default search action
Lalita Jategaonkar Jagadeesan
Person information
- affiliation: Bell Labs
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c35]Lalita Jagadeesan, Shushu Liu, Lizette Velázquez:
Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks Perspective. CSR 2024: 562-569 - [c34]Lalita Jagadeesan, Ilaria Malanchini, Lizette Velázquez:
A Socio-Economic Approach towards Trustworthy 6G Marketplaces of Softwarized Resources. VTC Fall 2024: 1-6 - 2021
- [c33]Tim Alberdingk Thijm, Gary Atkinson, Lalita Jagadeesan, Marina Thottan:
A Matter of Trust: Verification of Security and Performance for Network Platform as a Service. DSN (Supplements) 2021: 49-52 - [c32]Yuming Wu, Nishok Narasimha Mohanasamy, Lalita Jagadeesan, Muntasir Raihan Rahman:
Changes in Intent: Behavioral Predictions of Distributed SDN Controller Reconfiguration. ISSRE Workshops 2021: 433-438 - [i1]Fanfei Meng, Lalita Jagadeesan, Marina Thottan:
Model-based Reinforcement Learning for Service Mesh Fault Resiliency in a Web Application-level. CoRR abs/2110.13621 (2021) - 2020
- [c31]Siwar Kriaa, Serge Papillon, Lalita Jagadeesan, Veena B. Mendiratta:
Better Safe than Sorry: Modeling Reliability and Security in Replicated SDN Controllers. DRCN 2020: 1-6 - [c30]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
When Failure is (Not) an Option: Reliability Models for Microservices Architectures. ISSRE Workshops 2020: 19-24
2010 – 2019
- 2019
- [j9]Marina Thottan, Catello Di Martino, Young-Jin Kim, Gary W. Atkinson, Nakjung Choi, Nishok Mohanasamy, Lalita Jagadeesan, Veena B. Mendiratta, Jesse E. Simsarian, Bartek Kozicki:
The network OS: Carrier-grade SDN control of multi-domain, multi-layer networks. Bell Labs Tech. J. 24: 1-26 (2019) - [c29]Nakjung Choi, Lalita Jagadeesan, Young Jin, Nishok Narasimha Mohanasamy, Muntasir Raihan Rahman, Krishan K. Sabnani, Marina Thottan:
Run-time Performance Monitoring, Verification, and Healing of End-to-End Services. NetSoft 2019: 30-35 - [c28]Robert S. Hanmer, Sheng Liu, Lalita Jagadeesan, Muntasir Raihan Rahman:
Death by Babble: Security and Fault Tolerance of Distributed Consensus in High-Availability Softwarized Networks. NetSoft 2019: 266-270 - 2018
- [c27]Robert S. Hanmer, Lalita Jagadeesan, Veena B. Mendiratta, Heng Zhang:
Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN. ISSRE Workshops 2018: 59-64 - [c26]Veena B. Mendiratta, Lalita Jategaonkar Jagadeesan, Robert S. Hanmer, Muntasir R. Rahman:
How Reliable Is My Software-Defined Network? Models and Failure Impacts. ISSRE Workshops 2018: 83-88 - 2017
- [c25]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
Analytics-Enhanced Automated Code Verification for Dependability of Software-Defined Networks. ISSRE Workshops 2017: 139-145 - 2016
- [c24]Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
Programming the Network: Application Software Faults in Software-Defined Networks. ISSRE Workshops 2016: 125-131 - 2015
- [c23]Lalita Jagadeesan, Alan McBride, Vijay K. Gurbani, Jie Yang:
Cognitive Security: Security Analytics and Autonomics for Virtualized Networks. IPTComm 2015: 43-50
2000 – 2009
- 2005
- [c22]Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan:
Passive mid-stream monitoring of real-time properties. EMSOFT 2005: 343-352 - [c21]Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mendiratta:
Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability. ISAS 2005: 196-211 - 2001
- [j8]Kenneth C. Cox, Rebecca E. Grinter, Stacie Hibino, Lalita Jategaonkar Jagadeesan, David Mantilla:
A Multi-Modal Natural Language Interface to an Information Visualization Environment. Int. J. Speech Technol. 4(3-4): 297-314 (2001) - 2000
- [j7]Thomas Ball, Christopher Colby, Peter J. Danielsen, Lalita Jategaonkar Jagadeesan, Radha Jagadeesan, Konstantin Läufer, Peter Mataga, Kenneth Rehor:
Sisl: Several Interfaces, Single Logic. Int. J. Speech Technol. 3(2): 93-108 (2000) - [c20]Kenneth C. Cox, Rebecca E. Grinter, Stacie Hibino, Lalita Jategaonkar Jagadeesan, David Mantilla:
Using Dialog and Context in a Speech-Based interface for an Information Visualization Environment. Advanced Visual Interfaces 2000: 274-275 - [c19]Vineet Gupta, Lalita Jategaonkar Jagadeesan, Radha Jagadeesan, Xiaowei Jiang, Konstantin Läufer:
A Constraint-Based Framework for Prototyping Distributed Virtual Applications. CP 2000: 202-217 - [c18]Patrice Godefroid, James D. Herbsleb, Lalita Jategaonkar Jagadeesan, Du Li:
