My research agenda is centered around the Internet in general with focus on Bias in Machine Learning, Internet privacy, Online Social Networks, Internet measurement, and Internet protocols. I gather, process, and analyze large amounts of data from a variety of sources. I collaborate with a wide variety of people and work with many students. I do not have a "home page".
Web Protocols and Practice HTTP/1.1, Networking Protocols, Caching and Traffic Measurement
Balachander Krishnamurthy and Jennifer Rexford
Addison-Wesley, Spring 2001
Translations in Portuguese, Japanese, Russian, and Chinese available.
Practical Reusable UNIX Software
Edited by: Balachander Krishnamurthy
Full PostScript
for personal downloading only
Full PDF
for personal downloading only
Series Editor of 7 Volumes in the Trends in Software series by John Wiley & Sons:
1. User Interface Software (Bass/Dewan)
2. Configuration Management (Tichy)
3. Software Fault Tolerance (Lyu)
4. Software Process (Fuggetta/Wolf)
5. Formal Mehods for Real-Time Computing (Heitmeyer/Mandrioli)
6. Data Visualization Techniques (Bajaj)
7. Computer Supported Co-operative Work (Beaudouin-Lafon)
SDProber: A Software Defined Prober for SDN
Sivaramakrishnan Ramanathan, Yaron Kanza, and Balachander Krishnamurthy
Symposium on SDN Research 2018
Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study
Chang Liu, Arun Raghuramu, Chen-Nee Chuah, and Balachander Krishnamurthy
Symposium on SDN Research 2017
88) 5/14/24 | 11,983,646 | Bias Scoring of Machine Learning Project Data | 87) 6/6/23 | 11,669,751 | Prediction Of Network Events Via Rule Set Representations Of Machine Learning Models | 86) 4/4/23 | 11,620,542 | Bias Scoring of Machine Learning project data | 85) 2/21/23 | 11,586,950 | Methods, Systems, And Devices for Detecting and Mitigating Potential Bias | 84) 5/11/21 | 11,005,777 | Software Defined Prober | 83) 5/11/21 | 11,003,782 | Protection of personally identifiable information | 82) 12/8/20 | 10,862,995 | Internet-wide scheduling of transactions | 81) 3/3/20 | 10,579,804 | Tailored protection of personally identifiable information | 80) 10/8/19 | 10,439,986 | Method and apparatus for reducing unwanted traffic between peer networks | 79) 6/18/19 | 10,326,859 | Internet-wide scheduling of transactions | 78) 5/8/18 | 9,965,563 | Method and apparatus to identify outliers in social networks | 77) 2/13/18 | 9,894,181 | Internet-wide scheduling of transactions | 76) 1/2/18 | 9,860,181 | System and method for inferring traffic legitimacy through selective impairment | 75) 8/1/17 | 9,721,108 | Tailored protection of personally identifiable information | 74) 8/1/17 | 9,721,014 | System and method of processing database queries | 73) 6/13/17 | 9,680,877 | Systems and methods for rule-based anomaly detection on IP network flow | 72) 5/30/17 | 9,665,651 | Method and apparatus to identify outliers in social networks | 71) 4/11/17 | 9,621,573 | System and method for monitoring network traffic | 70) 4/11/17 | 9,621,475 | Internet-wide scheduling of transactions | 69) 9/13/16 | 9,443,024 | Method and apparatus to identify outliers in social networks | 68) 8/2/16 | 9,407,527 | System and method for inferring traffic legitimacy through selective impairment | 67) 5/31/16 | 9,356,959 | System and method for monitoring network traffic | 66) 2/9/16 | 9,258,217 | Systems and methods for rule-based anomaly detection on IP network flow | 65) 10/27/15 | 9,172,706 | Tailored protection of personally identifiable information | 64) 8/25/15 | 9,118,560 | Internet-wide scheduling of transactions | 63) 8/11/15 | 9,106,550 | System and method for inferring traffic legitimacy through selective impairment | 62) 6/16/15 | 9,059,897 | Method and apparatus to identify outliers in social networks | 61) 2/3/15 | 8,949,327 | Method and device to provide trusted recommendations of websites | 60) 1/27/15 | 8,943,200 | Method and apparatus for reducing unwanted traffic between peer networks | 59) 11/25/14 | 8,898,785 | System and method for monitoring network traffic | 58) 10/28/14 | 8,875,305 | Anonymization of data over multiple temporal releases | 57) 10/14/14 | 8,862,635 | Automatic gleaning of semantic information in social networks | 56) 9/16/14 | 8,839,454 | Multi-Dimensional User-Specified Extensible Narrowcasting System | 55) 9/16/14 | 8,839,443 | Identifying And Remedying Secondary Privacy Leakage | 54) 8/26/14 | 8,819,109 | Data network communication using identifiers mappable to resource locators | 53) 7/8/14 | 8,776,224 | Method and apparatus for identifying phishing websites in network traffic using generated regular expressions | 52) 7/8/14 | 8,775,605 | Method and apparatus to identify outliers in social networks | 51) 7/1/14 | 8,768,961 | System and method for processing