Arginases I and II: do their functions overlap?
…, H Yu, WW Grody, RM Kern, P Yoo, RK Iyer - Molecular genetics and …, 2004 - Elsevier
Arginase, often perceived solely as the last of the now six enzymes of the urea cycle, exists
in two forms and has a broad tissue distribution. A cytosolic form, AI, is highly expressed in …
in two forms and has a broad tissue distribution. A cytosolic form, AI, is highly expressed in …
Software-defined networking for smart grid resilience: Opportunities and challenges
… Kalbarczyk, PW Sauer, and RK Iyer. Semantic security analysis of scada networks to
detect malicious control commands in power grids. In Proceedings of the Smart Energy Grid …
detect malicious control commands in power grids. In Proceedings of the Smart Energy Grid …
[HTML][HTML] Industrializing autologous adoptive immunotherapies: manufacturing advances and challenges
RK Iyer, PA Bowles, H Kim, A Dulgar-Tulloch - Frontiers in medicine, 2018 - frontiersin.org
Cell therapy has proven to be a burgeoning field of investigation, evidenced by hundreds of
clinical trials being conducted worldwide across a variety of cell types and indications. Many …
clinical trials being conducted worldwide across a variety of cell types and indications. Many …
Fault injection techniques and tools
MC Hsueh, TK Tsai, RK Iyer - Computer, 1997 - ieeexplore.ieee.org
… Iyer is a professor in the departments of Electrical and Computer Engineering and Computer …
Iyer’s research interests are in the area of reliable computing, measurement and evaluation, …
Iyer’s research interests are in the area of reliable computing, measurement and evaluation, …
[HTML][HTML] Non-control-data attacks are realistic threats.
…, J Xu, EC Sezer, P Gauriar, RK Iyer - USENIX security …, 2005 - usenix.org
Most memory corruption attacks and Internet worms follow a familiar pattern known as the
control-data attack. Hence, many defensive techniques are designed to protect program …
control-data attack. Hence, many defensive techniques are designed to protect program …
[HTML][HTML] An evidence-based approach to establish the functional and clinical significance of copy number variants in intellectual and developmental disabilities
…, ST South, AR Brothman, WG Sanger, RK Iyer… - Genetics in …, 2011 - nature.com
Purpose: Copy number variants have emerged as a major cause of human disease such as
autism and intellectual disabilities. Because copy number variants are common in normal …
autism and intellectual disabilities. Because copy number variants are common in normal …
Influence of substrate stiffness on the phenotype of heart cells
Adult cardiomyocytes (CM) retain little capacity to regenerate, which motivates efforts to
engineer heart tissues that can emulate the functional and mechanical properties of native …
engineer heart tissues that can emulate the functional and mechanical properties of native …
Transparent runtime randomization for security
J Xu, Z Kalbarczyk, RK Iyer - 22nd International Symposium on …, 2003 - ieeexplore.ieee.org
A large class of security attacks exploit software implementation vulnerabilities such as
unchecked buffers. This paper proposes transparent runtime randomization (TRR), a generalized …
unchecked buffers. This paper proposes transparent runtime randomization (TRR), a generalized …
[HTML][HTML] Adverse events in robotic surgery: a retrospective study of 14 years of FDA data
Background Use of robotic systems for minimally invasive surgery has rapidly increased
during the last decade. Understanding the causes of adverse events and their impact on …
during the last decade. Understanding the causes of adverse events and their impact on …
{FIRM}: An intelligent fine-grained resource management framework for {SLO-Oriented} microservices
User-facing latency-sensitive web services include numerous distributed, intercommunicating
microservices that promise to simplify software development and operation. However, …
microservices that promise to simplify software development and operation. However, …