Ensuring privacy in presence awareness: an automated verification approach. CSCW 2000: 59-68 - [c17]Patrice Godefroid, Lalita Jategaonkar Jagadeesan, Radha Jagadeesan, Konstantin Läufer:
Automated systematic testing for constraint-based interactive services. SIGSOFT FSE 2000: 40-49
1990 – 1999
- 1998
- [j6]Patrice Godefroid, Robert S. Hanmer, Lalita Jategaonkar Jagadeesan:
Systematic software testing using VeriSoft - An analysis of the 4ESS™ heart-beat monitor. Bell Labs Tech. J. 3(2): 32-46 (1998) - [j5]Lalita Jategaonkar Jagadeesan, Lawrence G. Votta, Adam A. Porter, Carlos Puchol, J. Christopher Ramming:
Specification-based testing of reactive software: A case study in technology transfer. J. Syst. Softw. 40(3): 249-262 (1998) - [c16]Christopher Colby, Lalita Jategaonkar Jagadeesan, Radha Jagadeesan, Konstantin Läufer, Carlos Puchol:
Objects and Concurrency in Triveni: A Telecommunication Case Study in Java. COOTS 1998: 131-149 - [c15]Christopher Colby, Lalita Jategaonkar Jagadeesan, Radha Jagadeesan, Konstantin Läufer, Carlos Puchol:
Design and Implementation of Triveni: A Process-Algebraic API for Threads + Events. ICCL 1998: 58-67 - [c14]Patrice Godefroid, Robert S. Hanmer, Lalita Jategaonkar Jagadeesan:
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft. ISSTA 1998: 124-133 - [c13]Christopher Colby, Patrice Godefroid, Lalita Jategaonkar Jagadeesan:
Automatically Closing Open Reactive Programs. PLDI 1998: 345-357 - 1997
- [c12]Rajeev Alur, Lalita Jategaonkar Jagadeesan, Joseph J. Kott, James Von Olnhausen:
Model-Checking of Real-Time Systems: A Telecommunications Application (Experience Report). ICSE 1997: 514-524 - [c11]Lalita Jategaonkar Jagadeesan, Adam A. Porter, Carlos Puchol, J. Christopher Ramming, Lawrence G. Votta:
Specification-based Testing of Reactive Software: Tools and Experiments (Experience Report). ICSE 1997: 525-535 - [c10]Neeraj K. Gupta, Lalita Jategaonkar Jagadeesan, Eleftherios Koutsofios, David M. Weiss:
Auditdraw: Generating Audits the FAST Way. RE 1997: 188-197 - [c9]Christopher Colby, Lalita Jategaonkar, Radha Jagadeesan, Konstantin Läufer, Carlos Puchol:
The Semantics of Triveni: A Process-Algebraic API for Threads + Events. US-Brazil Joint Workshops on the Formal Foundations of Software Systems 1997: 107-133 - 1996
- [j4]Lalita Jategaonkar Jagadeesan, Carlos Puchol, James Von Olnhausen:
A Formal Approach to Reactive Systems Software: A Telecommunications Application in ESTEREL. Formal Methods Syst. Des. 8(2): 123-151 (1996) - [j3]Lalita Jategaonkar, Albert R. Meyer:
Deciding True Concurrency Equivalences on Safe, Finite Nets. Theor. Comput. Sci. 154(1): 107-143 (1996) - [j2]Mark A. Ardis, John A. Chaves, Lalita Jategaonkar Jagadeesan, Peter Mataga, Carlos Puchol, Mark G. Staskauskas, James Von Olnhausen:
A Framework for Evaluating Specification Methods for Reactive Systems Experience Report. IEEE Trans. Software Eng. 22(6): 378-389 (1996) - 1995
- [c8]Lalita Jategaonkar Jagadeesan, Radha Jagadeesan:
Causality and True Concurrency: A Data-flow Analysis of the Pi-Calculus (Extended Abstract). AMAST 1995: 277-291 - [c7]Lalita Jategaonkar Jagadeesan, Carlos Puchol, James Von Olnhausen:
Safety Property Verification of ESTEREL Programs and Applications to Telecommunications Software. CAV 1995: 127-140 - [c6]Mark A. Ardis, John A. Chaves, Lalita Jategaonkar Jagadeesan, Peter Mataga, Carlos Puchol, Mark G. Staskauskas, James Von Olnhausen:
A Framework for Evaluating Specification Methods for Reactive Systems: Experience Report. ICSE 1995: 159-168 - [c5]Lalita Jategaonkar Jagadeesan, Carlos Puchol, James Von Olnhausen:
A formal approach to reactive systems software: a telecommunications application in ESTEREL. WIFT 1995: 132-145 - 1993
- [j1]Lalita Jategaonkar, John C. Mitchell:
Type Inference with Extended Pattern Matching and Subtypes. Fundam. Informaticae 19(1/2): 127-165 (1993) - [c4]Lalita Jategaonkar, Albert R. Meyer:
Deciding True Concurrency Equivalences on Finite Sate Nets (Preliminary Report). ICALP 1993: 519-531 - [c3]Lalita Jategaonkar, Albert R. Meyer:
Self-Synchronization of Concurrent Processes (Preliminary Report). LICS 1993: 409-417 - 1992
- [c2]Lalita Jategaonkar, Albert R. Meyer:
Testing Equivalence for Petri Nets with Action Refinement: Preliminary Report. CONCUR 1992: 17-31
1980 – 1989
- 1988
- [c1]Lalita Jategaonkar, John C. Mitchell:
ML with Extended Pattern Matching and Subtypes. LISP and Functional Programming 1988: 198-211
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint