His main research concerns Computer network, Middlebox, Distributed computing, Key and Computer security. His Computer network research is multidisciplinary, incorporating elements of Throughput and Software deployment. His research investigates the connection between Middlebox and topics such as Access control that intersect with problems in Cache, Network management, Routing and Software-defined networking.
His Distributed computing research integrates issues from Provisioning and Adaptation. The concepts of his Key study are interwoven with issues in Security policy, Telecommunications, Information sensitivity and Cloud computing security. He combines subjects such as Network processing and Internet privacy with his study of Computer security.
His primary areas of study are Computer network, Computer security, Distributed computing, Key and The Internet. His Computer network research incorporates elements of Scalability and Internet video. His work on Network security as part of general Computer security study is frequently linked to Context, therefore connecting diverse disciplines of science.
His Distributed computing study combines topics from a wide range of disciplines, such as Cloud computing and Throughput. The various areas that Vyas Sekar examines in his Key study include Web service, Leverage, Adaptation, Bottleneck and Data science. His studies deal with areas such as Provisioning and Access control as well as Middlebox.
Vyas Sekar mainly focuses on Computer network, Denial-of-service attack, Computer security, Distributed computing and Key. His Computer network research includes themes of Enhanced Data Rates for GSM Evolution and Verifiable secret sharing. His Denial-of-service attack research is multidisciplinary, incorporating perspectives in Embedded system and Backup.
His Computer security research incorporates themes from Software and Automatic summarization. His biological study spans a wide range of topics, including Domain, Performance prediction, Network Functions Virtualization and Test scheduling. His studies in Key integrate themes in fields like Web service, Metadata, Data access, Critical infrastructure and Data science.
His primary scientific interests are in Computer security, Remote direct memory access, Operating system, Stateful firewall and Programming language. His primary area of study in Computer security is in the field of Access control. His work carried out in the field of Remote direct memory access brings together such families of science as Forwarding plane, Latency, Critical path method and Data availability.
The Forwarding plane study combines topics in areas such as Dram, Network address, Lookup table, Block and Systems architecture. His Operating system research includes themes of Isolation and Kernel. His Stateful firewall study combines topics in areas such as Model checking and Network verification.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Making middleboxes someone else's problem: network processing as a cloud service
Justine Sherry;Shaddi Hasan;Colin Scott;Arvind Krishnamurthy.
acm special interest group on data communication (2012)
Understanding the impact of video quality on user engagement
Florin Dobrian;Vyas Sekar;Asad Awan;Ion Stoica.
acm special interest group on data communication (2011)
SIMPLE-fying middlebox policy enforcement using SDN
Zafar Ayyub Qazi;Cheng-Chun Tu;Luis Chiang;Rui Miao.
acm special interest group on data communication (2013)
A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP
Xiaoqi Yin;Abhishek Jindal;Vyas Sekar;Bruno Sinopoli.
acm special interest group on data communication (2015)
Design and implementation of a consolidated middlebox architecture
Vyas Sekar;Norbert Egi;Sylvia Ratnasamy;Michael K. Reiter.
networked systems design and implementation (2012)
Less pain, most of the gain: incrementally deployable ICN
Seyed Kaveh Fayazbakhsh;Yin Lin;Amin Tootoonchian;Ali Ghodsi.
acm special interest group on data communication (2013)
Developing a predictive model of quality of experience for internet video
Athula Balachandran;Vyas Sekar;Aditya Akella;Srinivasan Seshan.
acm special interest group on data communication (2013)
Measuring user confidence in smartphone security and privacy
Erika Chin;Adrienne Porter Felt;Vyas Sekar;David Wagner.
symposium on usable privacy and security (2012)
An empirical evaluation of entropy-based traffic anomaly detection
George Nychis;Vyas Sekar;David G. Andersen;Hyong Kim.
internet measurement conference (2008)
One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon
Zaoxing Liu;Antonis Manousis;Gregory Vorsanger;Vyas Sekar.
acm special interest group on data communication (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
National University of Singapore
Duke University
Carnegie Mellon University
The University of Texas at Austin
University of California, Berkeley
Washington University in St. Louis
Stony Brook University
Stony Brook University
Harvard University
University of California, Berkeley
University of Limerick
IBM (United States)
Hong Kong University of Science and Technology
Lund University
Vanderbilt University
ByteDance
University of Pittsburgh
Korea Institute of Science and Technology
National Institutes of Health
University of Illinois at Urbana-Champaign
The University of Texas at Austin
University of Florida
University College London
University of California, Los Angeles
Charité - University Medicine Berlin
University of California, Berkeley