Venkatraman Ramakrishna

Learn More
Multiplayer games are representative of a large class of distributed applications that suffer from redundant communication, bottlenecks, single points of failure and poor reactivity to changing network conditions. Many of these problems can be alleviated through simple network adaptations at the infrastructure level. In this paper, we describe a model in(More)
Future environments will require devices to be automatically and safely configured to perform important tasks. Security concerns based on known vulnerabilities within the Internet make it clear that any widely deployed computing infrastructure must be designed from the start with substantially more security. However, existing security models cannot handle(More)
Panda is middleware designed to bring the benefits of active networks to applications not written with active networks in mind. This paper describes the architecture and implementation of Panda, and provides data on the overheads incurred and performance benefits achieved. The paper also discusses some of the key issues of automatically and transparently(More)
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or groups have highly heterogeneous resources and security and privacy concerns, and invariably belong to different security or administrative domains. Flexible and automated mechanisms(More)
Modern technology and omnipresent computing and communication facilities are leading us closer to the ubiquitous computing vision. However, the very nature of ubicomp infrastructure, the openness of the environments and the characteristics of the interactions pose unique security and privacy challenges. We anticipate that the vast number of interactions(More)
The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. Techniques are needed to protect wireless client devices and the next generation wireless infrastructure. We(More)
The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. Techniques are needed to protect wireless client devices and the next generation wireless infrastructure. We(More)
The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. Techniques are needed to protect wireless client devices and the next generation wireless infrastructure. We(More)
A patient of severe chronic renal failure presented with hyperkalemic electrocardiographic (ECG) changes and hyperkalemia. Following a session of hemodialysis, when he reverted to normokalemia, the repeat ECG revealed left ventricular hypertrophy (LVH). Thus we confronted with a situation of hyperkalemia, masking the LVH on ECG initially and when the(More)
In this paper, we have proposed a low complexity architecture for the Under-determined Blind Source Separation (UBSS) algorithm targeting remote healthcare applications. UBSS algorithm, departing from the typical BSS convention-equal number of the sources and sensors present, which is of tremendous interest in the field of Biomedical signal processing(More)