Venkatraman Ramakrishna

Learn More
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or groups have highly heterogeneous resources and security and privacy concerns, and invariably belong to different security or administrative domains. Flexible and automated mechanisms(More)
Future environments will require devices to be automatically and safely configured to perform important tasks. Security concerns based on known vulnerabilities within the Internet make it clear that any widely deployed computing infrastructure must be designed from the start with substantially more security. However, existing security models cannot handle(More)
Multiplayer games are representative of a large class of distributed applications that suffer from redundant communication, bottlenecks and poor reactivity to changing network conditions. Many of these problems can be alleviated through simple network adaptations at the infrastructure level. In our model, game packets are directed along the edges of a tree(More)
Panda is middleware designed to bring the benefits of active networks to applications not written with active networks in mind. This paper describes the architecture and implementation of Panda, and provides data on the overheads incurred and performance benefits achieved. The paper also discusses some of the key issues of automatically and transparently(More)
The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. Techniques are needed to protect wireless client devices and the next generation wireless infrastructure. We(More)
We developed a locative fiction application called nan0sphere and deployed it on the UCLA campus. This application presents an interactive narrative to users working in a group as they move around the campus. Based on each user's current location, previously visited locations, actions taken, and on the similar attributes of other users in the same group,(More)
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centralized cross-domain service access agreements can be made with a priori knowledge of the interacting entities' policies, but privacy concerns make this approach impractical.(More)
Future ubiquitous computing environments will require devices to be automatically and safely configured together to perform important tasks for the users they support. Security concerns based on known vulnerabilities of the Internet make it clear that any widely deployed new computing infrastructure must be designed with substantially more security. The(More)
  • 1