database queries | 50) 6/10/14 | 8,751,431 | System and method for inferring traffic legitimacy through selective impairment | 49) 5/20/14 | 8,732,295 | Method and apparatus for providing real friends count | 48) 4/15/14 | 8,701,185 | Method for locating fraudulent replicas of web sites | 47) 12/3/13 | 8,601,591 | Method and apparatus for providing web privacy | 46) 11/19/13 | 8,589,443 | Method and apparatus for providing anonymization of data | 45) 9/17/13 | 8,539,576 | System And Method For Filtering Unwanted Internet Protocol Traffic Based On Blacklists | 44) 9/3/13 | 8,527,504 | Data network content filtering using categorized filtering parameters | 43) 8/13/13 | 8,510,792 | Gated network service | 42) 7/9/13 | 8,484,463 | System and method for utilizing a rendezvous mechanism for secure information exchange | 41) 6/4/13 | 8,457,016 | Reverse engineering peering at internet exchange points | 40) 5/7/13 | 8,438,650 | Anonymization of data over multiple temporal releases | 39) 5/7/13 | 8,438,267 | Internet-wide scheduling of transactions | 38) 2/26/13 | 8,386,534 | Automatic gleaning of semantic information in social networks | 37) 2/12/13 | 8,375,447 | System and method for monitoring network traffic | 36) 11/6/12 | 8,307,431 | Method and apparatus for identifying phishing websites in network traffic using generated regular expressions | 35) 4/17/12 | 8,161,155 | Filtering unwanted data traffic via a per-customer blacklist | 34) 4/10/12 | 8,156,556 | Method and apparatus for providing mobile honeypots | 33) 3/20/12 | 8,141,150 | Method and apparatus for automatic identification of phishing sites from low-level network traffic | 32) 1/17/12 | 8,098,686 | Method and apparatus for providing an application-level utility metric | 31) 1/3/12 | 8,091,131 | Method and apparatus for communicating intrusion-related information between internet service providers | 30) 11/29/11 | 8,069,150 | Method and apparatus for improving end to end performance of a data network | 29) 07/12/11 | 7,979,413 | Automatic generation of embedded signatures for duplicate detection on a public network | 28) 04/26/11 | 7,933,745 | System and method for profiling resource constraints of web servers | 27) 03/29/11 | 7,916,664 | Reverse engineering peering at Internet exchange point | 26) 07/06/10 | 7,751,325 | Method and apparatus for sketch-based detection of changes In network traffic | 25) 06/22/10 | 7,742,409 | Method and apparatus for compensating for performance degradation of an application session | 24) 02/02/10 | 7,657,735 | System and method for monitoring network traffic | 23) 02/02/10 | 7,657,553 | System and method for improving end to end performance of a data network | 22) 12/08/09 | 7,630,949 | System and method for inferring traffic legitimacy through selective impairment | 21) 12/01/09 | 7,627,691 | Method for fast network-aware clustering | 20) 11/13/07 | 7,296,089 | Method for improving web performance by adapting servers based on client cluster characterization | 19) 5/15/07 | 7,219,160 | Method for fast network-aware clustering | 18) 3/13/07 | 7,191,168 | Fast prefix matching of bounded strings | 17) 8/9/05 | 6,928,485 | Method for network-aware clustering of clients in a network | 16) 6/28/05 | 6,912,562 | Cache invalidation technique with spurious resource change indications | 15) 6/15/04 | 6,751,608 | Method and apparatus for improving end to end performance of a data network | 14) 8/12/03 | 6,606,639 | Method for effective indexing of partially dynamic documents | 13) 6/10/03 | 6,578,113 | Method for cache validation for proxy caches | 12) 8/13/02 | 6,434,573 | Method for effective indexing of partially dynamic documents | 11) 3/26/02 | 6,363,379 | Method of clustering electronic documents in response to a search query | 10) 1/08/02 | 6,338,058 | Method for providing more informative results in response to a search of electronic documents | 9) 12/11/01 | 6,330,561 | Method and apparatus for improving end to end performance of a data network | 8) 12/26/00 | 6,167,397 | Method of clustering electronic documents in response to a search query | 7) 10/17/00 | 6,134,553 | Method for using region-sets to focus searches in hierarchical structures | 6) 06/06/00 | 6,073,130 | Method for improving the results of a search in a structured database | 5) 05/30/00 | 6,070,157 | Method for providing more informative results in response to a search of electronic documents | 4) 10/19/99 | 5,970,489 | Method for using region-sets to focus searches in hierarchical structures | 3) 9/21/99 | 5,956,722 | Method for effective indexing of partially dynamic documents | 2) 09/21/99 | 5,956,027 | Method and apparatus for sharing a web page | 1) 03/04/97 | 5,608,908 | Process control system responsive to device events |