Name
Affiliation
Papers
RAVI SUNDARAM
Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139, U.S.A., e-mail: koods@hotmail.com, US
76
Collaborators
Citations 
PageRank 
133
762
72.13
Referers 
Referees 
References 
1384
1433
824
Search Limit
1001000
Title
Citations
PageRank
Year
PAC-Learning for Strategic Classification00.342021
Cache Me if You Can: Capacitated Selfish Replication Games in Networks00.342020
Resilience and coevolution of preferential interdependent networks.00.342020
Realization Problems on Reachability Sequences.00.342020
On the Migration of Researchers across Scientific Domains.00.342019
Retracting Graphs to Cycles.00.342019
Plane Gossip: Approximating rumor spread in planar graphs.00.342018
Skyline Identification In Multi-Arm Bandits00.342018
Resilience and the Coevolution of Interdependent Multiplex Networks.00.342018
Colocation, Colocation, Colocation - Optimizing Placement in the Hybrid Cloud.00.342018
Chiron: A Robust Recommendation System with Graph Regularizer.00.342017
A General Framework for Asynchronous Communication.00.342017
Symmetric Interdiction for Matching Problems.00.342017
A General Characterization of Sync Word for Asynchronous Communication.00.342016
Chiron: A Robust Recommendation System.00.342016
Markovian Hitters and the Complexity of Blind Rendezvous.00.342016
An Upper Bound on Trilaterating Simple Polygons.00.342015
Designing Overlapping Networks for Publish-Subscribe Systems.00.342015
Rumors Across Radio, Wireless, Telephone.00.342015
On the network you keep: analyzing persons of interest using Cliqster20.362015
Asynchronous Communication over a Fading Channel and Additive Noise00.342015
SamaritanCloud: Secure infrastructure for scalable location-based services.10.352015
Multiplex networks: a Generative Model and Algorithmic Complexity.40.492015
Secure and scalable match: overcoming the universal circuit bottleneck using group programs.00.342014
Bayesian Inference In Treewidth-Bounded Graphical Models Without Indegree Constraints10.352014
Deterministic Blind Rendezvous in Cognitive Radio Networks130.632014
SamaritanCloud: Secure and scalable infrastructure for enabling location-based services00.342013
Maygh: building a CDN from client web browsers50.492013
Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing220.992013
WebCloud: Recruiting Social Network Users to Assist in Content Distribution150.692012
Cache me if you can: capacitated selfish replication games20.412012
WebCloud: Recruiting web browsers for content distribution00.342011
PhoneGuard: a smartphone in the coalmine00.342011
Scheduler Vulnerabilities and Attacks in Cloud Computing80.612011
Content delivery through the ages: Akamai to WebCloud00.342011
Prediction of Arrival of Nodes in a Scale Free Network00.342011
Home is where the (fast) internet is: flat-rate compatible incentives for reducing peak load60.622010
Existence Theorems and Approximation Algorithms for Generalized Network Security Games190.832010
Capacitated Caching Games00.342010
Algorithms For Constrained Bulk-Transfer Of Delay-Tolerant Data70.572010
Preprocessing DNS log data for effective data mining60.642009
Reducibility among Fractional Stability Problems130.722009
Preference Games and Personalized Equilibria, with Applications to Fractional BGP10.492008
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget.311.542008
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility.462.252007
(Almost) Tight bounds and existence theorems for single-commodity confluent flows120.772007
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses30.432007
A bounded-degree network formation game40.432007
The Confluent Capacity of the Internet: Congestion vs. Dilation60.492006
Steganographic communication in ordered channels130.792006
  • 1
  • 2