User profiles for R. K. Iyer

Rishabh Iyer

- Verified email at utdallas.edu - Cited by 3202

Rohin K. Iyer

- Verified email at mail.utoronto.ca - Cited by 1797

Arginases I and II: do their functions overlap?

…, H Yu, WW Grody, RM Kern, P Yoo, RK Iyer - Molecular genetics and …, 2004 - Elsevier
Arginase, often perceived solely as the last of the now six enzymes of the urea cycle, exists
in two forms and has a broad tissue distribution. A cytosolic form, AI, is highly expressed in …

Software-defined networking for smart grid resilience: Opportunities and challenges

X Dong, H Lin, R Tan, RK Iyer… - Proceedings of the 1st …, 2015 - dl.acm.org
… Kalbarczyk, PW Sauer, and RK Iyer. Semantic security analysis of scada networks to
detect malicious control commands in power grids. In Proceedings of the Smart Energy Grid …

[HTML][HTML] Industrializing autologous adoptive immunotherapies: manufacturing advances and challenges

RK Iyer, PA Bowles, H Kim, A Dulgar-Tulloch - Frontiers in medicine, 2018 - frontiersin.org
Cell therapy has proven to be a burgeoning field of investigation, evidenced by hundreds of
clinical trials being conducted worldwide across a variety of cell types and indications. Many …

Fault injection techniques and tools

MC Hsueh, TK Tsai, RK Iyer - Computer, 1997 - ieeexplore.ieee.org
Iyer is a professor in the departments of Electrical and Computer Engineering and Computer …
Iyer’s research interests are in the area of reliable computing, measurement and evaluation, …

[HTML][HTML] Non-control-data attacks are realistic threats.

…, J Xu, EC Sezer, P Gauriar, RK Iyer - USENIX security …, 2005 - usenix.org
Most memory corruption attacks and Internet worms follow a familiar pattern known as the
control-data attack. Hence, many defensive techniques are designed to protect program …

[HTML][HTML] An evidence-based approach to establish the functional and clinical significance of copy number variants in intellectual and developmental disabilities

…, ST South, AR Brothman, WG Sanger, RK Iyer… - Genetics in …, 2011 - nature.com
Purpose: Copy number variants have emerged as a major cause of human disease such as
autism and intellectual disabilities. Because copy number variants are common in normal …

Influence of substrate stiffness on the phenotype of heart cells

B Bhana, RK Iyer, WLK Chen, R Zhao… - Biotechnology and …, 2010 - Wiley Online Library
Adult cardiomyocytes (CM) retain little capacity to regenerate, which motivates efforts to
engineer heart tissues that can emulate the functional and mechanical properties of native …

Transparent runtime randomization for security

J Xu, Z Kalbarczyk, RK Iyer - 22nd International Symposium on …, 2003 - ieeexplore.ieee.org
A large class of security attacks exploit software implementation vulnerabilities such as
unchecked buffers. This paper proposes transparent runtime randomization (TRR), a generalized …

[HTML][HTML] Adverse events in robotic surgery: a retrospective study of 14 years of FDA data

…, J Raman, N Leveson, Z Kalbarczyk, RK Iyer - PloS one, 2016 - journals.plos.org
Background Use of robotic systems for minimally invasive surgery has rapidly increased
during the last decade. Understanding the causes of adverse events and their impact on …

{FIRM}: An intelligent fine-grained resource management framework for {SLO-Oriented} microservices

…, SS Banerjee, S Jha, ZT Kalbarczyk, RK Iyer - 14th USENIX symposium …, 2020 - usenix.org
User-facing latency-sensitive web services include numerous distributed, intercommunicating
microservices that promise to simplify software development and operation. However, …