network-wide process(More)
  • Amit Purohit
  • 2014 IEEE Conference on Control Applications (CCA…
  • 2014
Data compression algorithms are used in process plants to store and transmit data for analysis purposes. Amount of data is increasing in process plants due to advances in automation and process monitoring technologies. Process data historians are used in plants to store, manage, retrieve and analyze process data. Process data historians use data compression(More)
Much has been written regarding physicians' prescribing behavior. However, a literature search revealed a dearth of information regarding physicians' refilling behavior. The purpose of this study was to explore how authorization is given to community pharmacists for refilling a prescription by telephone. A total of 30 physicians (general practitioners and(More)