Arun V. Sathanur

Learn More
Sleep transistor insertion is a key step in low power design methodologies for nanometer CMOS. In the clustered sleep transistor approach, a single sleep transistor is shared among a number of gates and it must be sized according to the maximum current that can be injected onto the virtual ground by the gates in the cluster. A conservative (upper bound)(More)
4 Welcome Welcome to the 24th edition of the Great Lakes Symposium on VLSI (GLSVLSI) 2014 held in Houston, Texas. GLSVLSI is a premier venue for the dissemination of manuscripts of the highest quality BLOCKINin BLOCKINall BLOCKINareas BLOCKINrelated BLOCKINto BLOCKINVLSI, BLOCKINdevices BLOCKINand BLOCKINsystem BLOCKINlevel BLOCKINdesign. BLOCKINThe(More)
The explosion in social media adoption has opened up new opportunities for next-generation personalized web and information exchange in big data scenarios. Making sense of the massive number of overlapping streams of information generated by hundreds of millions of users on large social networks requires novel analytics and scalable computational(More)
Synthesis of multi-GigaHertz radio frequency circuits brings together difficult challenges related to simulation, extraction and multidimensional space search. The standard approach of mapping all electromagnetic parasitics into parametric RLC models prior to synthesis is extremely restrictive especially when broadband and full-wave models with high(More)
As technologies continue to shrink in size, modeling the effect of process variations on circuit performance is assuming profound significance. Process variations affect the on-chip performance of both active and passive components. This necessitates the inclusion of the effect of these variations on distributed interconnect structures in modeling overall(More)
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can(More)
Computing the set of influential nodes of a given size, which when activated will ensure maximal spread of influence on a complex network, is a challenging problem impacting multiple applications. A rigorous approach to influence maximization involves utilization of optimization routines that come with a high computational cost. In this work, we propose to(More)